Date
July 24, 2025, 4:41 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.140472] ================================================================== [ 35.140574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.140627] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.140680] [ 35.140712] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.140933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.140998] Hardware name: linux,dummy-virt (DT) [ 35.141033] Call trace: [ 35.141072] show_stack+0x20/0x38 (C) [ 35.141124] dump_stack_lvl+0x8c/0xd0 [ 35.141198] print_report+0x118/0x5e8 [ 35.141262] kasan_report+0xdc/0x128 [ 35.141307] __asan_report_load4_noabort+0x20/0x30 [ 35.141358] kasan_atomics_helper+0x3e04/0x4858 [ 35.141408] kasan_atomics+0x198/0x2e0 [ 35.141458] kunit_try_run_case+0x170/0x3f0 [ 35.141625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.141683] kthread+0x328/0x630 [ 35.141728] ret_from_fork+0x10/0x20 [ 35.141791] [ 35.141811] Allocated by task 296: [ 35.141842] kasan_save_stack+0x3c/0x68 [ 35.141883] kasan_save_track+0x20/0x40 [ 35.141920] kasan_save_alloc_info+0x40/0x58 [ 35.142116] __kasan_kmalloc+0xd4/0xd8 [ 35.142168] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.142228] kasan_atomics+0xb8/0x2e0 [ 35.142304] kunit_try_run_case+0x170/0x3f0 [ 35.142361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142409] kthread+0x328/0x630 [ 35.142443] ret_from_fork+0x10/0x20 [ 35.142479] [ 35.142505] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.142505] which belongs to the cache kmalloc-64 of size 64 [ 35.142671] The buggy address is located 0 bytes to the right of [ 35.142671] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.142807] [ 35.142836] The buggy address belongs to the physical page: [ 35.142902] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.143001] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.143091] page_type: f5(slab) [ 35.143159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.143211] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.143255] page dumped because: kasan: bad access detected [ 35.143287] [ 35.143309] Memory state around the buggy address: [ 35.143340] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.143691] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.143842] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.143923] ^ [ 35.143992] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.144310] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.144418] ================================================================== [ 35.278182] ================================================================== [ 35.278257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 35.278349] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.278401] [ 35.278459] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.278547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.278578] Hardware name: linux,dummy-virt (DT) [ 35.278610] Call trace: [ 35.278674] show_stack+0x20/0x38 (C) [ 35.278833] dump_stack_lvl+0x8c/0xd0 [ 35.278896] print_report+0x118/0x5e8 [ 35.278941] kasan_report+0xdc/0x128 [ 35.279000] kasan_check_range+0x100/0x1a8 [ 35.279094] __kasan_check_write+0x20/0x30 [ 35.279268] kasan_atomics_helper+0x16d0/0x4858 [ 35.279344] kasan_atomics+0x198/0x2e0 [ 35.279698] kunit_try_run_case+0x170/0x3f0 [ 35.279824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.279919] kthread+0x328/0x630 [ 35.280008] ret_from_fork+0x10/0x20 [ 35.280156] [ 35.280216] Allocated by task 296: [ 35.280352] kasan_save_stack+0x3c/0x68 [ 35.280413] kasan_save_track+0x20/0x40 [ 35.280450] kasan_save_alloc_info+0x40/0x58 [ 35.280491] __kasan_kmalloc+0xd4/0xd8 [ 35.280706] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.280769] kasan_atomics+0xb8/0x2e0 [ 35.280810] kunit_try_run_case+0x170/0x3f0 [ 35.281041] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.281164] kthread+0x328/0x630 [ 35.281473] ret_from_fork+0x10/0x20 [ 35.281568] [ 35.281639] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.281639] which belongs to the cache kmalloc-64 of size 64 [ 35.281828] The buggy address is located 0 bytes to the right of [ 35.281828] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.281908] [ 35.281932] The buggy address belongs to the physical page: [ 35.282213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.282277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.282391] page_type: f5(slab) [ 35.282432] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.282486] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.282530] page dumped because: kasan: bad access detected [ 35.282764] [ 35.282845] Memory state around the buggy address: [ 35.282893] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.282956] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.283058] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.283101] ^ [ 35.283137] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.283182] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.283261] ================================================================== [ 35.283513] ================================================================== [ 35.283562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 35.283627] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.283712] [ 35.283793] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.283883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.283918] Hardware name: linux,dummy-virt (DT) [ 35.283955] Call trace: [ 35.283982] show_stack+0x20/0x38 (C) [ 35.284041] dump_stack_lvl+0x8c/0xd0 [ 35.284091] print_report+0x118/0x5e8 [ 35.284137] kasan_report+0xdc/0x128 [ 35.284182] __asan_report_load8_noabort+0x20/0x30 [ 35.284247] kasan_atomics_helper+0x3e10/0x4858 [ 35.284307] kasan_atomics+0x198/0x2e0 [ 35.284357] kunit_try_run_case+0x170/0x3f0 [ 35.284406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.284461] kthread+0x328/0x630 [ 35.284525] ret_from_fork+0x10/0x20 [ 35.284584] [ 35.284607] Allocated by task 296: [ 35.284637] kasan_save_stack+0x3c/0x68 [ 35.284687] kasan_save_track+0x20/0x40 [ 35.284725] kasan_save_alloc_info+0x40/0x58 [ 35.284776] __kasan_kmalloc+0xd4/0xd8 [ 35.284811] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.284855] kasan_atomics+0xb8/0x2e0 [ 35.284893] kunit_try_run_case+0x170/0x3f0 [ 35.284932] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.284977] kthread+0x328/0x630 [ 35.285011] ret_from_fork+0x10/0x20 [ 35.285050] [ 35.285070] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.285070] which belongs to the cache kmalloc-64 of size 64 [ 35.285401] The buggy address is located 0 bytes to the right of [ 35.285401] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.285510] [ 35.285535] The buggy address belongs to the physical page: [ 35.285592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.285929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.286003] page_type: f5(slab) [ 35.286054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.286113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.286172] page dumped because: kasan: bad access detected [ 35.286208] [ 35.286247] Memory state around the buggy address: [ 35.286282] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.286355] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.286403] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.286444] ^ [ 35.286477] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.286522] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.286565] ================================================================== [ 35.160647] ================================================================== [ 35.160695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.160772] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.160823] [ 35.160855] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.160940] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.160970] Hardware name: linux,dummy-virt (DT) [ 35.161056] Call trace: [ 35.161082] show_stack+0x20/0x38 (C) [ 35.161133] dump_stack_lvl+0x8c/0xd0 [ 35.161300] print_report+0x118/0x5e8 [ 35.161390] kasan_report+0xdc/0x128 [ 35.161480] __asan_report_store8_noabort+0x20/0x30 [ 35.161534] kasan_atomics_helper+0x3e5c/0x4858 [ 35.161587] kasan_atomics+0x198/0x2e0 [ 35.161655] kunit_try_run_case+0x170/0x3f0 [ 35.161811] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.161872] kthread+0x328/0x630 [ 35.161918] ret_from_fork+0x10/0x20 [ 35.162040] [ 35.162068] Allocated by task 296: [ 35.162101] kasan_save_stack+0x3c/0x68 [ 35.162150] kasan_save_track+0x20/0x40 [ 35.162187] kasan_save_alloc_info+0x40/0x58 [ 35.162227] __kasan_kmalloc+0xd4/0xd8 [ 35.162264] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.162443] kasan_atomics+0xb8/0x2e0 [ 35.162501] kunit_try_run_case+0x170/0x3f0 [ 35.162577] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.162644] kthread+0x328/0x630 [ 35.162679] ret_from_fork+0x10/0x20 [ 35.162918] [ 35.162989] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.162989] which belongs to the cache kmalloc-64 of size 64 [ 35.163095] The buggy address is located 0 bytes to the right of [ 35.163095] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.163175] [ 35.163215] The buggy address belongs to the physical page: [ 35.163271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.163328] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.163594] page_type: f5(slab) [ 35.163644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.163697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.163740] page dumped because: kasan: bad access detected [ 35.163784] [ 35.163899] Memory state around the buggy address: [ 35.163965] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.164013] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.164068] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.164152] ^ [ 35.164259] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.164342] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.164384] ================================================================== [ 35.206807] ================================================================== [ 35.207100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 35.207166] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.207490] [ 35.207561] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.207714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.207742] Hardware name: linux,dummy-virt (DT) [ 35.207789] Call trace: [ 35.207822] show_stack+0x20/0x38 (C) [ 35.207875] dump_stack_lvl+0x8c/0xd0 [ 35.207947] print_report+0x118/0x5e8 [ 35.207994] kasan_report+0xdc/0x128 [ 35.208039] kasan_check_range+0x100/0x1a8 [ 35.208085] __kasan_check_write+0x20/0x30 [ 35.208133] kasan_atomics_helper+0x11f8/0x4858 [ 35.208348] kasan_atomics+0x198/0x2e0 [ 35.208445] kunit_try_run_case+0x170/0x3f0 [ 35.208597] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.208701] kthread+0x328/0x630 [ 35.209039] ret_from_fork+0x10/0x20 [ 35.209140] [ 35.209201] Allocated by task 296: [ 35.209279] kasan_save_stack+0x3c/0x68 [ 35.209396] kasan_save_track+0x20/0x40 [ 35.209452] kasan_save_alloc_info+0x40/0x58 [ 35.209493] __kasan_kmalloc+0xd4/0xd8 [ 35.209531] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.209584] kasan_atomics+0xb8/0x2e0 [ 35.209624] kunit_try_run_case+0x170/0x3f0 [ 35.209675] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.209721] kthread+0x328/0x630 [ 35.209767] ret_from_fork+0x10/0x20 [ 35.209806] [ 35.209828] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.209828] which belongs to the cache kmalloc-64 of size 64 [ 35.209915] The buggy address is located 0 bytes to the right of [ 35.209915] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.209981] [ 35.210011] The buggy address belongs to the physical page: [ 35.210065] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.210148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.210205] page_type: f5(slab) [ 35.210246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.210297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.210342] page dumped because: kasan: bad access detected [ 35.210375] [ 35.210396] Memory state around the buggy address: [ 35.210444] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.210491] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.210535] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.210576] ^ [ 35.210619] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.210682] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.210725] ================================================================== [ 35.150464] ================================================================== [ 35.150518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.150573] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.150623] [ 35.150928] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.151103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.151388] Hardware name: linux,dummy-virt (DT) [ 35.151458] Call trace: [ 35.151530] show_stack+0x20/0x38 (C) [ 35.151595] dump_stack_lvl+0x8c/0xd0 [ 35.151646] print_report+0x118/0x5e8 [ 35.151694] kasan_report+0xdc/0x128 [ 35.151741] __asan_report_load8_noabort+0x20/0x30 [ 35.151840] kasan_atomics_helper+0x3f58/0x4858 [ 35.151894] kasan_atomics+0x198/0x2e0 [ 35.152054] kunit_try_run_case+0x170/0x3f0 [ 35.152140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.152217] kthread+0x328/0x630 [ 35.152352] ret_from_fork+0x10/0x20 [ 35.152469] [ 35.152492] Allocated by task 296: [ 35.152523] kasan_save_stack+0x3c/0x68 [ 35.152565] kasan_save_track+0x20/0x40 [ 35.152741] kasan_save_alloc_info+0x40/0x58 [ 35.152840] __kasan_kmalloc+0xd4/0xd8 [ 35.152890] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.152947] kasan_atomics+0xb8/0x2e0 [ 35.153026] kunit_try_run_case+0x170/0x3f0 [ 35.153119] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.153176] kthread+0x328/0x630 [ 35.153210] ret_from_fork+0x10/0x20 [ 35.153249] [ 35.153271] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.153271] which belongs to the cache kmalloc-64 of size 64 [ 35.153370] The buggy address is located 0 bytes to the right of [ 35.153370] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.153534] [ 35.153585] The buggy address belongs to the physical page: [ 35.153642] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.153722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.153850] page_type: f5(slab) [ 35.153908] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.153960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.154002] page dumped because: kasan: bad access detected [ 35.154162] [ 35.154186] Memory state around the buggy address: [ 35.154222] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.154271] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.154483] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.154542] ^ [ 35.154609] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.154689] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.154997] ================================================================== [ 35.259976] ================================================================== [ 35.260095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 35.260149] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.260201] [ 35.260238] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.260450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.260485] Hardware name: linux,dummy-virt (DT) [ 35.260614] Call trace: [ 35.260649] show_stack+0x20/0x38 (C) [ 35.260771] dump_stack_lvl+0x8c/0xd0 [ 35.260849] print_report+0x118/0x5e8 [ 35.260915] kasan_report+0xdc/0x128 [ 35.261265] kasan_check_range+0x100/0x1a8 [ 35.261329] __kasan_check_write+0x20/0x30 [ 35.261379] kasan_atomics_helper+0x15b4/0x4858 [ 35.261494] kasan_atomics+0x198/0x2e0 [ 35.261546] kunit_try_run_case+0x170/0x3f0 [ 35.261601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.261720] kthread+0x328/0x630 [ 35.261802] ret_from_fork+0x10/0x20 [ 35.261861] [ 35.261901] Allocated by task 296: [ 35.261960] kasan_save_stack+0x3c/0x68 [ 35.262003] kasan_save_track+0x20/0x40 [ 35.262041] kasan_save_alloc_info+0x40/0x58 [ 35.262081] __kasan_kmalloc+0xd4/0xd8 [ 35.262123] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.262166] kasan_atomics+0xb8/0x2e0 [ 35.262315] kunit_try_run_case+0x170/0x3f0 [ 35.262453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262528] kthread+0x328/0x630 [ 35.262565] ret_from_fork+0x10/0x20 [ 35.262604] [ 35.262626] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.262626] which belongs to the cache kmalloc-64 of size 64 [ 35.262705] The buggy address is located 0 bytes to the right of [ 35.262705] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.262792] [ 35.262815] The buggy address belongs to the physical page: [ 35.262861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.262916] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.262967] page_type: f5(slab) [ 35.263005] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.263059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.263101] page dumped because: kasan: bad access detected [ 35.263140] [ 35.263161] Memory state around the buggy address: [ 35.263196] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.263242] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.263289] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.263329] ^ [ 35.263366] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.263418] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.263459] ================================================================== [ 35.243449] ================================================================== [ 35.243502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 35.243559] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.243611] [ 35.243665] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.243766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.243819] Hardware name: linux,dummy-virt (DT) [ 35.243893] Call trace: [ 35.243952] show_stack+0x20/0x38 (C) [ 35.244003] dump_stack_lvl+0x8c/0xd0 [ 35.244081] print_report+0x118/0x5e8 [ 35.244148] kasan_report+0xdc/0x128 [ 35.244193] kasan_check_range+0x100/0x1a8 [ 35.244259] __kasan_check_write+0x20/0x30 [ 35.244317] kasan_atomics_helper+0x147c/0x4858 [ 35.244369] kasan_atomics+0x198/0x2e0 [ 35.244438] kunit_try_run_case+0x170/0x3f0 [ 35.244487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.244542] kthread+0x328/0x630 [ 35.244601] ret_from_fork+0x10/0x20 [ 35.244678] [ 35.244702] Allocated by task 296: [ 35.244732] kasan_save_stack+0x3c/0x68 [ 35.244782] kasan_save_track+0x20/0x40 [ 35.244843] kasan_save_alloc_info+0x40/0x58 [ 35.244884] __kasan_kmalloc+0xd4/0xd8 [ 35.244921] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.244965] kasan_atomics+0xb8/0x2e0 [ 35.245004] kunit_try_run_case+0x170/0x3f0 [ 35.245266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.245331] kthread+0x328/0x630 [ 35.245725] ret_from_fork+0x10/0x20 [ 35.245803] [ 35.245881] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.245881] which belongs to the cache kmalloc-64 of size 64 [ 35.245962] The buggy address is located 0 bytes to the right of [ 35.245962] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.246032] [ 35.246332] The buggy address belongs to the physical page: [ 35.246394] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.246452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.246506] page_type: f5(slab) [ 35.247004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.247246] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.247324] page dumped because: kasan: bad access detected [ 35.247362] [ 35.247413] Memory state around the buggy address: [ 35.247459] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.247517] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.247563] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.247605] ^ [ 35.247821] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.248781] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.248832] ================================================================== [ 35.286899] ================================================================== [ 35.287014] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 35.287121] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.287268] [ 35.287650] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.287862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.287941] Hardware name: linux,dummy-virt (DT) [ 35.288015] Call trace: [ 35.288116] show_stack+0x20/0x38 (C) [ 35.288224] dump_stack_lvl+0x8c/0xd0 [ 35.288329] print_report+0x118/0x5e8 [ 35.289690] kasan_report+0xdc/0x128 [ 35.290794] kasan_check_range+0x100/0x1a8 [ 35.290864] __kasan_check_write+0x20/0x30 [ 35.291007] kasan_atomics_helper+0x175c/0x4858 [ 35.291175] kasan_atomics+0x198/0x2e0 [ 35.291229] kunit_try_run_case+0x170/0x3f0 [ 35.291329] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291445] kthread+0x328/0x630 [ 35.291589] ret_from_fork+0x10/0x20 [ 35.291713] [ 35.291937] Allocated by task 296: [ 35.291972] kasan_save_stack+0x3c/0x68 [ 35.292017] kasan_save_track+0x20/0x40 [ 35.292104] kasan_save_alloc_info+0x40/0x58 [ 35.292207] __kasan_kmalloc+0xd4/0xd8 [ 35.292371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.292470] kasan_atomics+0xb8/0x2e0 [ 35.292520] kunit_try_run_case+0x170/0x3f0 [ 35.292560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.292801] kthread+0x328/0x630 [ 35.292839] ret_from_fork+0x10/0x20 [ 35.292892] [ 35.292914] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.292914] which belongs to the cache kmalloc-64 of size 64 [ 35.292977] The buggy address is located 0 bytes to the right of [ 35.292977] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.293135] [ 35.293216] The buggy address belongs to the physical page: [ 35.293271] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.293342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.293401] page_type: f5(slab) [ 35.293442] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.293501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.293543] page dumped because: kasan: bad access detected [ 35.293583] [ 35.293603] Memory state around the buggy address: [ 35.293639] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.293684] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.293732] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.293783] ^ [ 35.293817] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.293861] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.293905] ================================================================== [ 35.294455] ================================================================== [ 35.294507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 35.294724] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.294792] [ 35.294828] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.294958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.295046] Hardware name: linux,dummy-virt (DT) [ 35.295170] Call trace: [ 35.295232] show_stack+0x20/0x38 (C) [ 35.295373] dump_stack_lvl+0x8c/0xd0 [ 35.295451] print_report+0x118/0x5e8 [ 35.295578] kasan_report+0xdc/0x128 [ 35.295739] __asan_report_load8_noabort+0x20/0x30 [ 35.295836] kasan_atomics_helper+0x3e20/0x4858 [ 35.296073] kasan_atomics+0x198/0x2e0 [ 35.296123] kunit_try_run_case+0x170/0x3f0 [ 35.296171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.296281] kthread+0x328/0x630 [ 35.296326] ret_from_fork+0x10/0x20 [ 35.296400] [ 35.296507] Allocated by task 296: [ 35.296575] kasan_save_stack+0x3c/0x68 [ 35.296720] kasan_save_track+0x20/0x40 [ 35.296803] kasan_save_alloc_info+0x40/0x58 [ 35.297049] __kasan_kmalloc+0xd4/0xd8 [ 35.297090] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.297133] kasan_atomics+0xb8/0x2e0 [ 35.297204] kunit_try_run_case+0x170/0x3f0 [ 35.298139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.298217] kthread+0x328/0x630 [ 35.298255] ret_from_fork+0x10/0x20 [ 35.298318] [ 35.298391] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.298391] which belongs to the cache kmalloc-64 of size 64 [ 35.298821] The buggy address is located 0 bytes to the right of [ 35.298821] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.298974] [ 35.299074] The buggy address belongs to the physical page: [ 35.299165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.299268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.299322] page_type: f5(slab) [ 35.299522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.299575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.299618] page dumped because: kasan: bad access detected [ 35.299652] [ 35.299673] Memory state around the buggy address: [ 35.299708] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.299775] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.299820] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.299905] ^ [ 35.299973] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.300113] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.300155] ================================================================== [ 35.181761] ================================================================== [ 35.182052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.182148] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.182203] [ 35.182235] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.182322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.182351] Hardware name: linux,dummy-virt (DT) [ 35.182384] Call trace: [ 35.182429] show_stack+0x20/0x38 (C) [ 35.182478] dump_stack_lvl+0x8c/0xd0 [ 35.182525] print_report+0x118/0x5e8 [ 35.182570] kasan_report+0xdc/0x128 [ 35.182634] kasan_check_range+0x100/0x1a8 [ 35.182682] __kasan_check_write+0x20/0x30 [ 35.182730] kasan_atomics_helper+0xff0/0x4858 [ 35.182792] kasan_atomics+0x198/0x2e0 [ 35.182850] kunit_try_run_case+0x170/0x3f0 [ 35.182909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.182972] kthread+0x328/0x630 [ 35.183018] ret_from_fork+0x10/0x20 [ 35.183064] [ 35.183094] Allocated by task 296: [ 35.183124] kasan_save_stack+0x3c/0x68 [ 35.183164] kasan_save_track+0x20/0x40 [ 35.183202] kasan_save_alloc_info+0x40/0x58 [ 35.183249] __kasan_kmalloc+0xd4/0xd8 [ 35.183303] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.183347] kasan_atomics+0xb8/0x2e0 [ 35.183401] kunit_try_run_case+0x170/0x3f0 [ 35.183442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.183488] kthread+0x328/0x630 [ 35.183531] ret_from_fork+0x10/0x20 [ 35.183570] [ 35.183591] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.183591] which belongs to the cache kmalloc-64 of size 64 [ 35.183651] The buggy address is located 0 bytes to the right of [ 35.183651] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.183723] [ 35.183756] The buggy address belongs to the physical page: [ 35.183792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.183846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.183894] page_type: f5(slab) [ 35.183933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.183987] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.184029] page dumped because: kasan: bad access detected [ 35.184062] [ 35.184082] Memory state around the buggy address: [ 35.184665] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.184777] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.184873] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.185041] ^ [ 35.185080] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.185125] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.185166] ================================================================== [ 35.176596] ================================================================== [ 35.176671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.176741] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.176806] [ 35.177054] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.177267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.177297] Hardware name: linux,dummy-virt (DT) [ 35.177437] Call trace: [ 35.177466] show_stack+0x20/0x38 (C) [ 35.177520] dump_stack_lvl+0x8c/0xd0 [ 35.177649] print_report+0x118/0x5e8 [ 35.177773] kasan_report+0xdc/0x128 [ 35.177839] kasan_check_range+0x100/0x1a8 [ 35.177890] __kasan_check_write+0x20/0x30 [ 35.178096] kasan_atomics_helper+0xf88/0x4858 [ 35.178358] kasan_atomics+0x198/0x2e0 [ 35.178423] kunit_try_run_case+0x170/0x3f0 [ 35.178473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.178539] kthread+0x328/0x630 [ 35.178583] ret_from_fork+0x10/0x20 [ 35.178641] [ 35.178664] Allocated by task 296: [ 35.178700] kasan_save_stack+0x3c/0x68 [ 35.178741] kasan_save_track+0x20/0x40 [ 35.178790] kasan_save_alloc_info+0x40/0x58 [ 35.178831] __kasan_kmalloc+0xd4/0xd8 [ 35.178910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.179159] kasan_atomics+0xb8/0x2e0 [ 35.179290] kunit_try_run_case+0x170/0x3f0 [ 35.179391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.179479] kthread+0x328/0x630 [ 35.179558] ret_from_fork+0x10/0x20 [ 35.179650] [ 35.179710] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.179710] which belongs to the cache kmalloc-64 of size 64 [ 35.179786] The buggy address is located 0 bytes to the right of [ 35.179786] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.179891] [ 35.179914] The buggy address belongs to the physical page: [ 35.179954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.180008] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.180061] page_type: f5(slab) [ 35.180099] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.180255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.180369] page dumped because: kasan: bad access detected [ 35.180427] [ 35.180491] Memory state around the buggy address: [ 35.180739] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.180848] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.180925] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.180994] ^ [ 35.181068] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.181131] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.181199] ================================================================== [ 35.145071] ================================================================== [ 35.145144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.145206] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.145256] [ 35.145296] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.145393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.145433] Hardware name: linux,dummy-virt (DT) [ 35.145467] Call trace: [ 35.145492] show_stack+0x20/0x38 (C) [ 35.145541] dump_stack_lvl+0x8c/0xd0 [ 35.145588] print_report+0x118/0x5e8 [ 35.145633] kasan_report+0xdc/0x128 [ 35.145678] kasan_check_range+0x100/0x1a8 [ 35.145735] __kasan_check_read+0x20/0x30 [ 35.145796] kasan_atomics_helper+0xdd4/0x4858 [ 35.145845] kasan_atomics+0x198/0x2e0 [ 35.145893] kunit_try_run_case+0x170/0x3f0 [ 35.145942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.146005] kthread+0x328/0x630 [ 35.146057] ret_from_fork+0x10/0x20 [ 35.146112] [ 35.146140] Allocated by task 296: [ 35.146178] kasan_save_stack+0x3c/0x68 [ 35.146220] kasan_save_track+0x20/0x40 [ 35.146258] kasan_save_alloc_info+0x40/0x58 [ 35.146298] __kasan_kmalloc+0xd4/0xd8 [ 35.146333] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.146387] kasan_atomics+0xb8/0x2e0 [ 35.146436] kunit_try_run_case+0x170/0x3f0 [ 35.146477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.146522] kthread+0x328/0x630 [ 35.146564] ret_from_fork+0x10/0x20 [ 35.146601] [ 35.146624] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.146624] which belongs to the cache kmalloc-64 of size 64 [ 35.146682] The buggy address is located 0 bytes to the right of [ 35.146682] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.147442] [ 35.147493] The buggy address belongs to the physical page: [ 35.147543] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.147602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.147652] page_type: f5(slab) [ 35.147691] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.147994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.148287] page dumped because: kasan: bad access detected [ 35.148391] [ 35.148451] Memory state around the buggy address: [ 35.148766] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.148887] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.149048] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.149143] ^ [ 35.149272] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.149318] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.149359] ================================================================== [ 35.223744] ================================================================== [ 35.224072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 35.224303] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.224385] [ 35.224420] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.224776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.224834] Hardware name: linux,dummy-virt (DT) [ 35.225052] Call trace: [ 35.225147] show_stack+0x20/0x38 (C) [ 35.225206] dump_stack_lvl+0x8c/0xd0 [ 35.225403] print_report+0x118/0x5e8 [ 35.225451] kasan_report+0xdc/0x128 [ 35.225496] kasan_check_range+0x100/0x1a8 [ 35.225543] __kasan_check_write+0x20/0x30 [ 35.225593] kasan_atomics_helper+0x1384/0x4858 [ 35.225645] kasan_atomics+0x198/0x2e0 [ 35.225692] kunit_try_run_case+0x170/0x3f0 [ 35.225741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.225829] kthread+0x328/0x630 [ 35.225875] ret_from_fork+0x10/0x20 [ 35.225925] [ 35.225948] Allocated by task 296: [ 35.225978] kasan_save_stack+0x3c/0x68 [ 35.226019] kasan_save_track+0x20/0x40 [ 35.226056] kasan_save_alloc_info+0x40/0x58 [ 35.226097] __kasan_kmalloc+0xd4/0xd8 [ 35.226139] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.226191] kasan_atomics+0xb8/0x2e0 [ 35.226231] kunit_try_run_case+0x170/0x3f0 [ 35.226272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.226317] kthread+0x328/0x630 [ 35.226362] ret_from_fork+0x10/0x20 [ 35.226409] [ 35.226452] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.226452] which belongs to the cache kmalloc-64 of size 64 [ 35.226514] The buggy address is located 0 bytes to the right of [ 35.226514] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.226580] [ 35.226602] The buggy address belongs to the physical page: [ 35.226643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.226695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226754] page_type: f5(slab) [ 35.227177] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.227248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.227292] page dumped because: kasan: bad access detected [ 35.227335] [ 35.227378] Memory state around the buggy address: [ 35.227416] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.227858] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.227955] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.228596] ^ [ 35.228646] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.228694] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.228735] ================================================================== [ 35.196738] ================================================================== [ 35.196802] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.196879] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.196950] [ 35.196981] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.197070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.197097] Hardware name: linux,dummy-virt (DT) [ 35.197130] Call trace: [ 35.197155] show_stack+0x20/0x38 (C) [ 35.197366] dump_stack_lvl+0x8c/0xd0 [ 35.197425] print_report+0x118/0x5e8 [ 35.197499] kasan_report+0xdc/0x128 [ 35.197544] kasan_check_range+0x100/0x1a8 [ 35.197610] __kasan_check_write+0x20/0x30 [ 35.197676] kasan_atomics_helper+0x1128/0x4858 [ 35.197731] kasan_atomics+0x198/0x2e0 [ 35.197794] kunit_try_run_case+0x170/0x3f0 [ 35.197842] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.197896] kthread+0x328/0x630 [ 35.197958] ret_from_fork+0x10/0x20 [ 35.198010] [ 35.198168] Allocated by task 296: [ 35.198227] kasan_save_stack+0x3c/0x68 [ 35.198272] kasan_save_track+0x20/0x40 [ 35.198308] kasan_save_alloc_info+0x40/0x58 [ 35.198349] __kasan_kmalloc+0xd4/0xd8 [ 35.198387] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.198429] kasan_atomics+0xb8/0x2e0 [ 35.198586] kunit_try_run_case+0x170/0x3f0 [ 35.198782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.198853] kthread+0x328/0x630 [ 35.198892] ret_from_fork+0x10/0x20 [ 35.198930] [ 35.198953] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.198953] which belongs to the cache kmalloc-64 of size 64 [ 35.199026] The buggy address is located 0 bytes to the right of [ 35.199026] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.199093] [ 35.199116] The buggy address belongs to the physical page: [ 35.199306] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.199405] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.199473] page_type: f5(slab) [ 35.199549] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.199809] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.199941] page dumped because: kasan: bad access detected [ 35.200030] [ 35.200066] Memory state around the buggy address: [ 35.200103] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.200149] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.200337] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.200384] ^ [ 35.200420] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.200589] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.200674] ================================================================== [ 35.253637] ================================================================== [ 35.253686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 35.253736] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.253908] [ 35.254166] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.254371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.254429] Hardware name: linux,dummy-virt (DT) [ 35.254464] Call trace: [ 35.254533] show_stack+0x20/0x38 (C) [ 35.254601] dump_stack_lvl+0x8c/0xd0 [ 35.254654] print_report+0x118/0x5e8 [ 35.254713] kasan_report+0xdc/0x128 [ 35.254779] kasan_check_range+0x100/0x1a8 [ 35.254826] __kasan_check_write+0x20/0x30 [ 35.254874] kasan_atomics_helper+0x154c/0x4858 [ 35.254925] kasan_atomics+0x198/0x2e0 [ 35.254987] kunit_try_run_case+0x170/0x3f0 [ 35.255035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.255228] kthread+0x328/0x630 [ 35.255326] ret_from_fork+0x10/0x20 [ 35.255463] [ 35.255519] Allocated by task 296: [ 35.255587] kasan_save_stack+0x3c/0x68 [ 35.255859] kasan_save_track+0x20/0x40 [ 35.255977] kasan_save_alloc_info+0x40/0x58 [ 35.256060] __kasan_kmalloc+0xd4/0xd8 [ 35.256172] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.256218] kasan_atomics+0xb8/0x2e0 [ 35.256274] kunit_try_run_case+0x170/0x3f0 [ 35.256321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.256366] kthread+0x328/0x630 [ 35.256709] ret_from_fork+0x10/0x20 [ 35.256842] [ 35.256894] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.256894] which belongs to the cache kmalloc-64 of size 64 [ 35.257125] The buggy address is located 0 bytes to the right of [ 35.257125] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.257296] [ 35.257391] The buggy address belongs to the physical page: [ 35.257495] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.257606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.257678] page_type: f5(slab) [ 35.257868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.258022] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.258178] page dumped because: kasan: bad access detected [ 35.258270] [ 35.258446] Memory state around the buggy address: [ 35.258597] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.258649] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.258695] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.258738] ^ [ 35.258807] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.258863] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.258904] ================================================================== [ 35.136198] ================================================================== [ 35.136281] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.136372] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.136424] [ 35.136485] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.136594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.136639] Hardware name: linux,dummy-virt (DT) [ 35.136674] Call trace: [ 35.136698] show_stack+0x20/0x38 (C) [ 35.136759] dump_stack_lvl+0x8c/0xd0 [ 35.136810] print_report+0x118/0x5e8 [ 35.136854] kasan_report+0xdc/0x128 [ 35.137031] kasan_check_range+0x100/0x1a8 [ 35.137082] __kasan_check_write+0x20/0x30 [ 35.137133] kasan_atomics_helper+0xd3c/0x4858 [ 35.137207] kasan_atomics+0x198/0x2e0 [ 35.137264] kunit_try_run_case+0x170/0x3f0 [ 35.137327] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.137382] kthread+0x328/0x630 [ 35.137440] ret_from_fork+0x10/0x20 [ 35.137521] [ 35.137544] Allocated by task 296: [ 35.137594] kasan_save_stack+0x3c/0x68 [ 35.137650] kasan_save_track+0x20/0x40 [ 35.137847] kasan_save_alloc_info+0x40/0x58 [ 35.138069] __kasan_kmalloc+0xd4/0xd8 [ 35.138159] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.138251] kasan_atomics+0xb8/0x2e0 [ 35.138320] kunit_try_run_case+0x170/0x3f0 [ 35.138361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.138405] kthread+0x328/0x630 [ 35.138441] ret_from_fork+0x10/0x20 [ 35.138478] [ 35.138499] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.138499] which belongs to the cache kmalloc-64 of size 64 [ 35.138561] The buggy address is located 0 bytes to the right of [ 35.138561] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.138626] [ 35.138785] The buggy address belongs to the physical page: [ 35.138861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.138941] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.139011] page_type: f5(slab) [ 35.139239] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.139382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.139440] page dumped because: kasan: bad access detected [ 35.139513] [ 35.139659] Memory