Date
Nov. 20, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 43.040889] ================================================================== [ 43.041680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 43.042558] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.043219] [ 43.044870] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.046256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.046796] Hardware name: linux,dummy-virt (DT) [ 43.047651] Call trace: [ 43.048209] show_stack+0x20/0x38 (C) [ 43.048815] dump_stack_lvl+0x8c/0xd0 [ 43.049651] print_report+0x118/0x5e0 [ 43.050433] kasan_report+0xc8/0x118 [ 43.051126] kasan_check_range+0x100/0x1a8 [ 43.051746] __kasan_check_write+0x20/0x30 [ 43.052300] kasan_atomics_helper+0x16d0/0x4858 [ 43.053257] kasan_atomics+0x198/0x2e8 [ 43.053972] kunit_try_run_case+0x14c/0x3d0 [ 43.054735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.055611] kthread+0x24c/0x2d0 [ 43.056328] ret_from_fork+0x10/0x20 [ 43.056897] [ 43.057484] Allocated by task 254: [ 43.058102] kasan_save_stack+0x3c/0x68 [ 43.058821] kasan_save_track+0x20/0x40 [ 43.059364] kasan_save_alloc_info+0x40/0x58 [ 43.060205] __kasan_kmalloc+0xd4/0xd8 [ 43.060963] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.061602] kasan_atomics+0xb8/0x2e8 [ 43.062368] kunit_try_run_case+0x14c/0x3d0 [ 43.063120] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.063968] kthread+0x24c/0x2d0 [ 43.064652] ret_from_fork+0x10/0x20 [ 43.065150] [ 43.065728] The buggy address belongs to the object at fff00000c65bde00 [ 43.065728] which belongs to the cache kmalloc-64 of size 64 [ 43.067076] The buggy address is located 0 bytes to the right of [ 43.067076] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.068525] [ 43.069083] The buggy address belongs to the physical page: [ 43.069720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.070718] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.071731] page_type: f5(slab) [ 43.072427] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.073476] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.074306] page dumped because: kasan: bad access detected [ 43.075160] [ 43.075671] Memory state around the buggy address: [ 43.076415] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.077271] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.078067] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.078895] ^ [ 43.079508] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.080335] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.081144] ================================================================== [ 42.595035] ================================================================== [ 42.595782] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 42.596662] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.597515] [ 42.597899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.599068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.599630] Hardware name: linux,dummy-virt (DT) [ 42.600246] Call trace: [ 42.600706] show_stack+0x20/0x38 (C) [ 42.601392] dump_stack_lvl+0x8c/0xd0 [ 42.602013] print_report+0x118/0x5e0 [ 42.602691] kasan_report+0xc8/0x118 [ 42.603321] kasan_check_range+0x100/0x1a8 [ 42.604049] __kasan_check_write+0x20/0x30 [ 42.604663] kasan_atomics_helper+0x126c/0x4858 [ 42.605486] kasan_atomics+0x198/0x2e8 [ 42.606163] kunit_try_run_case+0x14c/0x3d0 [ 42.606814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.607598] kthread+0x24c/0x2d0 [ 42.608194] ret_from_fork+0x10/0x20 [ 42.608814] [ 42.609143] Allocated by task 254: [ 42.609705] kasan_save_stack+0x3c/0x68 [ 42.610234] kasan_save_track+0x20/0x40 [ 42.610929] kasan_save_alloc_info+0x40/0x58 [ 42.611551] __kasan_kmalloc+0xd4/0xd8 [ 42.612164] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.612801] kasan_atomics+0xb8/0x2e8 [ 42.613396] kunit_try_run_case+0x14c/0x3d0 [ 42.614001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.614747] kthread+0x24c/0x2d0 [ 42.615397] ret_from_fork+0x10/0x20 [ 42.615927] [ 42.616322] The buggy address belongs to the object at fff00000c65bde00 [ 42.616322] which belongs to the cache kmalloc-64 of size 64 [ 42.617515] The buggy address is located 0 bytes to the right of [ 42.617515] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.618785] [ 42.619166] The buggy address belongs to the physical page: [ 42.619800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.620746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.621604] page_type: f5(slab) [ 42.622178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.623102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.624007] page dumped because: kasan: bad access detected [ 42.624769] [ 42.625365] Memory state around the buggy address: [ 42.626080] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.626855] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.627709] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.628747] ^ [ 42.629622] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.630799] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.631881] ================================================================== [ 41.404222] ================================================================== [ 41.405093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 41.406118] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.407549] [ 41.408071] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.409193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.410040] Hardware name: linux,dummy-virt (DT) [ 41.410809] Call trace: [ 41.411383] show_stack+0x20/0x38 (C) [ 41.412145] dump_stack_lvl+0x8c/0xd0 [ 41.412891] print_report+0x118/0x5e0 [ 41.413683] kasan_report+0xc8/0x118 [ 41.414182] kasan_check_range+0x100/0x1a8 [ 41.414766] __kasan_check_write+0x20/0x30 [ 41.415317] kasan_atomics_helper+0x6ec/0x4858 [ 41.416398] kasan_atomics+0x198/0x2e8 [ 41.417151] kunit_try_run_case+0x14c/0x3d0 [ 41.417953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.418862] kthread+0x24c/0x2d0 [ 41.419560] ret_from_fork+0x10/0x20 [ 41.420297] [ 41.420639] Allocated by task 254: [ 41.421392] kasan_save_stack+0x3c/0x68 [ 41.422132] kasan_save_track+0x20/0x40 [ 41.422786] kasan_save_alloc_info+0x40/0x58 [ 41.423418] __kasan_kmalloc+0xd4/0xd8 [ 41.424263] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.425130] kasan_atomics+0xb8/0x2e8 [ 41.425845] kunit_try_run_case+0x14c/0x3d0 [ 41.426434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.427370] kthread+0x24c/0x2d0 [ 41.428087] ret_from_fork+0x10/0x20 [ 41.428857] [ 41.429192] The buggy address belongs to the object at fff00000c65bde00 [ 41.429192] which belongs to the cache kmalloc-64 of size 64 [ 41.430665] The buggy address is located 0 bytes to the right of [ 41.430665] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.432121] [ 41.432701] The buggy address belongs to the physical page: [ 41.433311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.434123] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.434994] page_type: f5(slab) [ 41.435455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.436370] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.437218] page dumped because: kasan: bad access detected [ 41.437828] [ 41.438159] Memory state around the buggy address: [ 41.438667] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.439545] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.440342] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.441113] ^ [ 41.441632] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.442491] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.443318] ================================================================== [ 42.145210] ================================================================== [ 42.146371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 42.147285] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.147924] [ 42.148320] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.149708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.150435] Hardware name: linux,dummy-virt (DT) [ 42.151118] Call trace: [ 42.151579] show_stack+0x20/0x38 (C) [ 42.152265] dump_stack_lvl+0x8c/0xd0 [ 42.152911] print_report+0x118/0x5e0 [ 42.153534] kasan_report+0xc8/0x118 [ 42.154117] __asan_report_load8_noabort+0x20/0x30 [ 42.154804] kasan_atomics_helper+0x3f58/0x4858 [ 42.155398] kasan_atomics+0x198/0x2e8 [ 42.156043] kunit_try_run_case+0x14c/0x3d0 [ 42.156733] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.157495] kthread+0x24c/0x2d0 [ 42.158056] ret_from_fork+0x10/0x20 [ 42.158659] [ 42.159043] Allocated by task 254: [ 42.159547] kasan_save_stack+0x3c/0x68 [ 42.160203] kasan_save_track+0x20/0x40 [ 42.160836] kasan_save_alloc_info+0x40/0x58 [ 42.161519] __kasan_kmalloc+0xd4/0xd8 [ 42.162130] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.162838] kasan_atomics+0xb8/0x2e8 [ 42.163421] kunit_try_run_case+0x14c/0x3d0 [ 42.164073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.164823] kthread+0x24c/0x2d0 [ 42.165404] ret_from_fork+0x10/0x20 [ 42.166046] [ 42.166419] The buggy address belongs to the object at fff00000c65bde00 [ 42.166419] which belongs to the cache kmalloc-64 of size 64 [ 42.167615] The buggy address is located 0 bytes to the right of [ 42.167615] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.168903] [ 42.169236] The buggy address belongs to the physical page: [ 42.169924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.170937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.171702] page_type: f5(slab) [ 42.172306] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.173165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.174102] page dumped because: kasan: bad access detected [ 42.174760] [ 42.175137] Memory state around the buggy address: [ 42.175776] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.176647] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.177520] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.178363] ^ [ 42.178950] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.179862] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.180651] ================================================================== [ 40.714682] ================================================================== [ 40.716377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 40.717185] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.719089] [ 40.719780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.721092] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.721938] Hardware name: linux,dummy-virt (DT) [ 40.722687] Call trace: [ 40.723354] show_stack+0x20/0x38 (C) [ 40.724391] dump_stack_lvl+0x8c/0xd0 [ 40.724993] print_report+0x118/0x5e0 [ 40.725924] kasan_report+0xc8/0x118 [ 40.726562] __asan_report_load4_noabort+0x20/0x30 [ 40.727412] kasan_atomics_helper+0x40a8/0x4858 [ 40.728193] kasan_atomics+0x198/0x2e8 [ 40.728933] kunit_try_run_case+0x14c/0x3d0 [ 40.729785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.730278] kthread+0x24c/0x2d0 [ 40.730705] ret_from_fork+0x10/0x20 [ 40.731224] [ 40.731682] Allocated by task 254: [ 40.732364] kasan_save_stack+0x3c/0x68 [ 40.733109] kasan_save_track+0x20/0x40 [ 40.733808] kasan_save_alloc_info+0x40/0x58 [ 40.734659] __kasan_kmalloc+0xd4/0xd8 [ 40.735503] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.736313] kasan_atomics+0xb8/0x2e8 [ 40.737025] kunit_try_run_case+0x14c/0x3d0 [ 40.737877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.739114] kthread+0x24c/0x2d0 [ 40.739605] ret_from_fork+0x10/0x20 [ 40.740538] [ 40.740948] The buggy address belongs to the object at fff00000c65bde00 [ 40.740948] which belongs to the cache kmalloc-64 of size 64 [ 40.743119] The buggy address is located 0 bytes to the right of [ 40.743119] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.744262] [ 40.744971] The buggy address belongs to the physical page: [ 40.745711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.746792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.747323] page_type: f5(slab) [ 40.747727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.749156] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.750256] page dumped because: kasan: bad access detected [ 40.751110] [ 40.751646] Memory state around the buggy address: [ 40.752474] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.753735] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.754872] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.755801] ^ [ 40.756531] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.757899] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.759000] ================================================================== [ 41.592487] ================================================================== [ 41.593303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 41.594203] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.594809] [ 41.595196] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.596142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.596674] Hardware name: linux,dummy-virt (DT) [ 41.597137] Call trace: [ 41.597583] show_stack+0x20/0x38 (C) [ 41.598207] dump_stack_lvl+0x8c/0xd0 [ 41.598832] print_report+0x118/0x5e0 [ 41.599385] kasan_report+0xc8/0x118 [ 41.599908] kasan_check_range+0x100/0x1a8 [ 41.600558] __kasan_check_write+0x20/0x30 [ 41.601136] kasan_atomics_helper+0x934/0x4858 [ 41.601716] kasan_atomics+0x198/0x2e8 [ 41.602319] kunit_try_run_case+0x14c/0x3d0 [ 41.603009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.603709] kthread+0x24c/0x2d0 [ 41.604278] ret_from_fork+0x10/0x20 [ 41.604851] [ 41.605166] Allocated by task 254: [ 41.605705] kasan_save_stack+0x3c/0x68 [ 41.606209] kasan_save_track+0x20/0x40 [ 41.606809] kasan_save_alloc_info+0x40/0x58 [ 41.607409] __kasan_kmalloc+0xd4/0xd8 [ 41.607912] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.608599] kasan_atomics+0xb8/0x2e8 [ 41.609157] kunit_try_run_case+0x14c/0x3d0 [ 41.609760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.610510] kthread+0x24c/0x2d0 [ 41.611046] ret_from_fork+0x10/0x20 [ 41.611551] [ 41.611834] The buggy address belongs to the object at fff00000c65bde00 [ 41.611834] which belongs to the cache kmalloc-64 of size 64 [ 41.613162] The buggy address is located 0 bytes to the right of [ 41.613162] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.614355] [ 41.614728] The buggy address belongs to the physical page: [ 41.615381] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.616077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.616912] page_type: f5(slab) [ 41.617476] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.618244] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.619093] page dumped because: kasan: bad access detected [ 41.619794] [ 41.620108] Memory state around the buggy address: [ 41.620769] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.621539] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.622345] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.623061] ^ [ 41.623651] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.624494] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.625109] ================================================================== [ 41.850831] ================================================================== [ 41.851571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 41.852357] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.853109] [ 41.853706] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.854781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.855296] Hardware name: linux,dummy-virt (DT) [ 41.856359] Call trace: [ 41.856940] show_stack+0x20/0x38 (C) [ 41.857685] dump_stack_lvl+0x8c/0xd0 [ 41.858394] print_report+0x118/0x5e0 [ 41.859087] kasan_report+0xc8/0x118 [ 41.859789] __asan_report_load4_noabort+0x20/0x30 [ 41.860612] kasan_atomics_helper+0x3dbc/0x4858 [ 41.861377] kasan_atomics+0x198/0x2e8 [ 41.862076] kunit_try_run_case+0x14c/0x3d0 [ 41.862654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.863320] kthread+0x24c/0x2d0 [ 41.863838] ret_from_fork+0x10/0x20 [ 41.864347] [ 41.865219] Allocated by task 254: [ 41.865630] kasan_save_stack+0x3c/0x68 [ 41.866420] kasan_save_track+0x20/0x40 [ 41.866896] kasan_save_alloc_info+0x40/0x58 [ 41.867529] __kasan_kmalloc+0xd4/0xd8 [ 41.868015] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.868694] kasan_atomics+0xb8/0x2e8 [ 41.869238] kunit_try_run_case+0x14c/0x3d0 [ 41.869789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.870520] kthread+0x24c/0x2d0 [ 41.870959] ret_from_fork+0x10/0x20 [ 41.871538] [ 41.871892] The buggy address belongs to the object at fff00000c65bde00 [ 41.871892] which belongs to the cache kmalloc-64 of size 64 [ 41.873058] The buggy address is located 0 bytes to the right of [ 41.873058] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.874189] [ 41.874549] The buggy address belongs to the physical page: [ 41.875150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.875974] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.876728] page_type: f5(slab) [ 41.877257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.878059] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.878757] page dumped because: kasan: bad access detected [ 41.879460] [ 41.879806] Memory state around the buggy address: [ 41.880431] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.881213] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.882019] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.882775] ^ [ 41.883315] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.884519] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.885465] ================================================================== [ 42.896471] ================================================================== [ 42.897173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 42.898244] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.899631] [ 42.900042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.901226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.901806] Hardware name: linux,dummy-virt (DT) [ 42.902354] Call trace: [ 42.902744] show_stack+0x20/0x38 (C) [ 42.903380] dump_stack_lvl+0x8c/0xd0 [ 42.903927] print_report+0x118/0x5e0 [ 42.904467] kasan_report+0xc8/0x118 [ 42.904939] kasan_check_range+0x100/0x1a8 [ 42.905550] __kasan_check_write+0x20/0x30 [ 42.906154] kasan_atomics_helper+0x15b4/0x4858 [ 42.906783] kasan_atomics+0x198/0x2e8 [ 42.907262] kunit_try_run_case+0x14c/0x3d0 [ 42.907973] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.908796] kthread+0x24c/0x2d0 [ 42.909371] ret_from_fork+0x10/0x20 [ 42.910072] [ 42.910453] Allocated by task 254: [ 42.911003] kasan_save_stack+0x3c/0x68 [ 42.911585] kasan_save_track+0x20/0x40 [ 42.912112] kasan_save_alloc_info+0x40/0x58 [ 42.912681] __kasan_kmalloc+0xd4/0xd8 [ 42.913292] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.913964] kasan_atomics+0xb8/0x2e8 [ 42.914428] kunit_try_run_case+0x14c/0x3d0 [ 42.915144] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.915829] kthread+0x24c/0x2d0 [ 42.916402] ret_from_fork+0x10/0x20 [ 42.916992] [ 42.917319] The buggy address belongs to the object at fff00000c65bde00 [ 42.917319] which belongs to the cache kmalloc-64 of size 64 [ 42.918588] The buggy address is located 0 bytes to the right of [ 42.918588] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.919866] [ 42.920248] The buggy address belongs to the physical page: [ 42.920962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.921791] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.922569] page_type: f5(slab) [ 42.923044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.923935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.924786] page dumped because: kasan: bad access detected [ 42.925474] [ 42.925807] Memory state around the buggy address: [ 42.926354] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.927260] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.928126] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.928968] ^ [ 42.929617] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.930486] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.931306] ================================================================== [ 42.672694] ================================================================== [ 42.673416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 42.674854] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.675622] [ 42.676035] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.677309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.677898] Hardware name: linux,dummy-virt (DT) [ 42.678604] Call trace: [ 42.679078] show_stack+0x20/0x38 (C) [ 42.679768] dump_stack_lvl+0x8c/0xd0 [ 42.680389] print_report+0x118/0x5e0 [ 42.680982] kasan_report+0xc8/0x118 [ 42.681660] kasan_check_range+0x100/0x1a8 [ 42.682306] __kasan_check_write+0x20/0x30 [ 42.683023] kasan_atomics_helper+0x1384/0x4858 [ 42.683722] kasan_atomics+0x198/0x2e8 [ 42.684400] kunit_try_run_case+0x14c/0x3d0 [ 42.685038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.685780] kthread+0x24c/0x2d0 [ 42.686349] ret_from_fork+0x10/0x20 [ 42.686943] [ 42.687322] Allocated by task 254: [ 42.687913] kasan_save_stack+0x3c/0x68 [ 42.688508] kasan_save_track+0x20/0x40 [ 42.689068] kasan_save_alloc_info+0x40/0x58 [ 42.689756] __kasan_kmalloc+0xd4/0xd8 [ 42.690327] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.691013] kasan_atomics+0xb8/0x2e8 [ 42.691526] kunit_try_run_case+0x14c/0x3d0 [ 42.692253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.692999] kthread+0x24c/0x2d0 [ 42.693623] ret_from_fork+0x10/0x20 [ 42.694187] [ 42.694555] The buggy address belongs to the object at fff00000c65bde00 [ 42.694555] which belongs to the cache kmalloc-64 of size 64 [ 42.695992] The buggy address is located 0 bytes to the right of [ 42.695992] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.696851] [ 42.697023] The buggy address belongs to the physical page: [ 42.697306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.698474] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.699146] page_type: f5(slab) [ 42.699755] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.700702] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.701633] page dumped because: kasan: bad access detected [ 42.702251] [ 42.702558] Memory state around the buggy address: [ 42.703118] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.703882] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.704593] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.705529] ^ [ 42.706221] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.707140] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.707949] ================================================================== [ 42.404202] ================================================================== [ 42.404945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 42.405772] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.406589] [ 42.407017] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.408222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.408751] Hardware name: linux,dummy-virt (DT) [ 42.409428] Call trace: [ 42.409908] show_stack+0x20/0x38 (C) [ 42.410533] dump_stack_lvl+0x8c/0xd0 [ 42.411220] print_report+0x118/0x5e0 [ 42.411844] kasan_report+0xc8/0x118 [ 42.412378] kasan_check_range+0x100/0x1a8 [ 42.412960] __kasan_check_write+0x20/0x30 [ 42.413635] kasan_atomics_helper+0x1058/0x4858 [ 42.414324] kasan_atomics+0x198/0x2e8 [ 42.414978] kunit_try_run_case+0x14c/0x3d0 [ 42.415710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.416477] kthread+0x24c/0x2d0 [ 42.417059] ret_from_fork+0x10/0x20 [ 42.417660] [ 42.418048] Allocated by task 254: [ 42.418619] kasan_save_stack+0x3c/0x68 [ 42.419168] kasan_save_track+0x20/0x40 [ 42.419800] kasan_save_alloc_info+0x40/0x58 [ 42.420424] __kasan_kmalloc+0xd4/0xd8 [ 42.421048] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.421712] kasan_atomics+0xb8/0x2e8 [ 42.422333] kunit_try_run_case+0x14c/0x3d0 [ 42.422960] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.423652] kthread+0x24c/0x2d0 [ 42.424172] ret_from_fork+0x10/0x20 [ 42.424802] [ 42.425190] The buggy address belongs to the object at fff00000c65bde00 [ 42.425190] which belongs to the cache kmalloc-64 of size 64 [ 42.426389] The buggy address is located 0 bytes to the right of [ 42.426389] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.427726] [ 42.428082] The buggy address belongs to the physical page: [ 42.428712] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.429690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.430547] page_type: f5(slab) [ 42.431119] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.431996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.432889] page dumped because: kasan: bad access detected [ 42.433551] [ 42.433931] Memory state around the buggy address: [ 42.434557] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.435422] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.436242] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.437078] ^ [ 42.437726] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.438532] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.439319] ================================================================== [ 41.482971] ================================================================== [ 41.484456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 41.485279] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.487013] [ 41.487580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.488595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.489123] Hardware name: linux,dummy-virt (DT) [ 41.489736] Call trace: [ 41.490159] show_stack+0x20/0x38 (C) [ 41.490786] dump_stack_lvl+0x8c/0xd0 [ 41.491370] print_report+0x118/0x5e0 [ 41.491931] kasan_report+0xc8/0x118 [ 41.492497] kasan_check_range+0x100/0x1a8 [ 41.493071] __kasan_check_write+0x20/0x30 [ 41.493586] kasan_atomics_helper+0x7cc/0x4858 [ 41.494257] kasan_atomics+0x198/0x2e8 [ 41.494869] kunit_try_run_case+0x14c/0x3d0 [ 41.495500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.496163] kthread+0x24c/0x2d0 [ 41.496763] ret_from_fork+0x10/0x20 [ 41.497334] [ 41.497680] Allocated by task 254: [ 41.498219] kasan_save_stack+0x3c/0x68 [ 41.498828] kasan_save_track+0x20/0x40 [ 41.499286] kasan_save_alloc_info+0x40/0x58 [ 41.499911] __kasan_kmalloc+0xd4/0xd8 [ 41.500472] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.501060] kasan_atomics+0xb8/0x2e8 [ 41.501594] kunit_try_run_case+0x14c/0x3d0 [ 41.502210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.502939] kthread+0x24c/0x2d0 [ 41.503471] ret_from_fork+0x10/0x20 [ 41.504006] [ 41.504369] The buggy address belongs to the object at fff00000c65bde00 [ 41.504369] which belongs to the cache kmalloc-64 of size 64 [ 41.505537] The buggy address is located 0 bytes to the right of [ 41.505537] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.506668] [ 41.507031] The buggy address belongs to the physical page: [ 41.507737] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.508565] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.509331] page_type: f5(slab) [ 41.509884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.510682] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.511461] page dumped because: kasan: bad access detected [ 41.512077] [ 41.512456] Memory state around the buggy address: [ 41.513021] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.513822] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.514640] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.515303] ^ [ 41.515935] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.516829] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.517493] ================================================================== [ 41.163816] ================================================================== [ 41.164408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 41.165114] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.167025] [ 41.167456] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.169044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.169835] Hardware name: linux,dummy-virt (DT) [ 41.171200] Call trace: [ 41.171650] show_stack+0x20/0x38 (C) [ 41.172219] dump_stack_lvl+0x8c/0xd0 [ 41.172749] print_report+0x118/0x5e0 [ 41.173695] kasan_report+0xc8/0x118 [ 41.174377] kasan_check_range+0x100/0x1a8 [ 41.175281] __kasan_check_write+0x20/0x30 [ 41.175966] kasan_atomics_helper+0x47c/0x4858 [ 41.176714] kasan_atomics+0x198/0x2e8 [ 41.177279] kunit_try_run_case+0x14c/0x3d0 [ 41.177958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.179762] kthread+0x24c/0x2d0 [ 41.180515] ret_from_fork+0x10/0x20 [ 41.181036] [ 41.181743] Allocated by task 254: [ 41.182517] kasan_save_stack+0x3c/0x68 [ 41.183245] kasan_save_track+0x20/0x40 [ 41.183993] kasan_save_alloc_info+0x40/0x58 [ 41.184753] __kasan_kmalloc+0xd4/0xd8 [ 41.185589] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.186745] kasan_atomics+0xb8/0x2e8 [ 41.187193] kunit_try_run_case+0x14c/0x3d0 [ 41.187642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.188386] kthread+0x24c/0x2d0 [ 41.189016] ret_from_fork+0x10/0x20 [ 41.189623] [ 41.189975] The buggy address belongs to the object at fff00000c65bde00 [ 41.189975] which belongs to the cache kmalloc-64 of size 64 [ 41.191326] The buggy address is located 0 bytes to the right of [ 41.191326] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.193237] [ 41.193616] The buggy address belongs to the physical page: [ 41.194718] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.195600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.196464] page_type: f5(slab) [ 41.197078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.198289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.199157] page dumped because: kasan: bad access detected [ 41.199817] [ 41.200181] Memory state around the buggy address: [ 41.200810] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.202572] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.203459] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.204252] ^ [ 41.204911] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.205653] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.206372] ================================================================== [ 41.924968] ================================================================== [ 41.925898] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 41.926906] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.928303] [ 41.928930] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.930226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.930828] Hardware name: linux,dummy-virt (DT) [ 41.931220] Call trace: [ 41.931657] show_stack+0x20/0x38 (C) [ 41.932282] dump_stack_lvl+0x8c/0xd0 [ 41.932948] print_report+0x118/0x5e0 [ 41.933495] kasan_report+0xc8/0x118 [ 41.934012] __asan_report_load4_noabort+0x20/0x30 [ 41.934714] kasan_atomics_helper+0x3de4/0x4858 [ 41.935331] kasan_atomics+0x198/0x2e8 [ 41.935946] kunit_try_run_case+0x14c/0x3d0 [ 41.936550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.937293] kthread+0x24c/0x2d0 [ 41.937753] ret_from_fork+0x10/0x20 [ 41.938345] [ 41.938703] Allocated by task 254: [ 41.939198] kasan_save_stack+0x3c/0x68 [ 41.939815] kasan_save_track+0x20/0x40 [ 41.940372] kasan_save_alloc_info+0x40/0x58 [ 41.940938] __kasan_kmalloc+0xd4/0xd8 [ 41.941545] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.942131] kasan_atomics+0xb8/0x2e8 [ 41.942730] kunit_try_run_case+0x14c/0x3d0 [ 41.943270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.944019] kthread+0x24c/0x2d0 [ 41.944587] ret_from_fork+0x10/0x20 [ 41.945175] [ 41.945535] The buggy address belongs to the object at fff00000c65bde00 [ 41.945535] which belongs to the cache kmalloc-64 of size 64 [ 41.946731] The buggy address is located 0 bytes to the right of [ 41.946731] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.947794] [ 41.948164] The buggy address belongs to the physical page: [ 41.948896] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.949797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.950437] page_type: f5(slab) [ 41.950970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.951894] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.952658] page dumped because: kasan: bad access detected [ 41.953365] [ 41.953727] Memory state around the buggy address: [ 41.954216] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.955134] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.955811] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.956685] ^ [ 41.957275] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.958133] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.958842] ================================================================== [ 42.859309] ================================================================== [ 42.860004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 42.860876] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.861801] [ 42.862153] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.863326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.863878] Hardware name: linux,dummy-virt (DT) [ 42.864554] Call trace: [ 42.865034] show_stack+0x20/0x38 (C) [ 42.865685] dump_stack_lvl+0x8c/0xd0 [ 42.866330] print_report+0x118/0x5e0 [ 42.866981] kasan_report+0xc8/0x118 [ 42.867633] kasan_check_range+0x100/0x1a8 [ 42.868226] __kasan_check_write+0x20/0x30 [ 42.868887] kasan_atomics_helper+0x154c/0x4858 [ 42.869544] kasan_atomics+0x198/0x2e8 [ 42.870124] kunit_try_run_case+0x14c/0x3d0 [ 42.870776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.871576] kthread+0x24c/0x2d0 [ 42.872117] ret_from_fork+0x10/0x20 [ 42.872788] [ 42.873146] Allocated by task 254: [ 42.873640] kasan_save_stack+0x3c/0x68 [ 42.874253] kasan_save_track+0x20/0x40 [ 42.874829] kasan_save_alloc_info+0x40/0x58 [ 42.875516] __kasan_kmalloc+0xd4/0xd8 [ 42.876051] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.876657] kasan_atomics+0xb8/0x2e8 [ 42.877272] kunit_try_run_case+0x14c/0x3d0 [ 42.877860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.878621] kthread+0x24c/0x2d0 [ 42.879190] ret_from_fork+0x10/0x20 [ 42.879743] [ 42.880096] The buggy address belongs to the object at fff00000c65bde00 [ 42.880096] which belongs to the cache kmalloc-64 of size 64 [ 42.881317] The buggy address is located 0 bytes to the right of [ 42.881317] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.882590] [ 42.882943] The buggy address belongs to the physical page: [ 42.883676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.884563] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.885387] page_type: f5(slab) [ 42.885969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.886796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.887606] page dumped because: kasan: bad access detected [ 42.888188] [ 42.888560] Memory state around the buggy address: [ 42.889076] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.889913] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.890842] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.891578] ^ [ 42.892261] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.893072] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.893857] ================================================================== [ 42.516454] ================================================================== [ 42.517174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 42.518089] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.518902] [ 42.519321] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.520371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.520989] Hardware name: linux,dummy-virt (DT) [ 42.521651] Call trace: [ 42.522048] show_stack+0x20/0x38 (C) [ 42.522610] dump_stack_lvl+0x8c/0xd0 [ 42.523250] print_report+0x118/0x5e0 [ 42.523897] kasan_report+0xc8/0x118 [ 42.524512] kasan_check_range+0x100/0x1a8 [ 42.525044] __kasan_check_write+0x20/0x30 [ 42.525634] kasan_atomics_helper+0x1190/0x4858 [ 42.526276] kasan_atomics+0x198/0x2e8 [ 42.526927] kunit_try_run_case+0x14c/0x3d0 [ 42.527616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.528353] kthread+0x24c/0x2d0 [ 42.528917] ret_from_fork+0x10/0x20 [ 42.529571] [ 42.529931] Allocated by task 254: [ 42.530431] kasan_save_stack+0x3c/0x68 [ 42.531011] kasan_save_track+0x20/0x40 [ 42.531649] kasan_save_alloc_info+0x40/0x58 [ 42.532271] __kasan_kmalloc+0xd4/0xd8 [ 42.532886] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.533552] kasan_atomics+0xb8/0x2e8 [ 42.534151] kunit_try_run_case+0x14c/0x3d0 [ 42.534779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.535524] kthread+0x24c/0x2d0 [ 42.536015] ret_from_fork+0x10/0x20 [ 42.536629] [ 42.537010] The buggy address belongs to the object at fff00000c65bde00 [ 42.537010] which belongs to the cache kmalloc-64 of size 64 [ 42.538223] The buggy address is located 0 bytes to the right of [ 42.538223] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.539535] [ 42.539878] The buggy address belongs to the physical page: [ 42.540504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.541433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.542228] page_type: f5(slab) [ 42.542836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.543927] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.544937] page dumped because: kasan: bad access detected [ 42.545788] [ 42.546283] Memory state around the buggy address: [ 42.547007] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.548023] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.548886] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.549834] ^ [ 42.550599] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.551556] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.552530] ================================================================== [ 41.444883] ================================================================== [ 41.445712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 41.447040] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.447922] [ 