state around the buggy address: [ 35.139730] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.139851] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.140012] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.140092] ^ [ 35.140167] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.140218] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.140281] ================================================================== [ 35.170998] ================================================================== [ 35.171341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.171448] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.171744] [ 35.171823] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.171941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.172018] Hardware name: linux,dummy-virt (DT) [ 35.172070] Call trace: [ 35.172132] show_stack+0x20/0x38 (C) [ 35.172192] dump_stack_lvl+0x8c/0xd0 [ 35.172263] print_report+0x118/0x5e8 [ 35.172319] kasan_report+0xdc/0x128 [ 35.172365] kasan_check_range+0x100/0x1a8 [ 35.172413] __kasan_check_write+0x20/0x30 [ 35.172461] kasan_atomics_helper+0xf20/0x4858 [ 35.172515] kasan_atomics+0x198/0x2e0 [ 35.172561] kunit_try_run_case+0x170/0x3f0 [ 35.172620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.172684] kthread+0x328/0x630 [ 35.172735] ret_from_fork+0x10/0x20 [ 35.172797] [ 35.172817] Allocated by task 296: [ 35.172848] kasan_save_stack+0x3c/0x68 [ 35.172887] kasan_save_track+0x20/0x40 [ 35.172926] kasan_save_alloc_info+0x40/0x58 [ 35.173002] __kasan_kmalloc+0xd4/0xd8 [ 35.173212] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.173329] kasan_atomics+0xb8/0x2e0 [ 35.173405] kunit_try_run_case+0x170/0x3f0 [ 35.173490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.173547] kthread+0x328/0x630 [ 35.173583] ret_from_fork+0x10/0x20 [ 35.173620] [ 35.173644] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.173644] which belongs to the cache kmalloc-64 of size 64 [ 35.173756] The buggy address is located 0 bytes to the right of [ 35.173756] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.173964] [ 35.174072] The buggy address belongs to the physical page: [ 35.174145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.174459] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.174557] page_type: f5(slab) [ 35.174682] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.174765] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.174840] page dumped because: kasan: bad access detected [ 35.174988] [ 35.175009] Memory state around the buggy address: [ 35.175042] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.175148] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.175195] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.175236] ^ [ 35.175360] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.175474] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.175543] ================================================================== [ 35.300482] ================================================================== [ 35.300534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 35.300689] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.300780] [ 35.300816] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.300911] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.300970] Hardware name: linux,dummy-virt (DT) [ 35.301019] Call trace: [ 35.301047] show_stack+0x20/0x38 (C) [ 35.301122] dump_stack_lvl+0x8c/0xd0 [ 35.301172] print_report+0x118/0x5e8 [ 35.301222] kasan_report+0xdc/0x128 [ 35.301267] kasan_check_range+0x100/0x1a8 [ 35.301313] __kasan_check_write+0x20/0x30 [ 35.301362] kasan_atomics_helper+0x17ec/0x4858 [ 35.301418] kasan_atomics+0x198/0x2e0 [ 35.301466] kunit_try_run_case+0x170/0x3f0 [ 35.301515] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.301573] kthread+0x328/0x630 [ 35.301617] ret_from_fork+0x10/0x20 [ 35.301666] [ 35.301689] Allocated by task 296: [ 35.301725] kasan_save_stack+0x3c/0x68 [ 35.302025] kasan_save_track+0x20/0x40 [ 35.302079] kasan_save_alloc_info+0x40/0x58 [ 35.302316] __kasan_kmalloc+0xd4/0xd8 [ 35.302371] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.302582] kasan_atomics+0xb8/0x2e0 [ 35.302636] kunit_try_run_case+0x170/0x3f0 [ 35.302677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.302721] kthread+0x328/0x630 [ 35.302768] ret_from_fork+0x10/0x20 [ 35.302832] [ 35.302858] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.302858] which belongs to the cache kmalloc-64 of size 64 [ 35.302923] The buggy address is located 0 bytes to the right of [ 35.302923] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.303043] [ 35.303068] The buggy address belongs to the physical page: [ 35.303129] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.303299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.303424] page_type: f5(slab) [ 35.303545] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.303628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.303720] page dumped because: kasan: bad access detected [ 35.304125] [ 35.304185] Memory state around the buggy address: [ 35.304221] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.304451] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.304642] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.304773] ^ [ 35.304851] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.304944] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.305314] ================================================================== [ 35.190922] ================================================================== [ 35.190983] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.191078] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.191183] [ 35.191254] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.191361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.191389] Hardware name: linux,dummy-virt (DT) [ 35.191462] Call trace: [ 35.191595] show_stack+0x20/0x38 (C) [ 35.191649] dump_stack_lvl+0x8c/0xd0 [ 35.191730] print_report+0x118/0x5e8 [ 35.191873] kasan_report+0xdc/0x128 [ 35.191940] kasan_check_range+0x100/0x1a8 [ 35.192055] __kasan_check_write+0x20/0x30 [ 35.192137] kasan_atomics_helper+0x10c0/0x4858 [ 35.192328] kasan_atomics+0x198/0x2e0 [ 35.192466] kunit_try_run_case+0x170/0x3f0 [ 35.192728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.193221] kthread+0x328/0x630 [ 35.193311] ret_from_fork+0x10/0x20 [ 35.193429] [ 35.193502] Allocated by task 296: [ 35.193576] kasan_save_stack+0x3c/0x68 [ 35.193765] kasan_save_track+0x20/0x40 [ 35.193945] kasan_save_alloc_info+0x40/0x58 [ 35.194077] __kasan_kmalloc+0xd4/0xd8 [ 35.194408] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.194511] kasan_atomics+0xb8/0x2e0 [ 35.194607] kunit_try_run_case+0x170/0x3f0 [ 35.194697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.194794] kthread+0x328/0x630 [ 35.194882] ret_from_fork+0x10/0x20 [ 35.194920] [ 35.194944] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.194944] which belongs to the cache kmalloc-64 of size 64 [ 35.195007] The buggy address is located 0 bytes to the right of [ 35.195007] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.195074] [ 35.195133] The buggy address belongs to the physical page: [ 35.195293] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.195418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.195502] page_type: f5(slab) [ 35.195557] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.195820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.195892] page dumped because: kasan: bad access detected [ 35.195951] [ 35.196004] Memory state around the buggy address: [ 35.196051] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.196116] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.196166] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.196207] ^ [ 35.196242] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.196320] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.196442] ================================================================== [ 35.076505] ================================================================== [ 35.076553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.076602] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.076653] [ 35.076684] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.076839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.076898] Hardware name: linux,dummy-virt (DT) [ 35.076957] Call trace: [ 35.077058] dump_stack_lvl+0x8c/0xd0 [ 35.078317] kasan_save_alloc_info+0x40/0x58 [ 35.079109] The buggy address is located 0 bytes to the right of [ 35.079109] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.080032] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.082368] print_report+0x118/0x5e8 [ 35.084262] kasan_atomics+0xb8/0x2e0 [ 35.084981] [ 35.085053] The buggy address belongs to the physical page: [ 35.085245] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.085445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.085570] page_type: f5(slab) [ 35.085649] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.085766] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.085862] page dumped because: kasan: bad access detected [ 35.085936] [ 35.086008] Memory state around the buggy address: [ 35.086074] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.086150] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.086196] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.086239] ^ [ 35.086403] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.086548] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.086593] ================================================================== [ 35.263538] ================================================================== [ 35.263580] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 35.263625] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.263676] [ 35.263708] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.263806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.263836] Hardware name: linux,dummy-virt (DT) [ 35.263868] Call trace: [ 35.263932] show_stack+0x20/0x38 (C) [ 35.263984] dump_stack_lvl+0x8c/0xd0 [ 35.264295] print_report+0x118/0x5e8 [ 35.264378] kasan_report+0xdc/0x128 [ 35.264466] __asan_report_load8_noabort+0x20/0x30 [ 35.264522] kasan_atomics_helper+0x3db0/0x4858 [ 35.264575] kasan_atomics+0x198/0x2e0 [ 35.264701] kunit_try_run_case+0x170/0x3f0 [ 35.264857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.264943] kthread+0x328/0x630 [ 35.264993] ret_from_fork+0x10/0x20 [ 35.265109] [ 35.265213] Allocated by task 296: [ 35.265282] kasan_save_stack+0x3c/0x68 [ 35.265601] kasan_save_track+0x20/0x40 [ 35.265651] kasan_save_alloc_info+0x40/0x58 [ 35.265728] __kasan_kmalloc+0xd4/0xd8 [ 35.265778] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.265821] kasan_atomics+0xb8/0x2e0 [ 35.265862] kunit_try_run_case+0x170/0x3f0 [ 35.265902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.265948] kthread+0x328/0x630 [ 35.266136] ret_from_fork+0x10/0x20 [ 35.266300] [ 35.266370] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.266370] which belongs to the cache kmalloc-64 of size 64 [ 35.266624] The buggy address is located 0 bytes to the right of [ 35.266624] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.266788] [ 35.266849] The buggy address belongs to the physical page: [ 35.266975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.267079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.267210] page_type: f5(slab) [ 35.267270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.267321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.267364] page dumped because: kasan: bad access detected [ 35.267397] [ 35.267418] Memory state around the buggy address: [ 35.267452] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.267500] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.267547] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.267707] ^ [ 35.267784] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.267844] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.267912] ================================================================== [ 35.086833] ================================================================== [ 35.087158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.087273] Write of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.087573] [ 35.087652] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.088348] __kasan_check_write+0x20/0x30 [ 35.090467] The buggy address is located 0 bytes to the right of [ 35.090467] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.090630] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.090687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.090737] page_type: f5(slab) [ 35.090806] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.091093] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.092929] [ 35.093535] print_report+0x118/0x5e8 [ 35.096068] [ 35.096301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.096394] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.096447] page_type: f5(slab) [ 35.096612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.096841] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.098585] ================================================================== [ 35.066538] ================================================================== [ 35.066584] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.066632] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.066683] [ 35.066715] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.067137] Call trace: [ 35.068255] Allocated by task 296: [ 35.069537] [ 35.070094] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.070819] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.072307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.073611] kasan_save_track+0x20/0x40 [ 35.073711] __kasan_kmalloc+0xd4/0xd8 [ 35.073762] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.074018] kasan_atomics+0xb8/0x2e0 [ 35.074091] kunit_try_run_case+0x170/0x3f0 [ 35.074146] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.074204] kthread+0x328/0x630 [ 35.074254] ret_from_fork+0x10/0x20 [ 35.074293] [ 35.074354] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.074354] which belongs to the cache kmalloc-64 of size 64 [ 35.074438] The buggy address is located 0 bytes to the right of [ 35.074438] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.074730] [ 35.074809] The buggy address belongs to the physical page: [ 35.074868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.074996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.075053] page_type: f5(slab) [ 35.075093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.075351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.075445] page dumped because: kasan: bad access detected [ 35.075526] [ 35.075587] Memory state around the buggy address: [ 35.075677] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.075770] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.075815] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.075866] ^ [ 35.075902] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.076235] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.076282] ================================================================== [ 35.155713] ================================================================== [ 35.155808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.155861] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.156035] [ 35.156072] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.156160] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.156189] Hardware name: linux,dummy-virt (DT) [ 35.156223] Call trace: [ 35.156249] show_stack+0x20/0x38 (C) [ 35.156298] dump_stack_lvl+0x8c/0xd0 [ 35.156346] print_report+0x118/0x5e8 [ 35.156392] kasan_report+0xdc/0x128 [ 35.156438] kasan_check_range+0x100/0x1a8 [ 35.156623] __kasan_check_write+0x20/0x30 [ 35.156714] kasan_atomics_helper+0xe44/0x4858 [ 35.156806] kasan_atomics+0x198/0x2e0 [ 35.156861] kunit_try_run_case+0x170/0x3f0 [ 35.157076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.157189] kthread+0x328/0x630 [ 35.157255] ret_from_fork+0x10/0x20 [ 35.157317] [ 35.157357] Allocated by task 296: [ 35.157389] kasan_save_stack+0x3c/0x68 [ 35.157430] kasan_save_track+0x20/0x40 [ 35.157708] kasan_save_alloc_info+0x40/0x58 [ 35.157776] __kasan_kmalloc+0xd4/0xd8 [ 35.157816] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.157859] kasan_atomics+0xb8/0x2e0 [ 35.157952] kunit_try_run_case+0x170/0x3f0 [ 35.157994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.158040] kthread+0x328/0x630 [ 35.158082] ret_from_fork+0x10/0x20 [ 35.158206] [ 35.158245] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.158245] which belongs to the cache kmalloc-64 of size 64 [ 35.158434] The buggy address is located 0 bytes to the right of [ 35.158434] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.158558] [ 35.158599] The buggy address belongs to the physical page: [ 35.158656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.158712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.158774] page_type: f5(slab) [ 35.159009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.159105] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.159189] page dumped because: kasan: bad access detected [ 35.159257] [ 35.159324] Memory state around the buggy address: [ 35.159414] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.159500] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.159901] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.159997] ^ [ 35.160070] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.160173] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.160243] ================================================================== [ 35.249062] ================================================================== [ 35.249115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 35.249166] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.249216] [ 35.249251] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.249338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.249367] Hardware name: linux,dummy-virt (DT) [ 35.249400] Call trace: [ 35.249426] show_stack+0x20/0x38 (C) [ 35.249473] dump_stack_lvl+0x8c/0xd0 [ 35.249522] print_report+0x118/0x5e8 [ 35.249568] kasan_report+0xdc/0x128 [ 35.249611] kasan_check_range+0x100/0x1a8 [ 35.249657] __kasan_check_write+0x20/0x30 [ 35.249705] kasan_atomics_helper+0x14e4/0x4858 [ 35.249789] kasan_atomics+0x198/0x2e0 [ 35.249873] kunit_try_run_case+0x170/0x3f0 [ 35.249941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.250025] kthread+0x328/0x630 [ 35.250069] ret_from_fork+0x10/0x20 [ 35.250159] [ 35.250240] Allocated by task 296: [ 35.250300] kasan_save_stack+0x3c/0x68 [ 35.250369] kasan_save_track+0x20/0x40 [ 35.250425] kasan_save_alloc_info+0x40/0x58 [ 35.250485] __kasan_kmalloc+0xd4/0xd8 [ 35.250543] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.250588] kasan_atomics+0xb8/0x2e0 [ 35.250628] kunit_try_run_case+0x170/0x3f0 [ 35.250668] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.250879] kthread+0x328/0x630 [ 35.250967] ret_from_fork+0x10/0x20 [ 35.251029] [ 35.251196] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.251196] which belongs to the cache kmalloc-64 of size 64 [ 35.251332] The buggy address is located 0 bytes to the right of [ 35.251332] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.251454] [ 35.251622] The buggy address belongs to the physical page: [ 35.251675] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.251951] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.252190] page_type: f5(slab) [ 35.252232] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.252286] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.252487] page dumped because: kasan: bad access detected [ 35.252629] [ 35.252707] Memory state around the buggy address: [ 35.252826] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.253032] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.253159] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.253235] ^ [ 35.253285] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.253331] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.253372] ================================================================== [ 35.185393] ================================================================== [ 35.185542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.185599] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.185665] [ 35.185724] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.185842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.185890] Hardware name: linux,dummy-virt (DT) [ 35.185924] Call trace: [ 35.186172] show_stack+0x20/0x38 (C) [ 35.186255] dump_stack_lvl+0x8c/0xd0 [ 35.186308] print_report+0x118/0x5e8 [ 35.186353] kasan_report+0xdc/0x128 [ 35.186418] kasan_check_range+0x100/0x1a8 [ 35.186483] __kasan_check_write+0x20/0x30 [ 35.186574] kasan_atomics_helper+0x1058/0x4858 [ 35.186627] kasan_atomics+0x198/0x2e0 [ 35.186694] kunit_try_run_case+0x170/0x3f0 [ 35.186787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.186862] kthread+0x328/0x630 [ 35.187100] ret_from_fork+0x10/0x20 [ 35.187266] [ 35.187324] Allocated by task 296: [ 35.187422] kasan_save_stack+0x3c/0x68 [ 35.187500] kasan_save_track+0x20/0x40 [ 35.187829] kasan_save_alloc_info+0x40/0x58 [ 35.187919] __kasan_kmalloc+0xd4/0xd8 [ 35.187994] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.188061] kasan_atomics+0xb8/0x2e0 [ 35.188139] kunit_try_run_case+0x170/0x3f0 [ 35.188219] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.188318] kthread+0x328/0x630 [ 35.188412] ret_from_fork+0x10/0x20 [ 35.188499] [ 35.188532] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.188532] which belongs to the cache kmalloc-64 of size 64 [ 35.188594] The buggy address is located 0 bytes to the right of [ 35.188594] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.188773] [ 35.188798] The buggy address belongs to the physical page: [ 35.188838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.189003] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.189107] page_type: f5(slab) [ 35.189194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.189262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.189342] page dumped because: kasan: bad access detected [ 35.189594] [ 35.189660] Memory state around the buggy address: [ 35.189727] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.189832] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.189917] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.190003] ^ [ 35.190093] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.190179] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.190478] ================================================================== [ 35.234768] ================================================================== [ 35.234821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 35.234891] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.234953] [ 35.234985] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.235157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.235315] Hardware name: linux,dummy-virt (DT) [ 35.235409] Call trace: [ 35.235480] show_stack+0x20/0x38 (C) [ 35.235569] dump_stack_lvl+0x8c/0xd0 [ 35.235806] print_report+0x118/0x5e8 [ 35.236057] kasan_report+0xdc/0x128 [ 35.236159] kasan_check_range+0x100/0x1a8 [ 35.236278] __kasan_check_write+0x20/0x30 [ 35.236365] kasan_atomics_helper+0x1414/0x4858 [ 35.236472] kasan_atomics+0x198/0x2e0 [ 35.236548] kunit_try_run_case+0x170/0x3f0 [ 35.236615] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.236673] kthread+0x328/0x630 [ 35.236715] ret_from_fork+0x10/0x20 [ 35.236774] [ 35.236798] Allocated by task 296: [ 35.236827] kasan_save_stack+0x3c/0x68 [ 35.237144] kasan_save_track+0x20/0x40 [ 35.237252] kasan_save_alloc_info+0x40/0x58 [ 35.237320] __kasan_kmalloc+0xd4/0xd8 [ 35.237380] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.237457] kasan_atomics+0xb8/0x2e0 [ 35.237508] kunit_try_run_case+0x170/0x3f0 [ 35.237549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.237769] kthread+0x328/0x630 [ 35.237866] ret_from_fork+0x10/0x20 [ 35.237943] [ 35.238000] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.238000] which belongs to the cache kmalloc-64 of size 64 [ 35.238113] The buggy address is located 0 bytes to the right of [ 35.238113] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.238180] [ 35.238434] The buggy address belongs to the physical page: [ 35.238591] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.238692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.238779] page_type: f5(slab) [ 35.238963] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.239253] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.239314] page dumped because: kasan: bad access detected [ 35.239349] [ 35.239369] Memory state around the buggy address: [ 35.239404] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.239450] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.241116] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.242978] ^ [ 35.243044] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.243092] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.243135] ================================================================== [ 35.165483] ================================================================== [ 35.165539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.165590] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.165679] [ 35.165938] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.166069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.166122] Hardware name: linux,dummy-virt (DT) [ 35.166157] Call trace: [ 35.166184] show_stack+0x20/0x38 (C) [ 35.166241] dump_stack_lvl+0x8c/0xd0 [ 35.166317] print_report+0x118/0x5e8 [ 35.166383] kasan_report+0xdc/0x128 [ 35.166430] kasan_check_range+0x100/0x1a8 [ 35.166477] __kasan_check_write+0x20/0x30 [ 35.166535] kasan_atomics_helper+0xeb8/0x4858 [ 35.166586] kasan_atomics+0x198/0x2e0 [ 35.166635] kunit_try_run_case+0x170/0x3f0 [ 35.166681] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.166735] kthread+0x328/0x630 [ 35.166790] ret_from_fork+0x10/0x20 [ 35.166839] [ 35.166859] Allocated by task 296: [ 35.167516] kasan_save_stack+0x3c/0x68 [ 35.167823] kasan_save_track+0x20/0x40 [ 35.167931] kasan_save_alloc_info+0x40/0x58 [ 35.168042] __kasan_kmalloc+0xd4/0xd8 [ 35.168141] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.168241] kasan_atomics+0xb8/0x2e0 [ 35.168312] kunit_try_run_case+0x170/0x3f0 [ 35.168352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.168549] kthread+0x328/0x630 [ 35.168589] ret_from_fork+0x10/0x20 [ 35.168628] [ 35.168651] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.168651] which belongs to the cache kmalloc-64 of size 64 [ 35.168716] The buggy address is located 0 bytes to the right of [ 35.168716] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.168929] [ 35.168992] The buggy address belongs to the physical page: [ 35.169051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.169141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.169389] page_type: f5(slab) [ 35.169484] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.169602] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.169680] page dumped because: kasan: bad access detected [ 35.169732] [ 35.169818] Memory state around the buggy address: [ 35.169883] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.169973] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.170055] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.170323] ^ [ 35.170403] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.170461] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.170503] ================================================================== [ 35.129649] ================================================================== [ 35.129700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.129770] Read of size 4 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.129849] [ 35.129885] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.129991] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.130023] Hardware name: linux,dummy-virt (DT) [ 35.130058] Call trace: [ 35.130084] show_stack+0x20/0x38 (C) [ 35.130141] dump_stack_lvl+0x8c/0xd0 [ 35.130191] print_report+0x118/0x5e8 [ 35.130237] kasan_report+0xdc/0x128 [ 35.130406] __asan_report_load4_noabort+0x20/0x30 [ 35.130539] kasan_atomics_helper+0x3dd8/0x4858 [ 35.130594] kasan_atomics+0x198/0x2e0 [ 35.130670] kunit_try_run_case+0x170/0x3f0 [ 35.130721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.130992] kthread+0x328/0x630 [ 35.131138] ret_from_fork+0x10/0x20 [ 35.131308] [ 35.131369] Allocated by task 296: [ 35.131427] kasan_save_stack+0x3c/0x68 [ 35.131469] kasan_save_track+0x20/0x40 [ 35.131716] kasan_save_alloc_info+0x40/0x58 [ 35.131780] __kasan_kmalloc+0xd4/0xd8 [ 35.131910] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.132007] kasan_atomics+0xb8/0x2e0 [ 35.132097] kunit_try_run_case+0x170/0x3f0 [ 35.132203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.132278] kthread+0x328/0x630 [ 35.132357] ret_from_fork+0x10/0x20 [ 35.132588] [ 35.132717] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.132717] which belongs to the cache kmalloc-64 of size 64 [ 35.132881] The buggy address is located 0 bytes to the right of [ 35.132881] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.132960] [ 35.132983] The buggy address belongs to the physical page: [ 35.133035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.133363] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.133519] page_type: f5(slab) [ 35.133724] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.133933] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.134067] page dumped because: kasan: bad access detected [ 35.134160] [ 35.134217] Memory state around the buggy address: [ 35.134333] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.134409] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.134492] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.134613] ^ [ 35.134700] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.134767] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.134806] ================================================================== [ 35.217383] ================================================================== [ 35.217437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 35.217490] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.217638] [ 35.217704] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.217808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.217837] Hardware name: linux,dummy-virt (DT) [ 35.217871] Call trace: [ 35.217895] show_stack+0x20/0x38 (C) [ 35.217945] dump_stack_lvl+0x8c/0xd0 [ 35.218327] print_report+0x118/0x5e8 [ 35.218389] kasan_report+0xdc/0x128 [ 35.218435] kasan_check_range+0x100/0x1a8 [ 35.218524] __kasan_check_write+0x20/0x30 [ 35.218575] kasan_atomics_helper+0x12d8/0x4858 [ 35.218665] kasan_atomics+0x198/0x2e0 [ 35.218715] kunit_try_run_case+0x170/0x3f0 [ 35.218877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.218932] kthread+0x328/0x630 [ 35.219206] ret_from_fork+0x10/0x20 [ 35.219566] [ 35.219638] Allocated by task 296: [ 35.219852] kasan_save_stack+0x3c/0x68 [ 35.220004] kasan_save_track+0x20/0x40 [ 35.220125] kasan_save_alloc_info+0x40/0x58 [ 35.220243] __kasan_kmalloc+0xd4/0xd8 [ 35.220282] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.220348] kasan_atomics+0xb8/0x2e0 [ 35.220389] kunit_try_run_case+0x170/0x3f0 [ 35.220625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.220817] kthread+0x328/0x630 [ 35.220957] ret_from_fork+0x10/0x20 [ 35.221044] [ 35.221088] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.221088] which belongs to the cache kmalloc-64 of size 64 [ 35.221246] The buggy address is located 0 bytes to the right of [ 35.221246] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.221428] [ 35.221470] The buggy address belongs to the physical page: [ 35.221583] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.221642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.221692] page_type: f5(slab) [ 35.221774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.222099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.222193] page dumped because: kasan: bad access detected [ 35.222381] [ 35.222516] Memory state around the buggy address: [ 35.222589] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.222659] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.222706] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.222774] ^ [ 35.222809] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.222856] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.222976] ================================================================== [ 35.210977] ================================================================== [ 35.211029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 35.211079] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.211135] [ 35.211167] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.211618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.211663] Hardware name: linux,dummy-virt (DT) [ 35.211699] Call trace: [ 35.211724] show_stack+0x20/0x38 (C) [ 35.211789] dump_stack_lvl+0x8c/0xd0 [ 35.211838] print_report+0x118/0x5e8 [ 35.211897] kasan_report+0xdc/0x128 [ 35.211975] kasan_check_range+0x100/0x1a8 [ 35.212022] __kasan_check_write+0x20/0x30 [ 35.212069] kasan_atomics_helper+0x126c/0x4858 [ 35.212250] kasan_atomics+0x198/0x2e0 [ 35.212349] kunit_try_run_case+0x170/0x3f0 [ 35.212462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.212599] kthread+0x328/0x630 [ 35.212949] ret_from_fork+0x10/0x20 [ 35.213098] [ 35.213161] Allocated by task 296: [ 35.213204] kasan_save_stack+0x3c/0x68 [ 35.213275] kasan_save_track+0x20/0x40 [ 35.213345] kasan_save_alloc_info+0x40/0x58 [ 35.213437] __kasan_kmalloc+0xd4/0xd8 [ 35.213474] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.213529] kasan_atomics+0xb8/0x2e0 [ 35.213870] kunit_try_run_case+0x170/0x3f0 [ 35.213982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.214096] kthread+0x328/0x630 [ 35.214353] ret_from_fork+0x10/0x20 [ 35.214460] [ 35.214529] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.214529] which belongs to the cache kmalloc-64 of size 64 [ 35.214653] The buggy address is located 0 bytes to the right of [ 35.214653] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.214784] [ 35.214884] The buggy address belongs to the physical page: [ 35.214981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.215043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.215397] page_type: f5(slab) [ 35.215465] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.215616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.215691] page dumped because: kasan: bad access detected [ 35.216027] [ 35.216072] Memory state around the buggy address: [ 35.216162] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.216258] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.216382] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.216450] ^ [ 35.216535] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.216627] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.216734] ================================================================== [ 35.273842] ================================================================== [ 35.273895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 35.273989] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.274043] [ 35.274099] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.274192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.274221] Hardware name: linux,dummy-virt (DT) [ 35.274275] Call trace: [ 35.274300] show_stack+0x20/0x38 (C) [ 35.274374] dump_stack_lvl+0x8c/0xd0 [ 35.274423] print_report+0x118/0x5e8 [ 35.274470] kasan_report+0xdc/0x128 [ 35.274521] __asan_report_load8_noabort+0x20/0x30 [ 35.274982] kasan_atomics_helper+0x3df4/0x4858 [ 35.275086] kasan_atomics+0x198/0x2e0 [ 35.275151] kunit_try_run_case+0x170/0x3f0 [ 35.275520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.275629] kthread+0x328/0x630 [ 35.275734] ret_from_fork+0x10/0x20 [ 35.275857] [ 35.275880] Allocated by task 296: [ 35.275937] kasan_save_stack+0x3c/0x68 [ 35.275980] kasan_save_track+0x20/0x40 [ 35.276018] kasan_save_alloc_info+0x40/0x58 [ 35.276058] __kasan_kmalloc+0xd4/0xd8 [ 35.276095] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.276177] kasan_atomics+0xb8/0x2e0 [ 35.276256] kunit_try_run_case+0x170/0x3f0 [ 35.276296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.276364] kthread+0x328/0x630 [ 35.276422] ret_from_fork+0x10/0x20 [ 35.276547] [ 35.276605] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.276605] which belongs to the cache kmalloc-64 of size 64 [ 35.276733] The buggy address is located 0 bytes to the right of [ 35.276733] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.276825] [ 35.276849] The buggy address belongs to the physical page: [ 35.276888] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.276944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.276994] page_type: f5(slab) [ 35.277032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.277125] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.277170] page dumped because: kasan: bad access detected [ 35.277203] [ 35.277224] Memory state around the buggy address: [ 35.277404] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.277487] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.277561] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.277611] ^ [ 35.277647] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.277693] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.277742] ================================================================== [ 35.229083] ================================================================== [ 35.229159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 35.229213] Read of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.229264] [ 35.229297] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.229384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.229413] Hardware name: linux,dummy-virt (DT) [ 35.229446] Call trace: [ 35.229471] show_stack+0x20/0x38 (C) [ 35.229561] dump_stack_lvl+0x8c/0xd0 [ 35.229721] print_report+0x118/0x5e8 [ 35.229853] kasan_report+0xdc/0x128 [ 35.229910] __asan_report_load8_noabort+0x20/0x30 [ 35.229970] kasan_atomics_helper+0x3f04/0x4858 [ 35.230023] kasan_atomics+0x198/0x2e0 [ 35.230145] kunit_try_run_case+0x170/0x3f0 [ 35.230406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.230494] kthread+0x328/0x630 [ 35.230538] ret_from_fork+0x10/0x20 [ 35.230606] [ 35.230667] Allocated by task 296: [ 35.230705] kasan_save_stack+0x3c/0x68 [ 35.230783] kasan_save_track+0x20/0x40 [ 35.230822] kasan_save_alloc_info+0x40/0x58 [ 35.230862] __kasan_kmalloc+0xd4/0xd8 [ 35.230898] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.231176] kasan_atomics+0xb8/0x2e0 [ 35.231299] kunit_try_run_case+0x170/0x3f0 [ 35.231425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.231512] kthread+0x328/0x630 [ 35.231822] ret_from_fork+0x10/0x20 [ 35.231944] [ 35.232006] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.232006] which belongs to the cache kmalloc-64 of size 64 [ 35.232154] The buggy address is located 0 bytes to the right of [ 35.232154] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.232250] [ 35.232353] The buggy address belongs to the physical page: [ 35.232405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.232461] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.232530] page_type: f5(slab) [ 35.232570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.232870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.232993] page dumped because: kasan: bad access detected [ 35.233065] [ 35.233209] Memory state around the buggy address: [ 35.233419] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.233473] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.233518] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.233775] ^ [ 35.233895] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.233984] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.234171] ================================================================== [ 35.268707] ================================================================== [ 35.268812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 35.268886] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.268956] [ 35.268990] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.269080] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.269140] Hardware name: linux,dummy-virt (DT) [ 35.269174] Call trace: [ 35.269199] show_stack+0x20/0x38 (C) [ 35.269248] dump_stack_lvl+0x8c/0xd0 [ 35.269294] print_report+0x118/0x5e8 [ 35.269340] kasan_report+0xdc/0x128 [ 35.269385] kasan_check_range+0x100/0x1a8 [ 35.269483] __kasan_check_write+0x20/0x30 [ 35.269536] kasan_atomics_helper+0x1644/0x4858 [ 35.269699] kasan_atomics+0x198/0x2e0 [ 35.269770] kunit_try_run_case+0x170/0x3f0 [ 35.269826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.269900] kthread+0x328/0x630 [ 35.269943] ret_from_fork+0x10/0x20 [ 35.269993] [ 35.270015] Allocated by task 296: [ 35.270046] kasan_save_stack+0x3c/0x68 [ 35.270085] kasan_save_track+0x20/0x40 [ 35.270127] kasan_save_alloc_info+0x40/0x58 [ 35.270168] __kasan_kmalloc+0xd4/0xd8 [ 35.270205] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.270248] kasan_atomics+0xb8/0x2e0 [ 35.270418] kunit_try_run_case+0x170/0x3f0 [ 35.270556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.270680] kthread+0x328/0x630 [ 35.270760] ret_from_fork+0x10/0x20 [ 35.270808] [ 35.270995] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.270995] which belongs to the cache kmalloc-64 of size 64 [ 35.271193] The buggy address is located 0 bytes to the right of [ 35.271193] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.271318] [ 35.271386] The buggy address belongs to the physical page: [ 35.271426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.271483] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.271738] page_type: f5(slab) [ 35.271831] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.271981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.272067] page dumped because: kasan: bad access detected [ 35.272200] [ 35.272258] Memory state around the buggy address: [ 35.272354] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.272666] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.272780] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.272900] ^ [ 35.272965] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.273033] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.273170] ================================================================== [ 35.201347] ================================================================== [ 35.201400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 35.201676] Write of size 8 at addr fff00000c9b8ffb0 by task kunit_try_catch/296 [ 35.201765] [ 35.201809] CPU: 1 UID: 0 PID: 296 Comm: kunit_try_catch Tainted: G B N 6.16.0-rc7-next-20250724 #1 PREEMPT [ 35.201898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.201937] Hardware name: linux,dummy-virt (DT) [ 35.201969] Call trace: [ 35.201995] show_stack+0x20/0x38 (C) [ 35.202121] dump_stack_lvl+0x8c/0xd0 [ 35.202178] print_report+0x118/0x5e8 [ 35.202222] kasan_report+0xdc/0x128 [ 35.202309] kasan_check_range+0x100/0x1a8 [ 35.202614] __kasan_check_write+0x20/0x30 [ 35.202679] kasan_atomics_helper+0x1190/0x4858 [ 35.202734] kasan_atomics+0x198/0x2e0 [ 35.203025] kunit_try_run_case+0x170/0x3f0 [ 35.203171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.203360] kthread+0x328/0x630 [ 35.203989] ret_from_fork+0x10/0x20 [ 35.204248] [ 35.204289] Allocated by task 296: [ 35.204322] kasan_save_stack+0x3c/0x68 [ 35.204393] kasan_save_track+0x20/0x40 [ 35.205079] kasan_save_alloc_info+0x40/0x58 [ 35.205211] __kasan_kmalloc+0xd4/0xd8 [ 35.205456] __kmalloc_cache_noprof+0x16c/0x3c0 [ 35.205528] kasan_atomics+0xb8/0x2e0 [ 35.205571] kunit_try_run_case+0x170/0x3f0 [ 35.205611] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.205658] kthread+0x328/0x630 [ 35.205694] ret_from_fork+0x10/0x20 [ 35.205733] [ 35.205765] The buggy address belongs to the object at fff00000c9b8ff80 [ 35.205765] which belongs to the cache kmalloc-64 of size 64 [ 35.205830] The buggy address is located 0 bytes to the right of [ 35.205830] allocated 48-byte region [fff00000c9b8ff80, fff00000c9b8ffb0) [ 35.205896] [ 35.205918] The buggy address belongs to the physical page: [ 35.205958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x109b8f [ 35.206015] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.206064] page_type: f5(slab) [ 35.206105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.206160] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.206204] page dumped because: kasan: bad access detected [ 35.206238] [ 35.206260] Memory state around the buggy address: [ 35.206295] fff00000c9b8fe80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.206342] fff00000c9b8ff00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.206388] >fff00000c9b8ff80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.206428] ^ [ 35.206462] fff00000c9b90000: 00 00 00 fc fc fc fc fc fa fb fb fb fc fc fc fc [ 35.206508] fff00000c9b90080: fa fb fb fb fc fc fc fc fa fb fb fb fc fc fc fc [ 35.206549] ==================================================================