41.448276] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.449372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.449935] Hardware name: linux,dummy-virt (DT) [ 41.450501] Call trace: [ 41.450925] show_stack+0x20/0x38 (C) [ 41.451571] dump_stack_lvl+0x8c/0xd0 [ 41.452183] print_report+0x118/0x5e0 [ 41.452815] kasan_report+0xc8/0x118 [ 41.453390] kasan_check_range+0x100/0x1a8 [ 41.454005] __kasan_check_write+0x20/0x30 [ 41.454649] kasan_atomics_helper+0x760/0x4858 [ 41.455383] kasan_atomics+0x198/0x2e8 [ 41.456014] kunit_try_run_case+0x14c/0x3d0 [ 41.456639] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.457294] kthread+0x24c/0x2d0 [ 41.457852] ret_from_fork+0x10/0x20 [ 41.458388] [ 41.458758] Allocated by task 254: [ 41.459198] kasan_save_stack+0x3c/0x68 [ 41.459794] kasan_save_track+0x20/0x40 [ 41.460352] kasan_save_alloc_info+0x40/0x58 [ 41.461006] __kasan_kmalloc+0xd4/0xd8 [ 41.461594] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.462243] kasan_atomics+0xb8/0x2e8 [ 41.462712] kunit_try_run_case+0x14c/0x3d0 [ 41.463326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.464305] kthread+0x24c/0x2d0 [ 41.464766] ret_from_fork+0x10/0x20 [ 41.465236] [ 41.465646] The buggy address belongs to the object at fff00000c65bde00 [ 41.465646] which belongs to the cache kmalloc-64 of size 64 [ 41.467142] The buggy address is located 0 bytes to the right of [ 41.467142] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.468675] [ 41.469058] The buggy address belongs to the physical page: [ 41.469795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.470762] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.471614] page_type: f5(slab) [ 41.472051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.472852] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.473644] page dumped because: kasan: bad access detected [ 41.474247] [ 41.474597] Memory state around the buggy address: [ 41.475256] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.476073] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.476964] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.477862] ^ [ 41.478492] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.479374] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.480175] ================================================================== [ 40.983038] ================================================================== [ 40.983773] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 40.985953] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.986568] [ 40.986874] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.988028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.988603] Hardware name: linux,dummy-virt (DT) [ 40.989177] Call trace: [ 40.989588] show_stack+0x20/0x38 (C) [ 40.990645] dump_stack_lvl+0x8c/0xd0 [ 40.991288] print_report+0x118/0x5e0 [ 40.991792] kasan_report+0xc8/0x118 [ 40.992316] kasan_check_range+0x100/0x1a8 [ 40.992864] __kasan_check_write+0x20/0x30 [ 40.994680] kasan_atomics_helper+0x32c/0x4858 [ 40.995855] kasan_atomics+0x198/0x2e8 [ 40.996637] kunit_try_run_case+0x14c/0x3d0 [ 40.997579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.998137] kthread+0x24c/0x2d0 [ 40.999579] ret_from_fork+0x10/0x20 [ 41.000470] [ 41.000837] Allocated by task 254: [ 41.001381] kasan_save_stack+0x3c/0x68 [ 41.002260] kasan_save_track+0x20/0x40 [ 41.002674] kasan_save_alloc_info+0x40/0x58 [ 41.003494] __kasan_kmalloc+0xd4/0xd8 [ 41.004023] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.005008] kasan_atomics+0xb8/0x2e8 [ 41.005836] kunit_try_run_case+0x14c/0x3d0 [ 41.007570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.008437] kthread+0x24c/0x2d0 [ 41.008980] ret_from_fork+0x10/0x20 [ 41.010027] [ 41.010234] The buggy address belongs to the object at fff00000c65bde00 [ 41.010234] which belongs to the cache kmalloc-64 of size 64 [ 41.011496] The buggy address is located 0 bytes to the right of [ 41.011496] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.012746] [ 41.013088] The buggy address belongs to the physical page: [ 41.014111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.015148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.016293] page_type: f5(slab) [ 41.017670] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.019149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.020077] page dumped because: kasan: bad access detected [ 41.020792] [ 41.021143] Memory state around the buggy address: [ 41.022668] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.023033] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.023377] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.024031] ^ [ 41.025161] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.026509] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.027269] ================================================================== [ 41.960944] ================================================================== [ 41.961832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 41.962631] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.963390] [ 41.963765] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.964750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.965382] Hardware name: linux,dummy-virt (DT) [ 41.965928] Call trace: [ 41.966359] show_stack+0x20/0x38 (C) [ 41.967012] dump_stack_lvl+0x8c/0xd0 [ 41.967636] print_report+0x118/0x5e0 [ 41.968194] kasan_report+0xc8/0x118 [ 41.968720] kasan_check_range+0x100/0x1a8 [ 41.969374] __kasan_check_write+0x20/0x30 [ 41.969984] kasan_atomics_helper+0xca0/0x4858 [ 41.970676] kasan_atomics+0x198/0x2e8 [ 41.971281] kunit_try_run_case+0x14c/0x3d0 [ 41.971895] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.972611] kthread+0x24c/0x2d0 [ 41.973174] ret_from_fork+0x10/0x20 [ 41.973803] [ 41.974126] Allocated by task 254: [ 41.974616] kasan_save_stack+0x3c/0x68 [ 41.975252] kasan_save_track+0x20/0x40 [ 41.975748] kasan_save_alloc_info+0x40/0x58 [ 41.976382] __kasan_kmalloc+0xd4/0xd8 [ 41.976861] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.977518] kasan_atomics+0xb8/0x2e8 [ 41.978095] kunit_try_run_case+0x14c/0x3d0 [ 41.978680] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.979410] kthread+0x24c/0x2d0 [ 41.979953] ret_from_fork+0x10/0x20 [ 41.980721] [ 41.981085] The buggy address belongs to the object at fff00000c65bde00 [ 41.981085] which belongs to the cache kmalloc-64 of size 64 [ 41.982070] The buggy address is located 0 bytes to the right of [ 41.982070] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.983197] [ 41.983558] The buggy address belongs to the physical page: [ 41.984228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.985139] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.985872] page_type: f5(slab) [ 41.986412] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.987189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.988059] page dumped because: kasan: bad access detected [ 41.988682] [ 41.989030] Memory state around the buggy address: [ 41.989657] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.990393] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.991236] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.991938] ^ [ 41.992564] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.993422] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.994094] ================================================================== [ 41.119030] ================================================================== [ 41.119743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 41.120707] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.122257] [ 41.122657] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.123672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.124181] Hardware name: linux,dummy-virt (DT) [ 41.125707] Call trace: [ 41.126564] show_stack+0x20/0x38 (C) [ 41.127311] dump_stack_lvl+0x8c/0xd0 [ 41.127950] print_report+0x118/0x5e0 [ 41.128582] kasan_report+0xc8/0x118 [ 41.129133] kasan_check_range+0x100/0x1a8 [ 41.129738] __kasan_check_write+0x20/0x30 [ 41.130382] kasan_atomics_helper+0x414/0x4858 [ 41.130945] kasan_atomics+0x198/0x2e8 [ 41.132164] kunit_try_run_case+0x14c/0x3d0 [ 41.132663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.133641] kthread+0x24c/0x2d0 [ 41.134479] ret_from_fork+0x10/0x20 [ 41.135247] [ 41.135650] Allocated by task 254: [ 41.136204] kasan_save_stack+0x3c/0x68 [ 41.136850] kasan_save_track+0x20/0x40 [ 41.137635] kasan_save_alloc_info+0x40/0x58 [ 41.138603] __kasan_kmalloc+0xd4/0xd8 [ 41.139213] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.140396] kasan_atomics+0xb8/0x2e8 [ 41.140961] kunit_try_run_case+0x14c/0x3d0 [ 41.141761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.142836] kthread+0x24c/0x2d0 [ 41.143638] ret_from_fork+0x10/0x20 [ 41.144420] [ 41.144909] The buggy address belongs to the object at fff00000c65bde00 [ 41.144909] which belongs to the cache kmalloc-64 of size 64 [ 41.146483] The buggy address is located 0 bytes to the right of [ 41.146483] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.148266] [ 41.148642] The buggy address belongs to the physical page: [ 41.149605] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.150486] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.151207] page_type: f5(slab) [ 41.152048] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.153120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.154194] page dumped because: kasan: bad access detected [ 41.155055] [ 41.155322] Memory state around the buggy address: [ 41.156075] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.157481] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.158553] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.159306] ^ [ 41.159827] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.160714] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.161540] ================================================================== [ 43.006795] ================================================================== [ 43.007488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 43.008335] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.009138] [ 43.009519] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.010574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.010999] Hardware name: linux,dummy-virt (DT) [ 43.011624] Call trace: [ 43.012009] show_stack+0x20/0x38 (C) [ 43.012632] dump_stack_lvl+0x8c/0xd0 [ 43.013242] print_report+0x118/0x5e0 [ 43.013859] kasan_report+0xc8/0x118 [ 43.014374] __asan_report_load8_noabort+0x20/0x30 [ 43.015079] kasan_atomics_helper+0x3df4/0x4858 [ 43.015653] kasan_atomics+0x198/0x2e8 [ 43.016251] kunit_try_run_case+0x14c/0x3d0 [ 43.016812] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.017567] kthread+0x24c/0x2d0 [ 43.018021] ret_from_fork+0x10/0x20 [ 43.018649] [ 43.018999] Allocated by task 254: [ 43.019516] kasan_save_stack+0x3c/0x68 [ 43.020075] kasan_save_track+0x20/0x40 [ 43.020594] kasan_save_alloc_info+0x40/0x58 [ 43.021209] __kasan_kmalloc+0xd4/0xd8 [ 43.021732] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.022377] kasan_atomics+0xb8/0x2e8 [ 43.022917] kunit_try_run_case+0x14c/0x3d0 [ 43.023409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.024163] kthread+0x24c/0x2d0 [ 43.024639] ret_from_fork+0x10/0x20 [ 43.025245] [ 43.025613] The buggy address belongs to the object at fff00000c65bde00 [ 43.025613] which belongs to the cache kmalloc-64 of size 64 [ 43.026716] The buggy address is located 0 bytes to the right of [ 43.026716] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.027965] [ 43.028284] The buggy address belongs to the physical page: [ 43.028992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.029743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.030581] page_type: f5(slab) [ 43.031113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.031876] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.032676] page dumped because: kasan: bad access detected [ 43.033362] [ 43.033702] Memory state around the buggy address: [ 43.034262] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.035138] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.035860] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.036718] ^ [ 43.037217] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.038091] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.038792] ================================================================== [ 42.478546] ================================================================== [ 42.479680] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 42.480534] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.481094] [ 42.481400] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.482571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.483218] Hardware name: linux,dummy-virt (DT) [ 42.483846] Call trace: [ 42.484329] show_stack+0x20/0x38 (C) [ 42.485009] dump_stack_lvl+0x8c/0xd0 [ 42.485677] print_report+0x118/0x5e0 [ 42.486279] kasan_report+0xc8/0x118 [ 42.486967] kasan_check_range+0x100/0x1a8 [ 42.487624] __kasan_check_write+0x20/0x30 [ 42.488181] kasan_atomics_helper+0x1128/0x4858 [ 42.488911] kasan_atomics+0x198/0x2e8 [ 42.489527] kunit_try_run_case+0x14c/0x3d0 [ 42.490221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.491008] kthread+0x24c/0x2d0 [ 42.491605] ret_from_fork+0x10/0x20 [ 42.492246] [ 42.492620] Allocated by task 254: [ 42.493180] kasan_save_stack+0x3c/0x68 [ 42.493779] kasan_save_track+0x20/0x40 [ 42.494298] kasan_save_alloc_info+0x40/0x58 [ 42.495081] __kasan_kmalloc+0xd4/0xd8 [ 42.495976] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.496603] kasan_atomics+0xb8/0x2e8 [ 42.496862] kunit_try_run_case+0x14c/0x3d0 [ 42.497121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.497410] kthread+0x24c/0x2d0 [ 42.497820] ret_from_fork+0x10/0x20 [ 42.498221] [ 42.499115] The buggy address belongs to the object at fff00000c65bde00 [ 42.499115] which belongs to the cache kmalloc-64 of size 64 [ 42.500657] The buggy address is located 0 bytes to the right of [ 42.500657] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.501969] [ 42.502326] The buggy address belongs to the physical page: [ 42.502922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.503838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.504639] page_type: f5(slab) [ 42.505246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.506102] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.506988] page dumped because: kasan: bad access detected [ 42.507670] [ 42.508025] Memory state around the buggy address: [ 42.508717] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.509634] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.510489] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.511269] ^ [ 42.511891] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.512722] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.513507] ================================================================== [ 40.760319] ================================================================== [ 40.760940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 40.762423] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.763291] [ 40.763662] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.764901] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.766117] Hardware name: linux,dummy-virt (DT) [ 40.766701] Call trace: [ 40.767173] show_stack+0x20/0x38 (C) [ 40.767800] dump_stack_lvl+0x8c/0xd0 [ 40.768394] print_report+0x118/0x5e0 [ 40.768891] kasan_report+0xc8/0x118 [ 40.769790] __asan_report_store4_noabort+0x20/0x30 [ 40.770634] kasan_atomics_helper+0x3f7c/0x4858 [ 40.771138] kasan_atomics+0x198/0x2e8 [ 40.772144] kunit_try_run_case+0x14c/0x3d0 [ 40.772699] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.774237] kthread+0x24c/0x2d0 [ 40.774864] ret_from_fork+0x10/0x20 [ 40.775468] [ 40.775842] Allocated by task 254: [ 40.776366] kasan_save_stack+0x3c/0x68 [ 40.776979] kasan_save_track+0x20/0x40 [ 40.777623] kasan_save_alloc_info+0x40/0x58 [ 40.778741] __kasan_kmalloc+0xd4/0xd8 [ 40.779953] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.780537] kasan_atomics+0xb8/0x2e8 [ 40.781014] kunit_try_run_case+0x14c/0x3d0 [ 40.782029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.782844] kthread+0x24c/0x2d0 [ 40.783516] ret_from_fork+0x10/0x20 [ 40.784200] [ 40.784726] The buggy address belongs to the object at fff00000c65bde00 [ 40.784726] which belongs to the cache kmalloc-64 of size 64 [ 40.786982] The buggy address is located 0 bytes to the right of [ 40.786982] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.788629] [ 40.788918] The buggy address belongs to the physical page: [ 40.790003] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.791010] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.791991] page_type: f5(slab) [ 40.792703] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.794038] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.794957] page dumped because: kasan: bad access detected [ 40.795731] [ 40.796313] Memory state around the buggy address: [ 40.797148] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.798512] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.799521] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.800325] ^ [ 40.800955] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.801939] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.802705] ================================================================== [ 43.083055] ================================================================== [ 43.083767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 43.084599] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.086896] [ 43.087201] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.088255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.088804] Hardware name: linux,dummy-virt (DT) [ 43.089331] Call trace: [ 43.089735] show_stack+0x20/0x38 (C) [ 43.090345] dump_stack_lvl+0x8c/0xd0 [ 43.090957] print_report+0x118/0x5e0 [ 43.091495] kasan_report+0xc8/0x118 [ 43.092078] __asan_report_load8_noabort+0x20/0x30 [ 43.092773] kasan_atomics_helper+0x3e10/0x4858 [ 43.093465] kasan_atomics+0x198/0x2e8 [ 43.094062] kunit_try_run_case+0x14c/0x3d0 [ 43.094684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.095299] kthread+0x24c/0x2d0 [ 43.095882] ret_from_fork+0x10/0x20 [ 43.096419] [ 43.096778] Allocated by task 254: [ 43.097290] kasan_save_stack+0x3c/0x68 [ 43.097876] kasan_save_track+0x20/0x40 [ 43.098491] kasan_save_alloc_info+0x40/0x58 [ 43.099108] __kasan_kmalloc+0xd4/0xd8 [ 43.099660] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.100262] kasan_atomics+0xb8/0x2e8 [ 43.100843] kunit_try_run_case+0x14c/0x3d0 [ 43.101474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.102139] kthread+0x24c/0x2d0 [ 43.102580] ret_from_fork+0x10/0x20 [ 43.103152] [ 43.103504] The buggy address belongs to the object at fff00000c65bde00 [ 43.103504] which belongs to the cache kmalloc-64 of size 64 [ 43.104665] The buggy address is located 0 bytes to the right of [ 43.104665] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.105914] [ 43.106237] The buggy address belongs to the physical page: [ 43.106951] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.107871] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.108572] page_type: f5(slab) [ 43.108996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.109907] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.110810] page dumped because: kasan: bad access detected [ 43.111535] [ 43.111875] Memory state around the buggy address: [ 43.112463] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.113248] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.114034] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.114787] ^ [ 43.115338] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.116099] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.116784] ================================================================== [ 41.359590] ================================================================== [ 41.360631] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 41.362233] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.364083] [ 41.364639] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.365978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.366551] Hardware name: linux,dummy-virt (DT) [ 41.367102] Call trace: [ 41.367472] show_stack+0x20/0x38 (C) [ 41.368000] dump_stack_lvl+0x8c/0xd0 [ 41.369277] print_report+0x118/0x5e0 [ 41.369821] kasan_report+0xc8/0x118 [ 41.370329] kasan_check_range+0x100/0x1a8 [ 41.370870] __kasan_check_write+0x20/0x30 [ 41.371397] kasan_atomics_helper+0x684/0x4858 [ 41.372605] kasan_atomics+0x198/0x2e8 [ 41.373197] kunit_try_run_case+0x14c/0x3d0 [ 41.373844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.374872] kthread+0x24c/0x2d0 [ 41.375610] ret_from_fork+0x10/0x20 [ 41.376334] [ 41.376677] Allocated by task 254: [ 41.377471] kasan_save_stack+0x3c/0x68 [ 41.378041] kasan_save_track+0x20/0x40 [ 41.378847] kasan_save_alloc_info+0x40/0x58 [ 41.379615] __kasan_kmalloc+0xd4/0xd8 [ 41.380327] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.380964] kasan_atomics+0xb8/0x2e8 [ 41.381757] kunit_try_run_case+0x14c/0x3d0 [ 41.382557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.383412] kthread+0x24c/0x2d0 [ 41.383930] ret_from_fork+0x10/0x20 [ 41.384745] [ 41.385260] The buggy address belongs to the object at fff00000c65bde00 [ 41.385260] which belongs to the cache kmalloc-64 of size 64 [ 41.386724] The buggy address is located 0 bytes to the right of [ 41.386724] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.388278] [ 41.388641] The buggy address belongs to the physical page: [ 41.389556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.390595] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.391368] page_type: f5(slab) [ 41.392162] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.393216] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.394216] page dumped because: kasan: bad access detected [ 41.394989] [ 41.395337] Memory state around the buggy address: [ 41.396257] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.397102] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.398122] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.399085] ^ [ 41.399889] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.400867] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.401699] ================================================================== [ 42.440962] ================================================================== [ 42.441495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 42.442943] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.443889] [ 42.444328] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.445539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.446104] Hardware name: linux,dummy-virt (DT) [ 42.446648] Call trace: [ 42.447148] show_stack+0x20/0x38 (C) [ 42.447863] dump_stack_lvl+0x8c/0xd0 [ 42.448468] print_report+0x118/0x5e0 [ 42.449118] kasan_report+0xc8/0x118 [ 42.449768] kasan_check_range+0x100/0x1a8 [ 42.450399] __kasan_check_write+0x20/0x30 [ 42.451075] kasan_atomics_helper+0x10c0/0x4858 [ 42.451736] kasan_atomics+0x198/0x2e8 [ 42.452419] kunit_try_run_case+0x14c/0x3d0 [ 42.453087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.453888] kthread+0x24c/0x2d0 [ 42.454400] ret_from_fork+0x10/0x20 [ 42.455015] [ 42.455395] Allocated by task 254: [ 42.455953] kasan_save_stack+0x3c/0x68 [ 42.456601] kasan_save_track+0x20/0x40 [ 42.457135] kasan_save_alloc_info+0x40/0x58 [ 42.457784] __kasan_kmalloc+0xd4/0xd8 [ 42.458309] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.459010] kasan_atomics+0xb8/0x2e8 [ 42.459499] kunit_try_run_case+0x14c/0x3d0 [ 42.460159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.460863] kthread+0x24c/0x2d0 [ 42.461410] ret_from_fork+0x10/0x20 [ 42.461947] [ 42.462320] The buggy address belongs to the object at fff00000c65bde00 [ 42.462320] which belongs to the cache kmalloc-64 of size 64 [ 42.463591] The buggy address is located 0 bytes to the right of [ 42.463591] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.464943] [ 42.465306] The buggy address belongs to the physical page: [ 42.465897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.466864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.467642] page_type: f5(slab) [ 42.468152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.469057] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.469932] page dumped because: kasan: bad access detected [ 42.470588] [ 42.470960] Memory state around the buggy address: [ 42.471654] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.472387] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.473238] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.473985] ^ [ 42.474603] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.475514] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.476301] ================================================================== [ 40.806077] ================================================================== [ 40.806900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 40.807636] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.808201] [ 40.808654] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.809810] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.810746] Hardware name: linux,dummy-virt (DT) [ 40.811225] Call trace: [ 40.812680] show_stack+0x20/0x38 (C) [ 40.813360] dump_stack_lvl+0x8c/0xd0 [ 40.814305] print_report+0x118/0x5e0 [ 40.815191] kasan_report+0xc8/0x118 [ 40.815760] kasan_check_range+0x100/0x1a8 [ 40.816435] __kasan_check_read+0x20/0x30 [ 40.817034] kasan_atomics_helper+0x1ec/0x4858 [ 40.817949] kasan_atomics+0x198/0x2e8 [ 40.818468] kunit_try_run_case+0x14c/0x3d0 [ 40.819336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.820347] kthread+0x24c/0x2d0 [ 40.821093] ret_from_fork+0x10/0x20 [ 40.821900] [ 40.822247] Allocated by task 254: [ 40.823117] kasan_save_stack+0x3c/0x68 [ 40.823686] kasan_save_track+0x20/0x40 [ 40.824324] kasan_save_alloc_info+0x40/0x58 [ 40.824894] __kasan_kmalloc+0xd4/0xd8 [ 40.825809] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.826526] kasan_atomics+0xb8/0x2e8 [ 40.828006] kunit_try_run_case+0x14c/0x3d0 [ 40.828623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.828947] kthread+0x24c/0x2d0 [ 40.829173] ret_from_fork+0x10/0x20 [ 40.829615] [ 40.830028] The buggy address belongs to the object at fff00000c65bde00 [ 40.830028] which belongs to the cache kmalloc-64 of size 64 [ 40.831599] The buggy address is located 0 bytes to the right of [ 40.831599] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.832955] [ 40.833539] The buggy address belongs to the physical page: [ 40.834662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.835364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.836273] page_type: f5(slab) [ 40.836769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.837807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.838971] page dumped because: kasan: bad access detected [ 40.839285] [ 40.839436] Memory state around the buggy address: [ 40.840335] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.841198] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.842313] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.843528] ^ [ 40.844154] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.844898] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.846040] ================================================================== [ 42.367908] ================================================================== [ 42.368872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 42.369640] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.370435] [ 42.370847] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.371938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.372540] Hardware name: linux,dummy-virt (DT) [ 42.373099] Call trace: [ 42.373507] show_stack+0x20/0x38 (C) [ 42.374134] dump_stack_lvl+0x8c/0xd0 [ 42.374664] print_report+0x118/0x5e0 [ 42.375263] kasan_report+0xc8/0x118 [ 42.375828] kasan_check_range+0x100/0x1a8 [ 42.376469] __kasan_check_write+0x20/0x30 [ 42.377109] kasan_atomics_helper+0xff0/0x4858 [ 42.377793] kasan_atomics+0x198/0x2e8 [ 42.378325] kunit_try_run_case+0x14c/0x3d0 [ 42.379053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.379837] kthread+0x24c/0x2d0 [ 42.380460] ret_from_fork+0x10/0x20 [ 42.381033] [ 42.381340] Allocated by task 254: [ 42.381881] kasan_save_stack+0x3c/0x68 [ 42.382430] kasan_save_track+0x20/0x40 [ 42.383000] kasan_save_alloc_info+0x40/0x58 [ 42.383643] __kasan_kmalloc+0xd4/0xd8 [ 42.384256] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.384926] kasan_atomics+0xb8/0x2e8 [ 42.385539] kunit_try_run_case+0x14c/0x3d0 [ 42.386172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.386844] kthread+0x24c/0x2d0 [ 42.387372] ret_from_fork+0x10/0x20 [ 42.387980] [ 42.388350] The buggy address belongs to the object at fff00000c65bde00 [ 42.388350] which belongs to the cache kmalloc-64 of size 64 [ 42.389355] The buggy address is located 0 bytes to the right of [ 42.389355] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.390787] [ 42.391151] The buggy address belongs to the physical page: [ 42.391882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.392690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.393464] page_type: f5(slab) [ 42.394007] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.394966] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.395760] page dumped because: kasan: bad access detected [ 42.396476] [ 42.396820] Memory state around the buggy address: [ 42.397401] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.398251] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.398988] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.399860] ^ [ 42.400514] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.401358] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.402022] ================================================================== [ 42.635123] ================================================================== [ 42.635879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 42.636793] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.637682] [ 42.638148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.639275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.639882] Hardware name: linux,dummy-virt (DT) [ 42.640507] Call trace: [ 42.640988] show_stack+0x20/0x38 (C) [ 42.641665] dump_stack_lvl+0x8c/0xd0 [ 42.642318] print_report+0x118/0x5e0 [ 42.643001] kasan_report+0xc8/0x118 [ 42.643564] kasan_check_range+0x100/0x1a8 [ 42.644282] __kasan_check_write+0x20/0x30 [ 42.644914] kasan_atomics_helper+0x12d8/0x4858 [ 42.645586] kasan_atomics+0x198/0x2e8 [ 42.646247] kunit_try_run_case+0x14c/0x3d0 [ 42.646949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.647672] kthread+0x24c/0x2d0 [ 42.648302] ret_from_fork+0x10/0x20 [ 42.648956] [ 42.649351] Allocated by task 254: [ 42.649941] kasan_save_stack+0x3c/0x68 [ 42.650500] kasan_save_track+0x20/0x40 [ 42.651151] kasan_save_alloc_info+0x40/0x58 [ 42.651752] __kasan_kmalloc+0xd4/0xd8 [ 42.652254] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.652834] kasan_atomics+0xb8/0x2e8 [ 42.653397] kunit_try_run_case+0x14c/0x3d0 [ 42.654071] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.654808] kthread+0x24c/0x2d0 [ 42.655364] ret_from_fork+0x10/0x20 [ 42.656041] [ 42.656357] The buggy address belongs to the object at fff00000c65bde00 [ 42.656357] which belongs to the cache kmalloc-64 of size 64 [ 42.657810] The buggy address is located 0 bytes to the right of [ 42.657810] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.659023] [ 42.659481] The buggy address belongs to the physical page: [ 42.660241] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.661160] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.661992] page_type: f5(slab) [ 42.662598] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.663416] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.664405] page dumped because: kasan: bad access detected [ 42.665061] [ 42.665467] Memory state around the buggy address: [ 42.666112] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.666893] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.667720] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.668555] ^ [ 42.669220] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.670059] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.670869] ================================================================== [ 42.106758] ================================================================== [ 42.107542] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 42.108937] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.109848] [ 42.110150] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.111101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.112600] Hardware name: linux,dummy-virt (DT) [ 42.113329] Call trace: [ 42.113748] show_stack+0x20/0x38 (C) [ 42.114316] dump_stack_lvl+0x8c/0xd0 [ 42.114918] print_report+0x118/0x5e0 [ 42.115425] kasan_report+0xc8/0x118 [ 42.116048] kasan_check_range+0x100/0x1a8 [ 42.116740] __kasan_check_read+0x20/0x30 [ 42.117262] kasan_atomics_helper+0xdd4/0x4858 [ 42.117795] kasan_atomics+0x198/0x2e8 [ 42.118255] kunit_try_run_case+0x14c/0x3d0 [ 42.119306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.120327] kthread+0x24c/0x2d0 [ 42.120805] ret_from_fork+0x10/0x20 [ 42.121402] [ 42.121741] Allocated by task 254: [ 42.122263] kasan_save_stack+0x3c/0x68 [ 42.122804] kasan_save_track+0x20/0x40 [ 42.123420] kasan_save_alloc_info+0x40/0x58 [ 42.124023] __kasan_kmalloc+0xd4/0xd8 [ 42.124609] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.125170] kasan_atomics+0xb8/0x2e8 [ 42.125660] kunit_try_run_case+0x14c/0x3d0 [ 42.126308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.126987] kthread+0x24c/0x2d0 [ 42.127553] ret_from_fork+0x10/0x20 [ 42.128090] [ 42.128460] The buggy address belongs to the object at fff00000c65bde00 [ 42.128460] which belongs to the cache kmalloc-64 of size 64 [ 42.129503] The buggy address is located 0 bytes to the right of [ 42.129503] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.130855] [ 42.131205] The buggy address belongs to the physical page: [ 42.131808] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.132813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.133429] page_type: f5(slab) [ 42.133967] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.134892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.135787] page dumped because: kasan: bad access detected [ 42.136355] [ 42.136729] Memory state around the buggy address: [ 42.137373] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.138133] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.139006] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.139798] ^ [ 42.140360] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.141175] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.141867] ================================================================== [ 41.626952] ================================================================== [ 41.627714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 41.628578] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.629358] [ 41.629723] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.630839] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.631411] Hardware name: linux,dummy-virt (DT) [ 41.632088] Call trace: [ 41.632467] show_stack+0x20/0x38 (C) [ 41.633097] dump_stack_lvl+0x8c/0xd0 [ 41.633737] print_report+0x118/0x5e0 [ 41.634223] kasan_report+0xc8/0x118 [ 41.634846] kasan_check_range+0x100/0x1a8 [ 41.635406] __kasan_check_write+0x20/0x30 [ 41.636107] kasan_atomics_helper+0x99c/0x4858 [ 41.636741] kasan_atomics+0x198/0x2e8 [ 41.637348] kunit_try_run_case+0x14c/0x3d0 [ 41.637959] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.638725] kthread+0x24c/0x2d0 [ 41.639196] ret_from_fork+0x10/0x20 [ 41.639819] [ 41.640173] Allocated by task 254: [ 41.640698] kasan_save_stack+0x3c/0x68 [ 41.641227] kasan_save_track+0x20/0x40 [ 41.641862] kasan_save_alloc_info+0x40/0x58 [ 41.642463] __kasan_kmalloc+0xd4/0xd8 [ 41.643043] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.643674] kasan_atomics+0xb8/0x2e8 [ 41.644254] kunit_try_run_case+0x14c/0x3d0 [ 41.644839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.645496] kthread+0x24c/0x2d0 [ 41.646034] ret_from_fork+0x10/0x20 [ 41.646607] [ 41.646947] The buggy address belongs to the object at fff00000c65bde00 [ 41.646947] which belongs to the cache kmalloc-64 of size 64 [ 41.648051] The buggy address is located 0 bytes to the right of [ 41.648051] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.649357] [ 41.649721] The buggy address belongs to the physical page: [ 41.650336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.651292] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.652043] page_type: f5(slab) [ 41.652521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.653484] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.654331] page dumped because: kasan: bad access detected [ 41.655109] [ 41.655726] Memory state around the buggy address: [ 41.656419] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.657192] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.657987] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.658848] ^ [ 41.659469] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.660213] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.660921] ================================================================== [ 42.933120] ================================================================== [ 42.934961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 42.935802] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.936750] [ 42.937144] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.938277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.938904] Hardware name: linux,dummy-virt (DT) [ 42.939524] Call trace: [ 42.939894] show_stack+0x20/0x38 (C) [ 42.940396] dump_stack_lvl+0x8c/0xd0 [ 42.941037] print_report+0x118/0x5e0 [ 42.941603] kasan_report+0xc8/0x118 [ 42.942301] __asan_report_load8_noabort+0x20/0x30 [ 42.943049] kasan_atomics_helper+0x3db0/0x4858 [ 42.943803] kasan_atomics+0x198/0x2e8 [ 42.944472] kunit_try_run_case+0x14c/0x3d0 [ 42.945108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.945915] kthread+0x24c/0x2d0 [ 42.946512] ret_from_fork+0x10/0x20 [ 42.947132] [ 42.947513] Allocated by task 254: [ 42.948075] kasan_save_stack+0x3c/0x68 [ 42.948670] kasan_save_track+0x20/0x40 [ 42.949322] kasan_save_alloc_info+0x40/0x58 [ 42.949989] __kasan_kmalloc+0xd4/0xd8 [ 42.950595] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.951262] kasan_atomics+0xb8/0x2e8 [ 42.951855] kunit_try_run_case+0x14c/0x3d0 [ 42.952513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.953270] kthread+0x24c/0x2d0 [ 42.953829] ret_from_fork+0x10/0x20 [ 42.954425] [ 42.954826] The buggy address belongs to the object at fff00000c65bde00 [ 42.954826] which belongs to the cache kmalloc-64 of size 64 [ 42.956215] The buggy address is located 0 bytes to the right of [ 42.956215] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.957611] [ 42.958033] The buggy address belongs to the physical page: [ 42.958722] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.959747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.960459] page_type: f5(slab) [ 42.960879] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.961676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.962511] page dumped because: kasan: bad access detected [ 42.963276] [ 42.963708] Memory state around the buggy address: [ 42.964377] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.965211] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.966062] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.966906] ^ [ 42.967542] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.968278] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.968998] ================================================================== [ 42.183525] ================================================================== [ 42.184264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 42.185054] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.185742] [ 42.186227] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.187510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.188053] Hardware name: linux,dummy-virt (DT) [ 42.188708] Call trace: [ 42.189217] show_stack+0x20/0x38 (C) [ 42.189927] dump_stack_lvl+0x8c/0xd0 [ 42.190631] print_report+0x118/0x5e0 [ 42.191380] kasan_report+0xc8/0x118 [ 42.192190] kasan_check_range+0x100/0x1a8 [ 42.192885] __kasan_check_write+0x20/0x30 [ 42.193188] kasan_atomics_helper+0xe44/0x4858 [ 42.193552] kasan_atomics+0x198/0x2e8 [ 42.194371] kunit_try_run_case+0x14c/0x3d0 [ 42.195076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.195840] kthread+0x24c/0x2d0 [ 42.196382] ret_from_fork+0x10/0x20 [ 42.197084] [ 42.197405] Allocated by task 254: [ 42.197903] kasan_save_stack+0x3c/0x68 [ 42.198422] kasan_save_track+0x20/0x40 [ 42.199048] kasan_save_alloc_info+0x40/0x58 [ 42.199650] __kasan_kmalloc+0xd4/0xd8 [ 42.200174] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.200864] kasan_atomics+0xb8/0x2e8 [ 42.201359] kunit_try_run_case+0x14c/0x3d0 [ 42.202025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.202646] kthread+0x24c/0x2d0 [ 42.203192] ret_from_fork+0x10/0x20 [ 42.203807] [ 42.204162] The buggy address belongs to the object at fff00000c65bde00 [ 42.204162] which belongs to the cache kmalloc-64 of size 64 [ 42.205217] The buggy address is located 0 bytes to the right of [ 42.205217] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.206643] [ 42.207004] The buggy address belongs to the physical page: [ 42.207613] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.208568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.209410] page_type: f5(slab) [ 42.209996] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.210938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.211797] page dumped because: kasan: bad access detected [ 42.212460] [ 42.212800] Memory state around the buggy address: [ 42.213290] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.214138] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.215007] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.215772] ^ [ 42.216455] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.217193] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.218113] ================================================================== [ 41.208629] ================================================================== [ 41.209234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 41.210312] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.212204] [ 41.212716] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.214163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.214777] Hardware name: linux,dummy-virt (DT) [ 41.215544] Call trace: [ 41.216003] show_stack+0x20/0x38 (C) [ 41.216686] dump_stack_lvl+0x8c/0xd0 [ 41.217419] print_report+0x118/0x5e0 [ 41.217916] kasan_report+0xc8/0x118 [ 41.218566] kasan_check_range+0x100/0x1a8 [ 41.219209] __kasan_check_write+0x20/0x30 [ 41.219872] kasan_atomics_helper+0x4e4/0x4858 [ 41.220598] kasan_atomics+0x198/0x2e8 [ 41.221320] kunit_try_run_case+0x14c/0x3d0 [ 41.222032] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.222906] kthread+0x24c/0x2d0 [ 41.223494] ret_from_fork+0x10/0x20 [ 41.224056] [ 41.224343] Allocated by task 254: [ 41.224919] kasan_save_stack+0x3c/0x68 [ 41.225414] kasan_save_track+0x20/0x40 [ 41.226026] kasan_save_alloc_info+0x40/0x58 [ 41.226640] __kasan_kmalloc+0xd4/0xd8 [ 41.227101] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.227627] kasan_atomics+0xb8/0x2e8 [ 41.228204] kunit_try_run_case+0x14c/0x3d0 [ 41.228848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.229630] kthread+0x24c/0x2d0 [ 41.230079] ret_from_fork+0x10/0x20 [ 41.230647] [ 41.230975] The buggy address belongs to the object at fff00000c65bde00 [ 41.230975] which belongs to the cache kmalloc-64 of size 64 [ 41.231964] The buggy address is located 0 bytes to the right of [ 41.231964] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.233124] [ 41.233557] The buggy address belongs to the physical page: [ 41.234265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.235306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.235986] page_type: f5(slab) [ 41.236537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.237371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.238277] page dumped because: kasan: bad access detected [ 41.238971] [ 41.239261] Memory state around the buggy address: [ 41.239887] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.240814] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.241490] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.242331] ^ [ 41.243027] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.243781] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.244601] ================================================================== [ 41.071888] ================================================================== [ 41.072716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 41.074328] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.075331] [ 41.075718] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.077566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.078109] Hardware name: linux,dummy-virt (DT) [ 41.078978] Call trace: [ 41.079692] show_stack+0x20/0x38 (C) [ 41.080276] dump_stack_lvl+0x8c/0xd0 [ 41.080954] print_report+0x118/0x5e0 [ 41.082594] kasan_report+0xc8/0x118 [ 41.083133] kasan_check_range+0x100/0x1a8 [ 41.083749] __kasan_check_write+0x20/0x30 [ 41.084326] kasan_atomics_helper+0x3ac/0x4858 [ 41.084995] kasan_atomics+0x198/0x2e8 [ 41.086133] kunit_try_run_case+0x14c/0x3d0 [ 41.086761] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.087513] kthread+0x24c/0x2d0 [ 41.088225] ret_from_fork+0x10/0x20 [ 41.088940] [ 41.089376] Allocated by task 254: [ 41.090034] kasan_save_stack+0x3c/0x68 [ 41.090635] kasan_save_track+0x20/0x40 [ 41.091139] kasan_save_alloc_info+0x40/0x58 [ 41.092611] __kasan_kmalloc+0xd4/0xd8 [ 41.093118] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.093786] kasan_atomics+0xb8/0x2e8 [ 41.094615] kunit_try_run_case+0x14c/0x3d0 [ 41.095633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.096479] kthread+0x24c/0x2d0 [ 41.097034] ret_from_fork+0x10/0x20 [ 41.097916] [ 41.098461] The buggy address belongs to the object at fff00000c65bde00 [ 41.098461] which belongs to the cache kmalloc-64 of size 64 [ 41.099899] The buggy address is located 0 bytes to the right of [ 41.099899] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.102408] [ 41.102715] The buggy address belongs to the physical page: [ 41.103573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.104599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.105559] page_type: f5(slab) [ 41.107171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.108101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.108952] page dumped because: kasan: bad access detected [ 41.109989] [ 41.110197] Memory state around the buggy address: [ 41.110494] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.111216] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.112831] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.113794] ^ [ 41.114639] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.115569] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.116109] ================================================================== [ 41.284590] ================================================================== [ 41.285400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 41.286356] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.287301] [ 41.287746] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.288803] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.289404] Hardware name: linux,dummy-virt (DT) [ 41.290064] Call trace: [ 41.290550] show_stack+0x20/0x38 (C) [ 41.291157] dump_stack_lvl+0x8c/0xd0 [ 41.291822] print_report+0x118/0x5e0 [ 41.292515] kasan_report+0xc8/0x118 [ 41.293104] kasan_check_range+0x100/0x1a8 [ 41.293795] __kasan_check_write+0x20/0x30 [ 41.294426] kasan_atomics_helper+0x5b4/0x4858 [ 41.295119] kasan_atomics+0x198/0x2e8 [ 41.295737] kunit_try_run_case+0x14c/0x3d0 [ 41.296392] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.297163] kthread+0x24c/0x2d0 [ 41.297782] ret_from_fork+0x10/0x20 [ 41.298350] [ 41.298750] Allocated by task 254: [ 41.299261] kasan_save_stack+0x3c/0x68 [ 41.299865] kasan_save_track+0x20/0x40 [ 41.300508] kasan_save_alloc_info+0x40/0x58 [ 41.301092] __kasan_kmalloc+0xd4/0xd8 [ 41.301718] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.302309] kasan_atomics+0xb8/0x2e8 [ 41.302910] kunit_try_run_case+0x14c/0x3d0 [ 41.303503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.304224] kthread+0x24c/0x2d0 [ 41.304868] ret_from_fork+0x10/0x20 [ 41.305465] [ 41.305838] The buggy address belongs to the object at fff00000c65bde00 [ 41.305838] which belongs to the cache kmalloc-64 of size 64 [ 41.307071] The buggy address is located 0 bytes to the right of [ 41.307071] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.308308] [ 41.308662] The buggy address belongs to the physical page: [ 41.309382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.310277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.311086] page_type: f5(slab) [ 41.311680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.312566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.313404] page dumped because: kasan: bad access detected [ 41.314067] [ 41.314413] Memory state around the buggy address: [ 41.315216] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.316010] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.316904] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.317713] ^ [ 41.318303] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.319141] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.319953] ================================================================== [ 40.936132] ================================================================== [ 40.936883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 40.937995] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.940143] [ 40.940695] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.942154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.942802] Hardware name: linux,dummy-virt (DT) [ 40.943385] Call trace: [ 40.943739] show_stack+0x20/0x38 (C) [ 40.944409] dump_stack_lvl+0x8c/0xd0 [ 40.945061] print_report+0x118/0x5e0 [ 40.946102] kasan_report+0xc8/0x118 [ 40.947483] __asan_report_load4_noabort+0x20/0x30 [ 40.948143] kasan_atomics_helper+0x40fc/0x4858 [ 40.948779] kasan_atomics+0x198/0x2e8 [ 40.949195] kunit_try_run_case+0x14c/0x3d0 [ 40.949725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.950223] kthread+0x24c/0x2d0 [ 40.951309] ret_from_fork+0x10/0x20 [ 40.951816] [ 40.952194] Allocated by task 254: [ 40.952757] kasan_save_stack+0x3c/0x68 [ 40.953679] kasan_save_track+0x20/0x40 [ 40.954304] kasan_save_alloc_info+0x40/0x58 [ 40.954986] __kasan_kmalloc+0xd4/0xd8 [ 40.955438] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.957903] kasan_atomics+0xb8/0x2e8 [ 40.958313] kunit_try_run_case+0x14c/0x3d0 [ 40.959027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.959830] kthread+0x24c/0x2d0 [ 40.960672] ret_from_fork+0x10/0x20 [ 40.961453] [ 40.962195] The buggy address belongs to the object at fff00000c65bde00 [ 40.962195] which belongs to the cache kmalloc-64 of size 64 [ 40.964226] The buggy address is located 0 bytes to the right of [ 40.964226] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.965620] [ 40.965955] The buggy address belongs to the physical page: [ 40.967245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.968096] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.968971] page_type: f5(slab) [ 40.969834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.971621] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.972633] page dumped because: kasan: bad access detected [ 40.973744] [ 40.974020] Memory state around the buggy address: [ 40.974803] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.975734] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.976795] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.978700] ^ [ 40.979306] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.980091] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.980936] ================================================================== [ 42.971047] ================================================================== [ 42.971701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 42.972636] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.973702] [ 42.974272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.975361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.976002] Hardware name: linux,dummy-virt (DT) [ 42.976585] Call trace: [ 42.976936] show_stack+0x20/0x38 (C) [ 42.977561] dump_stack_lvl+0x8c/0xd0 [ 42.978178] print_report+0x118/0x5e0 [ 42.978793] kasan_report+0xc8/0x118 [ 42.979487] kasan_check_range+0x100/0x1a8 [ 42.980098] __kasan_check_write+0x20/0x30 [ 42.980653] kasan_atomics_helper+0x1644/0x4858 [ 42.981210] kasan_atomics+0x198/0x2e8 [ 42.981747] kunit_try_run_case+0x14c/0x3d0 [ 42.982471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.983275] kthread+0x24c/0x2d0 [ 42.983833] ret_from_fork+0x10/0x20 [ 42.984511] [ 42.984924] Allocated by task 254: [ 42.985526] kasan_save_stack+0x3c/0x68 [ 42.986149] kasan_save_track+0x20/0x40 [ 42.986805] kasan_save_alloc_info+0x40/0x58 [ 42.987356] __kasan_kmalloc+0xd4/0xd8 [ 42.988002] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.988544] kasan_atomics+0xb8/0x2e8 [ 42.988997] kunit_try_run_case+0x14c/0x3d0 [ 42.989624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.990241] kthread+0x24c/0x2d0 [ 42.990790] ret_from_fork+0x10/0x20 [ 42.991316] [ 42.991648] The buggy address belongs to the object at fff00000c65bde00 [ 42.991648] which belongs to the cache kmalloc-64 of size 64 [ 42.992858] The buggy address is located 0 bytes to the right of [ 42.992858] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.993996] [ 42.994336] The buggy address belongs to the physical page: [ 42.995083] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.995814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.996647] page_type: f5(slab) [ 42.997170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.998074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.998812] page dumped because: kasan: bad access detected [ 42.999492] [ 42.999834] Memory state around the buggy address: [ 43.000465] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.001253] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.002016] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.002733] ^ [ 43.003370] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.004092] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.004986] ================================================================== [ 41.246722] ================================================================== [ 41.247598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 41.248463] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.249393] [ 41.249786] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.250953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.251527] Hardware name: linux,dummy-virt (DT) [ 41.252167] Call trace: [ 41.252633] show_stack+0x20/0x38 (C) [ 41.253370] dump_stack_lvl+0x8c/0xd0 [ 41.254075] print_report+0x118/0x5e0 [ 41.254590] kasan_report+0xc8/0x118 [ 41.255310] kasan_check_range+0x100/0x1a8 [ 41.256073] __kasan_check_write+0x20/0x30 [ 41.256808] kasan_atomics_helper+0x54c/0x4858 [ 41.257437] kasan_atomics+0x198/0x2e8 [ 41.258061] kunit_try_run_case+0x14c/0x3d0 [ 41.258775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.259660] kthread+0x24c/0x2d0 [ 41.260114] ret_from_fork+0x10/0x20 [ 41.260829] [ 41.261294] Allocated by task 254: [ 41.261874] kasan_save_stack+0x3c/0x68 [ 41.262635] kasan_save_track+0x20/0x40 [ 41.263240] kasan_save_alloc_info+0x40/0x58 [ 41.263978] __kasan_kmalloc+0xd4/0xd8 [ 41.264518] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.265338] kasan_atomics+0xb8/0x2e8 [ 41.265971] kunit_try_run_case+0x14c/0x3d0 [ 41.266572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.267286] kthread+0x24c/0x2d0 [ 41.267877] ret_from_fork+0x10/0x20 [ 41.268398] [ 41.268767] The buggy address belongs to the object at fff00000c65bde00 [ 41.268767] which belongs to the cache kmalloc-64 of size 64 [ 41.270006] The buggy address is located 0 bytes to the right of [ 41.270006] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.271364] [ 41.271728] The buggy address belongs to the physical page: [ 41.272495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.273310] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.274070] page_type: f5(slab) [ 