[ 29.986034] ================================================================== [ 29.986525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 29.987263] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.987742] [ 29.987871] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.987940] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.987957] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.987982] Call Trace: [ 29.988002] <TASK> [ 29.988021] dump_stack_lvl+0x73/0xb0 [ 29.988052] print_report+0xd1/0x640 [ 29.988075] ? __virt_addr_valid+0x1db/0x2d0 [ 29.988101] ? kasan_atomics_helper+0x1079/0x5450 [ 29.988123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.988149] ? kasan_atomics_helper+0x1079/0x5450 [ 29.988172] kasan_report+0x141/0x180 [ 29.988194] ? kasan_atomics_helper+0x1079/0x5450 [ 29.988221] kasan_check_range+0x10c/0x1c0 [ 29.988246] __kasan_check_write+0x18/0x20 [ 29.988271] kasan_atomics_helper+0x1079/0x5450 [ 29.988295] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.988318] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.988345] ? kasan_atomics+0x152/0x310 [ 29.988372] kasan_atomics+0x1dc/0x310 [ 29.988395] ? __pfx_kasan_atomics+0x10/0x10 [ 29.988419] ? __pfx_read_tsc+0x10/0x10 [ 29.988445] ? ktime_get_ts64+0x86/0x230 [ 29.988471] kunit_try_run_case+0x1a5/0x480 [ 29.988497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.988520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.988547] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.988583] ? __kthread_parkme+0x82/0x180 [ 29.988603] ? preempt_count_sub+0x50/0x80 [ 29.988628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.988653] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.988677] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.988702] kthread+0x337/0x6f0 [ 29.988721] ? trace_preempt_on+0x20/0xc0 [ 29.988747] ? __pfx_kthread+0x10/0x10 [ 29.988768] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.988892] ? calculate_sigpending+0x7b/0xa0 [ 29.988919] ? __pfx_kthread+0x10/0x10 [ 29.988941] ret_from_fork+0x116/0x1d0 [ 29.988962] ? __pfx_kthread+0x10/0x10 [ 29.988982] ret_from_fork_asm+0x1a/0x30 [ 29.989015] </TASK> [ 29.989027] [ 30.001649] Allocated by task 313: [ 30.002176] kasan_save_stack+0x45/0x70 [ 30.002460] kasan_save_track+0x18/0x40 [ 30.002775] kasan_save_alloc_info+0x3b/0x50 [ 30.003153] __kasan_kmalloc+0xb7/0xc0 [ 30.003329] __kmalloc_cache_noprof+0x189/0x420 [ 30.003909] kasan_atomics+0x95/0x310 [ 30.004197] kunit_try_run_case+0x1a5/0x480 [ 30.004517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.004779] kthread+0x337/0x6f0 [ 30.005106] ret_from_fork+0x116/0x1d0 [ 30.005476] ret_from_fork_asm+0x1a/0x30 [ 30.005676] [ 30.005771] The buggy address belongs to the object at ffff888106038600 [ 30.005771] which belongs to the cache kmalloc-64 of size 64 [ 30.006680] The buggy address is located 0 bytes to the right of [ 30.006680] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.007633] [ 30.007738] The buggy address belongs to the physical page: [ 30.008263] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.008743] flags: 0x200000000000000(node=0|zone=2) [ 30.009193] page_type: f5(slab) [ 30.009492] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.009991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.010540] page dumped because: kasan: bad access detected [ 30.010970] [ 30.011104] Memory state around the buggy address: [ 30.011449] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.011753] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.012318] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.012818] ^ [ 30.013299] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.013634] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.014311] ================================================================== [ 30.696819] ================================================================== [ 30.697496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 30.698041] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.698334] [ 30.698686] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.698909] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.699027] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.699052] Call Trace: [ 30.699074] <TASK> [ 30.699193] dump_stack_lvl+0x73/0xb0 [ 30.699225] print_report+0xd1/0x640 [ 30.699249] ? __virt_addr_valid+0x1db/0x2d0 [ 30.699280] ? kasan_atomics_helper+0x1e12/0x5450 [ 30.699303] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.699329] ? kasan_atomics_helper+0x1e12/0x5450 [ 30.699352] kasan_report+0x141/0x180 [ 30.699375] ? kasan_atomics_helper+0x1e12/0x5450 [ 30.699402] kasan_check_range+0x10c/0x1c0 [ 30.699426] __kasan_check_write+0x18/0x20 [ 30.699450] kasan_atomics_helper+0x1e12/0x5450 [ 30.699474] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.699497] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.699524] ? kasan_atomics+0x152/0x310 [ 30.699550] kasan_atomics+0x1dc/0x310 [ 30.699584] ? __pfx_kasan_atomics+0x10/0x10 [ 30.699609] ? __pfx_read_tsc+0x10/0x10 [ 30.699633] ? ktime_get_ts64+0x86/0x230 [ 30.699658] kunit_try_run_case+0x1a5/0x480 [ 30.699684] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.699708] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.699734] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.699759] ? __kthread_parkme+0x82/0x180 [ 30.699791] ? preempt_count_sub+0x50/0x80 [ 30.699817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.699841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.699865] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.699891] kthread+0x337/0x6f0 [ 30.699911] ? trace_preempt_on+0x20/0xc0 [ 30.699947] ? __pfx_kthread+0x10/0x10 [ 30.699968] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.699992] ? calculate_sigpending+0x7b/0xa0 [ 30.700017] ? __pfx_kthread+0x10/0x10 [ 30.700038] ret_from_fork+0x116/0x1d0 [ 30.700059] ? __pfx_kthread+0x10/0x10 [ 30.700079] ret_from_fork_asm+0x1a/0x30 [ 30.700113] </TASK> [ 30.700125] [ 30.712276] Allocated by task 313: [ 30.712502] kasan_save_stack+0x45/0x70 [ 30.712958] kasan_save_track+0x18/0x40 [ 30.713207] kasan_save_alloc_info+0x3b/0x50 [ 30.713671] __kasan_kmalloc+0xb7/0xc0 [ 30.714026] __kmalloc_cache_noprof+0x189/0x420 [ 30.714329] kasan_atomics+0x95/0x310 [ 30.714518] kunit_try_run_case+0x1a5/0x480 [ 30.714701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.714996] kthread+0x337/0x6f0 [ 30.715505] ret_from_fork+0x116/0x1d0 [ 30.715669] ret_from_fork_asm+0x1a/0x30 [ 30.716199] [ 30.716360] The buggy address belongs to the object at ffff888106038600 [ 30.716360] which belongs to the cache kmalloc-64 of size 64 [ 30.716858] The buggy address is located 0 bytes to the right of [ 30.716858] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.717757] [ 30.717878] The buggy address belongs to the physical page: [ 30.718345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.718911] flags: 0x200000000000000(node=0|zone=2) [ 30.719258] page_type: f5(slab) [ 30.719428] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.719813] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.720166] page dumped because: kasan: bad access detected [ 30.720505] [ 30.720584] Memory state around the buggy address: [ 30.720797] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.721188] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.721601] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.721894] ^ [ 30.722072] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.722511] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.722988] ================================================================== [ 29.346478] ================================================================== [ 29.347092] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 29.347480] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.347818] [ 29.347948] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.348033] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.348048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.348071] Call Trace: [ 29.348089] <TASK> [ 29.348109] dump_stack_lvl+0x73/0xb0 [ 29.348137] print_report+0xd1/0x640 [ 29.348160] ? __virt_addr_valid+0x1db/0x2d0 [ 29.348185] ? kasan_atomics_helper+0x4ba2/0x5450 [ 29.348208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.348236] ? kasan_atomics_helper+0x4ba2/0x5450 [ 29.348258] kasan_report+0x141/0x180 [ 29.348281] ? kasan_atomics_helper+0x4ba2/0x5450 [ 29.348309] __asan_report_store4_noabort+0x1b/0x30 [ 29.348334] kasan_atomics_helper+0x4ba2/0x5450 [ 29.348358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.348381] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.348407] ? kasan_atomics+0x152/0x310 [ 29.348433] kasan_atomics+0x1dc/0x310 [ 29.348456] ? __pfx_kasan_atomics+0x10/0x10 [ 29.348481] ? __pfx_read_tsc+0x10/0x10 [ 29.348504] ? ktime_get_ts64+0x86/0x230 [ 29.348529] kunit_try_run_case+0x1a5/0x480 [ 29.348555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.348589] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.348616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.348641] ? __kthread_parkme+0x82/0x180 [ 29.348663] ? preempt_count_sub+0x50/0x80 [ 29.348689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.348713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.348738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.348762] kthread+0x337/0x6f0 [ 29.348783] ? trace_preempt_on+0x20/0xc0 [ 29.348807] ? __pfx_kthread+0x10/0x10 [ 29.348829] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.348852] ? calculate_sigpending+0x7b/0xa0 [ 29.348877] ? __pfx_kthread+0x10/0x10 [ 29.348899] ret_from_fork+0x116/0x1d0 [ 29.348956] ? __pfx_kthread+0x10/0x10 [ 29.348978] ret_from_fork_asm+0x1a/0x30 [ 29.349012] </TASK> [ 29.349024] [ 29.357437] Allocated by task 313: [ 29.357623] kasan_save_stack+0x45/0x70 [ 29.357855] kasan_save_track+0x18/0x40 [ 29.358119] kasan_save_alloc_info+0x3b/0x50 [ 29.358280] __kasan_kmalloc+0xb7/0xc0 [ 29.358409] __kmalloc_cache_noprof+0x189/0x420 [ 29.358561] kasan_atomics+0x95/0x310 [ 29.358702] kunit_try_run_case+0x1a5/0x480 [ 29.359022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.359274] kthread+0x337/0x6f0 [ 29.359439] ret_from_fork+0x116/0x1d0 [ 29.359634] ret_from_fork_asm+0x1a/0x30 [ 29.359775] [ 29.359842] The buggy address belongs to the object at ffff888106038600 [ 29.359842] which belongs to the cache kmalloc-64 of size 64 [ 29.360456] The buggy address is located 0 bytes to the right of [ 29.360456] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.361154] [ 29.361284] The buggy address belongs to the physical page: [ 29.361599] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.362011] flags: 0x200000000000000(node=0|zone=2) [ 29.362169] page_type: f5(slab) [ 29.362420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.362774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.363360] page dumped because: kasan: bad access detected [ 29.363526] [ 29.363607] Memory state around the buggy address: [ 29.364106] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.365004] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.365419] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.365770] ^ [ 29.366037] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366330] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366536] ================================================================== [ 29.545674] ================================================================== [ 29.545922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 29.546632] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.547078] [ 29.547236] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.547311] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.547327] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.547350] Call Trace: [ 29.547370] <TASK> [ 29.547390] dump_stack_lvl+0x73/0xb0 [ 29.547419] print_report+0xd1/0x640 [ 29.547471] ? __virt_addr_valid+0x1db/0x2d0 [ 29.547496] ? kasan_atomics_helper+0x5fe/0x5450 [ 29.547517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.547545] ? kasan_atomics_helper+0x5fe/0x5450 [ 29.547566] kasan_report+0x141/0x180 [ 29.547601] ? kasan_atomics_helper+0x5fe/0x5450 [ 29.547627] kasan_check_range+0x10c/0x1c0 [ 29.547651] __kasan_check_write+0x18/0x20 [ 29.547676] kasan_atomics_helper+0x5fe/0x5450 [ 29.547699] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.547723] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.547748] ? kasan_atomics+0x152/0x310 [ 29.547774] kasan_atomics+0x1dc/0x310 [ 29.547797] ? __pfx_kasan_atomics+0x10/0x10 [ 29.547850] ? __pfx_read_tsc+0x10/0x10 [ 29.547873] ? ktime_get_ts64+0x86/0x230 [ 29.547898] kunit_try_run_case+0x1a5/0x480 [ 29.547936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.547961] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.547988] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.548015] ? __kthread_parkme+0x82/0x180 [ 29.548036] ? preempt_count_sub+0x50/0x80 [ 29.548060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.548101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.548127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.548151] kthread+0x337/0x6f0 [ 29.548172] ? trace_preempt_on+0x20/0xc0 [ 29.548197] ? __pfx_kthread+0x10/0x10 [ 29.548218] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.548241] ? calculate_sigpending+0x7b/0xa0 [ 29.548266] ? __pfx_kthread+0x10/0x10 [ 29.548289] ret_from_fork+0x116/0x1d0 [ 29.548310] ? __pfx_kthread+0x10/0x10 [ 29.548331] ret_from_fork_asm+0x1a/0x30 [ 29.548364] </TASK> [ 29.548376] [ 29.556275] Allocated by task 313: [ 29.556462] kasan_save_stack+0x45/0x70 [ 29.556666] kasan_save_track+0x18/0x40 [ 29.556800] kasan_save_alloc_info+0x3b/0x50 [ 29.556972] __kasan_kmalloc+0xb7/0xc0 [ 29.557102] __kmalloc_cache_noprof+0x189/0x420 [ 29.557323] kasan_atomics+0x95/0x310 [ 29.557529] kunit_try_run_case+0x1a5/0x480 [ 29.557748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.558057] kthread+0x337/0x6f0 [ 29.558230] ret_from_fork+0x116/0x1d0 [ 29.558375] ret_from_fork_asm+0x1a/0x30 [ 29.558510] [ 29.558633] The buggy address belongs to the object at ffff888106038600 [ 29.558633] which belongs to the cache kmalloc-64 of size 64 [ 29.559008] The buggy address is located 0 bytes to the right of [ 29.559008] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.559374] [ 29.559442] The buggy address belongs to the physical page: [ 29.559643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.560001] flags: 0x200000000000000(node=0|zone=2) [ 29.560234] page_type: f5(slab) [ 29.560399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.560864] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.561228] page dumped because: kasan: bad access detected [ 29.561487] [ 29.561584] Memory state around the buggy address: [ 29.561802] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.562140] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.562368] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.562584] ^ [ 29.562740] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.562980] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563522] ================================================================== [ 30.357007] ================================================================== [ 30.357260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 30.357775] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.358091] [ 30.358510] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.358567] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.358594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.358618] Call Trace: [ 30.358633] <TASK> [ 30.358652] dump_stack_lvl+0x73/0xb0 [ 30.358683] print_report+0xd1/0x640 [ 30.358708] ? __virt_addr_valid+0x1db/0x2d0 [ 30.358733] ? kasan_atomics_helper+0x16e7/0x5450 [ 30.358755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.358900] ? kasan_atomics_helper+0x16e7/0x5450 [ 30.358945] kasan_report+0x141/0x180 [ 30.359025] ? kasan_atomics_helper+0x16e7/0x5450 [ 30.359053] kasan_check_range+0x10c/0x1c0 [ 30.359078] __kasan_check_write+0x18/0x20 [ 30.359102] kasan_atomics_helper+0x16e7/0x5450 [ 30.359126] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.359149] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.359175] ? kasan_atomics+0x152/0x310 [ 30.359203] kasan_atomics+0x1dc/0x310 [ 30.359226] ? __pfx_kasan_atomics+0x10/0x10 [ 30.359259] ? __pfx_read_tsc+0x10/0x10 [ 30.359281] ? ktime_get_ts64+0x86/0x230 [ 30.359307] kunit_try_run_case+0x1a5/0x480 [ 30.359334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.359357] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.359383] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.359409] ? __kthread_parkme+0x82/0x180 [ 30.359431] ? preempt_count_sub+0x50/0x80 [ 30.359456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.359481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.359505] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.359530] kthread+0x337/0x6f0 [ 30.359551] ? trace_preempt_on+0x20/0xc0 [ 30.359586] ? __pfx_kthread+0x10/0x10 [ 30.359610] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.359635] ? calculate_sigpending+0x7b/0xa0 [ 30.359660] ? __pfx_kthread+0x10/0x10 [ 30.359683] ret_from_fork+0x116/0x1d0 [ 30.359704] ? __pfx_kthread+0x10/0x10 [ 30.359726] ret_from_fork_asm+0x1a/0x30 [ 30.359758] </TASK> [ 30.359771] [ 30.368199] Allocated by task 313: [ 30.368390] kasan_save_stack+0x45/0x70 [ 30.368558] kasan_save_track+0x18/0x40 [ 30.368760] kasan_save_alloc_info+0x3b/0x50 [ 30.368944] __kasan_kmalloc+0xb7/0xc0 [ 30.369167] __kmalloc_cache_noprof+0x189/0x420 [ 30.369354] kasan_atomics+0x95/0x310 [ 30.370006] kunit_try_run_case+0x1a5/0x480 [ 30.370150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.370319] kthread+0x337/0x6f0 [ 30.370431] ret_from_fork+0x116/0x1d0 [ 30.370556] ret_from_fork_asm+0x1a/0x30 [ 30.370756] [ 30.370847] The buggy address belongs to the object at ffff888106038600 [ 30.370847] which belongs to the cache kmalloc-64 of size 64 [ 30.371372] The buggy address is located 0 bytes to the right of [ 30.371372] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.373303] [ 30.373394] The buggy address belongs to the physical page: [ 30.373585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.373827] flags: 0x200000000000000(node=0|zone=2) [ 30.374065] page_type: f5(slab) [ 30.374232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.375260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.376247] page dumped because: kasan: bad access detected [ 30.376533] [ 30.376614] Memory state around the buggy address: [ 30.377480] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.378033] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.378657] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.379387] ^ [ 30.379627] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.380064] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.381159] ================================================================== [ 30.723569] ================================================================== [ 30.723847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 30.724352] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.724730] [ 30.724933] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.724987] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.725003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.725026] Call Trace: [ 30.725044] <TASK> [ 30.725061] dump_stack_lvl+0x73/0xb0 [ 30.725159] print_report+0xd1/0x640 [ 30.725229] ? __virt_addr_valid+0x1db/0x2d0 [ 30.725255] ? kasan_atomics_helper+0x1eaa/0x5450 [ 30.725276] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.725353] ? kasan_atomics_helper+0x1eaa/0x5450 [ 30.725376] kasan_report+0x141/0x180 [ 30.725463] ? kasan_atomics_helper+0x1eaa/0x5450 [ 30.725502] kasan_check_range+0x10c/0x1c0 [ 30.725538] __kasan_check_write+0x18/0x20 [ 30.725563] kasan_atomics_helper+0x1eaa/0x5450 [ 30.725595] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.725618] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.725644] ? kasan_atomics+0x152/0x310 [ 30.725671] kasan_atomics+0x1dc/0x310 [ 30.725695] ? __pfx_kasan_atomics+0x10/0x10 [ 30.725720] ? __pfx_read_tsc+0x10/0x10 [ 30.725743] ? ktime_get_ts64+0x86/0x230 [ 30.725769] kunit_try_run_case+0x1a5/0x480 [ 30.725795] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.725818] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.725845] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.725887] ? __kthread_parkme+0x82/0x180 [ 30.725909] ? preempt_count_sub+0x50/0x80 [ 30.725940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.725965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.725990] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.726014] kthread+0x337/0x6f0 [ 30.726080] ? trace_preempt_on+0x20/0xc0 [ 30.726106] ? __pfx_kthread+0x10/0x10 [ 30.726126] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.726162] ? calculate_sigpending+0x7b/0xa0 [ 30.726229] ? __pfx_kthread+0x10/0x10 [ 30.726253] ret_from_fork+0x116/0x1d0 [ 30.726273] ? __pfx_kthread+0x10/0x10 [ 30.726306] ret_from_fork_asm+0x1a/0x30 [ 30.726339] </TASK> [ 30.726350] [ 30.738781] Allocated by task 313: [ 30.738996] kasan_save_stack+0x45/0x70 [ 30.739321] kasan_save_track+0x18/0x40 [ 30.739491] kasan_save_alloc_info+0x3b/0x50 [ 30.739696] __kasan_kmalloc+0xb7/0xc0 [ 30.740198] __kmalloc_cache_noprof+0x189/0x420 [ 30.740678] kasan_atomics+0x95/0x310 [ 30.741101] kunit_try_run_case+0x1a5/0x480 [ 30.741458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.741734] kthread+0x337/0x6f0 [ 30.742108] ret_from_fork+0x116/0x1d0 [ 30.742445] ret_from_fork_asm+0x1a/0x30 [ 30.742637] [ 30.742724] The buggy address belongs to the object at ffff888106038600 [ 30.742724] which belongs to the cache kmalloc-64 of size 64 [ 30.743691] The buggy address is located 0 bytes to the right of [ 30.743691] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.744817] [ 30.745094] The buggy address belongs to the physical page: [ 30.745723] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.746310] flags: 0x200000000000000(node=0|zone=2) [ 30.746769] page_type: f5(slab) [ 30.747228] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.747641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.748435] page dumped because: kasan: bad access detected [ 30.748922] [ 30.749086] Memory state around the buggy address: [ 30.749534] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.749835] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.750533] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.751225] ^ [ 30.751661] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.752294] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.752800] ================================================================== [ 29.729174] ================================================================== [ 29.729487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 29.729775] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.730231] [ 29.730318] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.730380] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.730394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.730419] Call Trace: [ 29.730434] <TASK> [ 29.730454] dump_stack_lvl+0x73/0xb0 [ 29.730485] print_report+0xd1/0x640 [ 29.730510] ? __virt_addr_valid+0x1db/0x2d0 [ 29.730535] ? kasan_atomics_helper+0xac7/0x5450 [ 29.730557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.730598] ? kasan_atomics_helper+0xac7/0x5450 [ 29.730629] kasan_report+0x141/0x180 [ 29.730663] ? kasan_atomics_helper+0xac7/0x5450 [ 29.730690] kasan_check_range+0x10c/0x1c0 [ 29.730728] __kasan_check_write+0x18/0x20 [ 29.730753] kasan_atomics_helper+0xac7/0x5450 [ 29.730777] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.730801] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.730831] ? kasan_atomics+0x152/0x310 [ 29.730857] kasan_atomics+0x1dc/0x310 [ 29.730881] ? __pfx_kasan_atomics+0x10/0x10 [ 29.730906] ? __pfx_read_tsc+0x10/0x10 [ 29.730928] ? ktime_get_ts64+0x86/0x230 [ 29.730972] kunit_try_run_case+0x1a5/0x480 [ 29.730999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.731033] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.731060] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.731097] ? __kthread_parkme+0x82/0x180 [ 29.731119] ? preempt_count_sub+0x50/0x80 [ 29.731168] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.731193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.731218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.731242] kthread+0x337/0x6f0 [ 29.731268] ? trace_preempt_on+0x20/0xc0 [ 29.731293] ? __pfx_kthread+0x10/0x10 [ 29.731314] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.731347] ? calculate_sigpending+0x7b/0xa0 [ 29.731372] ? __pfx_kthread+0x10/0x10 [ 29.731395] ret_from_fork+0x116/0x1d0 [ 29.731427] ? __pfx_kthread+0x10/0x10 [ 29.731449] ret_from_fork_asm+0x1a/0x30 [ 29.731493] </TASK> [ 29.731505] [ 29.740342] Allocated by task 313: [ 29.740599] kasan_save_stack+0x45/0x70 [ 29.740813] kasan_save_track+0x18/0x40 [ 29.741051] kasan_save_alloc_info+0x3b/0x50 [ 29.741438] __kasan_kmalloc+0xb7/0xc0 [ 29.741757] __kmalloc_cache_noprof+0x189/0x420 [ 29.742097] kasan_atomics+0x95/0x310 [ 29.742420] kunit_try_run_case+0x1a5/0x480 [ 29.742622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.742794] kthread+0x337/0x6f0 [ 29.743029] ret_from_fork+0x116/0x1d0 [ 29.743404] ret_from_fork_asm+0x1a/0x30 [ 29.743599] [ 29.743665] The buggy address belongs to the object at ffff888106038600 [ 29.743665] which belongs to the cache kmalloc-64 of size 64 [ 29.744328] The buggy address is located 0 bytes to the right of [ 29.744328] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.745061] [ 29.745310] The buggy address belongs to the physical page: [ 29.745506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.745932] flags: 0x200000000000000(node=0|zone=2) [ 29.746199] page_type: f5(slab) [ 29.746331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.746664] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.746931] page dumped because: kasan: bad access detected [ 29.747095] [ 29.747157] Memory state around the buggy address: [ 29.747313] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.747520] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.747745] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.747954] ^ [ 29.748307] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.748876] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749455] ================================================================== [ 29.564269] ================================================================== [ 29.564650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 29.565226] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.565501] [ 29.565615] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.565666] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.565681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.565706] Call Trace: [ 29.565724] <TASK> [ 29.565741] dump_stack_lvl+0x73/0xb0 [ 29.565771] print_report+0xd1/0x640 [ 29.565794] ? __virt_addr_valid+0x1db/0x2d0 [ 29.565820] ? kasan_atomics_helper+0x697/0x5450 [ 29.565841] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.565868] ? kasan_atomics_helper+0x697/0x5450 [ 29.565891] kasan_report+0x141/0x180 [ 29.565934] ? kasan_atomics_helper+0x697/0x5450 [ 29.565961] kasan_check_range+0x10c/0x1c0 [ 29.565985] __kasan_check_write+0x18/0x20 [ 29.566009] kasan_atomics_helper+0x697/0x5450 [ 29.566051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.566076] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.566120] ? kasan_atomics+0x152/0x310 [ 29.566170] kasan_atomics+0x1dc/0x310 [ 29.566193] ? __pfx_kasan_atomics+0x10/0x10 [ 29.566218] ? __pfx_read_tsc+0x10/0x10 [ 29.566241] ? ktime_get_ts64+0x86/0x230 [ 29.566266] kunit_try_run_case+0x1a5/0x480 [ 29.566292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.566316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.566343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.566368] ? __kthread_parkme+0x82/0x180 [ 29.566389] ? preempt_count_sub+0x50/0x80 [ 29.566414] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.566439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.566463] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.566488] kthread+0x337/0x6f0 [ 29.566508] ? trace_preempt_on+0x20/0xc0 [ 29.566533] ? __pfx_kthread+0x10/0x10 [ 29.566554] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.566587] ? calculate_sigpending+0x7b/0xa0 [ 29.566612] ? __pfx_kthread+0x10/0x10 [ 29.566633] ret_from_fork+0x116/0x1d0 [ 29.566653] ? __pfx_kthread+0x10/0x10 [ 29.566674] ret_from_fork_asm+0x1a/0x30 [ 29.566708] </TASK> [ 29.566719] [ 29.574629] Allocated by task 313: [ 29.574762] kasan_save_stack+0x45/0x70 [ 29.574906] kasan_save_track+0x18/0x40 [ 29.575037] kasan_save_alloc_info+0x3b/0x50 [ 29.575178] __kasan_kmalloc+0xb7/0xc0 [ 29.575312] __kmalloc_cache_noprof+0x189/0x420 [ 29.575531] kasan_atomics+0x95/0x310 [ 29.575932] kunit_try_run_case+0x1a5/0x480 [ 29.576159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.576432] kthread+0x337/0x6f0 [ 29.576623] ret_from_fork+0x116/0x1d0 [ 29.576873] ret_from_fork_asm+0x1a/0x30 [ 29.577081] [ 29.577175] The buggy address belongs to the object at ffff888106038600 [ 29.577175] which belongs to the cache kmalloc-64 of size 64 [ 29.577718] The buggy address is located 0 bytes to the right of [ 29.577718] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.578318] [ 29.578411] The buggy address belongs to the physical page: [ 29.580739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.581011] flags: 0x200000000000000(node=0|zone=2) [ 29.581177] page_type: f5(slab) [ 29.581332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.581685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.582022] page dumped because: kasan: bad access detected [ 29.582273] [ 29.582363] Memory state around the buggy address: [ 29.582626] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.582915] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.583229] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.583487] ^ [ 29.583703] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.583912] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.584118] ================================================================== [ 29.526565] ================================================================== [ 29.527263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 29.527753] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.528182] [ 29.528285] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.528338] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.528354] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.528376] Call Trace: [ 29.528395] <TASK> [ 29.528438] dump_stack_lvl+0x73/0xb0 [ 29.528467] print_report+0xd1/0x640 [ 29.528490] ? __virt_addr_valid+0x1db/0x2d0 [ 29.528515] ? kasan_atomics_helper+0x565/0x5450 [ 29.528537] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.528565] ? kasan_atomics_helper+0x565/0x5450 [ 29.528598] kasan_report+0x141/0x180 [ 29.528621] ? kasan_atomics_helper+0x565/0x5450 [ 29.528652] kasan_check_range+0x10c/0x1c0 [ 29.528678] __kasan_check_write+0x18/0x20 [ 29.528703] kasan_atomics_helper+0x565/0x5450 [ 29.528728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.528751] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.528777] ? kasan_atomics+0x152/0x310 [ 29.528804] kasan_atomics+0x1dc/0x310 [ 29.528827] ? __pfx_kasan_atomics+0x10/0x10 [ 29.528870] ? __pfx_read_tsc+0x10/0x10 [ 29.528892] ? ktime_get_ts64+0x86/0x230 [ 29.528918] kunit_try_run_case+0x1a5/0x480 [ 29.528957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.528981] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.529007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.529058] ? __kthread_parkme+0x82/0x180 [ 29.529089] ? preempt_count_sub+0x50/0x80 [ 29.529121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.529146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.529170] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.529195] kthread+0x337/0x6f0 [ 29.529215] ? trace_preempt_on+0x20/0xc0 [ 29.529240] ? __pfx_kthread+0x10/0x10 [ 29.529261] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.529285] ? calculate_sigpending+0x7b/0xa0 [ 29.529310] ? __pfx_kthread+0x10/0x10 [ 29.529333] ret_from_fork+0x116/0x1d0 [ 29.529352] ? __pfx_kthread+0x10/0x10 [ 29.529374] ret_from_fork_asm+0x1a/0x30 [ 29.529407] </TASK> [ 29.529419] [ 29.537109] Allocated by task 313: [ 29.537306] kasan_save_stack+0x45/0x70 [ 29.537517] kasan_save_track+0x18/0x40 [ 29.537741] kasan_save_alloc_info+0x3b/0x50 [ 29.538123] __kasan_kmalloc+0xb7/0xc0 [ 29.538396] __kmalloc_cache_noprof+0x189/0x420 [ 29.538701] kasan_atomics+0x95/0x310 [ 29.539003] kunit_try_run_case+0x1a5/0x480 [ 29.539199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.539424] kthread+0x337/0x6f0 [ 29.539539] ret_from_fork+0x116/0x1d0 [ 29.539731] ret_from_fork_asm+0x1a/0x30 [ 29.540084] [ 29.540246] The buggy address belongs to the object at ffff888106038600 [ 29.540246] which belongs to the cache kmalloc-64 of size 64 [ 29.540881] The buggy address is located 0 bytes to the right of [ 29.540881] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.541406] [ 29.541480] The buggy address belongs to the physical page: [ 29.541768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.542161] flags: 0x200000000000000(node=0|zone=2) [ 29.542379] page_type: f5(slab) [ 29.542498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.542733] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.542953] page dumped because: kasan: bad access detected [ 29.543117] [ 29.543180] Memory state around the buggy address: [ 29.543334] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.543615] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.543921] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.544609] ^ [ 29.544829] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.545039] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.545246] ================================================================== [ 30.923748] ================================================================== [ 30.924084] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 30.924424] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.924738] [ 30.924841] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.924897] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.924912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.924936] Call Trace: [ 30.924959] <TASK> [ 30.924980] dump_stack_lvl+0x73/0xb0 [ 30.925010] print_report+0xd1/0x640 [ 30.925036] ? __virt_addr_valid+0x1db/0x2d0 [ 30.925063] ? kasan_atomics_helper+0x4fa5/0x5450 [ 30.925087] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.925115] ? kasan_atomics_helper+0x4fa5/0x5450 [ 30.925137] kasan_report+0x141/0x180 [ 30.925161] ? kasan_atomics_helper+0x4fa5/0x5450 [ 30.925190] __asan_report_load8_noabort+0x18/0x20 [ 30.925217] kasan_atomics_helper+0x4fa5/0x5450 [ 30.925243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.925277] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.925304] ? kasan_atomics+0x152/0x310 [ 30.925333] kasan_atomics+0x1dc/0x310 [ 30.925357] ? __pfx_kasan_atomics+0x10/0x10 [ 30.925382] ? __pfx_read_tsc+0x10/0x10 [ 30.925405] ? ktime_get_ts64+0x86/0x230 [ 30.925431] kunit_try_run_case+0x1a5/0x480 [ 30.925458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.925482] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.925508] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.925534] ? __kthread_parkme+0x82/0x180 [ 30.925555] ? preempt_count_sub+0x50/0x80 [ 30.925592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.925616] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.925641] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.925664] kthread+0x337/0x6f0 [ 30.925684] ? trace_preempt_on+0x20/0xc0 [ 30.925710] ? __pfx_kthread+0x10/0x10 [ 30.925730] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.925755] ? calculate_sigpending+0x7b/0xa0 [ 30.925780] ? __pfx_kthread+0x10/0x10 [ 30.925801] ret_from_fork+0x116/0x1d0 [ 30.925822] ? __pfx_kthread+0x10/0x10 [ 30.925843] ret_from_fork_asm+0x1a/0x30 [ 30.925876] </TASK> [ 30.925889] [ 30.932955] Allocated by task 313: [ 30.933143] kasan_save_stack+0x45/0x70 [ 30.933361] kasan_save_track+0x18/0x40 [ 30.933505] kasan_save_alloc_info+0x3b/0x50 [ 30.933703] __kasan_kmalloc+0xb7/0xc0 [ 30.933893] __kmalloc_cache_noprof+0x189/0x420 [ 30.934103] kasan_atomics+0x95/0x310 [ 30.934234] kunit_try_run_case+0x1a5/0x480 [ 30.934374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.934634] kthread+0x337/0x6f0 [ 30.934796] ret_from_fork+0x116/0x1d0 [ 30.934976] ret_from_fork_asm+0x1a/0x30 [ 30.935169] [ 30.935235] The buggy address belongs to the object at ffff888106038600 [ 30.935235] which belongs to the cache kmalloc-64 of size 64 [ 30.935595] The buggy address is located 0 bytes to the right of [ 30.935595] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.936324] [ 30.936418] The buggy address belongs to the physical page: [ 30.936684] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.937033] flags: 0x200000000000000(node=0|zone=2) [ 30.937269] page_type: f5(slab) [ 30.937438] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.937721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.937942] page dumped because: kasan: bad access detected [ 30.938105] [ 30.938169] Memory state around the buggy address: [ 30.938319] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.938528] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.938906] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.939253] ^ [ 30.939744] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.940011] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.940217] ================================================================== [ 30.063206] ================================================================== [ 30.063547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 30.064129] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.064392] [ 30.064506] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.064591] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.064606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.064630] Call Trace: [ 30.064648] <TASK> [ 30.064667] dump_stack_lvl+0x73/0xb0 [ 30.064717] print_report+0xd1/0x640 [ 30.064742] ? __virt_addr_valid+0x1db/0x2d0 [ 30.064785] ? kasan_atomics_helper+0x4a02/0x5450 [ 30.064869] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.064897] ? kasan_atomics_helper+0x4a02/0x5450 [ 30.064919] kasan_report+0x141/0x180 [ 30.064943] ? kasan_atomics_helper+0x4a02/0x5450 [ 30.064981] __asan_report_load4_noabort+0x18/0x20 [ 30.065006] kasan_atomics_helper+0x4a02/0x5450 [ 30.065029] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.065052] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.065078] ? kasan_atomics+0x152/0x310 [ 30.065105] kasan_atomics+0x1dc/0x310 [ 30.065129] ? __pfx_kasan_atomics+0x10/0x10 [ 30.065153] ? __pfx_read_tsc+0x10/0x10 [ 30.065176] ? ktime_get_ts64+0x86/0x230 [ 30.065202] kunit_try_run_case+0x1a5/0x480 [ 30.065228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.065252] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.065300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.065326] ? __kthread_parkme+0x82/0x180 [ 30.065349] ? preempt_count_sub+0x50/0x80 [ 30.065373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.065398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.065422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.065447] kthread+0x337/0x6f0 [ 30.065484] ? trace_preempt_on+0x20/0xc0 [ 30.065509] ? __pfx_kthread+0x10/0x10 [ 30.065544] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.065592] ? calculate_sigpending+0x7b/0xa0 [ 30.065618] ? __pfx_kthread+0x10/0x10 [ 30.065640] ret_from_fork+0x116/0x1d0 [ 30.065660] ? __pfx_kthread+0x10/0x10 [ 30.065696] ret_from_fork_asm+0x1a/0x30 [ 30.065742] </TASK> [ 30.065755] [ 30.074924] Allocated by task 313: [ 30.075188] kasan_save_stack+0x45/0x70 [ 30.075461] kasan_save_track+0x18/0x40 [ 30.075675] kasan_save_alloc_info+0x3b/0x50 [ 30.075936] __kasan_kmalloc+0xb7/0xc0 [ 30.076107] __kmalloc_cache_noprof+0x189/0x420 [ 30.076355] kasan_atomics+0x95/0x310 [ 30.076546] kunit_try_run_case+0x1a5/0x480 [ 30.076856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.077382] kthread+0x337/0x6f0 [ 30.077505] ret_from_fork+0x116/0x1d0 [ 30.077699] ret_from_fork_asm+0x1a/0x30 [ 30.077908] [ 30.078019] The buggy address belongs to the object at ffff888106038600 [ 30.078019] which belongs to the cache kmalloc-64 of size 64 [ 30.078560] The buggy address is located 0 bytes to the right of [ 30.078560] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.079122] [ 30.079567] The buggy address belongs to the physical page: [ 30.079791] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.080214] flags: 0x200000000000000(node=0|zone=2) [ 30.080385] page_type: f5(slab) [ 30.080593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.081161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.081409] page dumped because: kasan: bad access detected [ 30.081651] [ 30.081714] Memory state around the buggy address: [ 30.081860] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.082517] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.083054] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.083432] ^ [ 30.083673] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084159] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.084409] ================================================================== [ 30.200915] ================================================================== [ 30.201352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 30.201813] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.202554] [ 30.202741] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.202795] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.202810] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.202833] Call Trace: [ 30.202855] <TASK> [ 30.202876] dump_stack_lvl+0x73/0xb0 [ 30.202907] print_report+0xd1/0x640 [ 30.202944] ? __virt_addr_valid+0x1db/0x2d0 [ 30.202970] ? kasan_atomics_helper+0x4eae/0x5450 [ 30.202995] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.203022] ? kasan_atomics_helper+0x4eae/0x5450 [ 30.203045] kasan_report+0x141/0x180 [ 30.203068] ? kasan_atomics_helper+0x4eae/0x5450 [ 30.203095] __asan_report_load8_noabort+0x18/0x20 [ 30.203120] kasan_atomics_helper+0x4eae/0x5450 [ 30.203144] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.203167] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.203193] ? kasan_atomics+0x152/0x310 [ 30.203220] kasan_atomics+0x1dc/0x310 [ 30.203244] ? __pfx_kasan_atomics+0x10/0x10 [ 30.203278] ? __pfx_read_tsc+0x10/0x10 [ 30.203302] ? ktime_get_ts64+0x86/0x230 [ 30.203328] kunit_try_run_case+0x1a5/0x480 [ 30.203355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.203379] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.203405] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.203431] ? __kthread_parkme+0x82/0x180 [ 30.203453] ? preempt_count_sub+0x50/0x80 [ 30.203501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.203543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.203568] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.203602] kthread+0x337/0x6f0 [ 30.203623] ? trace_preempt_on+0x20/0xc0 [ 30.203648] ? __pfx_kthread+0x10/0x10 [ 30.203669] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.203694] ? calculate_sigpending+0x7b/0xa0 [ 30.203719] ? __pfx_kthread+0x10/0x10 [ 30.203742] ret_from_fork+0x116/0x1d0 [ 30.203763] ? __pfx_kthread+0x10/0x10 [ 30.203796] ret_from_fork_asm+0x1a/0x30 [ 30.203830] </TASK> [ 30.203842] [ 30.215932] Allocated by task 313: [ 30.216105] kasan_save_stack+0x45/0x70 [ 30.216269] kasan_save_track+0x18/0x40 [ 30.217008] kasan_save_alloc_info+0x3b/0x50 [ 30.217461] __kasan_kmalloc+0xb7/0xc0 [ 30.217822] __kmalloc_cache_noprof+0x189/0x420 [ 30.218299] kasan_atomics+0x95/0x310 [ 30.218491] kunit_try_run_case+0x1a5/0x480 [ 30.218673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.219177] kthread+0x337/0x6f0 [ 30.219562] ret_from_fork+0x116/0x1d0 [ 30.219933] ret_from_fork_asm+0x1a/0x30 [ 30.220285] [ 30.220435] The buggy address belongs to the object at ffff888106038600 [ 30.220435] which belongs to the cache kmalloc-64 of size 64 [ 30.221221] The buggy address is located 0 bytes to the right of [ 30.221221] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.221596] [ 30.221675] The buggy address belongs to the physical page: [ 30.221928] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.222250] flags: 0x200000000000000(node=0|zone=2) [ 30.222412] page_type: f5(slab) [ 30.222583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.222976] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.223279] page dumped because: kasan: bad access detected [ 30.223683] [ 30.223768] Memory state around the buggy address: [ 30.224020] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.224297] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.224543] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.224980] ^ [ 30.225139] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.225346] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.226038] ================================================================== [ 30.226539] ================================================================== [ 30.226939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 30.227224] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.227529] [ 30.227652] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.227705] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.227720] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.227743] Call Trace: [ 30.227763] <TASK> [ 30.227783] dump_stack_lvl+0x73/0xb0 [ 30.227815] print_report+0xd1/0x640 [ 30.227840] ? __virt_addr_valid+0x1db/0x2d0 [ 30.227865] ? kasan_atomics_helper+0x1467/0x5450 [ 30.227888] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.227914] ? kasan_atomics_helper+0x1467/0x5450 [ 30.227937] kasan_report+0x141/0x180 [ 30.227960] ? kasan_atomics_helper+0x1467/0x5450 [ 30.227988] kasan_check_range+0x10c/0x1c0 [ 30.228012] __kasan_check_write+0x18/0x20 [ 30.228036] kasan_atomics_helper+0x1467/0x5450 [ 30.228059] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.228082] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.228108] ? kasan_atomics+0x152/0x310 [ 30.228134] kasan_atomics+0x1dc/0x310 [ 30.228158] ? __pfx_kasan_atomics+0x10/0x10 [ 30.228183] ? __pfx_read_tsc+0x10/0x10 [ 30.228225] ? ktime_get_ts64+0x86/0x230 [ 30.228261] kunit_try_run_case+0x1a5/0x480 [ 30.228293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.228317] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.228354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.228380] ? __kthread_parkme+0x82/0x180 [ 30.228403] ? preempt_count_sub+0x50/0x80 [ 30.228428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.228453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.228477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.228502] kthread+0x337/0x6f0 [ 30.228522] ? trace_preempt_on+0x20/0xc0 [ 30.228547] ? __pfx_kthread+0x10/0x10 [ 30.228567] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.228601] ? calculate_sigpending+0x7b/0xa0 [ 30.228626] ? __pfx_kthread+0x10/0x10 [ 30.228648] ret_from_fork+0x116/0x1d0 [ 30.228668] ? __pfx_kthread+0x10/0x10 [ 30.228689] ret_from_fork_asm+0x1a/0x30 [ 30.228722] </TASK> [ 30.228734] [ 30.236853] Allocated by task 313: [ 30.236986] kasan_save_stack+0x45/0x70 [ 30.237284] kasan_save_track+0x18/0x40 [ 30.237475] kasan_save_alloc_info+0x3b/0x50 [ 30.237678] __kasan_kmalloc+0xb7/0xc0 [ 30.237870] __kmalloc_cache_noprof+0x189/0x420 [ 30.238043] kasan_atomics+0x95/0x310 [ 30.238170] kunit_try_run_case+0x1a5/0x480 [ 30.238310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.238477] kthread+0x337/0x6f0 [ 30.238648] ret_from_fork+0x116/0x1d0 [ 30.238834] ret_from_fork_asm+0x1a/0x30 [ 30.239146] [ 30.239238] The buggy address belongs to the object at ffff888106038600 [ 30.239238] which belongs to the cache kmalloc-64 of size 64 [ 30.239842] The buggy address is located 0 bytes to the right of [ 30.239842] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.240425] [ 30.240498] The buggy address belongs to the physical page: [ 30.240757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.241149] flags: 0x200000000000000(node=0|zone=2) [ 30.241377] page_type: f5(slab) [ 30.241504] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.241816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.242195] page dumped because: kasan: bad access detected [ 30.242491] [ 30.242565] Memory state around the buggy address: [ 30.242788] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.243130] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.243474] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.243752] ^ [ 30.244162] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244392] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.244779] ================================================================== [ 30.128195] ================================================================== [ 30.128543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 30.129086] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.129415] [ 30.129523] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.129867] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.129885] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.129908] Call Trace: [ 30.129922] <TASK> [ 30.129940] dump_stack_lvl+0x73/0xb0 [ 30.129972] print_report+0xd1/0x640 [ 30.129996] ? __virt_addr_valid+0x1db/0x2d0 [ 30.130021] ? kasan_atomics_helper+0x12e6/0x5450 [ 30.130044] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.130096] ? kasan_atomics_helper+0x12e6/0x5450 [ 30.130119] kasan_report+0x141/0x180 [ 30.130141] ? kasan_atomics_helper+0x12e6/0x5450 [ 30.130169] kasan_check_range+0x10c/0x1c0 [ 30.130193] __kasan_check_write+0x18/0x20 [ 30.130217] kasan_atomics_helper+0x12e6/0x5450 [ 30.130241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.130263] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.130290] ? kasan_atomics+0x152/0x310 [ 30.130317] kasan_atomics+0x1dc/0x310 [ 30.130341] ? __pfx_kasan_atomics+0x10/0x10 [ 30.130385] ? __pfx_read_tsc+0x10/0x10 [ 30.130407] ? ktime_get_ts64+0x86/0x230 [ 30.130433] kunit_try_run_case+0x1a5/0x480 [ 30.130460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.130483] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.130510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.130553] ? __kthread_parkme+0x82/0x180 [ 30.130585] ? preempt_count_sub+0x50/0x80 [ 30.130610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.130634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.130659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.130684] kthread+0x337/0x6f0 [ 30.130703] ? trace_preempt_on+0x20/0xc0 [ 30.130746] ? __pfx_kthread+0x10/0x10 [ 30.130767] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.130850] ? calculate_sigpending+0x7b/0xa0 [ 30.130877] ? __pfx_kthread+0x10/0x10 [ 30.130899] ret_from_fork+0x116/0x1d0 [ 30.130941] ? __pfx_kthread+0x10/0x10 [ 30.130963] ret_from_fork_asm+0x1a/0x30 [ 30.130995] </TASK> [ 30.131007] [ 30.139271] Allocated by task 313: [ 30.139546] kasan_save_stack+0x45/0x70 [ 30.139871] kasan_save_track+0x18/0x40 [ 30.140147] kasan_save_alloc_info+0x3b/0x50 [ 30.140339] __kasan_kmalloc+0xb7/0xc0 [ 30.140517] __kmalloc_cache_noprof+0x189/0x420 [ 30.140763] kasan_atomics+0x95/0x310 [ 30.141027] kunit_try_run_case+0x1a5/0x480 [ 30.141454] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.141718] kthread+0x337/0x6f0 [ 30.141877] ret_from_fork+0x116/0x1d0 [ 30.142080] ret_from_fork_asm+0x1a/0x30 [ 30.142332] [ 30.142427] The buggy address belongs to the object at ffff888106038600 [ 30.142427] which belongs to the cache kmalloc-64 of size 64 [ 30.142906] The buggy address is located 0 bytes to the right of [ 30.142906] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.143470] [ 30.143589] The buggy address belongs to the physical page: [ 30.143844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.144185] flags: 0x200000000000000(node=0|zone=2) [ 30.144438] page_type: f5(slab) [ 30.144612] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.144937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.145257] page dumped because: kasan: bad access detected [ 30.145464] [ 30.145528] Memory state around the buggy address: [ 30.145678] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.145879] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.146358] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.146695] ^ [ 30.147090] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.147417] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.147665] ================================================================== [ 29.750013] ================================================================== [ 29.750495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 29.750745] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.751423] [ 29.751604] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.751671] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.751687] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.751710] Call Trace: [ 29.751730] <TASK> [ 29.751774] dump_stack_lvl+0x73/0xb0 [ 29.751814] print_report+0xd1/0x640 [ 29.751850] ? __virt_addr_valid+0x1db/0x2d0 [ 29.751875] ? kasan_atomics_helper+0xb6a/0x5450 [ 29.751897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.751923] ? kasan_atomics_helper+0xb6a/0x5450 [ 29.751946] kasan_report+0x141/0x180 [ 29.751970] ? kasan_atomics_helper+0xb6a/0x5450 [ 29.751996] kasan_check_range+0x10c/0x1c0 [ 29.752021] __kasan_check_write+0x18/0x20 [ 29.752045] kasan_atomics_helper+0xb6a/0x5450 [ 29.752069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.752092] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.752119] ? kasan_atomics+0x152/0x310 [ 29.752146] kasan_atomics+0x1dc/0x310 [ 29.752169] ? __pfx_kasan_atomics+0x10/0x10 [ 29.752194] ? __pfx_read_tsc+0x10/0x10 [ 29.752217] ? ktime_get_ts64+0x86/0x230 [ 29.752243] kunit_try_run_case+0x1a5/0x480 [ 29.752269] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.752292] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.752319] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.752344] ? __kthread_parkme+0x82/0x180 [ 29.752366] ? preempt_count_sub+0x50/0x80 [ 29.752390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.752415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.752440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.752464] kthread+0x337/0x6f0 [ 29.752484] ? trace_preempt_on+0x20/0xc0 [ 29.752508] ? __pfx_kthread+0x10/0x10 [ 29.752530] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.752554] ? calculate_sigpending+0x7b/0xa0 [ 29.752589] ? __pfx_kthread+0x10/0x10 [ 29.752611] ret_from_fork+0x116/0x1d0 [ 29.752631] ? __pfx_kthread+0x10/0x10 [ 29.752653] ret_from_fork_asm+0x1a/0x30 [ 29.752686] </TASK> [ 29.752698] [ 29.761509] Allocated by task 313: [ 29.762513] kasan_save_stack+0x45/0x70 [ 29.763054] kasan_save_track+0x18/0x40 [ 29.763699] kasan_save_alloc_info+0x3b/0x50 [ 29.764185] __kasan_kmalloc+0xb7/0xc0 [ 29.764376] __kmalloc_cache_noprof+0x189/0x420 [ 29.764595] kasan_atomics+0x95/0x310 [ 29.764743] kunit_try_run_case+0x1a5/0x480 [ 29.765606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.766317] kthread+0x337/0x6f0 [ 29.766475] ret_from_fork+0x116/0x1d0 [ 29.766644] ret_from_fork_asm+0x1a/0x30 [ 29.766780] [ 29.767468] The buggy address belongs to the object at ffff888106038600 [ 29.767468] which belongs to the cache kmalloc-64 of size 64 [ 29.768722] The buggy address is located 0 bytes to the right of [ 29.768722] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.769644] [ 29.769754] The buggy address belongs to the physical page: [ 29.770014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.770678] flags: 0x200000000000000(node=0|zone=2) [ 29.771185] page_type: f5(slab) [ 29.771371] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.771980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.772427] page dumped because: kasan: bad access detected [ 29.772774] [ 29.773134] Memory state around the buggy address: [ 29.773314] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.773740] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.774439] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.775053] ^ [ 29.775296] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.775616] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.776168] ================================================================== [ 29.855092] ================================================================== [ 29.855450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 29.855725] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.856679] [ 29.856832] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.856888] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.856904] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.856928] Call Trace: [ 29.856949] <TASK> [ 29.856970] dump_stack_lvl+0x73/0xb0 [ 29.857013] print_report+0xd1/0x640 [ 29.857037] ? __virt_addr_valid+0x1db/0x2d0 [ 29.857062] ? kasan_atomics_helper+0xde0/0x5450 [ 29.857084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.857311] ? kasan_atomics_helper+0xde0/0x5450 [ 29.857339] kasan_report+0x141/0x180 [ 29.857364] ? kasan_atomics_helper+0xde0/0x5450 [ 29.857391] kasan_check_range+0x10c/0x1c0 [ 29.857417] __kasan_check_write+0x18/0x20 [ 29.857441] kasan_atomics_helper+0xde0/0x5450 [ 29.857465] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.857487] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.857513] ? kasan_atomics+0x152/0x310 [ 29.857541] kasan_atomics+0x1dc/0x310 [ 29.857564] ? __pfx_kasan_atomics+0x10/0x10 [ 29.857603] ? __pfx_read_tsc+0x10/0x10 [ 29.857626] ? ktime_get_ts64+0x86/0x230 [ 29.857652] kunit_try_run_case+0x1a5/0x480 [ 29.857677] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.857700] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.857727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.857753] ? __kthread_parkme+0x82/0x180 [ 29.857775] ? preempt_count_sub+0x50/0x80 [ 29.857809] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.857835] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.857860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.857885] kthread+0x337/0x6f0 [ 29.857905] ? trace_preempt_on+0x20/0xc0 [ 29.857942] ? __pfx_kthread+0x10/0x10 [ 29.857963] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.857989] ? calculate_sigpending+0x7b/0xa0 [ 29.858015] ? __pfx_kthread+0x10/0x10 [ 29.858039] ret_from_fork+0x116/0x1d0 [ 29.858061] ? __pfx_kthread+0x10/0x10 [ 29.858082] ret_from_fork_asm+0x1a/0x30 [ 29.858116] </TASK> [ 29.858127] [ 29.870346] Allocated by task 313: [ 29.870529] kasan_save_stack+0x45/0x70 [ 29.870757] kasan_save_track+0x18/0x40 [ 29.870977] kasan_save_alloc_info+0x3b/0x50 [ 29.871433] __kasan_kmalloc+0xb7/0xc0 [ 29.872037] __kmalloc_cache_noprof+0x189/0x420 [ 29.872468] kasan_atomics+0x95/0x310 [ 29.872685] kunit_try_run_case+0x1a5/0x480 [ 29.873069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.873430] kthread+0x337/0x6f0 [ 29.873635] ret_from_fork+0x116/0x1d0 [ 29.874050] ret_from_fork_asm+0x1a/0x30 [ 29.874250] [ 29.874340] The buggy address belongs to the object at ffff888106038600 [ 29.874340] which belongs to the cache kmalloc-64 of size 64 [ 29.875202] The buggy address is located 0 bytes to the right of [ 29.875202] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.876026] [ 29.876107] The buggy address belongs to the physical page: [ 29.876373] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.877303] flags: 0x200000000000000(node=0|zone=2) [ 29.877486] page_type: f5(slab) [ 29.877697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.878314] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.878684] page dumped because: kasan: bad access detected [ 29.879049] [ 29.879150] Memory state around the buggy address: [ 29.879490] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.879794] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.880321] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.880656] ^ [ 29.881009] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.881367] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.881807] ================================================================== [ 30.382041] ================================================================== [ 30.382358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 30.382689] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.383652] [ 30.383761] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.383829] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.383846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.383869] Call Trace: [ 30.383891] <TASK> [ 30.383915] dump_stack_lvl+0x73/0xb0 [ 30.384131] print_report+0xd1/0x640 [ 30.384204] ? __virt_addr_valid+0x1db/0x2d0 [ 30.384231] ? kasan_atomics_helper+0x177f/0x5450 [ 30.384265] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.384293] ? kasan_atomics_helper+0x177f/0x5450 [ 30.384316] kasan_report+0x141/0x180 [ 30.384339] ? kasan_atomics_helper+0x177f/0x5450 [ 30.384366] kasan_check_range+0x10c/0x1c0 [ 30.384390] __kasan_check_write+0x18/0x20 [ 30.384415] kasan_atomics_helper+0x177f/0x5450 [ 30.384439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.384461] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.384488] ? kasan_atomics+0x152/0x310 [ 30.384515] kasan_atomics+0x1dc/0x310 [ 30.384538] ? __pfx_kasan_atomics+0x10/0x10 [ 30.384563] ? __pfx_read_tsc+0x10/0x10 [ 30.384596] ? ktime_get_ts64+0x86/0x230 [ 30.384622] kunit_try_run_case+0x1a5/0x480 [ 30.384649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.384672] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.384699] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.384725] ? __kthread_parkme+0x82/0x180 [ 30.384746] ? preempt_count_sub+0x50/0x80 [ 30.384771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.385018] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.385047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.385072] kthread+0x337/0x6f0 [ 30.385095] ? trace_preempt_on+0x20/0xc0 [ 30.385120] ? __pfx_kthread+0x10/0x10 [ 30.385142] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.385167] ? calculate_sigpending+0x7b/0xa0 [ 30.385192] ? __pfx_kthread+0x10/0x10 [ 30.385214] ret_from_fork+0x116/0x1d0 [ 30.385235] ? __pfx_kthread+0x10/0x10 [ 30.385257] ret_from_fork_asm+0x1a/0x30 [ 30.385292] </TASK> [ 30.385305] [ 30.397219] Allocated by task 313: [ 30.397453] kasan_save_stack+0x45/0x70 [ 30.397702] kasan_save_track+0x18/0x40 [ 30.397953] kasan_save_alloc_info+0x3b/0x50 [ 30.398148] __kasan_kmalloc+0xb7/0xc0 [ 30.398321] __kmalloc_cache_noprof+0x189/0x420 [ 30.398510] kasan_atomics+0x95/0x310 [ 30.398680] kunit_try_run_case+0x1a5/0x480 [ 30.398951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.399199] kthread+0x337/0x6f0 [ 30.399453] ret_from_fork+0x116/0x1d0 [ 30.399591] ret_from_fork_asm+0x1a/0x30 [ 30.399724] [ 30.399790] The buggy address belongs to the object at ffff888106038600 [ 30.399790] which belongs to the cache kmalloc-64 of size 64 [ 30.400359] The buggy address is located 0 bytes to the right of [ 30.400359] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.400977] [ 30.401071] The buggy address belongs to the physical page: [ 30.401244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.401609] flags: 0x200000000000000(node=0|zone=2) [ 30.401838] page_type: f5(slab) [ 30.402299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.402550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.403047] page dumped because: kasan: bad access detected [ 30.403329] [ 30.403420] Memory state around the buggy address: [ 30.403652] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.404094] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.404389] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.404705] ^ [ 30.404948] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.405426] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.405639] ================================================================== [ 30.459462] ================================================================== [ 30.460323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 30.460671] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.461253] [ 30.461433] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.461489] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.461504] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.461528] Call Trace: [ 30.461549] <TASK> [ 30.461570] dump_stack_lvl+0x73/0xb0 [ 30.461613] print_report+0xd1/0x640 [ 30.461637] ? __virt_addr_valid+0x1db/0x2d0 [ 30.461663] ? kasan_atomics_helper+0x194a/0x5450 [ 30.461685] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.461711] ? kasan_atomics_helper+0x194a/0x5450 [ 30.461734] kasan_report+0x141/0x180 [ 30.461756] ? kasan_atomics_helper+0x194a/0x5450 [ 30.461861] kasan_check_range+0x10c/0x1c0 [ 30.461893] __kasan_check_write+0x18/0x20 [ 30.461916] kasan_atomics_helper+0x194a/0x5450 [ 30.461941] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.461973] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.461998] ? kasan_atomics+0x152/0x310 [ 30.462025] kasan_atomics+0x1dc/0x310 [ 30.462049] ? __pfx_kasan_atomics+0x10/0x10 [ 30.462075] ? __pfx_read_tsc+0x10/0x10 [ 30.462098] ? ktime_get_ts64+0x86/0x230 [ 30.462126] kunit_try_run_case+0x1a5/0x480 [ 30.462154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.462177] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.462204] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.462230] ? __kthread_parkme+0x82/0x180 [ 30.462252] ? preempt_count_sub+0x50/0x80 [ 30.462276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.462301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.462326] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.462350] kthread+0x337/0x6f0 [ 30.462371] ? trace_preempt_on+0x20/0xc0 [ 30.462396] ? __pfx_kthread+0x10/0x10 [ 30.462417] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.462441] ? calculate_sigpending+0x7b/0xa0 [ 30.462466] ? __pfx_kthread+0x10/0x10 [ 30.462488] ret_from_fork+0x116/0x1d0 [ 30.462508] ? __pfx_kthread+0x10/0x10 [ 30.462530] ret_from_fork_asm+0x1a/0x30 [ 30.462563] </TASK> [ 30.462588] [ 30.475406] Allocated by task 313: [ 30.475551] kasan_save_stack+0x45/0x70 [ 30.475731] kasan_save_track+0x18/0x40 [ 30.476339] kasan_save_alloc_info+0x3b/0x50 [ 30.476537] __kasan_kmalloc+0xb7/0xc0 [ 30.476720] __kmalloc_cache_noprof+0x189/0x420 [ 30.476921] kasan_atomics+0x95/0x310 [ 30.477271] kunit_try_run_case+0x1a5/0x480 [ 30.477460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.477684] kthread+0x337/0x6f0 [ 30.477962] ret_from_fork+0x116/0x1d0 [ 30.478100] ret_from_fork_asm+0x1a/0x30 [ 30.478292] [ 30.478376] The buggy address belongs to the object at ffff888106038600 [ 30.478376] which belongs to the cache kmalloc-64 of size 64 [ 30.478738] The buggy address is located 0 bytes to the right of [ 30.478738] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.479285] [ 30.479385] The buggy address belongs to the physical page: [ 30.479695] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.480374] flags: 0x200000000000000(node=0|zone=2) [ 30.480608] page_type: f5(slab) [ 30.480772] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.481557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.482507] page dumped because: kasan: bad access detected [ 30.482699] [ 30.482768] Memory state around the buggy address: [ 30.482932] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.483143] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.483360] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.483566] ^ [ 30.484690] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485782] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.486788] ================================================================== [ 30.106903] ================================================================== [ 30.107528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 30.108009] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.108316] [ 30.108403] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.108637] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.108652] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.108695] Call Trace: [ 30.108708] <TASK> [ 30.108727] dump_stack_lvl+0x73/0xb0 [ 30.108934] print_report+0xd1/0x640 [ 30.108962] ? __virt_addr_valid+0x1db/0x2d0 [ 30.108989] ? kasan_atomics_helper+0x49e8/0x5450 [ 30.109011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.109038] ? kasan_atomics_helper+0x49e8/0x5450 [ 30.109061] kasan_report+0x141/0x180 [ 30.109106] ? kasan_atomics_helper+0x49e8/0x5450 [ 30.109134] __asan_report_load4_noabort+0x18/0x20 [ 30.109158] kasan_atomics_helper+0x49e8/0x5450 [ 30.109181] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.109204] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.109230] ? kasan_atomics+0x152/0x310 [ 30.109257] kasan_atomics+0x1dc/0x310 [ 30.109282] ? __pfx_kasan_atomics+0x10/0x10 [ 30.109308] ? __pfx_read_tsc+0x10/0x10 [ 30.109331] ? ktime_get_ts64+0x86/0x230 [ 30.109375] kunit_try_run_case+0x1a5/0x480 [ 30.109401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.109425] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.109452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.109479] ? __kthread_parkme+0x82/0x180 [ 30.109501] ? preempt_count_sub+0x50/0x80 [ 30.109525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.109565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.109601] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.109641] kthread+0x337/0x6f0 [ 30.109663] ? trace_preempt_on+0x20/0xc0 [ 30.109703] ? __pfx_kthread+0x10/0x10 [ 30.109727] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.109753] ? calculate_sigpending+0x7b/0xa0 [ 30.109880] ? __pfx_kthread+0x10/0x10 [ 30.109906] ret_from_fork+0x116/0x1d0 [ 30.109927] ? __pfx_kthread+0x10/0x10 [ 30.109950] ret_from_fork_asm+0x1a/0x30 [ 30.109984] </TASK> [ 30.109996] [ 30.118702] Allocated by task 313: [ 30.118859] kasan_save_stack+0x45/0x70 [ 30.119184] kasan_save_track+0x18/0x40 [ 30.119608] kasan_save_alloc_info+0x3b/0x50 [ 30.119811] __kasan_kmalloc+0xb7/0xc0 [ 30.120076] __kmalloc_cache_noprof+0x189/0x420 [ 30.120302] kasan_atomics+0x95/0x310 [ 30.120485] kunit_try_run_case+0x1a5/0x480 [ 30.120700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.120946] kthread+0x337/0x6f0 [ 30.121160] ret_from_fork+0x116/0x1d0 [ 30.121288] ret_from_fork_asm+0x1a/0x30 [ 30.121587] [ 30.121704] The buggy address belongs to the object at ffff888106038600 [ 30.121704] which belongs to the cache kmalloc-64 of size 64 [ 30.122507] The buggy address is located 0 bytes to the right of [ 30.122507] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.123233] [ 30.123338] The buggy address belongs to the physical page: [ 30.123608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.124056] flags: 0x200000000000000(node=0|zone=2) [ 30.124285] page_type: f5(slab) [ 30.124420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.124755] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.125205] page dumped because: kasan: bad access detected [ 30.125443] [ 30.125530] Memory state around the buggy address: [ 30.125739] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.126040] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.126337] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.126649] ^ [ 30.126998] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.127277] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.127474] ================================================================== [ 29.475009] ================================================================== [ 29.475274] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 29.476114] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.476665] [ 29.476874] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.477007] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.477023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.477048] Call Trace: [ 29.477068] <TASK> [ 29.477089] dump_stack_lvl+0x73/0xb0 [ 29.477120] print_report+0xd1/0x640 [ 29.477143] ? __virt_addr_valid+0x1db/0x2d0 [ 29.477169] ? kasan_atomics_helper+0x4a0/0x5450 [ 29.477191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.477219] ? kasan_atomics_helper+0x4a0/0x5450 [ 29.477242] kasan_report+0x141/0x180 [ 29.477266] ? kasan_atomics_helper+0x4a0/0x5450 [ 29.477295] kasan_check_range+0x10c/0x1c0 [ 29.477321] __kasan_check_write+0x18/0x20 [ 29.477349] kasan_atomics_helper+0x4a0/0x5450 [ 29.477373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.477397] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.477424] ? kasan_atomics+0x152/0x310 [ 29.477452] kasan_atomics+0x1dc/0x310 [ 29.477476] ? __pfx_kasan_atomics+0x10/0x10 [ 29.477501] ? __pfx_read_tsc+0x10/0x10 [ 29.477525] ? ktime_get_ts64+0x86/0x230 [ 29.477552] kunit_try_run_case+0x1a5/0x480 [ 29.477594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.477620] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.477680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.477707] ? __kthread_parkme+0x82/0x180 [ 29.477728] ? preempt_count_sub+0x50/0x80 [ 29.477753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.477794] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.477820] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.477846] kthread+0x337/0x6f0 [ 29.477868] ? trace_preempt_on+0x20/0xc0 [ 29.477893] ? __pfx_kthread+0x10/0x10 [ 29.477914] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.477940] ? calculate_sigpending+0x7b/0xa0 [ 29.477971] ? __pfx_kthread+0x10/0x10 [ 29.477993] ret_from_fork+0x116/0x1d0 [ 29.478014] ? __pfx_kthread+0x10/0x10 [ 29.478035] ret_from_fork_asm+0x1a/0x30 [ 29.478068] </TASK> [ 29.478079] [ 29.489338] Allocated by task 313: [ 29.489687] kasan_save_stack+0x45/0x70 [ 29.490070] kasan_save_track+0x18/0x40 [ 29.490219] kasan_save_alloc_info+0x3b/0x50 [ 29.490493] __kasan_kmalloc+0xb7/0xc0 [ 29.490803] __kmalloc_cache_noprof+0x189/0x420 [ 29.491181] kasan_atomics+0x95/0x310 [ 29.491398] kunit_try_run_case+0x1a5/0x480 [ 29.491547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.491810] kthread+0x337/0x6f0 [ 29.492309] ret_from_fork+0x116/0x1d0 [ 29.492584] ret_from_fork_asm+0x1a/0x30 [ 29.492752] [ 29.493010] The buggy address belongs to the object at ffff888106038600 [ 29.493010] which belongs to the cache kmalloc-64 of size 64 [ 29.493728] The buggy address is located 0 bytes to the right of [ 29.493728] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.494243] [ 29.494339] The buggy address belongs to the physical page: [ 29.494595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.495444] flags: 0x200000000000000(node=0|zone=2) [ 29.495780] page_type: f5(slab) [ 29.496151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.496533] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.497012] page dumped because: kasan: bad access detected [ 29.497187] [ 29.497435] Memory state around the buggy address: [ 29.497638] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.498133] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.498380] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.498859] ^ [ 29.499354] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.499767] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.500035] ================================================================== [ 29.776808] ================================================================== [ 29.777694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 29.778146] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.778727] [ 29.778855] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.778910] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.778927] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.778950] Call Trace: [ 29.778971] <TASK> [ 29.778993] dump_stack_lvl+0x73/0xb0 [ 29.779022] print_report+0xd1/0x640 [ 29.779047] ? __virt_addr_valid+0x1db/0x2d0 [ 29.779072] ? kasan_atomics_helper+0xc70/0x5450 [ 29.779093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.779120] ? kasan_atomics_helper+0xc70/0x5450 [ 29.779142] kasan_report+0x141/0x180 [ 29.779166] ? kasan_atomics_helper+0xc70/0x5450 [ 29.779192] kasan_check_range+0x10c/0x1c0 [ 29.779216] __kasan_check_write+0x18/0x20 [ 29.779240] kasan_atomics_helper+0xc70/0x5450 [ 29.779270] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.779292] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.779318] ? kasan_atomics+0x152/0x310 [ 29.779345] kasan_atomics+0x1dc/0x310 [ 29.779369] ? __pfx_kasan_atomics+0x10/0x10 [ 29.779393] ? __pfx_read_tsc+0x10/0x10 [ 29.779416] ? ktime_get_ts64+0x86/0x230 [ 29.779442] kunit_try_run_case+0x1a5/0x480 [ 29.779468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.779491] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.779517] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.779544] ? __kthread_parkme+0x82/0x180 [ 29.779566] ? preempt_count_sub+0x50/0x80 [ 29.779792] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.779824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.779851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.779875] kthread+0x337/0x6f0 [ 29.779897] ? trace_preempt_on+0x20/0xc0 [ 29.779937] ? __pfx_kthread+0x10/0x10 [ 29.779958] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.779984] ? calculate_sigpending+0x7b/0xa0 [ 29.780009] ? __pfx_kthread+0x10/0x10 [ 29.780031] ret_from_fork+0x116/0x1d0 [ 29.780052] ? __pfx_kthread+0x10/0x10 [ 29.780073] ret_from_fork_asm+0x1a/0x30 [ 29.780106] </TASK> [ 29.780119] [ 29.790960] Allocated by task 313: [ 29.791347] kasan_save_stack+0x45/0x70 [ 29.791501] kasan_save_track+0x18/0x40 [ 29.791676] kasan_save_alloc_info+0x3b/0x50 [ 29.792092] __kasan_kmalloc+0xb7/0xc0 [ 29.792267] __kmalloc_cache_noprof+0x189/0x420 [ 29.792521] kasan_atomics+0x95/0x310 [ 29.792713] kunit_try_run_case+0x1a5/0x480 [ 29.792891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.793366] kthread+0x337/0x6f0 [ 29.793607] ret_from_fork+0x116/0x1d0 [ 29.793936] ret_from_fork_asm+0x1a/0x30 [ 29.794296] [ 29.794402] The buggy address belongs to the object at ffff888106038600 [ 29.794402] which belongs to the cache kmalloc-64 of size 64 [ 29.794967] The buggy address is located 0 bytes to the right of [ 29.794967] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.795775] [ 29.796029] The buggy address belongs to the physical page: [ 29.796287] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.796621] flags: 0x200000000000000(node=0|zone=2) [ 29.797016] page_type: f5(slab) [ 29.797287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.797723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.798202] page dumped because: kasan: bad access detected [ 29.798420] [ 29.798515] Memory state around the buggy address: [ 29.798817] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.799260] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.799506] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.800025] ^ [ 29.800211] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.800659] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801055] ================================================================== [ 30.488079] ================================================================== [ 30.489557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 30.490790] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.491724] [ 30.492031] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.492092] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.492108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.492246] Call Trace: [ 30.492286] <TASK> [ 30.492309] dump_stack_lvl+0x73/0xb0 [ 30.492391] print_report+0xd1/0x640 [ 30.492418] ? __virt_addr_valid+0x1db/0x2d0 [ 30.492444] ? kasan_atomics_helper+0x19e3/0x5450 [ 30.492468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.492496] ? kasan_atomics_helper+0x19e3/0x5450 [ 30.492519] kasan_report+0x141/0x180 [ 30.492542] ? kasan_atomics_helper+0x19e3/0x5450 [ 30.492569] kasan_check_range+0x10c/0x1c0 [ 30.492605] __kasan_check_write+0x18/0x20 [ 30.492631] kasan_atomics_helper+0x19e3/0x5450 [ 30.492654] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.492676] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.492702] ? kasan_atomics+0x152/0x310 [ 30.492730] kasan_atomics+0x1dc/0x310 [ 30.492753] ? __pfx_kasan_atomics+0x10/0x10 [ 30.492777] ? __pfx_read_tsc+0x10/0x10 [ 30.492807] ? ktime_get_ts64+0x86/0x230 [ 30.492834] kunit_try_run_case+0x1a5/0x480 [ 30.492860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.492885] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.492911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.492937] ? __kthread_parkme+0x82/0x180 [ 30.492959] ? preempt_count_sub+0x50/0x80 [ 