41.274624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.275539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.276382] page dumped because: kasan: bad access detected [ 41.277026] [ 41.277404] Memory state around the buggy address: [ 41.278023] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.278850] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.279634] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.280401] ^ [ 41.281046] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.281876] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.282693] ================================================================== [ 41.736888] ================================================================== [ 41.737808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 41.738657] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.739373] [ 41.739955] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.741029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.742202] Hardware name: linux,dummy-virt (DT) [ 41.742739] Call trace: [ 41.743323] show_stack+0x20/0x38 (C) [ 41.744087] dump_stack_lvl+0x8c/0xd0 [ 41.744834] print_report+0x118/0x5e0 [ 41.745592] kasan_report+0xc8/0x118 [ 41.746295] kasan_check_range+0x100/0x1a8 [ 41.747082] __kasan_check_write+0x20/0x30 [ 41.747817] kasan_atomics_helper+0xad4/0x4858 [ 41.748428] kasan_atomics+0x198/0x2e8 [ 41.749263] kunit_try_run_case+0x14c/0x3d0 [ 41.750045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.750918] kthread+0x24c/0x2d0 [ 41.751622] ret_from_fork+0x10/0x20 [ 41.752362] [ 41.752852] Allocated by task 254: [ 41.753415] kasan_save_stack+0x3c/0x68 [ 41.754167] kasan_save_track+0x20/0x40 [ 41.754723] kasan_save_alloc_info+0x40/0x58 [ 41.755272] __kasan_kmalloc+0xd4/0xd8 [ 41.756026] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.756636] kasan_atomics+0xb8/0x2e8 [ 41.757142] kunit_try_run_case+0x14c/0x3d0 [ 41.757782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.758462] kthread+0x24c/0x2d0 [ 41.758988] ret_from_fork+0x10/0x20 [ 41.759581] [ 41.759955] The buggy address belongs to the object at fff00000c65bde00 [ 41.759955] which belongs to the cache kmalloc-64 of size 64 [ 41.761221] The buggy address is located 0 bytes to the right of [ 41.761221] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.762566] [ 41.762889] The buggy address belongs to the physical page: [ 41.763629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.764540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.765310] page_type: f5(slab) [ 41.765899] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.766782] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.767630] page dumped because: kasan: bad access detected [ 41.768303] [ 41.768631] Memory state around the buggy address: [ 41.769303] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.770105] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.770969] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.771761] ^ [ 41.772407] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.773178] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.773999] ================================================================== [ 41.776198] ================================================================== [ 41.776961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 41.777817] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.778726] [ 41.779149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.780172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.780780] Hardware name: linux,dummy-virt (DT) [ 41.781308] Call trace: [ 41.781778] show_stack+0x20/0x38 (C) [ 41.782417] dump_stack_lvl+0x8c/0xd0 [ 41.783013] print_report+0x118/0x5e0 [ 41.783641] kasan_report+0xc8/0x118 [ 41.784267] __asan_report_load4_noabort+0x20/0x30 [ 41.784963] kasan_atomics_helper+0x3dcc/0x4858 [ 41.785642] kasan_atomics+0x198/0x2e8 [ 41.786211] kunit_try_run_case+0x14c/0x3d0 [ 41.786898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.787688] kthread+0x24c/0x2d0 [ 41.788305] ret_from_fork+0x10/0x20 [ 41.788844] [ 41.789217] Allocated by task 254: [ 41.789786] kasan_save_stack+0x3c/0x68 [ 41.790360] kasan_save_track+0x20/0x40 [ 41.790974] kasan_save_alloc_info+0x40/0x58 [ 41.791657] __kasan_kmalloc+0xd4/0xd8 [ 41.792192] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.792890] kasan_atomics+0xb8/0x2e8 [ 41.793420] kunit_try_run_case+0x14c/0x3d0 [ 41.794095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.794761] kthread+0x24c/0x2d0 [ 41.795390] ret_from_fork+0x10/0x20 [ 41.795948] [ 41.796332] The buggy address belongs to the object at fff00000c65bde00 [ 41.796332] which belongs to the cache kmalloc-64 of size 64 [ 41.797549] The buggy address is located 0 bytes to the right of [ 41.797549] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.798786] [ 41.799133] The buggy address belongs to the physical page: [ 41.799867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.800788] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.801620] page_type: f5(slab) [ 41.802120] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.802965] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.803799] page dumped because: kasan: bad access detected [ 41.804435] [ 41.804880] Memory state around the buggy address: [ 41.805482] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.806367] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.807139] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.807983] ^ [ 41.808604] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.809434] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.810233] ================================================================== [ 42.746700] ================================================================== [ 42.747540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 42.748353] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.749043] [ 42.749482] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.750430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.751010] Hardware name: linux,dummy-virt (DT) [ 42.751607] Call trace: [ 42.752033] show_stack+0x20/0x38 (C) [ 42.752681] dump_stack_lvl+0x8c/0xd0 [ 42.753224] print_report+0x118/0x5e0 [ 42.753843] kasan_report+0xc8/0x118 [ 42.754510] kasan_check_range+0x100/0x1a8 [ 42.755128] __kasan_check_write+0x20/0x30 [ 42.755707] kasan_atomics_helper+0x1414/0x4858 [ 42.756682] kasan_atomics+0x198/0x2e8 [ 42.757379] kunit_try_run_case+0x14c/0x3d0 [ 42.758133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.759002] kthread+0x24c/0x2d0 [ 42.759710] ret_from_fork+0x10/0x20 [ 42.760462] [ 42.760962] Allocated by task 254: [ 42.761560] kasan_save_stack+0x3c/0x68 [ 42.762155] kasan_save_track+0x20/0x40 [ 42.762948] kasan_save_alloc_info+0x40/0x58 [ 42.763723] __kasan_kmalloc+0xd4/0xd8 [ 42.764209] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.765054] kasan_atomics+0xb8/0x2e8 [ 42.765770] kunit_try_run_case+0x14c/0x3d0 [ 42.766580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.767405] kthread+0x24c/0x2d0 [ 42.767944] ret_from_fork+0x10/0x20 [ 42.768426] [ 42.769108] The buggy address belongs to the object at fff00000c65bde00 [ 42.769108] which belongs to the cache kmalloc-64 of size 64 [ 42.769949] The buggy address is located 0 bytes to the right of [ 42.769949] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.770559] [ 42.770724] The buggy address belongs to the physical page: [ 42.771004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.771381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.772322] page_type: f5(slab) [ 42.773026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.774190] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.775209] page dumped because: kasan: bad access detected [ 42.775985] [ 42.776471] Memory state around the buggy address: [ 42.777239] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.778041] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.778784] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.779416] ^ [ 42.780100] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.780989] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.781762] ================================================================== [ 41.812711] ================================================================== [ 41.813410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 41.815172] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.816760] [ 41.817552] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.818509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.819005] Hardware name: linux,dummy-virt (DT) [ 41.819746] Call trace: [ 41.820150] show_stack+0x20/0x38 (C) [ 41.820886] dump_stack_lvl+0x8c/0xd0 [ 41.821569] print_report+0x118/0x5e0 [ 41.822205] kasan_report+0xc8/0x118 [ 41.822854] kasan_check_range+0x100/0x1a8 [ 41.823536] __kasan_check_write+0x20/0x30 [ 41.824209] kasan_atomics_helper+0xb70/0x4858 [ 41.824955] kasan_atomics+0x198/0x2e8 [ 41.825513] kunit_try_run_case+0x14c/0x3d0 [ 41.826232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.827097] kthread+0x24c/0x2d0 [ 41.827586] ret_from_fork+0x10/0x20 [ 41.828177] [ 41.828542] Allocated by task 254: [ 41.829096] kasan_save_stack+0x3c/0x68 [ 41.829609] kasan_save_track+0x20/0x40 [ 41.830231] kasan_save_alloc_info+0x40/0x58 [ 41.830920] __kasan_kmalloc+0xd4/0xd8 [ 41.831516] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.832163] kasan_atomics+0xb8/0x2e8 [ 41.832691] kunit_try_run_case+0x14c/0x3d0 [ 41.833316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.833990] kthread+0x24c/0x2d0 [ 41.834559] ret_from_fork+0x10/0x20 [ 41.835203] [ 41.835547] The buggy address belongs to the object at fff00000c65bde00 [ 41.835547] which belongs to the cache kmalloc-64 of size 64 [ 41.836813] The buggy address is located 0 bytes to the right of [ 41.836813] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.838087] [ 41.838482] The buggy address belongs to the physical page: [ 41.839218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.840141] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.840889] page_type: f5(slab) [ 41.841458] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.842350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.843231] page dumped because: kasan: bad access detected [ 41.843864] [ 41.844254] Memory state around the buggy address: [ 41.845000] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.845754] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.846625] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.847419] ^ [ 41.848045] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.848964] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.849379] ================================================================== [ 41.519295] ================================================================== [ 41.520044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 41.521765] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.522504] [ 41.522780] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.524307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.524927] Hardware name: linux,dummy-virt (DT) [ 41.525499] Call trace: [ 41.525883] show_stack+0x20/0x38 (C) [ 41.526502] dump_stack_lvl+0x8c/0xd0 [ 41.527038] print_report+0x118/0x5e0 [ 41.527646] kasan_report+0xc8/0x118 [ 41.528214] kasan_check_range+0x100/0x1a8 [ 41.528870] __kasan_check_write+0x20/0x30 [ 41.529507] kasan_atomics_helper+0x894/0x4858 [ 41.530118] kasan_atomics+0x198/0x2e8 [ 41.530689] kunit_try_run_case+0x14c/0x3d0 [ 41.531278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.531988] kthread+0x24c/0x2d0 [ 41.532574] ret_from_fork+0x10/0x20 [ 41.533165] [ 41.533534] Allocated by task 254: [ 41.534051] kasan_save_stack+0x3c/0x68 [ 41.534532] kasan_save_track+0x20/0x40 [ 41.535171] kasan_save_alloc_info+0x40/0x58 [ 41.535722] __kasan_kmalloc+0xd4/0xd8 [ 41.536304] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.536935] kasan_atomics+0xb8/0x2e8 [ 41.537518] kunit_try_run_case+0x14c/0x3d0 [ 41.538087] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.538671] kthread+0x24c/0x2d0 [ 41.539197] ret_from_fork+0x10/0x20 [ 41.539718] [ 41.540045] The buggy address belongs to the object at fff00000c65bde00 [ 41.540045] which belongs to the cache kmalloc-64 of size 64 [ 41.541233] The buggy address is located 0 bytes to the right of [ 41.541233] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.542417] [ 41.542761] The buggy address belongs to the physical page: [ 41.543455] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.544325] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.545072] page_type: f5(slab) [ 41.545630] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.546420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.547299] page dumped because: kasan: bad access detected [ 41.547928] [ 41.548670] Memory state around the buggy address: [ 41.549177] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.549952] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.551065] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.552044] ^ [ 41.552594] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.553389] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.554119] ================================================================== [ 42.554522] ================================================================== [ 42.555179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 42.556790] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.557570] [ 42.558268] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.559386] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.560257] Hardware name: linux,dummy-virt (DT) [ 42.560856] Call trace: [ 42.561238] show_stack+0x20/0x38 (C) [ 42.562110] dump_stack_lvl+0x8c/0xd0 [ 42.562842] print_report+0x118/0x5e0 [ 42.563564] kasan_report+0xc8/0x118 [ 42.564320] kasan_check_range+0x100/0x1a8 [ 42.565031] __kasan_check_write+0x20/0x30 [ 42.565772] kasan_atomics_helper+0x11f8/0x4858 [ 42.566405] kasan_atomics+0x198/0x2e8 [ 42.566968] kunit_try_run_case+0x14c/0x3d0 [ 42.567840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.568575] kthread+0x24c/0x2d0 [ 42.569080] ret_from_fork+0x10/0x20 [ 42.569570] [ 42.569920] Allocated by task 254: [ 42.570472] kasan_save_stack+0x3c/0x68 [ 42.571077] kasan_save_track+0x20/0x40 [ 42.571738] kasan_save_alloc_info+0x40/0x58 [ 42.572359] __kasan_kmalloc+0xd4/0xd8 [ 42.573012] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.573682] kasan_atomics+0xb8/0x2e8 [ 42.574302] kunit_try_run_case+0x14c/0x3d0 [ 42.574965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.575737] kthread+0x24c/0x2d0 [ 42.576284] ret_from_fork+0x10/0x20 [ 42.576930] [ 42.577209] The buggy address belongs to the object at fff00000c65bde00 [ 42.577209] which belongs to the cache kmalloc-64 of size 64 [ 42.578359] The buggy address is located 0 bytes to the right of [ 42.578359] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.579736] [ 42.580085] The buggy address belongs to the physical page: [ 42.580865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.581796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.582639] page_type: f5(slab) [ 42.583217] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.584125] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.585061] page dumped because: kasan: bad access detected [ 42.585748] [ 42.586112] Memory state around the buggy address: [ 42.586822] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.587719] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.588592] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.589400] ^ [ 42.590026] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.590922] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.591750] ================================================================== [ 41.321903] ================================================================== [ 41.322683] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 41.323564] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.324411] [ 41.324914] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.326123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.326741] Hardware name: linux,dummy-virt (DT) [ 41.327295] Call trace: [ 41.327766] show_stack+0x20/0x38 (C) [ 41.328360] dump_stack_lvl+0x8c/0xd0 [ 41.328993] print_report+0x118/0x5e0 [ 41.329675] kasan_report+0xc8/0x118 [ 41.330280] kasan_check_range+0x100/0x1a8 [ 41.330866] __kasan_check_write+0x20/0x30 [ 41.331566] kasan_atomics_helper+0x61c/0x4858 [ 41.332229] kasan_atomics+0x198/0x2e8 [ 41.332848] kunit_try_run_case+0x14c/0x3d0 [ 41.333535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.334335] kthread+0x24c/0x2d0 [ 41.334951] ret_from_fork+0x10/0x20 [ 41.335573] [ 41.335828] Allocated by task 254: [ 41.336658] kasan_save_stack+0x3c/0x68 [ 41.337274] kasan_save_track+0x20/0x40 [ 41.337758] kasan_save_alloc_info+0x40/0x58 [ 41.338414] __kasan_kmalloc+0xd4/0xd8 [ 41.338984] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.339688] kasan_atomics+0xb8/0x2e8 [ 41.340221] kunit_try_run_case+0x14c/0x3d0 [ 41.340904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.341609] kthread+0x24c/0x2d0 [ 41.342178] ret_from_fork+0x10/0x20 [ 41.342714] [ 41.343095] The buggy address belongs to the object at fff00000c65bde00 [ 41.343095] which belongs to the cache kmalloc-64 of size 64 [ 41.344279] The buggy address is located 0 bytes to the right of [ 41.344279] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.345575] [ 41.345956] The buggy address belongs to the physical page: [ 41.346618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.347584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.348419] page_type: f5(slab) [ 41.348957] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.349854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.350721] page dumped because: kasan: bad access detected [ 41.351341] [ 41.351741] Memory state around the buggy address: [ 41.352336] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.353177] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.354098] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.354986] ^ [ 41.355690] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.356400] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.357530] ================================================================== [ 40.847912] ================================================================== [ 40.848824] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 40.849492] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.851222] [ 40.851615] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.852817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.854084] Hardware name: linux,dummy-virt (DT) [ 40.854678] Call trace: [ 40.855026] show_stack+0x20/0x38 (C) [ 40.855722] dump_stack_lvl+0x8c/0xd0 [ 40.856362] print_report+0x118/0x5e0 [ 40.857010] kasan_report+0xc8/0x118 [ 40.857814] kasan_check_range+0x100/0x1a8 [ 40.858622] __kasan_check_write+0x20/0x30 [ 40.859078] kasan_atomics_helper+0x24c/0x4858 [ 40.859668] kasan_atomics+0x198/0x2e8 [ 