30.492984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.493009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.493034] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.493059] kthread+0x337/0x6f0 [ 30.493080] ? trace_preempt_on+0x20/0xc0 [ 30.493105] ? __pfx_kthread+0x10/0x10 [ 30.493127] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.493151] ? calculate_sigpending+0x7b/0xa0 [ 30.493176] ? __pfx_kthread+0x10/0x10 [ 30.493198] ret_from_fork+0x116/0x1d0 [ 30.493219] ? __pfx_kthread+0x10/0x10 [ 30.493240] ret_from_fork_asm+0x1a/0x30 [ 30.493274] </TASK> [ 30.493286] [ 30.510645] Allocated by task 313: [ 30.510806] kasan_save_stack+0x45/0x70 [ 30.510965] kasan_save_track+0x18/0x40 [ 30.511830] kasan_save_alloc_info+0x3b/0x50 [ 30.512527] __kasan_kmalloc+0xb7/0xc0 [ 30.512992] __kmalloc_cache_noprof+0x189/0x420 [ 30.513659] kasan_atomics+0x95/0x310 [ 30.514222] kunit_try_run_case+0x1a5/0x480 [ 30.514830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.515479] kthread+0x337/0x6f0 [ 30.516017] ret_from_fork+0x116/0x1d0 [ 30.516193] ret_from_fork_asm+0x1a/0x30 [ 30.516334] [ 30.516403] The buggy address belongs to the object at ffff888106038600 [ 30.516403] which belongs to the cache kmalloc-64 of size 64 [ 30.516771] The buggy address is located 0 bytes to the right of [ 30.516771] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.517593] [ 30.517666] The buggy address belongs to the physical page: [ 30.517880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.518374] flags: 0x200000000000000(node=0|zone=2) [ 30.518880] page_type: f5(slab) [ 30.519032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.519789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.520334] page dumped because: kasan: bad access detected [ 30.520692] [ 30.520907] Memory state around the buggy address: [ 30.521247] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.521680] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.521934] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.522659] ^ [ 30.522821] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.523371] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.524042] ================================================================== [ 30.879021] ================================================================== [ 30.879303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 30.880014] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.880284] [ 30.880674] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.880735] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.880752] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.880776] Call Trace: [ 30.880797] <TASK> [ 30.880926] dump_stack_lvl+0x73/0xb0 [ 30.880966] print_report+0xd1/0x640 [ 30.880990] ? __virt_addr_valid+0x1db/0x2d0 [ 30.881017] ? kasan_atomics_helper+0x4fb2/0x5450 [ 30.881039] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.881065] ? kasan_atomics_helper+0x4fb2/0x5450 [ 30.881088] kasan_report+0x141/0x180 [ 30.881111] ? kasan_atomics_helper+0x4fb2/0x5450 [ 30.881138] __asan_report_load8_noabort+0x18/0x20 [ 30.881163] kasan_atomics_helper+0x4fb2/0x5450 [ 30.881188] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.881210] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.881237] ? kasan_atomics+0x152/0x310 [ 30.881264] kasan_atomics+0x1dc/0x310 [ 30.881287] ? __pfx_kasan_atomics+0x10/0x10 [ 30.881312] ? __pfx_read_tsc+0x10/0x10 [ 30.881335] ? ktime_get_ts64+0x86/0x230 [ 30.881361] kunit_try_run_case+0x1a5/0x480 [ 30.881388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.881412] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.881439] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.881465] ? __kthread_parkme+0x82/0x180 [ 30.881486] ? preempt_count_sub+0x50/0x80 [ 30.881510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.881537] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.881561] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.881595] kthread+0x337/0x6f0 [ 30.881616] ? trace_preempt_on+0x20/0xc0 [ 30.881641] ? __pfx_kthread+0x10/0x10 [ 30.881662] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.881686] ? calculate_sigpending+0x7b/0xa0 [ 30.881711] ? __pfx_kthread+0x10/0x10 [ 30.881733] ret_from_fork+0x116/0x1d0 [ 30.881752] ? __pfx_kthread+0x10/0x10 [ 30.881774] ret_from_fork_asm+0x1a/0x30 [ 30.881807] </TASK> [ 30.881820] [ 30.892469] Allocated by task 313: [ 30.892791] kasan_save_stack+0x45/0x70 [ 30.893234] kasan_save_track+0x18/0x40 [ 30.893560] kasan_save_alloc_info+0x3b/0x50 [ 30.893765] __kasan_kmalloc+0xb7/0xc0 [ 30.894127] __kmalloc_cache_noprof+0x189/0x420 [ 30.894357] kasan_atomics+0x95/0x310 [ 30.894677] kunit_try_run_case+0x1a5/0x480 [ 30.894962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.895316] kthread+0x337/0x6f0 [ 30.895449] ret_from_fork+0x116/0x1d0 [ 30.895668] ret_from_fork_asm+0x1a/0x30 [ 30.896054] [ 30.896145] The buggy address belongs to the object at ffff888106038600 [ 30.896145] which belongs to the cache kmalloc-64 of size 64 [ 30.896835] The buggy address is located 0 bytes to the right of [ 30.896835] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.897237] [ 30.897312] The buggy address belongs to the physical page: [ 30.897490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.897742] flags: 0x200000000000000(node=0|zone=2) [ 30.897904] page_type: f5(slab) [ 30.898024] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.898249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.898471] page dumped because: kasan: bad access detected [ 30.898781] [ 30.898934] Memory state around the buggy address: [ 30.899359] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.899988] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.900828] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.901617] ^ [ 30.902073] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.902706] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.903391] ================================================================== [ 30.958610] ================================================================== [ 30.959023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 30.959312] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.959648] [ 30.959739] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.959792] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.959806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.959830] Call Trace: [ 30.959850] <TASK> [ 30.959872] dump_stack_lvl+0x73/0xb0 [ 30.959900] print_report+0xd1/0x640 [ 30.959925] ? __virt_addr_valid+0x1db/0x2d0 [ 30.959951] ? kasan_atomics_helper+0x5115/0x5450 [ 30.959973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.960000] ? kasan_atomics_helper+0x5115/0x5450 [ 30.960023] kasan_report+0x141/0x180 [ 30.960046] ? kasan_atomics_helper+0x5115/0x5450 [ 30.960073] __asan_report_load8_noabort+0x18/0x20 [ 30.960098] kasan_atomics_helper+0x5115/0x5450 [ 30.960122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.960145] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.960171] ? kasan_atomics+0x152/0x310 [ 30.960198] kasan_atomics+0x1dc/0x310 [ 30.960221] ? __pfx_kasan_atomics+0x10/0x10 [ 30.960246] ? __pfx_read_tsc+0x10/0x10 [ 30.960269] ? ktime_get_ts64+0x86/0x230 [ 30.960296] kunit_try_run_case+0x1a5/0x480 [ 30.960322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.960345] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.960374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.960399] ? __kthread_parkme+0x82/0x180 [ 30.960421] ? preempt_count_sub+0x50/0x80 [ 30.960445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.960469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.960493] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.960517] kthread+0x337/0x6f0 [ 30.960539] ? trace_preempt_on+0x20/0xc0 [ 30.960563] ? __pfx_kthread+0x10/0x10 [ 30.960596] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.960619] ? calculate_sigpending+0x7b/0xa0 [ 30.960644] ? __pfx_kthread+0x10/0x10 [ 30.960667] ret_from_fork+0x116/0x1d0 [ 30.960699] ? __pfx_kthread+0x10/0x10 [ 30.960720] ret_from_fork_asm+0x1a/0x30 [ 30.960755] </TASK> [ 30.960767] [ 30.968188] Allocated by task 313: [ 30.968357] kasan_save_stack+0x45/0x70 [ 30.968548] kasan_save_track+0x18/0x40 [ 30.968719] kasan_save_alloc_info+0x3b/0x50 [ 30.968909] __kasan_kmalloc+0xb7/0xc0 [ 30.969083] __kmalloc_cache_noprof+0x189/0x420 [ 30.969284] kasan_atomics+0x95/0x310 [ 30.969462] kunit_try_run_case+0x1a5/0x480 [ 30.969641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.969880] kthread+0x337/0x6f0 [ 30.970047] ret_from_fork+0x116/0x1d0 [ 30.970208] ret_from_fork_asm+0x1a/0x30 [ 30.970370] [ 30.970460] The buggy address belongs to the object at ffff888106038600 [ 30.970460] which belongs to the cache kmalloc-64 of size 64 [ 30.970884] The buggy address is located 0 bytes to the right of [ 30.970884] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.971241] [ 30.971316] The buggy address belongs to the physical page: [ 30.971488] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.971816] flags: 0x200000000000000(node=0|zone=2) [ 30.972219] page_type: f5(slab) [ 30.972384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.972722] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.973070] page dumped because: kasan: bad access detected [ 30.973237] [ 30.973300] Memory state around the buggy address: [ 30.973450] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.973668] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.973991] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.974303] ^ [ 30.974523] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.974838] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.975475] ================================================================== [ 29.678988] ================================================================== [ 29.679294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 29.679524] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.679754] [ 29.679898] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.679976] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.680015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.680061] Call Trace: [ 29.680102] <TASK> [ 29.680142] dump_stack_lvl+0x73/0xb0 [ 29.680193] print_report+0xd1/0x640 [ 29.680258] ? __virt_addr_valid+0x1db/0x2d0 [ 29.680284] ? kasan_atomics_helper+0x992/0x5450 [ 29.680522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.680555] ? kasan_atomics_helper+0x992/0x5450 [ 29.680591] kasan_report+0x141/0x180 [ 29.680615] ? kasan_atomics_helper+0x992/0x5450 [ 29.680642] kasan_check_range+0x10c/0x1c0 [ 29.680667] __kasan_check_write+0x18/0x20 [ 29.680692] kasan_atomics_helper+0x992/0x5450 [ 29.680715] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.680739] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.680766] ? kasan_atomics+0x152/0x310 [ 29.680793] kasan_atomics+0x1dc/0x310 [ 29.680866] ? __pfx_kasan_atomics+0x10/0x10 [ 29.680893] ? __pfx_read_tsc+0x10/0x10 [ 29.680925] ? ktime_get_ts64+0x86/0x230 [ 29.680951] kunit_try_run_case+0x1a5/0x480 [ 29.680977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.681042] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.681070] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.681096] ? __kthread_parkme+0x82/0x180 [ 29.681119] ? preempt_count_sub+0x50/0x80 [ 29.681144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.681169] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.681194] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.681218] kthread+0x337/0x6f0 [ 29.681238] ? trace_preempt_on+0x20/0xc0 [ 29.681264] ? __pfx_kthread+0x10/0x10 [ 29.681285] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.681309] ? calculate_sigpending+0x7b/0xa0 [ 29.681333] ? __pfx_kthread+0x10/0x10 [ 29.681355] ret_from_fork+0x116/0x1d0 [ 29.681375] ? __pfx_kthread+0x10/0x10 [ 29.681396] ret_from_fork_asm+0x1a/0x30 [ 29.681428] </TASK> [ 29.681441] [ 29.689029] Allocated by task 313: [ 29.689208] kasan_save_stack+0x45/0x70 [ 29.689474] kasan_save_track+0x18/0x40 [ 29.689673] kasan_save_alloc_info+0x3b/0x50 [ 29.689873] __kasan_kmalloc+0xb7/0xc0 [ 29.690259] __kmalloc_cache_noprof+0x189/0x420 [ 29.690592] kasan_atomics+0x95/0x310 [ 29.690729] kunit_try_run_case+0x1a5/0x480 [ 29.691194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.691466] kthread+0x337/0x6f0 [ 29.691651] ret_from_fork+0x116/0x1d0 [ 29.691984] ret_from_fork_asm+0x1a/0x30 [ 29.692198] [ 29.692264] The buggy address belongs to the object at ffff888106038600 [ 29.692264] which belongs to the cache kmalloc-64 of size 64 [ 29.692796] The buggy address is located 0 bytes to the right of [ 29.692796] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.693371] [ 29.693444] The buggy address belongs to the physical page: [ 29.693625] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.693855] flags: 0x200000000000000(node=0|zone=2) [ 29.694008] page_type: f5(slab) [ 29.694233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.694762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.695217] page dumped because: kasan: bad access detected [ 29.695380] [ 29.695442] Memory state around the buggy address: [ 29.695599] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.695797] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.696507] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.696831] ^ [ 29.697374] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.697729] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.698145] ================================================================== [ 29.367128] ================================================================== [ 29.367559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 29.368270] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.368979] [ 29.369170] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.369223] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.369238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.369261] Call Trace: [ 29.369276] <TASK> [ 29.369294] dump_stack_lvl+0x73/0xb0 [ 29.369323] print_report+0xd1/0x640 [ 29.369347] ? __virt_addr_valid+0x1db/0x2d0 [ 29.369372] ? kasan_atomics_helper+0x4b88/0x5450 [ 29.369397] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.369424] ? kasan_atomics_helper+0x4b88/0x5450 [ 29.369695] kasan_report+0x141/0x180 [ 29.369724] ? kasan_atomics_helper+0x4b88/0x5450 [ 29.369756] __asan_report_load4_noabort+0x18/0x20 [ 29.369794] kasan_atomics_helper+0x4b88/0x5450 [ 29.369820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.369844] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.369872] ? kasan_atomics+0x152/0x310 [ 29.369899] kasan_atomics+0x1dc/0x310 [ 29.370091] ? __pfx_kasan_atomics+0x10/0x10 [ 29.370126] ? __pfx_read_tsc+0x10/0x10 [ 29.370152] ? ktime_get_ts64+0x86/0x230 [ 29.370179] kunit_try_run_case+0x1a5/0x480 [ 29.370206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.370230] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.370256] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.370284] ? __kthread_parkme+0x82/0x180 [ 29.370305] ? preempt_count_sub+0x50/0x80 [ 29.370329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.370354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.370379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.370404] kthread+0x337/0x6f0 [ 29.370424] ? trace_preempt_on+0x20/0xc0 [ 29.370449] ? __pfx_kthread+0x10/0x10 [ 29.370470] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.370494] ? calculate_sigpending+0x7b/0xa0 [ 29.370518] ? __pfx_kthread+0x10/0x10 [ 29.370540] ret_from_fork+0x116/0x1d0 [ 29.370560] ? __pfx_kthread+0x10/0x10 [ 29.370594] ret_from_fork_asm+0x1a/0x30 [ 29.370626] </TASK> [ 29.370638] [ 29.385005] Allocated by task 313: [ 29.385417] kasan_save_stack+0x45/0x70 [ 29.385754] kasan_save_track+0x18/0x40 [ 29.386087] kasan_save_alloc_info+0x3b/0x50 [ 29.386304] __kasan_kmalloc+0xb7/0xc0 [ 29.386480] __kmalloc_cache_noprof+0x189/0x420 [ 29.386689] kasan_atomics+0x95/0x310 [ 29.387217] kunit_try_run_case+0x1a5/0x480 [ 29.387493] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.387960] kthread+0x337/0x6f0 [ 29.388294] ret_from_fork+0x116/0x1d0 [ 29.388647] ret_from_fork_asm+0x1a/0x30 [ 29.389008] [ 29.389125] The buggy address belongs to the object at ffff888106038600 [ 29.389125] which belongs to the cache kmalloc-64 of size 64 [ 29.389614] The buggy address is located 0 bytes to the right of [ 29.389614] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.390543] [ 29.390788] The buggy address belongs to the physical page: [ 29.391343] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.391697] flags: 0x200000000000000(node=0|zone=2) [ 29.392121] page_type: f5(slab) [ 29.392432] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.393213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.393525] page dumped because: kasan: bad access detected [ 29.393773] [ 29.393859] Memory state around the buggy address: [ 29.394425] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.395112] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.395635] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.396291] ^ [ 29.396516] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.397014] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.397479] ================================================================== [ 29.422183] ================================================================== [ 29.423134] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 29.423432] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.423750] [ 29.423938] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.423991] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.424007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.424031] Call Trace: [ 29.424052] <TASK> [ 29.424072] dump_stack_lvl+0x73/0xb0 [ 29.424102] print_report+0xd1/0x640 [ 29.424127] ? __virt_addr_valid+0x1db/0x2d0 [ 29.424152] ? kasan_atomics_helper+0x3df/0x5450 [ 29.424174] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.424201] ? kasan_atomics_helper+0x3df/0x5450 [ 29.424223] kasan_report+0x141/0x180 [ 29.424246] ? kasan_atomics_helper+0x3df/0x5450 [ 29.424272] kasan_check_range+0x10c/0x1c0 [ 29.424297] __kasan_check_read+0x15/0x20 [ 29.424321] kasan_atomics_helper+0x3df/0x5450 [ 29.424344] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.424367] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.424394] ? kasan_atomics+0x152/0x310 [ 29.424421] kasan_atomics+0x1dc/0x310 [ 29.424444] ? __pfx_kasan_atomics+0x10/0x10 [ 29.424470] ? __pfx_read_tsc+0x10/0x10 [ 29.424492] ? ktime_get_ts64+0x86/0x230 [ 29.424518] kunit_try_run_case+0x1a5/0x480 [ 29.424544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.424568] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.424605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.424631] ? __kthread_parkme+0x82/0x180 [ 29.424653] ? preempt_count_sub+0x50/0x80 [ 29.424678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.424703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.424727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.424752] kthread+0x337/0x6f0 [ 29.424772] ? trace_preempt_on+0x20/0xc0 [ 29.424797] ? __pfx_kthread+0x10/0x10 [ 29.424818] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.424842] ? calculate_sigpending+0x7b/0xa0 [ 29.424867] ? __pfx_kthread+0x10/0x10 [ 29.424889] ret_from_fork+0x116/0x1d0 [ 29.424910] ? __pfx_kthread+0x10/0x10 [ 29.424931] ret_from_fork_asm+0x1a/0x30 [ 29.424963] </TASK> [ 29.424975] [ 29.436668] Allocated by task 313: [ 29.436810] kasan_save_stack+0x45/0x70 [ 29.437089] kasan_save_track+0x18/0x40 [ 29.437280] kasan_save_alloc_info+0x3b/0x50 [ 29.437470] __kasan_kmalloc+0xb7/0xc0 [ 29.437634] __kmalloc_cache_noprof+0x189/0x420 [ 29.438273] kasan_atomics+0x95/0x310 [ 29.438427] kunit_try_run_case+0x1a5/0x480 [ 29.438780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.439185] kthread+0x337/0x6f0 [ 29.439659] ret_from_fork+0x116/0x1d0 [ 29.439843] ret_from_fork_asm+0x1a/0x30 [ 29.440328] [ 29.440439] The buggy address belongs to the object at ffff888106038600 [ 29.440439] which belongs to the cache kmalloc-64 of size 64 [ 29.441348] The buggy address is located 0 bytes to the right of [ 29.441348] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.442146] [ 29.442273] The buggy address belongs to the physical page: [ 29.442560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.443036] flags: 0x200000000000000(node=0|zone=2) [ 29.443538] page_type: f5(slab) [ 29.443680] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.444298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.444660] page dumped because: kasan: bad access detected [ 29.444981] [ 29.445052] Memory state around the buggy address: [ 29.445449] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.445971] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.446476] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.446865] ^ [ 29.447059] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.447591] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.448022] ================================================================== [ 29.584647] ================================================================== [ 29.585236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 29.585596] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.585847] [ 29.585999] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.586075] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.586091] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.586117] Call Trace: [ 29.586137] <TASK> [ 29.586158] dump_stack_lvl+0x73/0xb0 [ 29.586188] print_report+0xd1/0x640 [ 29.586212] ? __virt_addr_valid+0x1db/0x2d0 [ 29.586238] ? kasan_atomics_helper+0x72f/0x5450 [ 29.586260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.586286] ? kasan_atomics_helper+0x72f/0x5450 [ 29.586308] kasan_report+0x141/0x180 [ 29.586332] ? kasan_atomics_helper+0x72f/0x5450 [ 29.586361] kasan_check_range+0x10c/0x1c0 [ 29.586385] __kasan_check_write+0x18/0x20 [ 29.586409] kasan_atomics_helper+0x72f/0x5450 [ 29.586433] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.586455] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.586481] ? kasan_atomics+0x152/0x310 [ 29.586508] kasan_atomics+0x1dc/0x310 [ 29.586532] ? __pfx_kasan_atomics+0x10/0x10 [ 29.586556] ? __pfx_read_tsc+0x10/0x10 [ 29.586588] ? ktime_get_ts64+0x86/0x230 [ 29.586614] kunit_try_run_case+0x1a5/0x480 [ 29.586640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.586662] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.586689] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.586716] ? __kthread_parkme+0x82/0x180 [ 29.586737] ? preempt_count_sub+0x50/0x80 [ 29.586761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.586809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.586932] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.586959] kthread+0x337/0x6f0 [ 29.586979] ? trace_preempt_on+0x20/0xc0 [ 29.587005] ? __pfx_kthread+0x10/0x10 [ 29.587025] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.587050] ? calculate_sigpending+0x7b/0xa0 [ 29.587076] ? __pfx_kthread+0x10/0x10 [ 29.587098] ret_from_fork+0x116/0x1d0 [ 29.587118] ? __pfx_kthread+0x10/0x10 [ 29.587139] ret_from_fork_asm+0x1a/0x30 [ 29.587173] </TASK> [ 29.587185] [ 29.601794] Allocated by task 313: [ 29.602064] kasan_save_stack+0x45/0x70 [ 29.602475] kasan_save_track+0x18/0x40 [ 29.602769] kasan_save_alloc_info+0x3b/0x50 [ 29.603248] __kasan_kmalloc+0xb7/0xc0 [ 29.603386] __kmalloc_cache_noprof+0x189/0x420 [ 29.603533] kasan_atomics+0x95/0x310 [ 29.603670] kunit_try_run_case+0x1a5/0x480 [ 29.603812] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.603978] kthread+0x337/0x6f0 [ 29.604090] ret_from_fork+0x116/0x1d0 [ 29.604438] ret_from_fork_asm+0x1a/0x30 [ 29.604662] [ 29.604770] The buggy address belongs to the object at ffff888106038600 [ 29.604770] which belongs to the cache kmalloc-64 of size 64 [ 29.605251] The buggy address is located 0 bytes to the right of [ 29.605251] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.606072] [ 29.606205] The buggy address belongs to the physical page: [ 29.606653] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.606897] flags: 0x200000000000000(node=0|zone=2) [ 29.607188] page_type: f5(slab) [ 29.607517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.607752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.608205] page dumped because: kasan: bad access detected [ 29.608504] [ 29.608639] Memory state around the buggy address: [ 29.608969] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.609234] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.610317] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.610634] ^ [ 29.611111] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.611596] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.612555] ================================================================== [ 29.882472] ================================================================== [ 29.882969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 29.883614] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.884034] [ 29.884337] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.884397] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.884412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.884435] Call Trace: [ 29.884456] <TASK> [ 29.884478] dump_stack_lvl+0x73/0xb0 [ 29.884511] print_report+0xd1/0x640 [ 29.884549] ? __virt_addr_valid+0x1db/0x2d0 [ 29.884587] ? kasan_atomics_helper+0xe78/0x5450 [ 29.884612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.884638] ? kasan_atomics_helper+0xe78/0x5450 [ 29.884679] kasan_report+0x141/0x180 [ 29.884703] ? kasan_atomics_helper+0xe78/0x5450 [ 29.884730] kasan_check_range+0x10c/0x1c0 [ 29.884755] __kasan_check_write+0x18/0x20 [ 29.884779] kasan_atomics_helper+0xe78/0x5450 [ 29.884803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.884826] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.884978] ? kasan_atomics+0x152/0x310 [ 29.885007] kasan_atomics+0x1dc/0x310 [ 29.885030] ? __pfx_kasan_atomics+0x10/0x10 [ 29.885056] ? __pfx_read_tsc+0x10/0x10 [ 29.885079] ? ktime_get_ts64+0x86/0x230 [ 29.885105] kunit_try_run_case+0x1a5/0x480 [ 29.885132] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.885155] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.885184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.885209] ? __kthread_parkme+0x82/0x180 [ 29.885230] ? preempt_count_sub+0x50/0x80 [ 29.885256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.885280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.885305] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.885330] kthread+0x337/0x6f0 [ 29.885350] ? trace_preempt_on+0x20/0xc0 [ 29.885375] ? __pfx_kthread+0x10/0x10 [ 29.885396] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.885421] ? calculate_sigpending+0x7b/0xa0 [ 29.885445] ? __pfx_kthread+0x10/0x10 [ 29.885468] ret_from_fork+0x116/0x1d0 [ 29.885488] ? __pfx_kthread+0x10/0x10 [ 29.885509] ret_from_fork_asm+0x1a/0x30 [ 29.885542] </TASK> [ 29.885555] [ 29.896979] Allocated by task 313: [ 29.897342] kasan_save_stack+0x45/0x70 [ 29.897921] kasan_save_track+0x18/0x40 [ 29.898156] kasan_save_alloc_info+0x3b/0x50 [ 29.898509] __kasan_kmalloc+0xb7/0xc0 [ 29.898877] __kmalloc_cache_noprof+0x189/0x420 [ 29.899127] kasan_atomics+0x95/0x310 [ 29.899350] kunit_try_run_case+0x1a5/0x480 [ 29.899746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.900250] kthread+0x337/0x6f0 [ 29.900392] ret_from_fork+0x116/0x1d0 [ 29.900652] ret_from_fork_asm+0x1a/0x30 [ 29.900846] [ 29.900920] The buggy address belongs to the object at ffff888106038600 [ 29.900920] which belongs to the cache kmalloc-64 of size 64 [ 29.901810] The buggy address is located 0 bytes to the right of [ 29.901810] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.902643] [ 29.902853] The buggy address belongs to the physical page: [ 29.903149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.903711] flags: 0x200000000000000(node=0|zone=2) [ 29.903879] page_type: f5(slab) [ 29.904047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.904357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.905130] page dumped because: kasan: bad access detected [ 29.905337] [ 29.905428] Memory state around the buggy address: [ 29.905761] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.906057] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.906431] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.906986] ^ [ 29.907219] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.907507] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.908087] ================================================================== [ 30.639033] ================================================================== [ 30.639658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 30.640427] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.641361] [ 30.641544] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.641610] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.641626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.641649] Call Trace: [ 30.641671] <TASK> [ 30.641691] dump_stack_lvl+0x73/0xb0 [ 30.641721] print_report+0xd1/0x640 [ 30.641745] ? __virt_addr_valid+0x1db/0x2d0 [ 30.641770] ? kasan_atomics_helper+0x1ce1/0x5450 [ 30.641793] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.641819] ? kasan_atomics_helper+0x1ce1/0x5450 [ 30.641926] kasan_report+0x141/0x180 [ 30.641953] ? kasan_atomics_helper+0x1ce1/0x5450 [ 30.641980] kasan_check_range+0x10c/0x1c0 [ 30.642004] __kasan_check_write+0x18/0x20 [ 30.642029] kasan_atomics_helper+0x1ce1/0x5450 [ 30.642053] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.642076] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.642101] ? kasan_atomics+0x152/0x310 [ 30.642129] kasan_atomics+0x1dc/0x310 [ 30.642151] ? __pfx_kasan_atomics+0x10/0x10 [ 30.642176] ? __pfx_read_tsc+0x10/0x10 [ 30.642199] ? ktime_get_ts64+0x86/0x230 [ 30.642224] kunit_try_run_case+0x1a5/0x480 [ 30.642250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.642273] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.642299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.642325] ? __kthread_parkme+0x82/0x180 [ 30.642347] ? preempt_count_sub+0x50/0x80 [ 30.642370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.642394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.642419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.642443] kthread+0x337/0x6f0 [ 30.642463] ? trace_preempt_on+0x20/0xc0 [ 30.642488] ? __pfx_kthread+0x10/0x10 [ 30.642509] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.642534] ? calculate_sigpending+0x7b/0xa0 [ 30.642558] ? __pfx_kthread+0x10/0x10 [ 30.642594] ret_from_fork+0x116/0x1d0 [ 30.642615] ? __pfx_kthread+0x10/0x10 [ 30.642639] ret_from_fork_asm+0x1a/0x30 [ 30.642673] </TASK> [ 30.642684] [ 30.655953] Allocated by task 313: [ 30.656400] kasan_save_stack+0x45/0x70 [ 30.656800] kasan_save_track+0x18/0x40 [ 30.657496] kasan_save_alloc_info+0x3b/0x50 [ 30.657959] __kasan_kmalloc+0xb7/0xc0 [ 30.658487] __kmalloc_cache_noprof+0x189/0x420 [ 30.658787] kasan_atomics+0x95/0x310 [ 30.658927] kunit_try_run_case+0x1a5/0x480 [ 30.659069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.659239] kthread+0x337/0x6f0 [ 30.659363] ret_from_fork+0x116/0x1d0 [ 30.659493] ret_from_fork_asm+0x1a/0x30 [ 30.659645] [ 30.659713] The buggy address belongs to the object at ffff888106038600 [ 30.659713] which belongs to the cache kmalloc-64 of size 64 [ 30.660502] The buggy address is located 0 bytes to the right of [ 30.660502] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.661636] [ 30.661743] The buggy address belongs to the physical page: [ 30.661996] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.662298] flags: 0x200000000000000(node=0|zone=2) [ 30.662647] page_type: f5(slab) [ 30.662981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.663232] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.664031] page dumped because: kasan: bad access detected [ 30.664284] [ 30.664403] Memory state around the buggy address: [ 30.664635] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.665062] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.665725] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.666232] ^ [ 30.666613] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.666859] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.667167] ================================================================== [ 30.753957] ================================================================== [ 30.754529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 30.755267] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.755607] [ 30.755715] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.755769] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.755785] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.755809] Call Trace: [ 30.755824] <TASK> [ 30.755845] dump_stack_lvl+0x73/0xb0 [ 30.755877] print_report+0xd1/0x640 [ 30.755902] ? __virt_addr_valid+0x1db/0x2d0 [ 30.756269] ? kasan_atomics_helper+0x1f43/0x5450 [ 30.756316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.756343] ? kasan_atomics_helper+0x1f43/0x5450 [ 30.756367] kasan_report+0x141/0x180 [ 30.756431] ? kasan_atomics_helper+0x1f43/0x5450 [ 30.756462] kasan_check_range+0x10c/0x1c0 [ 30.756488] __kasan_check_write+0x18/0x20 [ 30.756513] kasan_atomics_helper+0x1f43/0x5450 [ 30.756536] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.756559] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.756595] ? kasan_atomics+0x152/0x310 [ 30.756622] kasan_atomics+0x1dc/0x310 [ 30.756645] ? __pfx_kasan_atomics+0x10/0x10 [ 30.756670] ? __pfx_read_tsc+0x10/0x10 [ 30.756692] ? ktime_get_ts64+0x86/0x230 [ 30.756718] kunit_try_run_case+0x1a5/0x480 [ 30.756743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.756767] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.756795] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.756821] ? __kthread_parkme+0x82/0x180 [ 30.756842] ? preempt_count_sub+0x50/0x80 [ 30.756866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.756891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.756915] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.756951] kthread+0x337/0x6f0 [ 30.756971] ? trace_preempt_on+0x20/0xc0 [ 30.756996] ? __pfx_kthread+0x10/0x10 [ 30.757017] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.757041] ? calculate_sigpending+0x7b/0xa0 [ 30.757065] ? __pfx_kthread+0x10/0x10 [ 30.757087] ret_from_fork+0x116/0x1d0 [ 30.757106] ? __pfx_kthread+0x10/0x10 [ 30.757127] ret_from_fork_asm+0x1a/0x30 [ 30.757160] </TASK> [ 30.757173] [ 30.767565] Allocated by task 313: [ 30.767925] kasan_save_stack+0x45/0x70 [ 30.768129] kasan_save_track+0x18/0x40 [ 30.768444] kasan_save_alloc_info+0x3b/0x50 [ 30.768665] __kasan_kmalloc+0xb7/0xc0 [ 30.769045] __kmalloc_cache_noprof+0x189/0x420 [ 30.769336] kasan_atomics+0x95/0x310 [ 30.769484] kunit_try_run_case+0x1a5/0x480 [ 30.769840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.770204] kthread+0x337/0x6f0 [ 30.770343] ret_from_fork+0x116/0x1d0 [ 30.770658] ret_from_fork_asm+0x1a/0x30 [ 30.770857] [ 30.770926] The buggy address belongs to the object at ffff888106038600 [ 30.770926] which belongs to the cache kmalloc-64 of size 64 [ 30.771523] The buggy address is located 0 bytes to the right of [ 30.771523] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.772253] [ 30.772340] The buggy address belongs to the physical page: [ 30.772735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.773084] flags: 0x200000000000000(node=0|zone=2) [ 30.773440] page_type: f5(slab) [ 30.773568] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.774071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.774454] page dumped because: kasan: bad access detected [ 30.774717] [ 30.774784] Memory state around the buggy address: [ 30.775162] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.775473] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.775873] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.776167] ^ [ 30.776528] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.776957] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.777268] ================================================================== [ 30.085029] ================================================================== [ 30.085720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 30.086197] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.086485] [ 30.086585] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.086661] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.086677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.086701] Call Trace: [ 30.086740] <TASK> [ 30.086763] dump_stack_lvl+0x73/0xb0 [ 30.086891] print_report+0xd1/0x640 [ 30.086919] ? __virt_addr_valid+0x1db/0x2d0 [ 30.086960] ? kasan_atomics_helper+0x1217/0x5450 [ 30.087041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.087069] ? kasan_atomics_helper+0x1217/0x5450 [ 30.087092] kasan_report+0x141/0x180 [ 30.087116] ? kasan_atomics_helper+0x1217/0x5450 [ 30.087142] kasan_check_range+0x10c/0x1c0 [ 30.087166] __kasan_check_write+0x18/0x20 [ 30.087190] kasan_atomics_helper+0x1217/0x5450 [ 30.087214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.087236] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.087271] ? kasan_atomics+0x152/0x310 [ 30.087298] kasan_atomics+0x1dc/0x310 [ 30.087321] ? __pfx_kasan_atomics+0x10/0x10 [ 30.087347] ? __pfx_read_tsc+0x10/0x10 [ 30.087369] ? ktime_get_ts64+0x86/0x230 [ 30.087395] kunit_try_run_case+0x1a5/0x480 [ 30.087423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.087446] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.087473] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.087499] ? __kthread_parkme+0x82/0x180 [ 30.087521] ? preempt_count_sub+0x50/0x80 [ 30.087545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.087570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.087744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.087769] kthread+0x337/0x6f0 [ 30.087791] ? trace_preempt_on+0x20/0xc0 [ 30.087840] ? __pfx_kthread+0x10/0x10 [ 30.087862] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.087887] ? calculate_sigpending+0x7b/0xa0 [ 30.087912] ? __pfx_kthread+0x10/0x10 [ 30.087992] ret_from_fork+0x116/0x1d0 [ 30.088018] ? __pfx_kthread+0x10/0x10 [ 30.088058] ret_from_fork_asm+0x1a/0x30 [ 30.088107] </TASK> [ 30.088119] [ 30.096601] Allocated by task 313: [ 30.096787] kasan_save_stack+0x45/0x70 [ 30.096993] kasan_save_track+0x18/0x40 [ 30.097280] kasan_save_alloc_info+0x3b/0x50 [ 30.097607] __kasan_kmalloc+0xb7/0xc0 [ 30.097746] __kmalloc_cache_noprof+0x189/0x420 [ 30.098014] kasan_atomics+0x95/0x310 [ 30.098280] kunit_try_run_case+0x1a5/0x480 [ 30.098513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.098750] kthread+0x337/0x6f0 [ 30.098925] ret_from_fork+0x116/0x1d0 [ 30.099125] ret_from_fork_asm+0x1a/0x30 [ 30.099347] [ 30.099438] The buggy address belongs to the object at ffff888106038600 [ 30.099438] which belongs to the cache kmalloc-64 of size 64 [ 30.100150] The buggy address is located 0 bytes to the right of [ 30.100150] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.100651] [ 30.100719] The buggy address belongs to the physical page: [ 30.100891] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.101125] flags: 0x200000000000000(node=0|zone=2) [ 30.101750] page_type: f5(slab) [ 30.101946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.102923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.103358] page dumped because: kasan: bad access detected [ 30.103675] [ 30.103768] Memory state around the buggy address: [ 30.104196] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.104449] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.104668] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.104874] ^ [ 30.105190] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.105771] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.106163] ================================================================== [ 29.908837] ================================================================== [ 29.909495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 29.910191] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.910719] [ 29.911104] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.911300] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.911320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.911344] Call Trace: [ 29.911364] <TASK> [ 29.911383] dump_stack_lvl+0x73/0xb0 [ 29.911412] print_report+0xd1/0x640 [ 29.911436] ? __virt_addr_valid+0x1db/0x2d0 [ 29.911461] ? kasan_atomics_helper+0xf10/0x5450 [ 29.911482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.911510] ? kasan_atomics_helper+0xf10/0x5450 [ 29.911532] kasan_report+0x141/0x180 [ 29.911555] ? kasan_atomics_helper+0xf10/0x5450 [ 29.911594] kasan_check_range+0x10c/0x1c0 [ 29.911619] __kasan_check_write+0x18/0x20 [ 29.911643] kasan_atomics_helper+0xf10/0x5450 [ 29.911667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.911690] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.911717] ? kasan_atomics+0x152/0x310 [ 29.911744] kasan_atomics+0x1dc/0x310 [ 29.911774] ? __pfx_kasan_atomics+0x10/0x10 [ 29.911800] ? __pfx_read_tsc+0x10/0x10 [ 29.911823] ? ktime_get_ts64+0x86/0x230 [ 29.911848] kunit_try_run_case+0x1a5/0x480 [ 29.911874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.911897] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.911924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.911950] ? __kthread_parkme+0x82/0x180 [ 29.911972] ? preempt_count_sub+0x50/0x80 [ 29.911996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.912021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.912045] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.912069] kthread+0x337/0x6f0 [ 29.912089] ? trace_preempt_on+0x20/0xc0 [ 29.912114] ? __pfx_kthread+0x10/0x10 [ 29.912135] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.912159] ? calculate_sigpending+0x7b/0xa0 [ 29.912183] ? __pfx_kthread+0x10/0x10 [ 29.912205] ret_from_fork+0x116/0x1d0 [ 29.912225] ? __pfx_kthread+0x10/0x10 [ 29.912247] ret_from_fork_asm+0x1a/0x30 [ 29.912280] </TASK> [ 29.912292] [ 29.923843] Allocated by task 