40.860399] kunit_try_run_case+0x14c/0x3d0 [ 40.861158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.862201] kthread+0x24c/0x2d0 [ 40.862707] ret_from_fork+0x10/0x20 [ 40.863297] [ 40.863673] Allocated by task 254: [ 40.864248] kasan_save_stack+0x3c/0x68 [ 40.864885] kasan_save_track+0x20/0x40 [ 40.865814] kasan_save_alloc_info+0x40/0x58 [ 40.866544] __kasan_kmalloc+0xd4/0xd8 [ 40.866957] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.867507] kasan_atomics+0xb8/0x2e8 [ 40.868114] kunit_try_run_case+0x14c/0x3d0 [ 40.868808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.869621] kthread+0x24c/0x2d0 [ 40.870203] ret_from_fork+0x10/0x20 [ 40.871195] [ 40.871541] The buggy address belongs to the object at fff00000c65bde00 [ 40.871541] which belongs to the cache kmalloc-64 of size 64 [ 40.872954] The buggy address is located 0 bytes to the right of [ 40.872954] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.874612] [ 40.876186] The buggy address belongs to the physical page: [ 40.876783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.878286] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.879233] page_type: f5(slab) [ 40.879935] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.881026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.882046] page dumped because: kasan: bad access detected [ 40.882649] [ 40.882971] Memory state around the buggy address: [ 40.884310] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.885386] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.886501] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.887544] ^ [ 40.888576] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.889528] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.889938] ================================================================== [ 41.887021] ================================================================== [ 41.888209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 41.889007] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.890401] [ 41.890703] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.891657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.892100] Hardware name: linux,dummy-virt (DT) [ 41.893134] Call trace: [ 41.893647] show_stack+0x20/0x38 (C) [ 41.894329] dump_stack_lvl+0x8c/0xd0 [ 41.894919] print_report+0x118/0x5e0 [ 41.895569] kasan_report+0xc8/0x118 [ 41.896169] kasan_check_range+0x100/0x1a8 [ 41.896798] __kasan_check_write+0x20/0x30 [ 41.897466] kasan_atomics_helper+0xc08/0x4858 [ 41.898107] kasan_atomics+0x198/0x2e8 [ 41.898755] kunit_try_run_case+0x14c/0x3d0 [ 41.899394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.900090] kthread+0x24c/0x2d0 [ 41.900705] ret_from_fork+0x10/0x20 [ 41.901277] [ 41.901658] Allocated by task 254: [ 41.902179] kasan_save_stack+0x3c/0x68 [ 41.902713] kasan_save_track+0x20/0x40 [ 41.903340] kasan_save_alloc_info+0x40/0x58 [ 41.904020] __kasan_kmalloc+0xd4/0xd8 [ 41.904592] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.905257] kasan_atomics+0xb8/0x2e8 [ 41.905851] kunit_try_run_case+0x14c/0x3d0 [ 41.906425] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.907201] kthread+0x24c/0x2d0 [ 41.907787] ret_from_fork+0x10/0x20 [ 41.908408] [ 41.908774] The buggy address belongs to the object at fff00000c65bde00 [ 41.908774] which belongs to the cache kmalloc-64 of size 64 [ 41.909982] The buggy address is located 0 bytes to the right of [ 41.909982] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.911241] [ 41.911684] The buggy address belongs to the physical page: [ 41.912307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.913302] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.914124] page_type: f5(slab) [ 41.914575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.915314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.916053] page dumped because: kasan: bad access detected [ 41.916657] [ 41.917010] Memory state around the buggy address: [ 41.917591] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.918510] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.919530] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.920508] ^ [ 41.921110] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.921859] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.922981] ================================================================== [ 41.995885] ================================================================== [ 41.997154] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 41.998216] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.999644] [ 42.000111] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.002094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.002845] Hardware name: linux,dummy-virt (DT) [ 42.003616] Call trace: [ 42.004009] show_stack+0x20/0x38 (C) [ 42.004556] dump_stack_lvl+0x8c/0xd0 [ 42.005003] print_report+0x118/0x5e0 [ 42.006091] kasan_report+0xc8/0x118 [ 42.006607] __asan_report_load4_noabort+0x20/0x30 [ 42.007432] kasan_atomics_helper+0x3dd8/0x4858 [ 42.008274] kasan_atomics+0x198/0x2e8 [ 42.009009] kunit_try_run_case+0x14c/0x3d0 [ 42.009575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.010249] kthread+0x24c/0x2d0 [ 42.010722] ret_from_fork+0x10/0x20 [ 42.011318] [ 42.011685] Allocated by task 254: [ 42.012154] kasan_save_stack+0x3c/0x68 [ 42.012704] kasan_save_track+0x20/0x40 [ 42.013288] kasan_save_alloc_info+0x40/0x58 [ 42.013902] __kasan_kmalloc+0xd4/0xd8 [ 42.014513] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.015125] kasan_atomics+0xb8/0x2e8 [ 42.015636] kunit_try_run_case+0x14c/0x3d0 [ 42.016275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.017023] kthread+0x24c/0x2d0 [ 42.017549] ret_from_fork+0x10/0x20 [ 42.018119] [ 42.018484] The buggy address belongs to the object at fff00000c65bde00 [ 42.018484] which belongs to the cache kmalloc-64 of size 64 [ 42.019579] The buggy address is located 0 bytes to the right of [ 42.019579] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.020914] [ 42.021273] The buggy address belongs to the physical page: [ 42.021861] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.022810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.023661] page_type: f5(slab) [ 42.024141] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.025409] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.026137] page dumped because: kasan: bad access detected [ 42.026823] [ 42.027173] Memory state around the buggy address: [ 42.027829] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.028598] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.029435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.030278] ^ [ 42.030903] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.031741] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.032510] ================================================================== [ 43.196044] ================================================================== [ 43.197325] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 43.198213] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.199074] [ 43.199461] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.200670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.201247] Hardware name: linux,dummy-virt (DT) [ 43.201855] Call trace: [ 43.202295] show_stack+0x20/0x38 (C) [ 43.202980] dump_stack_lvl+0x8c/0xd0 [ 43.203650] print_report+0x118/0x5e0 [ 43.204197] kasan_report+0xc8/0x118 [ 43.204932] kasan_check_range+0x100/0x1a8 [ 43.205590] __kasan_check_write+0x20/0x30 [ 43.206217] kasan_atomics_helper+0x17ec/0x4858 [ 43.206920] kasan_atomics+0x198/0x2e8 [ 43.207484] kunit_try_run_case+0x14c/0x3d0 [ 43.208138] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.208933] kthread+0x24c/0x2d0 [ 43.209535] ret_from_fork+0x10/0x20 [ 43.210165] [ 43.210566] Allocated by task 254: [ 43.211092] kasan_save_stack+0x3c/0x68 [ 43.211757] kasan_save_track+0x20/0x40 [ 43.212377] kasan_save_alloc_info+0x40/0x58 [ 43.213014] __kasan_kmalloc+0xd4/0xd8 [ 43.213551] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.214228] kasan_atomics+0xb8/0x2e8 [ 43.214824] kunit_try_run_case+0x14c/0x3d0 [ 43.215426] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.216189] kthread+0x24c/0x2d0 [ 43.216760] ret_from_fork+0x10/0x20 [ 43.217291] [ 43.217670] The buggy address belongs to the object at fff00000c65bde00 [ 43.217670] which belongs to the cache kmalloc-64 of size 64 [ 43.218963] The buggy address is located 0 bytes to the right of [ 43.218963] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.220267] [ 43.220622] The buggy address belongs to the physical page: [ 43.221284] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.222275] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.223004] page_type: f5(slab) [ 43.223586] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.224478] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.225229] page dumped because: kasan: bad access detected [ 43.225905] [ 43.226288] Memory state around the buggy address: [ 43.226949] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.227681] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.228570] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.229352] ^ [ 43.229958] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.230788] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.231606] ================================================================== [ 42.219850] ================================================================== [ 42.220681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 42.221771] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.222703] [ 42.223083] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.224194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.224709] Hardware name: linux,dummy-virt (DT) [ 42.225353] Call trace: [ 42.225780] show_stack+0x20/0x38 (C) [ 42.226399] dump_stack_lvl+0x8c/0xd0 [ 42.227012] print_report+0x118/0x5e0 [ 42.227559] kasan_report+0xc8/0x118 [ 42.228167] __asan_report_store8_noabort+0x20/0x30 [ 42.228918] kasan_atomics_helper+0x3e5c/0x4858 [ 42.229563] kasan_atomics+0x198/0x2e8 [ 42.230073] kunit_try_run_case+0x14c/0x3d0 [ 42.230736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.231415] kthread+0x24c/0x2d0 [ 42.231980] ret_from_fork+0x10/0x20 [ 42.232569] [ 42.232904] Allocated by task 254: [ 42.233455] kasan_save_stack+0x3c/0x68 [ 42.234062] kasan_save_track+0x20/0x40 [ 42.234658] kasan_save_alloc_info+0x40/0x58 [ 42.235295] __kasan_kmalloc+0xd4/0xd8 [ 42.235833] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.236493] kasan_atomics+0xb8/0x2e8 [ 42.237064] kunit_try_run_case+0x14c/0x3d0 [ 42.237620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.238355] kthread+0x24c/0x2d0 [ 42.238918] ret_from_fork+0x10/0x20 [ 42.239503] [ 42.239846] The buggy address belongs to the object at fff00000c65bde00 [ 42.239846] which belongs to the cache kmalloc-64 of size 64 [ 42.240992] The buggy address is located 0 bytes to the right of [ 42.240992] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.242146] [ 42.242532] The buggy address belongs to the physical page: [ 42.243220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.244039] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.244872] page_type: f5(slab) [ 42.245404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.246269] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.247192] page dumped because: kasan: bad access detected [ 42.247888] [ 42.248257] Memory state around the buggy address: [ 42.248940] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.249853] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.250613] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.251498] ^ [ 42.252186] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.253025] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.253797] ================================================================== [ 42.822665] ================================================================== [ 42.823401] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 42.824196] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.825111] [ 42.825521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.826591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.827203] Hardware name: linux,dummy-virt (DT) [ 42.827880] Call trace: [ 42.828307] show_stack+0x20/0x38 (C) [ 42.828981] dump_stack_lvl+0x8c/0xd0 [ 42.829565] print_report+0x118/0x5e0 [ 42.830207] kasan_report+0xc8/0x118 [ 42.830861] kasan_check_range+0x100/0x1a8 [ 42.831438] __kasan_check_write+0x20/0x30 [ 42.832146] kasan_atomics_helper+0x14e4/0x4858 [ 42.832791] kasan_atomics+0x198/0x2e8 [ 42.833401] kunit_try_run_case+0x14c/0x3d0 [ 42.834077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.834882] kthread+0x24c/0x2d0 [ 42.835431] ret_from_fork+0x10/0x20 [ 42.836056] [ 42.836413] Allocated by task 254: [ 42.836980] kasan_save_stack+0x3c/0x68 [ 42.837534] kasan_save_track+0x20/0x40 [ 42.838151] kasan_save_alloc_info+0x40/0x58 [ 42.838795] __kasan_kmalloc+0xd4/0xd8 [ 42.839407] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.839987] kasan_atomics+0xb8/0x2e8 [ 42.840614] kunit_try_run_case+0x14c/0x3d0 [ 42.841202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.841953] kthread+0x24c/0x2d0 [ 42.842424] ret_from_fork+0x10/0x20 [ 42.843035] [ 42.843424] The buggy address belongs to the object at fff00000c65bde00 [ 42.843424] which belongs to the cache kmalloc-64 of size 64 [ 42.844698] The buggy address is located 0 bytes to the right of [ 42.844698] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.845995] [ 42.846343] The buggy address belongs to the physical page: [ 42.846993] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.847903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.848730] page_type: f5(slab) [ 42.849225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.850155] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.851038] page dumped because: kasan: bad access detected [ 42.851687] [ 42.852071] Memory state around the buggy address: [ 42.852760] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.853506] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.854422] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.855221] ^ [ 42.855880] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.856787] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.857660] ================================================================== [ 41.662534] ================================================================== [ 41.663243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 41.664104] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.665488] [ 41.665886] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.666847] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.667418] Hardware name: linux,dummy-virt (DT) [ 41.667960] Call trace: [ 41.668384] show_stack+0x20/0x38 (C) [ 41.669029] dump_stack_lvl+0x8c/0xd0 [ 41.669672] print_report+0x118/0x5e0 [ 41.670266] kasan_report+0xc8/0x118 [ 41.670881] kasan_check_range+0x100/0x1a8 [ 41.671507] __kasan_check_write+0x20/0x30 [ 41.672151] kasan_atomics_helper+0xa04/0x4858 [ 41.672841] kasan_atomics+0x198/0x2e8 [ 41.673345] kunit_try_run_case+0x14c/0x3d0 [ 41.674033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.674816] kthread+0x24c/0x2d0 [ 41.675272] ret_from_fork+0x10/0x20 [ 41.675899] [ 41.676254] Allocated by task 254: [ 41.676787] kasan_save_stack+0x3c/0x68 [ 41.677314] kasan_save_track+0x20/0x40 [ 41.677909] kasan_save_alloc_info+0x40/0x58 [ 41.678396] __kasan_kmalloc+0xd4/0xd8 [ 41.678995] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.679684] kasan_atomics+0xb8/0x2e8 [ 41.680272] kunit_try_run_case+0x14c/0x3d0 [ 41.680918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.681484] kthread+0x24c/0x2d0 [ 41.682017] ret_from_fork+0x10/0x20 [ 41.682597] [ 41.682956] The buggy address belongs to the object at fff00000c65bde00 [ 41.682956] which belongs to the cache kmalloc-64 of size 64 [ 41.684102] The buggy address is located 0 bytes to the right of [ 41.684102] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.685236] [ 41.685607] The buggy address belongs to the physical page: [ 41.686191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.687042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.687664] page_type: f5(slab) [ 41.688201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.689127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.689879] page dumped because: kasan: bad access detected [ 41.690560] [ 41.690901] Memory state around the buggy address: [ 41.691407] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.692251] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.693063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.693822] ^ [ 41.694489] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.695180] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.696037] ================================================================== [ 41.556168] ================================================================== [ 41.556908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 41.558490] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.559331] [ 41.559626] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.560615] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.561321] Hardware name: linux,dummy-virt (DT) [ 41.561923] Call trace: [ 41.562244] show_stack+0x20/0x38 (C) [ 41.562713] dump_stack_lvl+0x8c/0xd0 [ 41.563162] print_report+0x118/0x5e0 [ 41.563603] kasan_report+0xc8/0x118 [ 41.564073] __asan_report_load4_noabort+0x20/0x30 [ 41.564903] kasan_atomics_helper+0x42d8/0x4858 [ 41.565610] kasan_atomics+0x198/0x2e8 [ 41.566190] kunit_try_run_case+0x14c/0x3d0 [ 41.567431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.568322] kthread+0x24c/0x2d0 [ 41.568854] ret_from_fork+0x10/0x20 [ 41.569454] [ 41.569802] Allocated by task 254: [ 41.570295] kasan_save_stack+0x3c/0x68 [ 41.570912] kasan_save_track+0x20/0x40 [ 41.571476] kasan_save_alloc_info+0x40/0x58 [ 41.572013] __kasan_kmalloc+0xd4/0xd8 [ 41.572614] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.573179] kasan_atomics+0xb8/0x2e8 [ 41.573770] kunit_try_run_case+0x14c/0x3d0 [ 41.574275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.574964] kthread+0x24c/0x2d0 [ 41.575434] ret_from_fork+0x10/0x20 [ 41.575957] [ 41.576314] The buggy address belongs to the object at fff00000c65bde00 [ 41.576314] which belongs to the cache kmalloc-64 of size 64 [ 41.577364] The buggy address is located 0 bytes to the right of [ 41.577364] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.578589] [ 41.578935] The buggy address belongs to the physical page: [ 41.579594] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.580388] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.581186] page_type: f5(slab) [ 41.581642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.582559] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.583339] page dumped because: kasan: bad access detected [ 41.584044] [ 41.584405] Memory state around the buggy address: [ 