313: [ 29.924478] kasan_save_stack+0x45/0x70 [ 29.924725] kasan_save_track+0x18/0x40 [ 29.925127] kasan_save_alloc_info+0x3b/0x50 [ 29.925328] __kasan_kmalloc+0xb7/0xc0 [ 29.925537] __kmalloc_cache_noprof+0x189/0x420 [ 29.925833] kasan_atomics+0x95/0x310 [ 29.926083] kunit_try_run_case+0x1a5/0x480 [ 29.926481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.926951] kthread+0x337/0x6f0 [ 29.927288] ret_from_fork+0x116/0x1d0 [ 29.927477] ret_from_fork_asm+0x1a/0x30 [ 29.927725] [ 29.927823] The buggy address belongs to the object at ffff888106038600 [ 29.927823] which belongs to the cache kmalloc-64 of size 64 [ 29.928689] The buggy address is located 0 bytes to the right of [ 29.928689] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.929539] [ 29.929661] The buggy address belongs to the physical page: [ 29.929958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.930303] flags: 0x200000000000000(node=0|zone=2) [ 29.930914] page_type: f5(slab) [ 29.931065] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.931382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.931923] page dumped because: kasan: bad access detected [ 29.932118] [ 29.932214] Memory state around the buggy address: [ 29.932536] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.933153] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.933527] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.934014] ^ [ 29.934210] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.934753] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.935096] ================================================================== [ 30.304770] ================================================================== [ 30.305684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 30.306530] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.307214] [ 30.307320] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.307542] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.307561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.307597] Call Trace: [ 30.307619] <TASK> [ 30.307641] dump_stack_lvl+0x73/0xb0 [ 30.307679] print_report+0xd1/0x640 [ 30.307705] ? __virt_addr_valid+0x1db/0x2d0 [ 30.307731] ? kasan_atomics_helper+0x15b6/0x5450 [ 30.307755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.307816] ? kasan_atomics_helper+0x15b6/0x5450 [ 30.307841] kasan_report+0x141/0x180 [ 30.307866] ? kasan_atomics_helper+0x15b6/0x5450 [ 30.307893] kasan_check_range+0x10c/0x1c0 [ 30.307925] __kasan_check_write+0x18/0x20 [ 30.307949] kasan_atomics_helper+0x15b6/0x5450 [ 30.307974] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.307997] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.308023] ? kasan_atomics+0x152/0x310 [ 30.308050] kasan_atomics+0x1dc/0x310 [ 30.308074] ? __pfx_kasan_atomics+0x10/0x10 [ 30.308099] ? __pfx_read_tsc+0x10/0x10 [ 30.308122] ? ktime_get_ts64+0x86/0x230 [ 30.308148] kunit_try_run_case+0x1a5/0x480 [ 30.308173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.308196] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.308223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.308250] ? __kthread_parkme+0x82/0x180 [ 30.308271] ? preempt_count_sub+0x50/0x80 [ 30.308296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.308320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.308345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.308370] kthread+0x337/0x6f0 [ 30.308390] ? trace_preempt_on+0x20/0xc0 [ 30.308415] ? __pfx_kthread+0x10/0x10 [ 30.308437] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.308461] ? calculate_sigpending+0x7b/0xa0 [ 30.308486] ? __pfx_kthread+0x10/0x10 [ 30.308508] ret_from_fork+0x116/0x1d0 [ 30.308527] ? __pfx_kthread+0x10/0x10 [ 30.308548] ret_from_fork_asm+0x1a/0x30 [ 30.308592] </TASK> [ 30.308606] [ 30.320564] Allocated by task 313: [ 30.320947] kasan_save_stack+0x45/0x70 [ 30.321299] kasan_save_track+0x18/0x40 [ 30.321482] kasan_save_alloc_info+0x3b/0x50 [ 30.321684] __kasan_kmalloc+0xb7/0xc0 [ 30.322166] __kmalloc_cache_noprof+0x189/0x420 [ 30.322409] kasan_atomics+0x95/0x310 [ 30.322725] kunit_try_run_case+0x1a5/0x480 [ 30.323115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.323581] kthread+0x337/0x6f0 [ 30.323754] ret_from_fork+0x116/0x1d0 [ 30.324199] ret_from_fork_asm+0x1a/0x30 [ 30.324401] [ 30.324492] The buggy address belongs to the object at ffff888106038600 [ 30.324492] which belongs to the cache kmalloc-64 of size 64 [ 30.325272] The buggy address is located 0 bytes to the right of [ 30.325272] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.326171] [ 30.326413] The buggy address belongs to the physical page: [ 30.326647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.326997] flags: 0x200000000000000(node=0|zone=2) [ 30.327287] page_type: f5(slab) [ 30.327422] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.327739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.328043] page dumped because: kasan: bad access detected [ 30.328376] [ 30.328439] Memory state around the buggy address: [ 30.328680] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.329059] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.329510] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.329765] ^ [ 30.330035] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.330245] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.330663] ================================================================== [ 30.169547] ================================================================== [ 30.170088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 30.170449] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.170674] [ 30.170757] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.170812] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.170826] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.170850] Call Trace: [ 30.170871] <TASK> [ 30.170890] dump_stack_lvl+0x73/0xb0 [ 30.171216] print_report+0xd1/0x640 [ 30.171261] ? __virt_addr_valid+0x1db/0x2d0 [ 30.171286] ? kasan_atomics_helper+0x13b5/0x5450 [ 30.171308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.171335] ? kasan_atomics_helper+0x13b5/0x5450 [ 30.171358] kasan_report+0x141/0x180 [ 30.171382] ? kasan_atomics_helper+0x13b5/0x5450 [ 30.171409] kasan_check_range+0x10c/0x1c0 [ 30.171433] __kasan_check_read+0x15/0x20 [ 30.171458] kasan_atomics_helper+0x13b5/0x5450 [ 30.171481] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.171505] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.171531] ? kasan_atomics+0x152/0x310 [ 30.171557] kasan_atomics+0x1dc/0x310 [ 30.171631] ? __pfx_kasan_atomics+0x10/0x10 [ 30.171657] ? __pfx_read_tsc+0x10/0x10 [ 30.171680] ? ktime_get_ts64+0x86/0x230 [ 30.171706] kunit_try_run_case+0x1a5/0x480 [ 30.171732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.171787] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.171815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.171841] ? __kthread_parkme+0x82/0x180 [ 30.171941] ? preempt_count_sub+0x50/0x80 [ 30.172006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.172032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.172057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.172082] kthread+0x337/0x6f0 [ 30.172134] ? trace_preempt_on+0x20/0xc0 [ 30.172160] ? __pfx_kthread+0x10/0x10 [ 30.172182] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.172206] ? calculate_sigpending+0x7b/0xa0 [ 30.172231] ? __pfx_kthread+0x10/0x10 [ 30.172283] ret_from_fork+0x116/0x1d0 [ 30.172304] ? __pfx_kthread+0x10/0x10 [ 30.172326] ret_from_fork_asm+0x1a/0x30 [ 30.172358] </TASK> [ 30.172370] [ 30.185880] Allocated by task 313: [ 30.186198] kasan_save_stack+0x45/0x70 [ 30.186563] kasan_save_track+0x18/0x40 [ 30.186903] kasan_save_alloc_info+0x3b/0x50 [ 30.187271] __kasan_kmalloc+0xb7/0xc0 [ 30.187660] __kmalloc_cache_noprof+0x189/0x420 [ 30.188144] kasan_atomics+0x95/0x310 [ 30.188538] kunit_try_run_case+0x1a5/0x480 [ 30.189011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.189533] kthread+0x337/0x6f0 [ 30.189899] ret_from_fork+0x116/0x1d0 [ 30.190232] ret_from_fork_asm+0x1a/0x30 [ 30.190595] [ 30.190797] The buggy address belongs to the object at ffff888106038600 [ 30.190797] which belongs to the cache kmalloc-64 of size 64 [ 30.191984] The buggy address is located 0 bytes to the right of [ 30.191984] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.193143] [ 30.193320] The buggy address belongs to the physical page: [ 30.193833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.194688] flags: 0x200000000000000(node=0|zone=2) [ 30.195214] page_type: f5(slab) [ 30.195384] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.195698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.195996] page dumped because: kasan: bad access detected [ 30.196267] [ 30.196425] Memory state around the buggy address: [ 30.196840] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.197504] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.197966] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.198355] ^ [ 30.198817] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.199487] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.200166] ================================================================== [ 30.040977] ================================================================== [ 30.041602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 30.041942] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.042190] [ 30.042285] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.042337] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.042351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.042375] Call Trace: [ 30.042395] <TASK> [ 30.042416] dump_stack_lvl+0x73/0xb0 [ 30.042444] print_report+0xd1/0x640 [ 30.042487] ? __virt_addr_valid+0x1db/0x2d0 [ 30.042512] ? kasan_atomics_helper+0x1148/0x5450 [ 30.042534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.042561] ? kasan_atomics_helper+0x1148/0x5450 [ 30.042595] kasan_report+0x141/0x180 [ 30.042618] ? kasan_atomics_helper+0x1148/0x5450 [ 30.042644] kasan_check_range+0x10c/0x1c0 [ 30.042670] __kasan_check_write+0x18/0x20 [ 30.042695] kasan_atomics_helper+0x1148/0x5450 [ 30.042719] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.042743] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.042769] ? kasan_atomics+0x152/0x310 [ 30.042796] kasan_atomics+0x1dc/0x310 [ 30.042819] ? __pfx_kasan_atomics+0x10/0x10 [ 30.042845] ? __pfx_read_tsc+0x10/0x10 [ 30.042868] ? ktime_get_ts64+0x86/0x230 [ 30.042895] kunit_try_run_case+0x1a5/0x480 [ 30.042921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.042945] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.042971] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.042997] ? __kthread_parkme+0x82/0x180 [ 30.043019] ? preempt_count_sub+0x50/0x80 [ 30.043043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.043071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.043095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.043120] kthread+0x337/0x6f0 [ 30.043169] ? trace_preempt_on+0x20/0xc0 [ 30.043426] ? __pfx_kthread+0x10/0x10 [ 30.043448] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.043483] ? calculate_sigpending+0x7b/0xa0 [ 30.043508] ? __pfx_kthread+0x10/0x10 [ 30.043530] ret_from_fork+0x116/0x1d0 [ 30.043551] ? __pfx_kthread+0x10/0x10 [ 30.043582] ret_from_fork_asm+0x1a/0x30 [ 30.043615] </TASK> [ 30.043627] [ 30.053153] Allocated by task 313: [ 30.053347] kasan_save_stack+0x45/0x70 [ 30.053551] kasan_save_track+0x18/0x40 [ 30.053770] kasan_save_alloc_info+0x3b/0x50 [ 30.054057] __kasan_kmalloc+0xb7/0xc0 [ 30.054198] __kmalloc_cache_noprof+0x189/0x420 [ 30.054442] kasan_atomics+0x95/0x310 [ 30.054666] kunit_try_run_case+0x1a5/0x480 [ 30.055043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.055284] kthread+0x337/0x6f0 [ 30.055474] ret_from_fork+0x116/0x1d0 [ 30.055643] ret_from_fork_asm+0x1a/0x30 [ 30.055922] [ 30.056012] The buggy address belongs to the object at ffff888106038600 [ 30.056012] which belongs to the cache kmalloc-64 of size 64 [ 30.056546] The buggy address is located 0 bytes to the right of [ 30.056546] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.057179] [ 30.057250] The buggy address belongs to the physical page: [ 30.057983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.058713] flags: 0x200000000000000(node=0|zone=2) [ 30.059155] page_type: f5(slab) [ 30.059358] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.059668] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.060063] page dumped because: kasan: bad access detected [ 30.060509] [ 30.060612] Memory state around the buggy address: [ 30.060833] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.061183] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.061544] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.061788] ^ [ 30.062068] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.062482] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.062742] ================================================================== [ 30.608453] ================================================================== [ 30.609070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 30.609909] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.610419] [ 30.610513] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.610567] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.610594] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.610617] Call Trace: [ 30.610638] <TASK> [ 30.610657] dump_stack_lvl+0x73/0xb0 [ 30.610688] print_report+0xd1/0x640 [ 30.610713] ? __virt_addr_valid+0x1db/0x2d0 [ 30.610738] ? kasan_atomics_helper+0x4f30/0x5450 [ 30.610761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.610799] ? kasan_atomics_helper+0x4f30/0x5450 [ 30.610821] kasan_report+0x141/0x180 [ 30.610845] ? kasan_atomics_helper+0x4f30/0x5450 [ 30.610872] __asan_report_load8_noabort+0x18/0x20 [ 30.610897] kasan_atomics_helper+0x4f30/0x5450 [ 30.610919] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.610959] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.610985] ? kasan_atomics+0x152/0x310 [ 30.611012] kasan_atomics+0x1dc/0x310 [ 30.611035] ? __pfx_kasan_atomics+0x10/0x10 [ 30.611059] ? __pfx_read_tsc+0x10/0x10 [ 30.611082] ? ktime_get_ts64+0x86/0x230 [ 30.611108] kunit_try_run_case+0x1a5/0x480 [ 30.611135] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.611158] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.611185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.611211] ? __kthread_parkme+0x82/0x180 [ 30.611232] ? preempt_count_sub+0x50/0x80 [ 30.611260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.611285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.611310] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.611334] kthread+0x337/0x6f0 [ 30.611355] ? trace_preempt_on+0x20/0xc0 [ 30.611380] ? __pfx_kthread+0x10/0x10 [ 30.611402] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.611426] ? calculate_sigpending+0x7b/0xa0 [ 30.611452] ? __pfx_kthread+0x10/0x10 [ 30.611475] ret_from_fork+0x116/0x1d0 [ 30.611495] ? __pfx_kthread+0x10/0x10 [ 30.611516] ret_from_fork_asm+0x1a/0x30 [ 30.611549] </TASK> [ 30.611561] [ 30.626462] Allocated by task 313: [ 30.626853] kasan_save_stack+0x45/0x70 [ 30.627274] kasan_save_track+0x18/0x40 [ 30.627439] kasan_save_alloc_info+0x3b/0x50 [ 30.627605] __kasan_kmalloc+0xb7/0xc0 [ 30.627731] __kmalloc_cache_noprof+0x189/0x420 [ 30.628140] kasan_atomics+0x95/0x310 [ 30.628534] kunit_try_run_case+0x1a5/0x480 [ 30.628968] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.629579] kthread+0x337/0x6f0 [ 30.629922] ret_from_fork+0x116/0x1d0 [ 30.630269] ret_from_fork_asm+0x1a/0x30 [ 30.630402] [ 30.630469] The buggy address belongs to the object at ffff888106038600 [ 30.630469] which belongs to the cache kmalloc-64 of size 64 [ 30.630812] The buggy address is located 0 bytes to the right of [ 30.630812] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.631166] [ 30.631323] The buggy address belongs to the physical page: [ 30.631951] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.632739] flags: 0x200000000000000(node=0|zone=2) [ 30.633277] page_type: f5(slab) [ 30.633536] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.634047] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.634262] page dumped because: kasan: bad access detected [ 30.634810] [ 30.634985] Memory state around the buggy address: [ 30.635506] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.636236] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.637064] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.637299] ^ [ 30.637450] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.637661] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.638064] ================================================================== [ 30.904607] ================================================================== [ 30.905346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 30.906024] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.906689] [ 30.906862] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.906930] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.906945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.906968] Call Trace: [ 30.906992] <TASK> [ 30.907014] dump_stack_lvl+0x73/0xb0 [ 30.907046] print_report+0xd1/0x640 [ 30.907071] ? __virt_addr_valid+0x1db/0x2d0 [ 30.907097] ? kasan_atomics_helper+0x218a/0x5450 [ 30.907119] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.907147] ? kasan_atomics_helper+0x218a/0x5450 [ 30.907169] kasan_report+0x141/0x180 [ 30.907192] ? kasan_atomics_helper+0x218a/0x5450 [ 30.907219] kasan_check_range+0x10c/0x1c0 [ 30.907244] __kasan_check_write+0x18/0x20 [ 30.907277] kasan_atomics_helper+0x218a/0x5450 [ 30.907305] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.907328] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.907356] ? kasan_atomics+0x152/0x310 [ 30.907383] kasan_atomics+0x1dc/0x310 [ 30.907407] ? __pfx_kasan_atomics+0x10/0x10 [ 30.907432] ? __pfx_read_tsc+0x10/0x10 [ 30.907455] ? ktime_get_ts64+0x86/0x230 [ 30.907482] kunit_try_run_case+0x1a5/0x480 [ 30.907508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.907532] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.907558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.907595] ? __kthread_parkme+0x82/0x180 [ 30.907617] ? preempt_count_sub+0x50/0x80 [ 30.907642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.907666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.907690] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.907714] kthread+0x337/0x6f0 [ 30.907734] ? trace_preempt_on+0x20/0xc0 [ 30.907760] ? __pfx_kthread+0x10/0x10 [ 30.907781] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.907805] ? calculate_sigpending+0x7b/0xa0 [ 30.907830] ? __pfx_kthread+0x10/0x10 [ 30.907852] ret_from_fork+0x116/0x1d0 [ 30.907873] ? __pfx_kthread+0x10/0x10 [ 30.907894] ret_from_fork_asm+0x1a/0x30 [ 30.907937] </TASK> [ 30.907950] [ 30.915453] Allocated by task 313: [ 30.915653] kasan_save_stack+0x45/0x70 [ 30.915858] kasan_save_track+0x18/0x40 [ 30.916033] kasan_save_alloc_info+0x3b/0x50 [ 30.916224] __kasan_kmalloc+0xb7/0xc0 [ 30.916393] __kmalloc_cache_noprof+0x189/0x420 [ 30.916556] kasan_atomics+0x95/0x310 [ 30.916747] kunit_try_run_case+0x1a5/0x480 [ 30.916921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.917129] kthread+0x337/0x6f0 [ 30.917244] ret_from_fork+0x116/0x1d0 [ 30.917402] ret_from_fork_asm+0x1a/0x30 [ 30.917605] [ 30.917701] The buggy address belongs to the object at ffff888106038600 [ 30.917701] which belongs to the cache kmalloc-64 of size 64 [ 30.918233] The buggy address is located 0 bytes to the right of [ 30.918233] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.918703] [ 30.918773] The buggy address belongs to the physical page: [ 30.919099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.919443] flags: 0x200000000000000(node=0|zone=2) [ 30.919632] page_type: f5(slab) [ 30.919751] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.919975] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.920195] page dumped because: kasan: bad access detected [ 30.920436] [ 30.920524] Memory state around the buggy address: [ 30.920832] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.921279] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.921485] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.921698] ^ [ 30.921856] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.922514] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.922839] ================================================================== [ 30.245241] ================================================================== [ 30.245598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 30.245893] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.246194] [ 30.246280] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.246332] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.246347] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.246370] Call Trace: [ 30.246392] <TASK> [ 30.246412] dump_stack_lvl+0x73/0xb0 [ 30.246440] print_report+0xd1/0x640 [ 30.246465] ? __virt_addr_valid+0x1db/0x2d0 [ 30.246490] ? kasan_atomics_helper+0x50d4/0x5450 [ 30.246513] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.246540] ? kasan_atomics_helper+0x50d4/0x5450 [ 30.246562] kasan_report+0x141/0x180 [ 30.246596] ? kasan_atomics_helper+0x50d4/0x5450 [ 30.246623] __asan_report_store8_noabort+0x1b/0x30 [ 30.246649] kasan_atomics_helper+0x50d4/0x5450 [ 30.246673] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.246696] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.246722] ? kasan_atomics+0x152/0x310 [ 30.246749] kasan_atomics+0x1dc/0x310 [ 30.246772] ? __pfx_kasan_atomics+0x10/0x10 [ 30.246797] ? __pfx_read_tsc+0x10/0x10 [ 30.246820] ? ktime_get_ts64+0x86/0x230 [ 30.246845] kunit_try_run_case+0x1a5/0x480 [ 30.246871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.246894] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.246920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.246946] ? __kthread_parkme+0x82/0x180 [ 30.246968] ? preempt_count_sub+0x50/0x80 [ 30.246992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.247017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.247041] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.247066] kthread+0x337/0x6f0 [ 30.247087] ? trace_preempt_on+0x20/0xc0 [ 30.247112] ? __pfx_kthread+0x10/0x10 [ 30.247133] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.247157] ? calculate_sigpending+0x7b/0xa0 [ 30.247181] ? __pfx_kthread+0x10/0x10 [ 30.247203] ret_from_fork+0x116/0x1d0 [ 30.247223] ? __pfx_kthread+0x10/0x10 [ 30.247245] ret_from_fork_asm+0x1a/0x30 [ 30.247283] </TASK> [ 30.247296] [ 30.257004] Allocated by task 313: [ 30.257203] kasan_save_stack+0x45/0x70 [ 30.257421] kasan_save_track+0x18/0x40 [ 30.258796] kasan_save_alloc_info+0x3b/0x50 [ 30.259689] __kasan_kmalloc+0xb7/0xc0 [ 30.260249] __kmalloc_cache_noprof+0x189/0x420 [ 30.260671] kasan_atomics+0x95/0x310 [ 30.261331] kunit_try_run_case+0x1a5/0x480 [ 30.261504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.261689] kthread+0x337/0x6f0 [ 30.261809] ret_from_fork+0x116/0x1d0 [ 30.262551] ret_from_fork_asm+0x1a/0x30 [ 30.263396] [ 30.263735] The buggy address belongs to the object at ffff888106038600 [ 30.263735] which belongs to the cache kmalloc-64 of size 64 [ 30.265259] The buggy address is located 0 bytes to the right of [ 30.265259] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.266843] [ 30.266935] The buggy address belongs to the physical page: [ 30.267427] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.268404] flags: 0x200000000000000(node=0|zone=2) [ 30.269097] page_type: f5(slab) [ 30.269281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.269511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.269744] page dumped because: kasan: bad access detected [ 30.270146] [ 30.270223] Memory state around the buggy address: [ 30.270381] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.270609] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.271138] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.271755] ^ [ 30.272247] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.272947] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.273601] ================================================================== [ 30.427731] ================================================================== [ 30.428487] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 30.429538] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.429937] [ 30.430028] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.430085] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.430101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.430124] Call Trace: [ 30.430146] <TASK> [ 30.430167] dump_stack_lvl+0x73/0xb0 [ 30.430197] print_report+0xd1/0x640 [ 30.430221] ? __virt_addr_valid+0x1db/0x2d0 [ 30.430246] ? kasan_atomics_helper+0x18b1/0x5450 [ 30.430268] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.430294] ? kasan_atomics_helper+0x18b1/0x5450 [ 30.430317] kasan_report+0x141/0x180 [ 30.430340] ? kasan_atomics_helper+0x18b1/0x5450 [ 30.430366] kasan_check_range+0x10c/0x1c0 [ 30.430392] __kasan_check_write+0x18/0x20 [ 30.430417] kasan_atomics_helper+0x18b1/0x5450 [ 30.430440] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.430464] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.430491] ? kasan_atomics+0x152/0x310 [ 30.430518] kasan_atomics+0x1dc/0x310 [ 30.430541] ? __pfx_kasan_atomics+0x10/0x10 [ 30.430566] ? __pfx_read_tsc+0x10/0x10 [ 30.430599] ? ktime_get_ts64+0x86/0x230 [ 30.430625] kunit_try_run_case+0x1a5/0x480 [ 30.430651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.430674] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.430701] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.430727] ? __kthread_parkme+0x82/0x180 [ 30.430749] ? preempt_count_sub+0x50/0x80 [ 30.430774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.430799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.430823] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.430848] kthread+0x337/0x6f0 [ 30.431288] ? trace_preempt_on+0x20/0xc0 [ 30.431315] ? __pfx_kthread+0x10/0x10 [ 30.431348] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.431373] ? calculate_sigpending+0x7b/0xa0 [ 30.431398] ? __pfx_kthread+0x10/0x10 [ 30.431420] ret_from_fork+0x116/0x1d0 [ 30.431441] ? __pfx_kthread+0x10/0x10 [ 30.431463] ret_from_fork_asm+0x1a/0x30 [ 30.431496] </TASK> [ 30.431508] [ 30.445367] Allocated by task 313: [ 30.445924] kasan_save_stack+0x45/0x70 [ 30.446179] kasan_save_track+0x18/0x40 [ 30.446598] kasan_save_alloc_info+0x3b/0x50 [ 30.446918] __kasan_kmalloc+0xb7/0xc0 [ 30.447105] __kmalloc_cache_noprof+0x189/0x420 [ 30.447461] kasan_atomics+0x95/0x310 [ 30.447857] kunit_try_run_case+0x1a5/0x480 [ 30.448322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.448677] kthread+0x337/0x6f0 [ 30.448923] ret_from_fork+0x116/0x1d0 [ 30.449358] ret_from_fork_asm+0x1a/0x30 [ 30.449744] [ 30.449952] The buggy address belongs to the object at ffff888106038600 [ 30.449952] which belongs to the cache kmalloc-64 of size 64 [ 30.450325] The buggy address is located 0 bytes to the right of [ 30.450325] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.451634] [ 30.451803] The buggy address belongs to the physical page: [ 30.452440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.453224] flags: 0x200000000000000(node=0|zone=2) [ 30.453699] page_type: f5(slab) [ 30.454062] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.454403] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.454642] page dumped because: kasan: bad access detected [ 30.454843] [ 30.454991] Memory state around the buggy address: [ 30.455450] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.455816] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.456546] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.457214] ^ [ 30.457637] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.457986] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.458542] ================================================================== [ 30.331679] ================================================================== [ 30.331990] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 30.332315] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.333368] [ 30.333475] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.333529] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.333544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.333568] Call Trace: [ 30.333678] <TASK> [ 30.333756] dump_stack_lvl+0x73/0xb0 [ 30.333790] print_report+0xd1/0x640 [ 30.333814] ? __virt_addr_valid+0x1db/0x2d0 [ 30.333900] ? kasan_atomics_helper+0x164f/0x5450 [ 30.333926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.333955] ? kasan_atomics_helper+0x164f/0x5450 [ 30.333978] kasan_report+0x141/0x180 [ 30.334002] ? kasan_atomics_helper+0x164f/0x5450 [ 30.334029] kasan_check_range+0x10c/0x1c0 [ 30.334054] __kasan_check_write+0x18/0x20 [ 30.334078] kasan_atomics_helper+0x164f/0x5450 [ 30.334101] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.334125] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.334151] ? kasan_atomics+0x152/0x310 [ 30.334178] kasan_atomics+0x1dc/0x310 [ 30.334202] ? __pfx_kasan_atomics+0x10/0x10 [ 30.334227] ? __pfx_read_tsc+0x10/0x10 [ 30.334250] ? ktime_get_ts64+0x86/0x230 [ 30.334330] kunit_try_run_case+0x1a5/0x480 [ 30.334361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.334385] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.334425] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.334451] ? __kthread_parkme+0x82/0x180 [ 30.334473] ? preempt_count_sub+0x50/0x80 [ 30.334498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.334522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.334547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.334582] kthread+0x337/0x6f0 [ 30.334603] ? trace_preempt_on+0x20/0xc0 [ 30.334627] ? __pfx_kthread+0x10/0x10 [ 30.334650] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.334674] ? calculate_sigpending+0x7b/0xa0 [ 30.334699] ? __pfx_kthread+0x10/0x10 [ 30.334721] ret_from_fork+0x116/0x1d0 [ 30.334741] ? __pfx_kthread+0x10/0x10 [ 30.334764] ret_from_fork_asm+0x1a/0x30 [ 30.334807] </TASK> [ 30.334819] [ 30.345450] Allocated by task 313: [ 30.345798] kasan_save_stack+0x45/0x70 [ 30.346092] kasan_save_track+0x18/0x40 [ 30.346236] kasan_save_alloc_info+0x3b/0x50 [ 30.346425] __kasan_kmalloc+0xb7/0xc0 [ 30.346655] __kmalloc_cache_noprof+0x189/0x420 [ 30.346874] kasan_atomics+0x95/0x310 [ 30.347376] kunit_try_run_case+0x1a5/0x480 [ 30.347724] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.348114] kthread+0x337/0x6f0 [ 30.348294] ret_from_fork+0x116/0x1d0 [ 30.348479] ret_from_fork_asm+0x1a/0x30 [ 30.348683] [ 30.348754] The buggy address belongs to the object at ffff888106038600 [ 30.348754] which belongs to the cache kmalloc-64 of size 64 [ 30.349660] The buggy address is located 0 bytes to the right of [ 30.349660] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.350456] [ 30.350653] The buggy address belongs to the physical page: [ 30.350988] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.351630] flags: 0x200000000000000(node=0|zone=2) [ 30.351931] page_type: f5(slab) [ 30.352051] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.352436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.352813] page dumped because: kasan: bad access detected [ 30.353226] [ 30.353389] Memory state around the buggy address: [ 30.353705] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.354193] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.354483] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.354781] ^ [ 30.355245] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.355648] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.356134] ================================================================== [ 30.668237] ================================================================== [ 30.668768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 30.669398] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.670112] [ 30.670216] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.670294] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.670309] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.670333] Call Trace: [ 30.670353] <TASK> [ 30.670375] dump_stack_lvl+0x73/0xb0 [ 30.670407] print_report+0xd1/0x640 [ 30.670432] ? __virt_addr_valid+0x1db/0x2d0 [ 30.670673] ? kasan_atomics_helper+0x1d7a/0x5450 [ 30.670699] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.670726] ? kasan_atomics_helper+0x1d7a/0x5450 [ 30.670748] kasan_report+0x141/0x180 [ 30.670772] ? kasan_atomics_helper+0x1d7a/0x5450 [ 30.670810] kasan_check_range+0x10c/0x1c0 [ 30.670836] __kasan_check_write+0x18/0x20 [ 30.670861] kasan_atomics_helper+0x1d7a/0x5450 [ 30.670884] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.670907] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.670940] ? kasan_atomics+0x152/0x310 [ 30.670967] kasan_atomics+0x1dc/0x310 [ 30.670990] ? __pfx_kasan_atomics+0x10/0x10 [ 30.671015] ? __pfx_read_tsc+0x10/0x10 [ 30.671037] ? ktime_get_ts64+0x86/0x230 [ 30.671064] kunit_try_run_case+0x1a5/0x480 [ 30.671089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.671112] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.671139] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.671165] ? __kthread_parkme+0x82/0x180 [ 30.671186] ? preempt_count_sub+0x50/0x80 [ 30.671210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.671235] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.671266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.671290] kthread+0x337/0x6f0 [ 30.671310] ? trace_preempt_on+0x20/0xc0 [ 30.671335] ? __pfx_kthread+0x10/0x10 [ 30.671356] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.671380] ? calculate_sigpending+0x7b/0xa0 [ 30.671405] ? __pfx_kthread+0x10/0x10 [ 30.671428] ret_from_fork+0x116/0x1d0 [ 30.671448] ? __pfx_kthread+0x10/0x10 [ 30.671469] ret_from_fork_asm+0x1a/0x30 [ 30.671503] </TASK> [ 30.671515] [ 30.684179] Allocated by task 313: [ 30.684617] kasan_save_stack+0x45/0x70 [ 30.684999] kasan_save_track+0x18/0x40 [ 30.685228] kasan_save_alloc_info+0x3b/0x50 [ 30.685443] __kasan_kmalloc+0xb7/0xc0 [ 30.685634] __kmalloc_cache_noprof+0x189/0x420 [ 30.686110] kasan_atomics+0x95/0x310 [ 30.686254] kunit_try_run_case+0x1a5/0x480 [ 30.686556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.687070] kthread+0x337/0x6f0 [ 30.687239] ret_from_fork+0x116/0x1d0 [ 30.687432] ret_from_fork_asm+0x1a/0x30 [ 30.687744] [ 30.687843] The buggy address belongs to the object at ffff888106038600 [ 30.687843] which belongs to the cache kmalloc-64 of size 64 [ 30.688826] The buggy address is located 0 bytes to the right of [ 30.688826] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.689544] [ 30.689661] The buggy address belongs to the physical page: [ 30.690219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.690890] flags: 0x200000000000000(node=0|zone=2) [ 30.691160] page_type: f5(slab) [ 30.691464] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.691782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.692379] page dumped because: kasan: bad access detected [ 30.692739] [ 30.692837] Memory state around the buggy address: [ 30.693311] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.693718] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.694512] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.694976] ^ [ 30.695155] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.695504] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.696104] ================================================================== [ 30.827053] ================================================================== [ 30.827447] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 30.828237] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.828647] [ 30.829030] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.829200] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.829219] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.829244] Call Trace: [ 30.829267] <TASK> [ 30.829290] dump_stack_lvl+0x73/0xb0 [ 30.829324] print_report+0xd1/0x640 [ 30.829349] ? __virt_addr_valid+0x1db/0x2d0 [ 30.829376] ? kasan_atomics_helper+0x4f98/0x5450 [ 30.829399] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.829426] ? kasan_atomics_helper+0x4f98/0x5450 [ 30.829449] kasan_report+0x141/0x180 [ 30.829472] ? kasan_atomics_helper+0x4f98/0x5450 [ 30.829498] __asan_report_load8_noabort+0x18/0x20 [ 30.829523] kasan_atomics_helper+0x4f98/0x5450 [ 30.829547] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.829571] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.829609] ? kasan_atomics+0x152/0x310 [ 30.829636] kasan_atomics+0x1dc/0x310 [ 30.829659] ? __pfx_kasan_atomics+0x10/0x10 [ 30.829684] ? __pfx_read_tsc+0x10/0x10 [ 30.829707] ? ktime_get_ts64+0x86/0x230 [ 30.829732] kunit_try_run_case+0x1a5/0x480 [ 30.829759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.829781] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.829808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.829834] ? __kthread_parkme+0x82/0x180 [ 30.829855] ? preempt_count_sub+0x50/0x80 [ 30.829879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.829904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.829943] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.829968] kthread+0x337/0x6f0 [ 30.829987] ? trace_preempt_on+0x20/0xc0 [ 30.830012] ? __pfx_kthread+0x10/0x10 [ 30.830033] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.830058] ? calculate_sigpending+0x7b/0xa0 [ 30.830084] ? __pfx_kthread+0x10/0x10 [ 30.830106] ret_from_fork+0x116/0x1d0 [ 30.830129] ? __pfx_kthread+0x10/0x10 [ 30.830151] ret_from_fork_asm+0x1a/0x30 [ 30.830187] </TASK> [ 30.830200] [ 30.840921] Allocated by task 313: [ 30.841349] kasan_save_stack+0x45/0x70 [ 30.841567] kasan_save_track+0x18/0x40 [ 30.841756] kasan_save_alloc_info+0x3b/0x50 [ 30.842202] __kasan_kmalloc+0xb7/0xc0 [ 30.842474] __kmalloc_cache_noprof+0x189/0x420 [ 30.842795] kasan_atomics+0x95/0x310 [ 30.843124] kunit_try_run_case+0x1a5/0x480 [ 30.843443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.843745] kthread+0x337/0x6f0 [ 30.844079] ret_from_fork+0x116/0x1d0 [ 30.844367] ret_from_fork_asm+0x1a/0x30 [ 30.844559] [ 30.844671] The buggy address belongs to the object at ffff888106038600 [ 30.844671] which belongs to the cache kmalloc-64 of size 64 [ 30.845489] The buggy address is located 0 bytes to the right of [ 30.845489] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.846115] [ 30.846402] The buggy address belongs to the physical page: [ 30.846709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.847269] flags: 0x200000000000000(node=0|zone=2) [ 30.847606] page_type: f5(slab) [ 30.847897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.848308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.848728] page dumped because: kasan: bad access detected [ 30.848955] [ 30.849047] Memory state around the buggy address: [ 30.849242] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.849550] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.849853] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.850499] ^ [ 30.850815] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.851275] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.851641] ================================================================== [ 29.448444] ================================================================== [ 29.448694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 29.449532] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.450156] [ 29.450276] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.450341] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.450356] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.450380] Call Trace: [ 29.450398] <TASK> [ 29.450418] dump_stack_lvl+0x73/0xb0 [ 29.450449] print_report+0xd1/0x640 [ 29.450473] ? __virt_addr_valid+0x1db/0x2d0 [ 29.450498] ? kasan_atomics_helper+0x4b54/0x5450 [ 29.450739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.450772] ? kasan_atomics_helper+0x4b54/0x5450 [ 29.450818] kasan_report+0x141/0x180 [ 29.450848] ? kasan_atomics_helper+0x4b54/0x5450 [ 29.450876] __asan_report_load4_noabort+0x18/0x20 [ 29.450901] kasan_atomics_helper+0x4b54/0x5450 [ 29.450932] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.450955] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.450984] ? kasan_atomics+0x152/0x310 [ 29.451012] kasan_atomics+0x1dc/0x310 [ 29.451036] ? __pfx_kasan_atomics+0x10/0x10 [ 29.451061] ? __pfx_read_tsc+0x10/0x10 [ 29.451084] ? ktime_get_ts64+0x86/0x230 [ 29.451110] kunit_try_run_case+0x1a5/0x480 [ 29.451136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.451159] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.451186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.451213] ? __kthread_parkme+0x82/0x180 [ 29.451234] ? preempt_count_sub+0x50/0x80 [ 29.451264] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.451289] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.451314] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.451339] kthread+0x337/0x6f0 [ 29.451359] ? trace_preempt_on+0x20/0xc0 [ 29.451383] ? __pfx_kthread+0x10/0x10 [ 29.451405] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.451429] ? calculate_sigpending+0x7b/0xa0 [ 29.451454] ? __pfx_kthread+0x10/0x10 [ 29.451476] ret_from_fork+0x116/0x1d0 [ 29.451496] ? __pfx_kthread+0x10/0x10 [ 29.451518] ret_from_fork_asm+0x1a/0x30 [ 29.451550] </TASK> [ 29.451562] [ 29.462910] Allocated by task 313: [ 29.463190] kasan_save_stack+0x45/0x70 [ 29.463674] kasan_save_track+0x18/0x40 [ 29.464094] kasan_save_alloc_info+0x3b/0x50 [ 29.464295] __kasan_kmalloc+0xb7/0xc0 [ 29.464569] __kmalloc_cache_noprof+0x189/0x420 [ 29.464773] kasan_atomics+0x95/0x310 [ 29.465200] kunit_try_run_case+0x1a5/0x480 [ 29.465442] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.465769] kthread+0x337/0x6f0 [ 29.466026] ret_from_fork+0x116/0x1d0 [ 29.466430] ret_from_fork_asm+0x1a/0x30 [ 29.466608] [ 29.466704] The buggy address belongs to the object at ffff888106038600 [ 29.466704] which belongs to the cache kmalloc-64 of size 64 [ 29.467607] The buggy address is located 0 bytes to the right of [ 29.467607] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.468377] [ 29.468588] The buggy address belongs to the physical page: [ 29.469177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.469600] flags: 0x200000000000000(node=0|zone=2) [ 29.469904] page_type: f5(slab) [ 29.470232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.470562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.471062] page dumped because: kasan: bad access detected [ 29.471305] [ 29.471393] Memory state around the buggy address: [ 29.471784] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.472365] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.472665] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.473126] ^ [ 29.473445] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.474073] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.474366] ================================================================== [ 30.778265] ================================================================== [ 30.778943] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 30.779184] Read of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.779481] [ 30.779854] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.779982] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.779998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.780022] Call Trace: [ 30.780042] <TASK> [ 30.780062] dump_stack_lvl+0x73/0xb0 [ 30.780092] print_report+0xd1/0x640 [ 30.780116] ? __virt_addr_valid+0x1db/0x2d0 [ 30.780141] ? kasan_atomics_helper+0x4f71/0x5450 [ 30.780164] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.780191] ? kasan_atomics_helper+0x4f71/0x5450 [ 30.780214] kasan_report+0x141/0x180 [ 30.780358] ? kasan_atomics_helper+0x4f71/0x5450 [ 30.780386] __asan_report_load8_noabort+0x18/0x20 [ 30.780412] kasan_atomics_helper+0x4f71/0x5450 [ 30.780435] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.780457] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.780485] ? kasan_atomics+0x152/0x310 [ 30.780512] kasan_atomics+0x1dc/0x310 [ 30.780535] ? __pfx_kasan_atomics+0x10/0x10 [ 30.780560] ? __pfx_read_tsc+0x10/0x10 [ 30.780592] ? ktime_get_ts64+0x86/0x230 [ 30.780619] kunit_try_run_case+0x1a5/0x480 [ 30.780645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.780669] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.780696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.780722] ? __kthread_parkme+0x82/0x180 [ 30.780744] ? preempt_count_sub+0x50/0x80 [ 30.780770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.780797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.780822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.780847] kthread+0x337/0x6f0 [ 30.780867] ? trace_preempt_on+0x20/0xc0 [ 30.780893] ? __pfx_kthread+0x10/0x10 [ 30.780928] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.780953] ? calculate_sigpending+0x7b/0xa0 [ 30.780978] ? __pfx_kthread+0x10/0x10 [ 30.781000] ret_from_fork+0x116/0x1d0 [ 30.781020] ? __pfx_kthread+0x10/0x10 [ 30.781041] ret_from_fork_asm+0x1a/0x30 [ 30.781076] </TASK> [ 30.781088] [ 30.791027] Allocated by task 313: [ 30.791371] kasan_save_stack+0x45/0x70 [ 30.791549] kasan_save_track+0x18/0x40 [ 30.791723] kasan_save_alloc_info+0x3b/0x50 [ 30.791920] __kasan_kmalloc+0xb7/0xc0 [ 30.792358] __kmalloc_cache_noprof+0x189/0x420 [ 30.792533] kasan_atomics+0x95/0x310 [ 30.792877] kunit_try_run_case+0x1a5/0x480 [ 30.793095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.793490] kthread+0x337/0x6f0 [ 30.793748] ret_from_fork+0x116/0x1d0 [ 30.793896] ret_from_fork_asm+0x1a/0x30 [ 30.794243] [ 30.794364] The buggy address belongs to the object at ffff888106038600 [ 30.794364] which belongs to the cache kmalloc-64 of size 64 [ 30.795068] The buggy address is located 0 bytes to the right of [ 30.795068] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.795772] [ 30.795867] The buggy address belongs to the physical page: [ 30.796058] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.796537] flags: 0x200000000000000(node=0|zone=2) [ 30.796859] page_type: f5(slab) [ 30.797036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.797529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.797959] page dumped because: kasan: bad access detected [ 30.798200] [ 30.798444] Memory state around the buggy address: [ 30.798622] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.799116] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.799418] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.799721] ^ [ 30.799924] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.800459] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.800859] ================================================================== [ 30.940821] ================================================================== [ 30.941144] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 30.941490] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.941833] [ 30.941953] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.942008] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.942023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.942046] Call Trace: [ 30.942067] <TASK> [ 30.942088] dump_stack_lvl+0x73/0xb0 [ 30.942117] print_report+0xd1/0x640 [ 30.942141] ? __virt_addr_valid+0x1db/0x2d0 [ 30.942166] ? kasan_atomics_helper+0x224c/0x5450 [ 30.942188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.942216] ? kasan_atomics_helper+0x224c/0x5450 [ 30.942238] kasan_report+0x141/0x180 [ 30.942261] ? kasan_atomics_helper+0x224c/0x5450 [ 30.942288] kasan_check_range+0x10c/0x1c0 [ 30.942313] __kasan_check_write+0x18/0x20 [ 30.942337] kasan_atomics_helper+0x224c/0x5450 [ 30.942361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.942384] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.942411] ? kasan_atomics+0x152/0x310 [ 30.942438] kasan_atomics+0x1dc/0x310 [ 30.942461] ? __pfx_kasan_atomics+0x10/0x10 [ 30.942486] ? __pfx_read_tsc+0x10/0x10 [ 30.942509] ? ktime_get_ts64+0x86/0x230 [ 30.942535] kunit_try_run_case+0x1a5/0x480 [ 30.942561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.942596] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.942623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.942650] ? __kthread_parkme+0x82/0x180 [ 30.942672] ? preempt_count_sub+0x50/0x80 [ 30.942695] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.942720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.942744] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.942768] kthread+0x337/0x6f0 [ 30.942789] ? trace_preempt_on+0x20/0xc0 [ 30.942813] ? __pfx_kthread+0x10/0x10 [ 30.942834] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.942858] ? calculate_sigpending+0x7b/0xa0 [ 30.942883] ? __pfx_kthread+0x10/0x10 [ 30.942905] ret_from_fork+0x116/0x1d0 [ 30.942925] ? __pfx_kthread+0x10/0x10 [ 30.942946] ret_from_fork_asm+0x1a/0x30 [ 30.942980] </TASK> [ 30.942991] [ 30.950946] Allocated by task 313: [ 30.951092] kasan_save_stack+0x45/0x70 [ 30.951236] kasan_save_track+0x18/0x40 [ 30.951372] kasan_save_alloc_info+0x3b/0x50 [ 30.951514] __kasan_kmalloc+0xb7/0xc0 [ 30.951685] __kmalloc_cache_noprof+0x189/0x420 [ 30.951904] kasan_atomics+0x95/0x310 [ 30.952096] kunit_try_run_case+0x1a5/0x480 [ 30.952296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.952541] kthread+0x337/0x6f0 [ 30.952710] ret_from_fork+0x116/0x1d0 [ 30.952890] ret_from_fork_asm+0x1a/0x30 [ 30.953049] [ 30.953115] The buggy address belongs to the object at ffff888106038600 [ 30.953115] which belongs to the cache kmalloc-64 of size 64 [ 30.953586] The buggy address is located 0 bytes to the right of [ 30.953586] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.954182] [ 30.954275] The buggy address belongs to the physical page: [ 30.954480] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.954823] flags: 0x200000000000000(node=0|zone=2) [ 30.955058] page_type: f5(slab) [ 30.955194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.955501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.955790] page dumped because: kasan: bad access detected [ 30.956051] [ 30.956116] Memory state around the buggy address: [ 30.956322] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.956618] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.956899] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.957175] ^ [ 30.957379] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.957632] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.957837] ================================================================== [ 29.698691] ================================================================== [ 29.699080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 29.699320] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.699683] [ 29.699792] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.699844] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.699859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.699882] Call Trace: [ 29.699902] <TASK> [ 29.699986] dump_stack_lvl+0x73/0xb0 [ 29.700541] print_report+0xd1/0x640 [ 29.700566] ? __virt_addr_valid+0x1db/0x2d0 [ 29.700604] ? kasan_atomics_helper+0xa2b/0x5450 [ 29.700626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.700652] ? kasan_atomics_helper+0xa2b/0x5450 [ 29.700675] kasan_report+0x141/0x180 [ 29.700698] ? kasan_atomics_helper+0xa2b/0x5450 [ 29.700725] kasan_check_range+0x10c/0x1c0 [ 29.700750] __kasan_check_write+0x18/0x20 [ 29.700774] kasan_atomics_helper+0xa2b/0x5450 [ 29.700797] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.700820] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.700847] ? kasan_atomics+0x152/0x310 [ 29.700874] kasan_atomics+0x1dc/0x310 [ 29.700897] ? __pfx_kasan_atomics+0x10/0x10 [ 29.700923] ? __pfx_read_tsc+0x10/0x10 [ 29.700946] ? ktime_get_ts64+0x86/0x230 [ 29.700971] kunit_try_run_case+0x1a5/0x480 [ 29.700998] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.701022] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.701048] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.701074] ? __kthread_parkme+0x82/0x180 [ 29.701095] ? preempt_count_sub+0x50/0x80 [ 29.701119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.701144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.701169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.701194] kthread+0x337/0x6f0 [ 29.701213] ? trace_preempt_on+0x20/0xc0 [ 29.701238] ? __pfx_kthread+0x10/0x10 [ 29.701259] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.701548] ? calculate_sigpending+0x7b/0xa0 [ 29.701595] ? __pfx_kthread+0x10/0x10 [ 29.701619] ret_from_fork+0x116/0x1d0 [ 29.701641] ? __pfx_kthread+0x10/0x10 [ 29.701662] ret_from_fork_asm+0x1a/0x30 [ 29.701696] </TASK> [ 29.701708] [ 29.714665] Allocated by task 313: [ 29.715272] kasan_save_stack+0x45/0x70 [ 29.715533] kasan_save_track+0x18/0x40 [ 29.715842] kasan_save_alloc_info+0x3b/0x50 [ 29.716228] __kasan_kmalloc+0xb7/0xc0 [ 29.716516] __kmalloc_cache_noprof+0x189/0x420 [ 29.716754] kasan_atomics+0x95/0x310 [ 29.717191] kunit_try_run_case+0x1a5/0x480 [ 29.717379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.717621] kthread+0x337/0x6f0 [ 29.717773] ret_from_fork+0x116/0x1d0 [ 29.718263] ret_from_fork_asm+0x1a/0x30 [ 29.718599] [ 29.718883] The buggy address belongs to the object at ffff888106038600 [ 29.718883] which belongs to the cache kmalloc-64 of size 64 [ 29.719641] The buggy address is located 0 bytes to the right of [ 29.719641] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.720599] [ 29.720949] The buggy address belongs to the physical page: [ 29.721450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.722163] flags: 0x200000000000000(node=0|zone=2) [ 29.722400] page_type: f5(slab) [ 29.722555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.722870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.723491] page dumped because: kasan: bad access detected [ 29.724016] [ 29.724285] Memory state around the buggy address: [ 29.724508] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.725070] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.725560] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.726445] ^ [ 29.726750] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.727352] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.727669] ================================================================== [ 30.555615] ================================================================== [ 30.556245] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 30.556698] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.557264] [ 30.557360] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.557414] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.557428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.557452] Call Trace: [ 30.557473] <TASK> [ 30.557493] dump_stack_lvl+0x73/0xb0 [ 30.557525] print_report+0xd1/0x640 [ 30.557848] ? __virt_addr_valid+0x1db/0x2d0 [ 30.557889] ? kasan_atomics_helper+0x1b22/0x5450 [ 30.557913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.557949] ? kasan_atomics_helper+0x1b22/0x5450 [ 30.557972] kasan_report+0x141/0x180 [ 30.557995] ? kasan_atomics_helper+0x1b22/0x5450 [ 30.558022] kasan_check_range+0x10c/0x1c0 [ 30.558047] __kasan_check_write+0x18/0x20 [ 30.558071] kasan_atomics_helper+0x1b22/0x5450 [ 30.558096] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.558119] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.558145] ? kasan_atomics+0x152/0x310 [ 30.558171] kasan_atomics+0x1dc/0x310 [ 30.558195] ? __pfx_kasan_atomics+0x10/0x10 [ 30.558220] ? __pfx_read_tsc+0x10/0x10 [ 30.558242] ? ktime_get_ts64+0x86/0x230 [ 30.558268] kunit_try_run_case+0x1a5/0x480 [ 30.558294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.558316] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.558343] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.558370] ? __kthread_parkme+0x82/0x180 [ 30.558391] ? preempt_count_sub+0x50/0x80 [ 30.558416] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.558440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.558465] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.558489] kthread+0x337/0x6f0 [ 30.558509] ? trace_preempt_on+0x20/0xc0 [ 30.558534] ? __pfx_kthread+0x10/0x10 [ 30.558554] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.558588] ? calculate_sigpending+0x7b/0xa0 [ 30.558643] ? __pfx_kthread+0x10/0x10 [ 30.558666] ret_from_fork+0x116/0x1d0 [ 30.558687] ? __pfx_kthread+0x10/0x10 [ 30.558718] ret_from_fork_asm+0x1a/0x30 [ 30.558751] </TASK> [ 30.558763] [ 30.567398] Allocated by task 313: [ 30.567629] kasan_save_stack+0x45/0x70 [ 30.567869] kasan_save_track+0x18/0x40 [ 30.568130] kasan_save_alloc_info+0x3b/0x50 [ 30.568334] __kasan_kmalloc+0xb7/0xc0 [ 30.568559] __kmalloc_cache_noprof+0x189/0x420 [ 30.568747] kasan_atomics+0x95/0x310 [ 30.569069] kunit_try_run_case+0x1a5/0x480 [ 30.569294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.569601] kthread+0x337/0x6f0 [ 30.569776] ret_from_fork+0x116/0x1d0 [ 30.570142] ret_from_fork_asm+0x1a/0x30 [ 30.570470] [ 30.570593] The buggy address belongs to the object at ffff888106038600 [ 30.570593] which belongs to the cache kmalloc-64 of size 64 [ 30.570968] The buggy address is located 0 bytes to the right of [ 30.570968] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.571604] [ 30.571700] The buggy address belongs to the physical page: [ 30.572005] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.572388] flags: 0x200000000000000(node=0|zone=2) [ 30.572597] page_type: f5(slab) [ 30.572763] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.573017] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.573441] page dumped because: kasan: bad access detected [ 30.573840] [ 30.573969] Memory state around the buggy address: [ 30.574251] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.574632] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.574970] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.575460] ^ [ 30.575783] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.576390] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.576727] ================================================================== [ 29.398391] ================================================================== [ 29.398723] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 29.399613] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.400463] [ 29.400652] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.400710] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.400727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.400751] Call Trace: [ 29.400884] <TASK> [ 29.400909] dump_stack_lvl+0x73/0xb0 [ 29.400943] print_report+0xd1/0x640 [ 29.400971] ? __virt_addr_valid+0x1db/0x2d0 [ 29.400998] ? kasan_atomics_helper+0x4b6e/0x5450 [ 29.401067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.401098] ? kasan_atomics_helper+0x4b6e/0x5450 [ 29.401122] kasan_report+0x141/0x180 [ 29.401146] ? kasan_atomics_helper+0x4b6e/0x5450 [ 29.401173] __asan_report_store4_noabort+0x1b/0x30 [ 29.401198] kasan_atomics_helper+0x4b6e/0x5450 [ 29.401223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.401246] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.401272] ? kasan_atomics+0x152/0x310 [ 29.401300] kasan_atomics+0x1dc/0x310 [ 29.401323] ? __pfx_kasan_atomics+0x10/0x10 [ 29.401349] ? __pfx_read_tsc+0x10/0x10 [ 29.401371] ? ktime_get_ts64+0x86/0x230 [ 29.401397] kunit_try_run_case+0x1a5/0x480 [ 29.401426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.401452] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.401479] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.401506] ? __kthread_parkme+0x82/0x180 [ 29.401528] ? preempt_count_sub+0x50/0x80 [ 29.401553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.401589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.401615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.401639] kthread+0x337/0x6f0 [ 29.401660] ? trace_preempt_on+0x20/0xc0 [ 29.401684] ? __pfx_kthread+0x10/0x10 [ 29.401705] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.401730] ? calculate_sigpending+0x7b/0xa0 [ 29.401755] ? __pfx_kthread+0x10/0x10 [ 29.401777] ret_from_fork+0x116/0x1d0 [ 29.401810] ? __pfx_kthread+0x10/0x10 [ 29.401832] ret_from_fork_asm+0x1a/0x30 [ 29.401865] </TASK> [ 29.401876] [ 29.412992] Allocated by task 313: [ 29.413256] kasan_save_stack+0x45/0x70 [ 29.413436] kasan_save_track+0x18/0x40 [ 29.413625] kasan_save_alloc_info+0x3b/0x50 [ 29.413837] __kasan_kmalloc+0xb7/0xc0 [ 29.414041] __kmalloc_cache_noprof+0x189/0x420 [ 29.414233] kasan_atomics+0x95/0x310 [ 29.414431] kunit_try_run_case+0x1a5/0x480 [ 29.414620] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.414819] kthread+0x337/0x6f0 [ 29.414935] ret_from_fork+0x116/0x1d0 [ 29.415064] ret_from_fork_asm+0x1a/0x30 [ 29.415203] [ 29.415282] The buggy address belongs to the object at ffff888106038600 [ 29.415282] which belongs to the cache kmalloc-64 of size 64 [ 29.416144] The buggy address is located 0 bytes to the right of [ 29.416144] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.416534] [ 29.416614] The buggy address belongs to the physical page: [ 29.416832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.417220] flags: 0x200000000000000(node=0|zone=2) [ 29.417674] page_type: f5(slab) [ 29.417900] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.418219] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.418524] page dumped because: kasan: bad access detected [ 29.418768] [ 29.418924] Memory state around the buggy address: [ 29.419137] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.419536] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.419868] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.420246] ^ [ 29.420486] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.420844] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.421146] ================================================================== [ 30.852993] ================================================================== [ 30.853311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 30.853787] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.854266] [ 30.854672] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.854739] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.854756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.854779] Call Trace: [ 30.854802] <TASK> [ 30.854823] dump_stack_lvl+0x73/0xb0 [ 30.854856] print_report+0xd1/0x640 [ 30.854883] ? __virt_addr_valid+0x1db/0x2d0 [ 30.854909] ? kasan_atomics_helper+0x20c8/0x5450 [ 30.854942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.854969] ? kasan_atomics_helper+0x20c8/0x5450 [ 30.854992] kasan_report+0x141/0x180 [ 30.855016] ? kasan_atomics_helper+0x20c8/0x5450 [ 30.855044] kasan_check_range+0x10c/0x1c0 [ 30.855068] __kasan_check_write+0x18/0x20 [ 30.855094] kasan_atomics_helper+0x20c8/0x5450 [ 30.855118] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.855141] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.855167] ? kasan_atomics+0x152/0x310 [ 30.855194] kasan_atomics+0x1dc/0x310 [ 30.855217] ? __pfx_kasan_atomics+0x10/0x10 [ 30.855242] ? __pfx_read_tsc+0x10/0x10 [ 30.855290] ? ktime_get_ts64+0x86/0x230 [ 30.855316] kunit_try_run_case+0x1a5/0x480 [ 30.855343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.855377] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.855404] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.855442] ? __kthread_parkme+0x82/0x180 [ 30.855463] ? preempt_count_sub+0x50/0x80 [ 30.855488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.855522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.855546] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.855588] kthread+0x337/0x6f0 [ 30.855609] ? trace_preempt_on+0x20/0xc0 [ 30.855635] ? __pfx_kthread+0x10/0x10 [ 30.855666] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.855691] ? calculate_sigpending+0x7b/0xa0 [ 30.855716] ? __pfx_kthread+0x10/0x10 [ 30.855738] ret_from_fork+0x116/0x1d0 [ 30.855758] ? __pfx_kthread+0x10/0x10 [ 30.855780] ret_from_fork_asm+0x1a/0x30 [ 30.855813] </TASK> [ 30.855825] [ 30.867023] Allocated by task 313: [ 30.867255] kasan_save_stack+0x45/0x70 [ 30.867456] kasan_save_track+0x18/0x40 [ 30.867631] kasan_save_alloc_info+0x3b/0x50 [ 30.867829] __kasan_kmalloc+0xb7/0xc0 [ 30.868473] __kmalloc_cache_noprof+0x189/0x420 [ 30.868731] kasan_atomics+0x95/0x310 [ 30.869032] kunit_try_run_case+0x1a5/0x480 [ 30.869253] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.869673] kthread+0x337/0x6f0 [ 30.869950] ret_from_fork+0x116/0x1d0 [ 30.870261] ret_from_fork_asm+0x1a/0x30 [ 30.870416] [ 30.870688] The buggy address belongs to the object at ffff888106038600 [ 30.870688] which belongs to the cache kmalloc-64 of size 64 [ 30.871494] The buggy address is located 0 bytes to the right of [ 30.871494] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.872212] [ 30.872301] The buggy address belongs to the physical page: [ 30.872710] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.873235] flags: 0x200000000000000(node=0|zone=2) [ 30.873561] page_type: f5(slab) [ 30.873865] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.874391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.874822] page dumped because: kasan: bad access detected [ 30.875221] [ 30.875312] Memory state around the buggy address: [ 30.875691] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.876178] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.876568] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.877009] ^ [ 30.877255] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.877633] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.878099] ================================================================== [ 29.801653] ================================================================== [ 29.802073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 29.802314] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.803287] [ 29.803387] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.803439] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.803455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.803477] Call Trace: [ 29.803493] <TASK> [ 29.803509] dump_stack_lvl+0x73/0xb0 [ 29.803538] print_report+0xd1/0x640 [ 29.803563] ? __virt_addr_valid+0x1db/0x2d0 [ 29.803600] ? kasan_atomics_helper+0x4a84/0x5450 [ 29.803657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.803685] ? kasan_atomics_helper+0x4a84/0x5450 [ 29.803706] kasan_report+0x141/0x180 [ 29.803730] ? kasan_atomics_helper+0x4a84/0x5450 [ 29.803757] __asan_report_load4_noabort+0x18/0x20 [ 29.803782] kasan_atomics_helper+0x4a84/0x5450 [ 29.804042] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.804070] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.804096] ? kasan_atomics+0x152/0x310 [ 29.804124] kasan_atomics+0x1dc/0x310 [ 29.804147] ? __pfx_kasan_atomics+0x10/0x10 [ 29.804173] ? __pfx_read_tsc+0x10/0x10 [ 29.804197] ? ktime_get_ts64+0x86/0x230 [ 29.804223] kunit_try_run_case+0x1a5/0x480 [ 29.804249] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.804272] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.804298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.804324] ? __kthread_parkme+0x82/0x180 [ 29.804346] ? preempt_count_sub+0x50/0x80 [ 29.804370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.804395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.804419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.804443] kthread+0x337/0x6f0 [ 29.804464] ? trace_preempt_on+0x20/0xc0 [ 29.804488] ? __pfx_kthread+0x10/0x10 [ 29.804509] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.804534] ? calculate_sigpending+0x7b/0xa0 [ 29.804559] ? __pfx_kthread+0x10/0x10 [ 29.804594] ret_from_fork+0x116/0x1d0 [ 29.804614] ? __pfx_kthread+0x10/0x10 [ 29.804636] ret_from_fork_asm+0x1a/0x30 [ 29.804669] </TASK> [ 29.804681] [ 29.815156] Allocated by task 313: [ 29.815434] kasan_save_stack+0x45/0x70 [ 29.815761] kasan_save_track+0x18/0x40 [ 29.815995] kasan_save_alloc_info+0x3b/0x50 [ 29.816514] __kasan_kmalloc+0xb7/0xc0 [ 29.816694] __kmalloc_cache_noprof+0x189/0x420 [ 29.817188] kasan_atomics+0x95/0x310 [ 29.817361] kunit_try_run_case+0x1a5/0x480 [ 29.817513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.818021] kthread+0x337/0x6f0 [ 29.818398] ret_from_fork+0x116/0x1d0 [ 29.818544] ret_from_fork_asm+0x1a/0x30 [ 29.818756] [ 29.818847] The buggy address belongs to the object at ffff888106038600 [ 29.818847] which belongs to the cache kmalloc-64 of size 64 [ 29.819693] The buggy address is located 0 bytes to the right of [ 29.819693] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.820490] [ 29.820601] The buggy address belongs to the physical page: [ 29.820856] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.821379] flags: 0x200000000000000(node=0|zone=2) [ 29.821560] page_type: f5(slab) [ 29.821739] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.822310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.822645] page dumped because: kasan: bad access detected [ 29.823042] [ 29.823168] Memory state around the buggy address: [ 29.823543] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.823888] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.824554] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.825109] ^ [ 29.825395] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825987] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.826472] ================================================================== [ 29.962235] ================================================================== [ 29.962551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 29.963260] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.963728] [ 29.963846] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.964037] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.964085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.964109] Call Trace: [ 29.964130] <TASK> [ 29.964213] dump_stack_lvl+0x73/0xb0 [ 29.964248] print_report+0xd1/0x640 [ 29.964272] ? __virt_addr_valid+0x1db/0x2d0 [ 29.964297] ? kasan_atomics_helper+0x4a36/0x5450 [ 29.964319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.964346] ? kasan_atomics_helper+0x4a36/0x5450 [ 29.964368] kasan_report+0x141/0x180 [ 29.964391] ? kasan_atomics_helper+0x4a36/0x5450 [ 29.964418] __asan_report_load4_noabort+0x18/0x20 [ 29.964443] kasan_atomics_helper+0x4a36/0x5450 [ 29.964467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.964491] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.964517] ? kasan_atomics+0x152/0x310 [ 29.964544] kasan_atomics+0x1dc/0x310 [ 29.964568] ? __pfx_kasan_atomics+0x10/0x10 [ 29.964606] ? __pfx_read_tsc+0x10/0x10 [ 29.964629] ? ktime_get_ts64+0x86/0x230 [ 29.964655] kunit_try_run_case+0x1a5/0x480 [ 29.964681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.964704] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.964731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.964757] ? __kthread_parkme+0x82/0x180 [ 29.964779] ? preempt_count_sub+0x50/0x80 [ 29.964812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.964837] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.964863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.964888] kthread+0x337/0x6f0 [ 29.964909] ? trace_preempt_on+0x20/0xc0 [ 29.964941] ? __pfx_kthread+0x10/0x10 [ 29.964962] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.964988] ? calculate_sigpending+0x7b/0xa0 [ 29.965012] ? __pfx_kthread+0x10/0x10 [ 29.965034] ret_from_fork+0x116/0x1d0 [ 29.965055] ? __pfx_kthread+0x10/0x10 [ 29.965078] ret_from_fork_asm+0x1a/0x30 [ 29.965111] </TASK> [ 29.965123] [ 29.975477] Allocated by task 313: [ 29.975689] kasan_save_stack+0x45/0x70 [ 29.975862] kasan_save_track+0x18/0x40 [ 29.976322] kasan_save_alloc_info+0x3b/0x50 [ 29.976653] __kasan_kmalloc+0xb7/0xc0 [ 29.977031] __kmalloc_cache_noprof+0x189/0x420 [ 29.977225] kasan_atomics+0x95/0x310 [ 29.977518] kunit_try_run_case+0x1a5/0x480 [ 29.977906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.978116] kthread+0x337/0x6f0 [ 29.978300] ret_from_fork+0x116/0x1d0 [ 29.978597] ret_from_fork_asm+0x1a/0x30 [ 29.978773] [ 29.979058] The buggy address belongs to the object at ffff888106038600 [ 29.979058] which belongs to the cache kmalloc-64 of size 64 [ 29.979627] The buggy address is located 0 bytes to the right of [ 29.979627] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.980197] [ 29.980455] The buggy address belongs to the physical page: [ 29.980790] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.981097] flags: 0x200000000000000(node=0|zone=2) [ 29.981408] page_type: f5(slab) [ 29.981678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.982044] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.982416] page dumped because: kasan: bad access detected [ 29.982722] [ 29.982893] Memory state around the buggy address: [ 29.983164] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.983549] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.983875] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.984410] ^ [ 29.984642] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985025] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985505] ================================================================== [ 30.274553] ================================================================== [ 30.275483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 30.276077] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.276310] [ 30.276398] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.276457] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.276472] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.276496] Call Trace: [ 30.276518] <TASK> [ 30.276541] dump_stack_lvl+0x73/0xb0 [ 30.276586] print_report+0xd1/0x640 [ 30.276616] ? __virt_addr_valid+0x1db/0x2d0 [ 30.276644] ? kasan_atomics_helper+0x151d/0x5450 [ 30.276667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.276696] ? kasan_atomics_helper+0x151d/0x5450 [ 30.276719] kasan_report+0x141/0x180 [ 30.276743] ? kasan_atomics_helper+0x151d/0x5450 [ 30.276770] kasan_check_range+0x10c/0x1c0 [ 30.276795] __kasan_check_write+0x18/0x20 [ 30.276924] kasan_atomics_helper+0x151d/0x5450 [ 30.276960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.276985] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.277014] ? kasan_atomics+0x152/0x310 [ 30.277042] kasan_atomics+0x1dc/0x310 [ 30.277066] ? __pfx_kasan_atomics+0x10/0x10 [ 30.277091] ? __pfx_read_tsc+0x10/0x10 [ 30.277113] ? ktime_get_ts64+0x86/0x230 [ 30.277159] kunit_try_run_case+0x1a5/0x480 [ 30.277187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.277211] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.277238] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.277265] ? __kthread_parkme+0x82/0x180 [ 30.277289] ? preempt_count_sub+0x50/0x80 [ 30.277313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.277339] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.277363] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.277388] kthread+0x337/0x6f0 [ 30.277409] ? trace_preempt_on+0x20/0xc0 [ 30.277436] ? __pfx_kthread+0x10/0x10 [ 30.277458] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.277484] ? calculate_sigpending+0x7b/0xa0 [ 30.277510] ? __pfx_kthread+0x10/0x10 [ 30.277532] ret_from_fork+0x116/0x1d0 [ 30.277553] ? __pfx_kthread+0x10/0x10 [ 30.277587] ret_from_fork_asm+0x1a/0x30 [ 30.277621] </TASK> [ 30.277634] [ 30.293276] Allocated by task 313: [ 30.293454] kasan_save_stack+0x45/0x70 [ 30.293939] kasan_save_track+0x18/0x40 [ 30.294275] kasan_save_alloc_info+0x3b/0x50 [ 30.294555] __kasan_kmalloc+0xb7/0xc0 [ 30.294735] __kmalloc_cache_noprof+0x189/0x420 [ 30.295449] kasan_atomics+0x95/0x310 [ 30.295661] kunit_try_run_case+0x1a5/0x480 [ 30.295954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.296218] kthread+0x337/0x6f0 [ 30.296368] ret_from_fork+0x116/0x1d0 [ 30.296555] ret_from_fork_asm+0x1a/0x30 [ 30.296755] [ 30.296828] The buggy address belongs to the object at ffff888106038600 [ 30.296828] which belongs to the cache kmalloc-64 of size 64 [ 30.297916] The buggy address is located 0 bytes to the right of [ 30.297916] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.298492] [ 30.298610] The buggy address belongs to the physical page: [ 30.299255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.299614] flags: 0x200000000000000(node=0|zone=2) [ 30.299873] page_type: f5(slab) [ 30.300066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.300467] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.300938] page dumped because: kasan: bad access detected [ 30.301369] [ 30.301471] Memory state around the buggy address: [ 30.301712] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.302025] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.302434] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.302722] ^ [ 30.303072] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.303661] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.304264] ================================================================== [ 30.525018] ================================================================== [ 30.525411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 30.525662] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.526191] [ 30.526384] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.526438] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.526454] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.526477] Call Trace: [ 30.526498] <TASK> [ 30.526518] dump_stack_lvl+0x73/0xb0 [ 30.526556] print_report+0xd1/0x640 [ 30.526601] ? __virt_addr_valid+0x1db/0x2d0 [ 30.526629] ? kasan_atomics_helper+0x1a7f/0x5450 [ 30.526660] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.526686] ? kasan_atomics_helper+0x1a7f/0x5450 [ 30.526709] kasan_report+0x141/0x180 [ 30.526743] ? kasan_atomics_helper+0x1a7f/0x5450 [ 30.526769] kasan_check_range+0x10c/0x1c0 [ 30.526794] __kasan_check_write+0x18/0x20 [ 30.526818] kasan_atomics_helper+0x1a7f/0x5450 [ 30.526841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.526864] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.526890] ? kasan_atomics+0x152/0x310 [ 30.526925] kasan_atomics+0x1dc/0x310 [ 30.526947] ? __pfx_kasan_atomics+0x10/0x10 [ 30.526972] ? __pfx_read_tsc+0x10/0x10 [ 30.527031] ? ktime_get_ts64+0x86/0x230 [ 30.527081] kunit_try_run_case+0x1a5/0x480 [ 30.527109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.527132] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.527159] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.527185] ? __kthread_parkme+0x82/0x180 [ 30.527207] ? preempt_count_sub+0x50/0x80 [ 30.527232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.527263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.527288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.527312] kthread+0x337/0x6f0 [ 30.527343] ? trace_preempt_on+0x20/0xc0 [ 30.527369] ? __pfx_kthread+0x10/0x10 [ 30.527401] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.527426] ? calculate_sigpending+0x7b/0xa0 [ 30.527451] ? __pfx_kthread+0x10/0x10 [ 30.527473] ret_from_fork+0x116/0x1d0 [ 30.527494] ? __pfx_kthread+0x10/0x10 [ 30.527516] ret_from_fork_asm+0x1a/0x30 [ 30.527549] </TASK> [ 30.527562] [ 30.543466] Allocated by task 313: [ 30.543787] kasan_save_stack+0x45/0x70 [ 30.544493] kasan_save_track+0x18/0x40 [ 30.544694] kasan_save_alloc_info+0x3b/0x50 [ 30.544839] __kasan_kmalloc+0xb7/0xc0 [ 30.545121] __kmalloc_cache_noprof+0x189/0x420 [ 30.545644] kasan_atomics+0x95/0x310 [ 30.546235] kunit_try_run_case+0x1a5/0x480 [ 30.546725] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.547263] kthread+0x337/0x6f0 [ 30.547619] ret_from_fork+0x116/0x1d0 [ 30.547784] ret_from_fork_asm+0x1a/0x30 [ 30.548258] [ 30.548426] The buggy address belongs to the object at ffff888106038600 [ 30.548426] which belongs to the cache kmalloc-64 of size 64 [ 30.549135] The buggy address is located 0 bytes to the right of [ 30.549135] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.550510] [ 30.550681] The buggy address belongs to the physical page: [ 30.551052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.551594] flags: 0x200000000000000(node=0|zone=2) [ 30.552060] page_type: f5(slab) [ 30.552203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.552446] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.552680] page dumped because: kasan: bad access detected [ 30.552873] [ 30.552980] Memory state around the buggy address: [ 30.553236] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.553558] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.553878] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.554090] ^ [ 30.554311] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.554607] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.555030] ================================================================== [ 29.324558] ================================================================== [ 29.325400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 29.325950] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.326288] [ 29.326404] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.326461] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.326475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.326497] Call Trace: [ 29.326510] <TASK> [ 29.326529] dump_stack_lvl+0x73/0xb0 [ 29.326559] print_report+0xd1/0x640 [ 29.326596] ? __virt_addr_valid+0x1db/0x2d0 [ 29.326620] ? kasan_atomics_helper+0x4bbc/0x5450 [ 29.326641] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.326688] ? kasan_atomics_helper+0x4bbc/0x5450 [ 29.326710] kasan_report+0x141/0x180 [ 29.326732] ? kasan_atomics_helper+0x4bbc/0x5450 [ 29.326758] __asan_report_load4_noabort+0x18/0x20 [ 29.326783] kasan_atomics_helper+0x4bbc/0x5450 [ 29.326805] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.326826] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.326852] ? kasan_atomics+0x152/0x310 [ 29.326878] kasan_atomics+0x1dc/0x310 [ 29.326964] ? __pfx_kasan_atomics+0x10/0x10 [ 29.326996] ? __pfx_read_tsc+0x10/0x10 [ 29.327018] ? ktime_get_ts64+0x86/0x230 [ 29.327044] kunit_try_run_case+0x1a5/0x480 [ 29.327071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.327094] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.327119] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.327143] ? __kthread_parkme+0x82/0x180 [ 29.327168] ? preempt_count_sub+0x50/0x80 [ 29.327192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.327218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.327244] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.327275] kthread+0x337/0x6f0 [ 29.327296] ? trace_preempt_on+0x20/0xc0 [ 29.327321] ? __pfx_kthread+0x10/0x10 [ 29.327343] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.327366] ? calculate_sigpending+0x7b/0xa0 [ 29.327391] ? __pfx_kthread+0x10/0x10 [ 29.327413] ret_from_fork+0x116/0x1d0 [ 29.327434] ? __pfx_kthread+0x10/0x10 [ 29.327455] ret_from_fork_asm+0x1a/0x30 [ 29.327488] </TASK> [ 29.327500] [ 29.336218] Allocated by task 313: [ 29.336451] kasan_save_stack+0x45/0x70 [ 29.336665] kasan_save_track+0x18/0x40 [ 29.336868] kasan_save_alloc_info+0x3b/0x50 [ 29.337139] __kasan_kmalloc+0xb7/0xc0 [ 29.337352] __kmalloc_cache_noprof+0x189/0x420 [ 29.337537] kasan_atomics+0x95/0x310 [ 29.337672] kunit_try_run_case+0x1a5/0x480 [ 29.337976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.338257] kthread+0x337/0x6f0 [ 29.338424] ret_from_fork+0x116/0x1d0 [ 29.338645] ret_from_fork_asm+0x1a/0x30 [ 29.338945] [ 29.339038] The buggy address belongs to the object at ffff888106038600 [ 29.339038] which belongs to the cache kmalloc-64 of size 64 [ 29.339497] The buggy address is located 0 bytes to the right of [ 29.339497] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.340204] [ 29.340282] The buggy address belongs to the physical page: [ 29.340560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.340928] flags: 0x200000000000000(node=0|zone=2) [ 29.341255] page_type: f5(slab) [ 29.341409] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.341778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.342081] page dumped because: kasan: bad access detected [ 29.342243] [ 29.342305] Memory state around the buggy address: [ 29.342451] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.342665] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.343335] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.343704] ^ [ 29.344034] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.344386] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.344704] ================================================================== [ 29.935954] ================================================================== [ 29.936310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 29.936813] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.937536] [ 29.937665] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.937721] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.937737] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.937761] Call Trace: [ 29.937782] <TASK> [ 29.937803] dump_stack_lvl+0x73/0xb0 [ 29.937834] print_report+0xd1/0x640 [ 29.937859] ? __virt_addr_valid+0x1db/0x2d0 [ 29.937884] ? kasan_atomics_helper+0xfa9/0x5450 [ 29.937907] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.938190] ? kasan_atomics_helper+0xfa9/0x5450 [ 29.938216] kasan_report+0x141/0x180 [ 29.938240] ? kasan_atomics_helper+0xfa9/0x5450 [ 29.938267] kasan_check_range+0x10c/0x1c0 [ 29.938292] __kasan_check_write+0x18/0x20 [ 29.938316] kasan_atomics_helper+0xfa9/0x5450 [ 29.938340] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.938364] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.938390] ? kasan_atomics+0x152/0x310 [ 29.938418] kasan_atomics+0x1dc/0x310 [ 29.938440] ? __pfx_kasan_atomics+0x10/0x10 [ 29.938466] ? __pfx_read_tsc+0x10/0x10 [ 29.938488] ? ktime_get_ts64+0x86/0x230 [ 29.938514] kunit_try_run_case+0x1a5/0x480 [ 29.938542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.938566] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.938605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.938632] ? __kthread_parkme+0x82/0x180 [ 29.938654] ? preempt_count_sub+0x50/0x80 [ 29.938679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.938703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.938727] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.938751] kthread+0x337/0x6f0 [ 29.938771] ? trace_preempt_on+0x20/0xc0 [ 29.938814] ? __pfx_kthread+0x10/0x10 [ 29.938835] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.938859] ? calculate_sigpending+0x7b/0xa0 [ 29.938884] ? __pfx_kthread+0x10/0x10 [ 29.938906] ret_from_fork+0x116/0x1d0 [ 29.938937] ? __pfx_kthread+0x10/0x10 [ 29.938959] ret_from_fork_asm+0x1a/0x30 [ 29.938991] </TASK> [ 29.939003] [ 29.950487] Allocated by task 313: [ 29.950766] kasan_save_stack+0x45/0x70 [ 29.951144] kasan_save_track+0x18/0x40 [ 29.951481] kasan_save_alloc_info+0x3b/0x50 [ 29.951754] __kasan_kmalloc+0xb7/0xc0 [ 29.952128] __kmalloc_cache_noprof+0x189/0x420 [ 29.952340] kasan_atomics+0x95/0x310 [ 29.952553] kunit_try_run_case+0x1a5/0x480 [ 29.952778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.953243] kthread+0x337/0x6f0 [ 29.953431] ret_from_fork+0x116/0x1d0 [ 29.953630] ret_from_fork_asm+0x1a/0x30 [ 29.953895] [ 29.954157] The buggy address belongs to the object at ffff888106038600 [ 29.954157] which belongs to the cache kmalloc-64 of size 64 [ 29.954847] The buggy address is located 0 bytes to the right of [ 29.954847] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.955570] [ 29.956092] The buggy address belongs to the physical page: [ 29.956377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.956712] flags: 0x200000000000000(node=0|zone=2) [ 29.957179] page_type: f5(slab) [ 29.957509] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.957960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.958351] page dumped because: kasan: bad access detected [ 29.958636] [ 29.958896] Memory state around the buggy address: [ 29.959090] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.959671] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.959937] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.960441] ^ [ 29.960892] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.961173] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.961474] ================================================================== [ 30.148366] ================================================================== [ 30.148693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 30.149235] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.149594] [ 30.149705] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.149770] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.149787] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.149811] Call Trace: [ 30.149830] <TASK> [ 30.149849] dump_stack_lvl+0x73/0xb0 [ 30.149878] print_report+0xd1/0x640 [ 30.149902] ? __virt_addr_valid+0x1db/0x2d0 [ 30.149928] ? kasan_atomics_helper+0x49ce/0x5450 [ 30.149950] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.149976] ? kasan_atomics_helper+0x49ce/0x5450 [ 30.149998] kasan_report+0x141/0x180 [ 30.150022] ? kasan_atomics_helper+0x49ce/0x5450 [ 30.150048] __asan_report_load4_noabort+0x18/0x20 [ 30.150075] kasan_atomics_helper+0x49ce/0x5450 [ 30.150099] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.150121] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.150148] ? kasan_atomics+0x152/0x310 [ 30.150176] kasan_atomics+0x1dc/0x310 [ 30.150199] ? __pfx_kasan_atomics+0x10/0x10 [ 30.150225] ? __pfx_read_tsc+0x10/0x10 [ 30.150251] ? ktime_get_ts64+0x86/0x230 [ 30.150278] kunit_try_run_case+0x1a5/0x480 [ 30.150304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.150328] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.150355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.150475] ? __kthread_parkme+0x82/0x180 [ 30.150500] ? preempt_count_sub+0x50/0x80 [ 30.150524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.150549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.150610] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.150636] kthread+0x337/0x6f0 [ 30.150656] ? trace_preempt_on+0x20/0xc0 [ 30.150681] ? __pfx_kthread+0x10/0x10 [ 30.150702] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.150727] ? calculate_sigpending+0x7b/0xa0 [ 30.150752] ? __pfx_kthread+0x10/0x10 [ 30.150840] ret_from_fork+0x116/0x1d0 [ 30.150862] ? __pfx_kthread+0x10/0x10 [ 30.150884] ret_from_fork_asm+0x1a/0x30 [ 30.150918] </TASK> [ 30.150930] [ 30.159622] Allocated by task 313: [ 30.159773] kasan_save_stack+0x45/0x70 [ 30.160321] kasan_save_track+0x18/0x40 [ 30.160548] kasan_save_alloc_info+0x3b/0x50 [ 30.160784] __kasan_kmalloc+0xb7/0xc0 [ 30.161252] __kmalloc_cache_noprof+0x189/0x420 [ 30.161422] kasan_atomics+0x95/0x310 [ 30.161632] kunit_try_run_case+0x1a5/0x480 [ 30.162026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.162299] kthread+0x337/0x6f0 [ 30.162450] ret_from_fork+0x116/0x1d0 [ 30.162583] ret_from_fork_asm+0x1a/0x30 [ 30.162777] [ 30.162964] The buggy address belongs to the object at ffff888106038600 [ 30.162964] which belongs to the cache kmalloc-64 of size 64 [ 30.163662] The buggy address is located 0 bytes to the right of [ 30.163662] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.164013] [ 30.164090] The buggy address belongs to the physical page: [ 30.164333] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.164678] flags: 0x200000000000000(node=0|zone=2) [ 30.164902] page_type: f5(slab) [ 30.165067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.165389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.165648] page dumped because: kasan: bad access detected [ 30.165812] [ 30.165875] Memory state around the buggy address: [ 30.166017] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.166591] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.167244] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.167569] ^ [ 30.167805] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.168536] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.169033] ================================================================== [ 30.406099] ================================================================== [ 30.406988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 30.407440] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.407778] [ 30.407991] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.408046] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.408062] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.408086] Call Trace: [ 30.408108] <TASK> [ 30.408129] dump_stack_lvl+0x73/0xb0 [ 30.408160] print_report+0xd1/0x640 [ 30.408186] ? __virt_addr_valid+0x1db/0x2d0 [ 30.408211] ? kasan_atomics_helper+0x1818/0x5450 [ 30.408234] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.408260] ? kasan_atomics_helper+0x1818/0x5450 [ 30.408283] kasan_report+0x141/0x180 [ 30.408399] ? kasan_atomics_helper+0x1818/0x5450 [ 30.408433] kasan_check_range+0x10c/0x1c0 [ 30.408458] __kasan_check_write+0x18/0x20 [ 30.408483] kasan_atomics_helper+0x1818/0x5450 [ 30.408507] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.408530] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.408557] ? kasan_atomics+0x152/0x310 [ 30.408600] kasan_atomics+0x1dc/0x310 [ 30.408624] ? __pfx_kasan_atomics+0x10/0x10 [ 30.408661] ? __pfx_read_tsc+0x10/0x10 [ 30.408685] ? ktime_get_ts64+0x86/0x230 [ 30.408711] kunit_try_run_case+0x1a5/0x480 [ 30.408737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.408760] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.408830] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.408859] ? __kthread_parkme+0x82/0x180 [ 30.408882] ? preempt_count_sub+0x50/0x80 [ 30.408932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.408958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.408983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.409008] kthread+0x337/0x6f0 [ 30.409029] ? trace_preempt_on+0x20/0xc0 [ 30.409054] ? __pfx_kthread+0x10/0x10 [ 30.409076] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.409100] ? calculate_sigpending+0x7b/0xa0 [ 30.409124] ? __pfx_kthread+0x10/0x10 [ 30.409147] ret_from_fork+0x116/0x1d0 [ 30.409168] ? __pfx_kthread+0x10/0x10 [ 30.409189] ret_from_fork_asm+0x1a/0x30 [ 30.409231] </TASK> [ 30.409243] [ 30.417406] Allocated by task 313: [ 30.417605] kasan_save_stack+0x45/0x70 [ 30.418011] kasan_save_track+0x18/0x40 [ 30.418188] kasan_save_alloc_info+0x3b/0x50 [ 30.418401] __kasan_kmalloc+0xb7/0xc0 [ 30.418554] __kmalloc_cache_noprof+0x189/0x420 [ 30.418763] kasan_atomics+0x95/0x310 [ 30.418994] kunit_try_run_case+0x1a5/0x480 [ 30.419240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.419516] kthread+0x337/0x6f0 [ 30.419673] ret_from_fork+0x116/0x1d0 [ 30.419915] ret_from_fork_asm+0x1a/0x30 [ 30.420123] [ 30.420216] The buggy address belongs to the object at ffff888106038600 [ 30.420216] which belongs to the cache kmalloc-64 of size 64 [ 30.420676] The buggy address is located 0 bytes to the right of [ 30.420676] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.421332] [ 30.421400] The buggy address belongs to the physical page: [ 30.422038] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.422353] flags: 0x200000000000000(node=0|zone=2) [ 30.422552] page_type: f5(slab) [ 30.422737] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.422967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.423219] page dumped because: kasan: bad access detected [ 30.423665] [ 30.423758] Memory state around the buggy address: [ 30.424209] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.424554] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.424968] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.425179] ^ [ 30.425330] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.425533] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.425875] ================================================================== [ 29.500520] ================================================================== [ 29.500774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 29.501683] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.502216] [ 29.502328] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.502385] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.502401] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.502426] Call Trace: [ 29.502448] <TASK> [ 29.502627] dump_stack_lvl+0x73/0xb0 [ 29.502668] print_report+0xd1/0x640 [ 29.502693] ? __virt_addr_valid+0x1db/0x2d0 [ 29.502719] ? kasan_atomics_helper+0x4b3a/0x5450 [ 29.502741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.502768] ? kasan_atomics_helper+0x4b3a/0x5450 [ 29.502803] kasan_report+0x141/0x180 [ 29.502829] ? kasan_atomics_helper+0x4b3a/0x5450 [ 29.502856] __asan_report_store4_noabort+0x1b/0x30 [ 29.502882] kasan_atomics_helper+0x4b3a/0x5450 [ 29.502905] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.502934] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.502961] ? kasan_atomics+0x152/0x310 [ 29.502988] kasan_atomics+0x1dc/0x310 [ 29.503012] ? __pfx_kasan_atomics+0x10/0x10 [ 29.503037] ? __pfx_read_tsc+0x10/0x10 [ 29.503060] ? ktime_get_ts64+0x86/0x230 [ 29.503086] kunit_try_run_case+0x1a5/0x480 [ 29.503113] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.503137] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.503164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.503190] ? __kthread_parkme+0x82/0x180 [ 29.503211] ? preempt_count_sub+0x50/0x80 [ 29.503236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.503267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.503292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.503316] kthread+0x337/0x6f0 [ 29.503337] ? trace_preempt_on+0x20/0xc0 [ 29.503361] ? __pfx_kthread+0x10/0x10 [ 29.503382] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.503406] ? calculate_sigpending+0x7b/0xa0 [ 29.503432] ? __pfx_kthread+0x10/0x10 [ 29.503454] ret_from_fork+0x116/0x1d0 [ 29.503474] ? __pfx_kthread+0x10/0x10 [ 29.503496] ret_from_fork_asm+0x1a/0x30 [ 29.503530] </TASK> [ 29.503543] [ 29.514061] Allocated by task 313: [ 29.514204] kasan_save_stack+0x45/0x70 [ 29.514465] kasan_save_track+0x18/0x40 [ 29.515028] kasan_save_alloc_info+0x3b/0x50 [ 29.515213] __kasan_kmalloc+0xb7/0xc0 [ 29.515409] __kmalloc_cache_noprof+0x189/0x420 [ 29.515642] kasan_atomics+0x95/0x310 [ 29.516158] kunit_try_run_case+0x1a5/0x480 [ 29.516351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.516728] kthread+0x337/0x6f0 [ 29.517136] ret_from_fork+0x116/0x1d0 [ 29.517311] ret_from_fork_asm+0x1a/0x30 [ 29.517666] [ 29.517773] The buggy address belongs to the object at ffff888106038600 [ 29.517773] which belongs to the cache kmalloc-64 of size 64 [ 29.518517] The buggy address is located 0 bytes to the right of [ 29.518517] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.519364] [ 29.519471] The buggy address belongs to the physical page: [ 29.519938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.520401] flags: 0x200000000000000(node=0|zone=2) [ 29.520781] page_type: f5(slab) [ 29.521032] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.521484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.521983] page dumped because: kasan: bad access detected [ 29.522384] [ 29.522547] Memory state around the buggy address: [ 29.523032] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.523492] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.524217] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.524518] ^ [ 29.524747] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.525283] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.525807] ================================================================== [ 29.827312] ================================================================== [ 29.827763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 29.828378] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.828804] [ 29.828968] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.829021] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.829038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.829060] Call Trace: [ 29.829081] <TASK> [ 29.829099] dump_stack_lvl+0x73/0xb0 [ 29.829365] print_report+0xd1/0x640 [ 29.829391] ? __virt_addr_valid+0x1db/0x2d0 [ 29.829416] ? kasan_atomics_helper+0xd47/0x5450 [ 29.829437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.829464] ? kasan_atomics_helper+0xd47/0x5450 [ 29.829486] kasan_report+0x141/0x180 [ 29.829509] ? kasan_atomics_helper+0xd47/0x5450 [ 29.829535] kasan_check_range+0x10c/0x1c0 [ 29.829560] __kasan_check_write+0x18/0x20 [ 29.829597] kasan_atomics_helper+0xd47/0x5450 [ 29.829620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.829642] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.829668] ? kasan_atomics+0x152/0x310 [ 29.829695] kasan_atomics+0x1dc/0x310 [ 29.829718] ? __pfx_kasan_atomics+0x10/0x10 [ 29.829742] ? __pfx_read_tsc+0x10/0x10 [ 29.829765] ? ktime_get_ts64+0x86/0x230 [ 29.829801] kunit_try_run_case+0x1a5/0x480 [ 29.829827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.829850] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.829876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.829902] ? __kthread_parkme+0x82/0x180 [ 29.829941] ? preempt_count_sub+0x50/0x80 [ 29.829964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.829989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.830013] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.830037] kthread+0x337/0x6f0 [ 29.830058] ? trace_preempt_on+0x20/0xc0 [ 29.830081] ? __pfx_kthread+0x10/0x10 [ 29.830102] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.830126] ? calculate_sigpending+0x7b/0xa0 [ 29.830150] ? __pfx_kthread+0x10/0x10 [ 29.830172] ret_from_fork+0x116/0x1d0 [ 29.830191] ? __pfx_kthread+0x10/0x10 [ 29.830213] ret_from_fork_asm+0x1a/0x30 [ 29.830246] </TASK> [ 29.830258] [ 29.842562] Allocated by task 313: [ 29.842973] kasan_save_stack+0x45/0x70 [ 29.843176] kasan_save_track+0x18/0x40 [ 29.843475] kasan_save_alloc_info+0x3b/0x50 [ 29.843699] __kasan_kmalloc+0xb7/0xc0 [ 29.844163] __kmalloc_cache_noprof+0x189/0x420 [ 29.844382] kasan_atomics+0x95/0x310 [ 29.844523] kunit_try_run_case+0x1a5/0x480 [ 29.844944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.845319] kthread+0x337/0x6f0 [ 29.845672] ret_from_fork+0x116/0x1d0 [ 29.845993] ret_from_fork_asm+0x1a/0x30 [ 29.846338] [ 29.846431] The buggy address belongs to the object at ffff888106038600 [ 29.846431] which belongs to the cache kmalloc-64 of size 64 [ 29.847055] The buggy address is located 0 bytes to the right of [ 29.847055] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.847748] [ 29.847926] The buggy address belongs to the physical page: [ 29.848350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.848684] flags: 0x200000000000000(node=0|zone=2) [ 29.849233] page_type: f5(slab) [ 29.849538] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.849944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.850517] page dumped because: kasan: bad access detected [ 29.851016] [ 29.851147] Memory state around the buggy address: [ 29.851651] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.852206] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.852470] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.853043] ^ [ 29.853312] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.853951] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.854413] ================================================================== [ 29.614310] ================================================================== [ 29.614637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 29.615560] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.615824] [ 29.615912] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.615966] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.615982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.616007] Call Trace: [ 29.616028] <TASK> [ 29.616048] dump_stack_lvl+0x73/0xb0 [ 29.616080] print_report+0xd1/0x640 [ 29.616106] ? __virt_addr_valid+0x1db/0x2d0 [ 29.616132] ? kasan_atomics_helper+0x7c7/0x5450 [ 29.616155] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.616182] ? kasan_atomics_helper+0x7c7/0x5450 [ 29.616204] kasan_report+0x141/0x180 [ 29.616227] ? kasan_atomics_helper+0x7c7/0x5450 [ 29.616254] kasan_check_range+0x10c/0x1c0 [ 29.616277] __kasan_check_write+0x18/0x20 [ 29.616302] kasan_atomics_helper+0x7c7/0x5450 [ 29.616325] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.616348] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.616375] ? kasan_atomics+0x152/0x310 [ 29.616400] kasan_atomics+0x1dc/0x310 [ 29.616425] ? __pfx_kasan_atomics+0x10/0x10 [ 29.616449] ? __pfx_read_tsc+0x10/0x10 [ 29.616472] ? ktime_get_ts64+0x86/0x230 [ 29.616498] kunit_try_run_case+0x1a5/0x480 [ 29.616526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.616550] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.616587] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.616613] ? __kthread_parkme+0x82/0x180 [ 29.616634] ? preempt_count_sub+0x50/0x80 [ 29.616658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.616683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.616707] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.616733] kthread+0x337/0x6f0 [ 29.616753] ? trace_preempt_on+0x20/0xc0 [ 29.616778] ? __pfx_kthread+0x10/0x10 [ 29.616800] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.617040] ? calculate_sigpending+0x7b/0xa0 [ 29.617072] ? __pfx_kthread+0x10/0x10 [ 29.617096] ret_from_fork+0x116/0x1d0 [ 29.617118] ? __pfx_kthread+0x10/0x10 [ 29.617141] ret_from_fork_asm+0x1a/0x30 [ 29.617175] </TASK> [ 29.617187] [ 29.625542] Allocated by task 313: [ 29.625690] kasan_save_stack+0x45/0x70 [ 29.625968] kasan_save_track+0x18/0x40 [ 29.626128] kasan_save_alloc_info+0x3b/0x50 [ 29.626270] __kasan_kmalloc+0xb7/0xc0 [ 29.626393] __kmalloc_cache_noprof+0x189/0x420 [ 29.626538] kasan_atomics+0x95/0x310 [ 29.627068] kunit_try_run_case+0x1a5/0x480 [ 29.627349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.627650] kthread+0x337/0x6f0 [ 29.627783] ret_from_fork+0x116/0x1d0 [ 29.628130] ret_from_fork_asm+0x1a/0x30 [ 29.628394] [ 29.628471] The buggy address belongs to the object at ffff888106038600 [ 29.628471] which belongs to the cache kmalloc-64 of size 64 [ 29.629070] The buggy address is located 0 bytes to the right of [ 29.629070] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.629619] [ 29.630103] The buggy address belongs to the physical page: [ 29.630379] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.630728] flags: 0x200000000000000(node=0|zone=2) [ 29.631603] page_type: f5(slab) [ 29.631773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.632442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.632759] page dumped because: kasan: bad access detected [ 29.633138] [ 29.633237] Memory state around the buggy address: [ 29.633464] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.633772] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.634233] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.634511] ^ [ 29.634748] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.635279] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.635615] ================================================================== [ 29.657015] ================================================================== [ 29.657362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 29.657743] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.658227] [ 29.658330] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.658424] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.658441] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.658464] Call Trace: [ 29.658483] <TASK> [ 29.658501] dump_stack_lvl+0x73/0xb0 [ 29.658563] print_report+0xd1/0x640 [ 29.658601] ? __virt_addr_valid+0x1db/0x2d0 [ 29.658625] ? kasan_atomics_helper+0x8f9/0x5450 [ 29.658647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.658706] ? kasan_atomics_helper+0x8f9/0x5450 [ 29.658731] kasan_report+0x141/0x180 [ 29.658755] ? kasan_atomics_helper+0x8f9/0x5450 [ 29.658781] kasan_check_range+0x10c/0x1c0 [ 29.658903] __kasan_check_write+0x18/0x20 [ 29.658937] kasan_atomics_helper+0x8f9/0x5450 [ 29.658961] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.658984] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.659010] ? kasan_atomics+0x152/0x310 [ 29.659037] kasan_atomics+0x1dc/0x310 [ 29.659061] ? __pfx_kasan_atomics+0x10/0x10 [ 29.659085] ? __pfx_read_tsc+0x10/0x10 [ 29.659108] ? ktime_get_ts64+0x86/0x230 [ 29.659133] kunit_try_run_case+0x1a5/0x480 [ 29.659190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.659214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.659240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.659273] ? __kthread_parkme+0x82/0x180 [ 29.659293] ? preempt_count_sub+0x50/0x80 [ 29.659344] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.659369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.659418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.659466] kthread+0x337/0x6f0 [ 29.659486] ? trace_preempt_on+0x20/0xc0 [ 29.659534] ? __pfx_kthread+0x10/0x10 [ 29.659557] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.659619] ? calculate_sigpending+0x7b/0xa0 [ 29.659643] ? __pfx_kthread+0x10/0x10 [ 29.659666] ret_from_fork+0x116/0x1d0 [ 29.659686] ? __pfx_kthread+0x10/0x10 [ 29.659707] ret_from_fork_asm+0x1a/0x30 [ 29.659740] </TASK> [ 29.659751] [ 29.668945] Allocated by task 313: [ 29.669167] kasan_save_stack+0x45/0x70 [ 29.669383] kasan_save_track+0x18/0x40 [ 29.669586] kasan_save_alloc_info+0x3b/0x50 [ 29.669898] __kasan_kmalloc+0xb7/0xc0 [ 29.670119] __kmalloc_cache_noprof+0x189/0x420 [ 29.670335] kasan_atomics+0x95/0x310 [ 29.670521] kunit_try_run_case+0x1a5/0x480 [ 29.670685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.670850] kthread+0x337/0x6f0 [ 29.671101] ret_from_fork+0x116/0x1d0 [ 29.671426] ret_from_fork_asm+0x1a/0x30 [ 29.671759] [ 29.671924] The buggy address belongs to the object at ffff888106038600 [ 29.671924] which belongs to the cache kmalloc-64 of size 64 [ 29.672706] The buggy address is located 0 bytes to the right of [ 29.672706] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.673431] [ 29.673566] The buggy address belongs to the physical page: [ 29.673865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.674462] flags: 0x200000000000000(node=0|zone=2) [ 29.674758] page_type: f5(slab) [ 29.674898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.675424] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.675786] page dumped because: kasan: bad access detected [ 29.675988] [ 29.676292] Memory state around the buggy address: [ 29.676508] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.676772] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.677126] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.677324] ^ [ 29.677469] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.678051] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.678408] ================================================================== [ 30.015108] ================================================================== [ 30.015782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 30.016466] Read of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.016885] [ 30.017021] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.017087] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.017202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.017232] Call Trace: [ 30.017255] <TASK> [ 30.017277] dump_stack_lvl+0x73/0xb0 [ 30.017310] print_report+0xd1/0x640 [ 30.017334] ? __virt_addr_valid+0x1db/0x2d0 [ 30.017369] ? kasan_atomics_helper+0x4a1c/0x5450 [ 30.017392] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.017419] ? kasan_atomics_helper+0x4a1c/0x5450 [ 30.017441] kasan_report+0x141/0x180 [ 30.017464] ? kasan_atomics_helper+0x4a1c/0x5450 [ 30.017491] __asan_report_load4_noabort+0x18/0x20 [ 30.017517] kasan_atomics_helper+0x4a1c/0x5450 [ 30.017540] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.017563] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.017599] ? kasan_atomics+0x152/0x310 [ 30.017626] kasan_atomics+0x1dc/0x310 [ 30.017650] ? __pfx_kasan_atomics+0x10/0x10 [ 30.017675] ? __pfx_read_tsc+0x10/0x10 [ 30.017698] ? ktime_get_ts64+0x86/0x230 [ 30.017725] kunit_try_run_case+0x1a5/0x480 [ 30.017753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.017776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.017843] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.017869] ? __kthread_parkme+0x82/0x180 [ 30.017891] ? preempt_count_sub+0x50/0x80 [ 30.017915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.017940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.017965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.017990] kthread+0x337/0x6f0 [ 30.018012] ? trace_preempt_on+0x20/0xc0 [ 30.018038] ? __pfx_kthread+0x10/0x10 [ 30.018058] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.018083] ? calculate_sigpending+0x7b/0xa0 [ 30.018108] ? __pfx_kthread+0x10/0x10 [ 30.018130] ret_from_fork+0x116/0x1d0 [ 30.018150] ? __pfx_kthread+0x10/0x10 [ 30.018171] ret_from_fork_asm+0x1a/0x30 [ 30.018205] </TASK> [ 30.018218] [ 30.030365] Allocated by task 313: [ 30.030606] kasan_save_stack+0x45/0x70 [ 30.031046] kasan_save_track+0x18/0x40 [ 30.031271] kasan_save_alloc_info+0x3b/0x50 [ 30.031469] __kasan_kmalloc+0xb7/0xc0 [ 30.031652] __kmalloc_cache_noprof+0x189/0x420 [ 30.032081] kasan_atomics+0x95/0x310 [ 30.032384] kunit_try_run_case+0x1a5/0x480 [ 30.032792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.033241] kthread+0x337/0x6f0 [ 30.033430] ret_from_fork+0x116/0x1d0 [ 30.033618] ret_from_fork_asm+0x1a/0x30 [ 30.034020] [ 30.034116] The buggy address belongs to the object at ffff888106038600 [ 30.034116] which belongs to the cache kmalloc-64 of size 64 [ 30.034999] The buggy address is located 0 bytes to the right of [ 30.034999] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.035662] [ 30.035760] The buggy address belongs to the physical page: [ 30.036230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.036737] flags: 0x200000000000000(node=0|zone=2) [ 30.036963] page_type: f5(slab) [ 30.037225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.037538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.037801] page dumped because: kasan: bad access detected [ 30.038114] [ 30.038235] Memory state around the buggy address: [ 30.038426] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.038769] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.039040] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.039246] ^ [ 30.039483] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.039758] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.040226] ================================================================== [ 30.577184] ================================================================== [ 30.577535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 30.577902] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.578124] [ 30.578208] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.578261] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.578276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.578300] Call Trace: [ 30.578321] <TASK> [ 30.578342] dump_stack_lvl+0x73/0xb0 [ 30.578370] print_report+0xd1/0x640 [ 30.578393] ? __virt_addr_valid+0x1db/0x2d0 [ 30.578418] ? kasan_atomics_helper+0x1c18/0x5450 [ 30.578440] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.578466] ? kasan_atomics_helper+0x1c18/0x5450 [ 30.578491] kasan_report+0x141/0x180 [ 30.578515] ? kasan_atomics_helper+0x1c18/0x5450 [ 30.578543] kasan_check_range+0x10c/0x1c0 [ 30.578567] __kasan_check_write+0x18/0x20 [ 30.578602] kasan_atomics_helper+0x1c18/0x5450 [ 30.578625] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.578694] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.578741] ? kasan_atomics+0x152/0x310 [ 30.578776] kasan_atomics+0x1dc/0x310 [ 30.578801] ? __pfx_kasan_atomics+0x10/0x10 [ 30.578825] ? __pfx_read_tsc+0x10/0x10 [ 30.578850] ? ktime_get_ts64+0x86/0x230 [ 30.578876] kunit_try_run_case+0x1a5/0x480 [ 30.578901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.578925] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.578951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.578977] ? __kthread_parkme+0x82/0x180 [ 30.578998] ? preempt_count_sub+0x50/0x80 [ 30.579023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.579048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.579073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.579097] kthread+0x337/0x6f0 [ 30.579118] ? trace_preempt_on+0x20/0xc0 [ 30.579143] ? __pfx_kthread+0x10/0x10 [ 30.579164] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.579188] ? calculate_sigpending+0x7b/0xa0 [ 30.579213] ? __pfx_kthread+0x10/0x10 [ 30.579235] ret_from_fork+0x116/0x1d0 [ 30.579263] ? __pfx_kthread+0x10/0x10 [ 30.579285] ret_from_fork_asm+0x1a/0x30 [ 30.579318] </TASK> [ 30.579331] [ 30.594561] Allocated by task 313: [ 30.594734] kasan_save_stack+0x45/0x70 [ 30.595091] kasan_save_track+0x18/0x40 [ 30.595282] kasan_save_alloc_info+0x3b/0x50 [ 30.595493] __kasan_kmalloc+0xb7/0xc0 [ 30.595690] __kmalloc_cache_noprof+0x189/0x420 [ 30.595868] kasan_atomics+0x95/0x310 [ 30.595997] kunit_try_run_case+0x1a5/0x480 [ 30.596197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.596686] kthread+0x337/0x6f0 [ 30.596864] ret_from_fork+0x116/0x1d0 [ 30.597601] ret_from_fork_asm+0x1a/0x30 [ 30.598099] [ 30.598280] The buggy address belongs to the object at ffff888106038600 [ 30.598280] which belongs to the cache kmalloc-64 of size 64 [ 30.599311] The buggy address is located 0 bytes to the right of [ 30.599311] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.600392] [ 30.600563] The buggy address belongs to the physical page: [ 30.601067] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.601321] flags: 0x200000000000000(node=0|zone=2) [ 30.601906] page_type: f5(slab) [ 30.602325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.603098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.603727] page dumped because: kasan: bad access detected [ 30.604277] [ 30.604423] Memory state around the buggy address: [ 30.604586] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.604961] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.605613] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.606307] ^ [ 30.606853] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.607479] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.607701] ================================================================== [ 30.801755] ================================================================== [ 30.802378] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 30.802711] Write of size 8 at addr ffff888106038630 by task kunit_try_catch/313 [ 30.803205] [ 30.803402] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 30.803743] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 30.803761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.803796] Call Trace: [ 30.803815] <TASK> [ 30.803834] dump_stack_lvl+0x73/0xb0 [ 30.803865] print_report+0xd1/0x640 [ 30.803955] ? __virt_addr_valid+0x1db/0x2d0 [ 30.804055] ? kasan_atomics_helper+0x2006/0x5450 [ 30.804092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.804119] ? kasan_atomics_helper+0x2006/0x5450 [ 30.804142] kasan_report+0x141/0x180 [ 30.804166] ? kasan_atomics_helper+0x2006/0x5450 [ 30.804193] kasan_check_range+0x10c/0x1c0 [ 30.804218] __kasan_check_write+0x18/0x20 [ 30.804242] kasan_atomics_helper+0x2006/0x5450 [ 30.804266] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.804288] ? __kmalloc_cache_noprof+0x189/0x420 [ 30.804313] ? kasan_atomics+0x152/0x310 [ 30.804340] kasan_atomics+0x1dc/0x310 [ 30.804362] ? __pfx_kasan_atomics+0x10/0x10 [ 30.804387] ? __pfx_read_tsc+0x10/0x10 [ 30.804410] ? ktime_get_ts64+0x86/0x230 [ 30.804436] kunit_try_run_case+0x1a5/0x480 [ 30.804461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.804484] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 30.804510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.804536] ? __kthread_parkme+0x82/0x180 [ 30.804557] ? preempt_count_sub+0x50/0x80 [ 30.804590] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.804615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.804639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.804665] kthread+0x337/0x6f0 [ 30.804685] ? trace_preempt_on+0x20/0xc0 [ 30.804709] ? __pfx_kthread+0x10/0x10 [ 30.804731] ? _raw_spin_unlock_irq+0x47/0x80 [ 30.804755] ? calculate_sigpending+0x7b/0xa0 [ 30.804779] ? __pfx_kthread+0x10/0x10 [ 30.804801] ret_from_fork+0x116/0x1d0 [ 30.804822] ? __pfx_kthread+0x10/0x10 [ 30.804843] ret_from_fork_asm+0x1a/0x30 [ 30.804875] </TASK> [ 30.804886] [ 30.815421] Allocated by task 313: [ 30.815636] kasan_save_stack+0x45/0x70 [ 30.815839] kasan_save_track+0x18/0x40 [ 30.816334] kasan_save_alloc_info+0x3b/0x50 [ 30.816558] __kasan_kmalloc+0xb7/0xc0 [ 30.816713] __kmalloc_cache_noprof+0x189/0x420 [ 30.817199] kasan_atomics+0x95/0x310 [ 30.817346] kunit_try_run_case+0x1a5/0x480 [ 30.817753] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.818103] kthread+0x337/0x6f0 [ 30.818280] ret_from_fork+0x116/0x1d0 [ 30.818585] ret_from_fork_asm+0x1a/0x30 [ 30.818777] [ 30.818872] The buggy address belongs to the object at ffff888106038600 [ 30.818872] which belongs to the cache kmalloc-64 of size 64 [ 30.819881] The buggy address is located 0 bytes to the right of [ 30.819881] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 30.820715] [ 30.820800] The buggy address belongs to the physical page: [ 30.821228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 30.821696] flags: 0x200000000000000(node=0|zone=2) [ 30.821932] page_type: f5(slab) [ 30.822313] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.822752] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.823326] page dumped because: kasan: bad access detected [ 30.823590] [ 30.823662] Memory state around the buggy address: [ 30.823891] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.824450] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.824760] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.825223] ^ [ 30.825448] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.825896] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.826287] ================================================================== [ 29.636276] ================================================================== [ 29.636602] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 29.636936] Write of size 4 at addr ffff888106038630 by task kunit_try_catch/313 [ 29.637409] [ 29.637513] CPU: 1 UID: 0 PID: 313 Comm: kunit_try_catch Tainted: G B W N 6.16.0-rc7-next-20250724 #1 PREEMPT(voluntary) [ 29.637611] Tainted: [B]=BAD_PAGE, [W]=WARN, [N]=TEST [ 29.637628] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.637650] Call Trace: [ 29.637669] <TASK> [ 29.637686] dump_stack_lvl+0x73/0xb0 [ 29.637715] print_report+0xd1/0x640 [ 29.637772] ? __virt_addr_valid+0x1db/0x2d0 [ 29.637798] ? kasan_atomics_helper+0x860/0x5450 [ 29.637822] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.638042] ? kasan_atomics_helper+0x860/0x5450 [ 29.638068] kasan_report+0x141/0x180 [ 29.638092] ? kasan_atomics_helper+0x860/0x5450 [ 29.638120] kasan_check_range+0x10c/0x1c0 [ 29.638176] __kasan_check_write+0x18/0x20 [ 29.638199] kasan_atomics_helper+0x860/0x5450 [ 29.638223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.638246] ? __kmalloc_cache_noprof+0x189/0x420 [ 29.638271] ? kasan_atomics+0x152/0x310 [ 29.638329] kasan_atomics+0x1dc/0x310 [ 29.638353] ? __pfx_kasan_atomics+0x10/0x10 [ 29.638377] ? __pfx_read_tsc+0x10/0x10 [ 29.638400] ? ktime_get_ts64+0x86/0x230 [ 29.638425] kunit_try_run_case+0x1a5/0x480 [ 29.638478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.638503] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 29.638529] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.638557] ? __kthread_parkme+0x82/0x180 [ 29.638591] ? preempt_count_sub+0x50/0x80 [ 29.638615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.638641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.638665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.638720] kthread+0x337/0x6f0 [ 29.638766] ? trace_preempt_on+0x20/0xc0 [ 29.638806] ? __pfx_kthread+0x10/0x10 [ 29.638828] ? _raw_spin_unlock_irq+0x47/0x80 [ 29.638853] ? calculate_sigpending+0x7b/0xa0 [ 29.638877] ? __pfx_kthread+0x10/0x10 [ 29.638899] ret_from_fork+0x116/0x1d0 [ 29.638920] ? __pfx_kthread+0x10/0x10 [ 29.638993] ret_from_fork_asm+0x1a/0x30 [ 29.639027] </TASK> [ 29.639039] [ 29.647518] Allocated by task 313: [ 29.647717] kasan_save_stack+0x45/0x70 [ 29.648145] kasan_save_track+0x18/0x40 [ 29.648314] kasan_save_alloc_info+0x3b/0x50 [ 29.648596] __kasan_kmalloc+0xb7/0xc0 [ 29.648830] __kmalloc_cache_noprof+0x189/0x420 [ 29.649288] kasan_atomics+0x95/0x310 [ 29.649638] kunit_try_run_case+0x1a5/0x480 [ 29.649827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.650131] kthread+0x337/0x6f0 [ 29.650254] ret_from_fork+0x116/0x1d0 [ 29.650381] ret_from_fork_asm+0x1a/0x30 [ 29.650552] [ 29.650653] The buggy address belongs to the object at ffff888106038600 [ 29.650653] which belongs to the cache kmalloc-64 of size 64 [ 29.651365] The buggy address is located 0 bytes to the right of [ 29.651365] allocated 48-byte region [ffff888106038600, ffff888106038630) [ 29.652164] [ 29.652303] The buggy address belongs to the physical page: [ 29.652559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106038 [ 29.653040] flags: 0x200000000000000(node=0|zone=2) [ 29.653204] page_type: f5(slab) [ 29.653321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.653569] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.653913] page dumped because: kasan: bad access detected [ 29.654157] [ 29.654246] Memory state around the buggy address: [ 29.654448] ffff888106038500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.654795] ffff888106038580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.655007] >ffff888106038600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.655207] ^ [ 29.655360] ffff888106038680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656046] ffff888106038700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.656448] ==================================================================