41.584961] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.585806] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.586677] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.587395] ^ [ 41.588030] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.588766] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.589528] ================================================================== [ 42.072114] ================================================================== [ 42.072874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 42.074721] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.075646] [ 42.075970] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.077044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.077522] Hardware name: linux,dummy-virt (DT) [ 42.078111] Call trace: [ 42.078524] show_stack+0x20/0x38 (C) [ 42.079102] dump_stack_lvl+0x8c/0xd0 [ 42.079681] print_report+0x118/0x5e0 [ 42.080255] kasan_report+0xc8/0x118 [ 42.080762] __asan_report_load4_noabort+0x20/0x30 [ 42.081435] kasan_atomics_helper+0x3e04/0x4858 [ 42.082037] kasan_atomics+0x198/0x2e8 [ 42.082576] kunit_try_run_case+0x14c/0x3d0 [ 42.083163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.083827] kthread+0x24c/0x2d0 [ 42.084408] ret_from_fork+0x10/0x20 [ 42.085062] [ 42.085413] Allocated by task 254: [ 42.085935] kasan_save_stack+0x3c/0x68 [ 42.086399] kasan_save_track+0x20/0x40 [ 42.086856] kasan_save_alloc_info+0x40/0x58 [ 42.087375] __kasan_kmalloc+0xd4/0xd8 [ 42.087778] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.088069] kasan_atomics+0xb8/0x2e8 [ 42.088324] kunit_try_run_case+0x14c/0x3d0 [ 42.088792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.089357] kthread+0x24c/0x2d0 [ 42.090731] ret_from_fork+0x10/0x20 [ 42.091734] [ 42.092083] The buggy address belongs to the object at fff00000c65bde00 [ 42.092083] which belongs to the cache kmalloc-64 of size 64 [ 42.093208] The buggy address is located 0 bytes to the right of [ 42.093208] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.094349] [ 42.094716] The buggy address belongs to the physical page: [ 42.095344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.096230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.096977] page_type: f5(slab) [ 42.097505] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.098304] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.099123] page dumped because: kasan: bad access detected [ 42.099730] [ 42.100077] Memory state around the buggy address: [ 42.100582] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.101433] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.102237] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.102967] ^ [ 42.103582] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.104454] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.105133] ================================================================== [ 41.029008] ================================================================== [ 41.030371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 41.030963] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.031991] [ 41.032481] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.033862] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.034743] Hardware name: linux,dummy-virt (DT) [ 41.035334] Call trace: [ 41.035625] show_stack+0x20/0x38 (C) [ 41.036319] dump_stack_lvl+0x8c/0xd0 [ 41.036968] print_report+0x118/0x5e0 [ 41.037618] kasan_report+0xc8/0x118 [ 41.038949] __asan_report_store4_noabort+0x20/0x30 [ 41.039773] kasan_atomics_helper+0x3f94/0x4858 [ 41.040592] kasan_atomics+0x198/0x2e8 [ 41.041301] kunit_try_run_case+0x14c/0x3d0 [ 41.041997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.043167] kthread+0x24c/0x2d0 [ 41.043664] ret_from_fork+0x10/0x20 [ 41.044173] [ 41.044554] Allocated by task 254: [ 41.044972] kasan_save_stack+0x3c/0x68 [ 41.045871] kasan_save_track+0x20/0x40 [ 41.046525] kasan_save_alloc_info+0x40/0x58 [ 41.047749] __kasan_kmalloc+0xd4/0xd8 [ 41.048296] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.049059] kasan_atomics+0xb8/0x2e8 [ 41.049684] kunit_try_run_case+0x14c/0x3d0 [ 41.050339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.051689] kthread+0x24c/0x2d0 [ 41.052155] ret_from_fork+0x10/0x20 [ 41.052733] [ 41.053052] The buggy address belongs to the object at fff00000c65bde00 [ 41.053052] which belongs to the cache kmalloc-64 of size 64 [ 41.054488] The buggy address is located 0 bytes to the right of [ 41.054488] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.056104] [ 41.056609] The buggy address belongs to the physical page: [ 41.057520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.058677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.059642] page_type: f5(slab) [ 41.060124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.060617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.062298] page dumped because: kasan: bad access detected [ 41.063147] [ 41.063675] Memory state around the buggy address: [ 41.064257] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.065279] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.066306] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.067276] ^ [ 41.067854] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.068921] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.069841] ================================================================== [ 43.159167] ================================================================== [ 43.159784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 43.160705] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.161950] [ 43.162477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.163704] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.164425] Hardware name: linux,dummy-virt (DT) [ 43.165140] Call trace: [ 43.165718] show_stack+0x20/0x38 (C) [ 43.166454] dump_stack_lvl+0x8c/0xd0 [ 43.166960] print_report+0x118/0x5e0 [ 43.167481] kasan_report+0xc8/0x118 [ 43.167984] __asan_report_load8_noabort+0x20/0x30 [ 43.168644] kasan_atomics_helper+0x3e20/0x4858 [ 43.169177] kasan_atomics+0x198/0x2e8 [ 43.170282] kunit_try_run_case+0x14c/0x3d0 [ 43.170899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.171646] kthread+0x24c/0x2d0 [ 43.172281] ret_from_fork+0x10/0x20 [ 43.172848] [ 43.173254] Allocated by task 254: [ 43.173773] kasan_save_stack+0x3c/0x68 [ 43.174416] kasan_save_track+0x20/0x40 [ 43.175121] kasan_save_alloc_info+0x40/0x58 [ 43.175715] __kasan_kmalloc+0xd4/0xd8 [ 43.176208] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.176795] kasan_atomics+0xb8/0x2e8 [ 43.177264] kunit_try_run_case+0x14c/0x3d0 [ 43.177828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.178411] kthread+0x24c/0x2d0 [ 43.179024] ret_from_fork+0x10/0x20 [ 43.179673] [ 43.180089] The buggy address belongs to the object at fff00000c65bde00 [ 43.180089] which belongs to the cache kmalloc-64 of size 64 [ 43.181501] The buggy address is located 0 bytes to the right of [ 43.181501] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.182715] [ 43.183193] The buggy address belongs to the physical page: [ 43.183977] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.184818] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.185696] page_type: f5(slab) [ 43.186273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.187120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.187929] page dumped because: kasan: bad access detected [ 43.188645] [ 43.189053] Memory state around the buggy address: [ 43.189622] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.190398] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.191151] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.191921] ^ [ 43.192517] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.193435] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.194302] ================================================================== [ 41.698342] ================================================================== [ 41.699122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 41.699884] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 41.701477] [ 41.701763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 41.702713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 41.703155] Hardware name: linux,dummy-virt (DT) [ 41.704256] Call trace: [ 41.705009] show_stack+0x20/0x38 (C) [ 41.705531] dump_stack_lvl+0x8c/0xd0 [ 41.706135] print_report+0x118/0x5e0 [ 41.706727] kasan_report+0xc8/0x118 [ 41.707264] kasan_check_range+0x100/0x1a8 [ 41.707795] __kasan_check_write+0x20/0x30 [ 41.708381] kasan_atomics_helper+0xa6c/0x4858 [ 41.709064] kasan_atomics+0x198/0x2e8 [ 41.709643] kunit_try_run_case+0x14c/0x3d0 [ 41.710305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.711027] kthread+0x24c/0x2d0 [ 41.711502] ret_from_fork+0x10/0x20 [ 41.712093] [ 41.712452] Allocated by task 254: [ 41.712922] kasan_save_stack+0x3c/0x68 [ 41.713528] kasan_save_track+0x20/0x40 [ 41.714064] kasan_save_alloc_info+0x40/0x58 [ 41.714649] __kasan_kmalloc+0xd4/0xd8 [ 41.715171] __kmalloc_cache_noprof+0x15c/0x3c8 [ 41.715837] kasan_atomics+0xb8/0x2e8 [ 41.716403] kunit_try_run_case+0x14c/0x3d0 [ 41.717026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 41.718019] kthread+0x24c/0x2d0 [ 41.718766] ret_from_fork+0x10/0x20 [ 41.719217] [ 41.719581] The buggy address belongs to the object at fff00000c65bde00 [ 41.719581] which belongs to the cache kmalloc-64 of size 64 [ 41.721165] The buggy address is located 0 bytes to the right of [ 41.721165] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 41.722681] [ 41.723196] The buggy address belongs to the physical page: [ 41.723843] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 41.724726] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 41.725930] page_type: f5(slab) [ 41.726386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 41.727429] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 41.728427] page dumped because: kasan: bad access detected [ 41.729247] [ 41.729742] Memory state around the buggy address: [ 41.730617] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.731303] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 41.732063] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 41.732788] ^ [ 41.733415] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.734245] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 41.734953] ================================================================== [ 42.294209] ================================================================== [ 42.295068] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 42.295968] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.296890] [ 42.297306] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.298971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.299490] Hardware name: linux,dummy-virt (DT) [ 42.300107] Call trace: [ 42.300602] show_stack+0x20/0x38 (C) [ 42.301225] dump_stack_lvl+0x8c/0xd0 [ 42.301913] print_report+0x118/0x5e0 [ 42.302569] kasan_report+0xc8/0x118 [ 42.303241] kasan_check_range+0x100/0x1a8 [ 42.303930] __kasan_check_write+0x20/0x30 [ 42.304609] kasan_atomics_helper+0xf20/0x4858 [ 42.305354] kasan_atomics+0x198/0x2e8 [ 42.305912] kunit_try_run_case+0x14c/0x3d0 [ 42.306612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.307294] kthread+0x24c/0x2d0 [ 42.307824] ret_from_fork+0x10/0x20 [ 42.308432] [ 42.308838] Allocated by task 254: [ 42.309269] kasan_save_stack+0x3c/0x68 [ 42.309895] kasan_save_track+0x20/0x40 [ 42.310460] kasan_save_alloc_info+0x40/0x58 [ 42.311077] __kasan_kmalloc+0xd4/0xd8 [ 42.311648] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.312332] kasan_atomics+0xb8/0x2e8 [ 42.312869] kunit_try_run_case+0x14c/0x3d0 [ 42.313417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.314122] kthread+0x24c/0x2d0 [ 42.314655] ret_from_fork+0x10/0x20 [ 42.315260] [ 42.315633] The buggy address belongs to the object at fff00000c65bde00 [ 42.315633] which belongs to the cache kmalloc-64 of size 64 [ 42.316751] The buggy address is located 0 bytes to the right of [ 42.316751] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.317968] [ 42.318338] The buggy address belongs to the physical page: [ 42.319518] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.320369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.321223] page_type: f5(slab) [ 42.321775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.322556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.323461] page dumped because: kasan: bad access detected [ 42.324079] [ 42.324434] Memory state around the buggy address: [ 42.325095] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.325877] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.326722] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.327568] ^ [ 42.328146] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.328927] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.329780] ================================================================== [ 42.711074] ================================================================== [ 42.711839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 42.713628] Read of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.714754] [ 42.715145] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.716109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.717092] Hardware name: linux,dummy-virt (DT) [ 42.717821] Call trace: [ 42.718206] show_stack+0x20/0x38 (C) [ 42.718789] dump_stack_lvl+0x8c/0xd0 [ 42.719337] print_report+0x118/0x5e0 [ 42.719906] kasan_report+0xc8/0x118 [ 42.720408] __asan_report_load8_noabort+0x20/0x30 [ 42.721105] kasan_atomics_helper+0x3f04/0x4858 [ 42.721735] kasan_atomics+0x198/0x2e8 [ 42.722281] kunit_try_run_case+0x14c/0x3d0 [ 42.722874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.723563] kthread+0x24c/0x2d0 [ 42.724120] ret_from_fork+0x10/0x20 [ 42.724720] [ 42.725051] Allocated by task 254: [ 42.725580] kasan_save_stack+0x3c/0x68 [ 42.726125] kasan_save_track+0x20/0x40 [ 42.726749] kasan_save_alloc_info+0x40/0x58 [ 42.727369] __kasan_kmalloc+0xd4/0xd8 [ 42.727946] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.728644] kasan_atomics+0xb8/0x2e8 [ 42.729209] kunit_try_run_case+0x14c/0x3d0 [ 42.729823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.730467] kthread+0x24c/0x2d0 [ 42.730948] ret_from_fork+0x10/0x20 [ 42.731435] [ 42.731798] The buggy address belongs to the object at fff00000c65bde00 [ 42.731798] which belongs to the cache kmalloc-64 of size 64 [ 42.732999] The buggy address is located 0 bytes to the right of [ 42.732999] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.734146] [ 42.734510] The buggy address belongs to the physical page: [ 42.735244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.736041] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.736875] page_type: f5(slab) [ 42.737314] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.738253] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.739000] page dumped because: kasan: bad access detected [ 42.739709] [ 42.740058] Memory state around the buggy address: [ 42.740624] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.741409] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.742104] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.742921] ^ [ 42.743571] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.744187] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.745000] ================================================================== [ 42.783964] ================================================================== [ 42.784823] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 42.785757] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.786533] [ 42.786965] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.788209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.788809] Hardware name: linux,dummy-virt (DT) [ 42.789331] Call trace: [ 42.789808] show_stack+0x20/0x38 (C) [ 42.790496] dump_stack_lvl+0x8c/0xd0 [ 42.791093] print_report+0x118/0x5e0 [ 42.791745] kasan_report+0xc8/0x118 [ 42.792285] kasan_check_range+0x100/0x1a8 [ 42.792984] __kasan_check_write+0x20/0x30 [ 42.793661] kasan_atomics_helper+0x147c/0x4858 [ 42.794338] kasan_atomics+0x198/0x2e8 [ 42.794997] kunit_try_run_case+0x14c/0x3d0 [ 42.795558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.796386] kthread+0x24c/0x2d0 [ 42.796996] ret_from_fork+0x10/0x20 [ 42.797626] [ 42.798014] Allocated by task 254: [ 42.798606] kasan_save_stack+0x3c/0x68 [ 42.799190] kasan_save_track+0x20/0x40 [ 42.799752] kasan_save_alloc_info+0x40/0x58 [ 42.800468] __kasan_kmalloc+0xd4/0xd8 [ 42.801030] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.801753] kasan_atomics+0xb8/0x2e8 [ 42.802277] kunit_try_run_case+0x14c/0x3d0 [ 42.802957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.803664] kthread+0x24c/0x2d0 [ 42.804237] ret_from_fork+0x10/0x20 [ 42.804779] [ 42.805208] The buggy address belongs to the object at fff00000c65bde00 [ 42.805208] which belongs to the cache kmalloc-64 of size 64 [ 42.806590] The buggy address is located 0 bytes to the right of [ 42.806590] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.807873] [ 42.808214] The buggy address belongs to the physical page: [ 42.808973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.809792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.810661] page_type: f5(slab) [ 42.811194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.812077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.812945] page dumped because: kasan: bad access detected [ 42.813652] [ 42.814034] Memory state around the buggy address: [ 42.814744] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.815589] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.816435] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.817249] ^ [ 42.817863] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.818716] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.819528] ================================================================== [ 42.331501] ================================================================== [ 42.332311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 42.333205] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.334636] [ 42.335070] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.336209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.336730] Hardware name: linux,dummy-virt (DT) [ 42.337362] Call trace: [ 42.337831] show_stack+0x20/0x38 (C) [ 42.338455] dump_stack_lvl+0x8c/0xd0 [ 42.338985] print_report+0x118/0x5e0 [ 42.339599] kasan_report+0xc8/0x118 [ 42.340198] kasan_check_range+0x100/0x1a8 [ 42.340738] __kasan_check_write+0x20/0x30 [ 42.341378] kasan_atomics_helper+0xf88/0x4858 [ 42.342015] kasan_atomics+0x198/0x2e8 [ 42.342541] kunit_try_run_case+0x14c/0x3d0 [ 42.343196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.343922] kthread+0x24c/0x2d0 [ 42.344415] ret_from_fork+0x10/0x20 [ 42.345097] [ 42.345425] Allocated by task 254: [ 42.345874] kasan_save_stack+0x3c/0x68 [ 42.346493] kasan_save_track+0x20/0x40 [ 42.347088] kasan_save_alloc_info+0x40/0x58 [ 42.347628] __kasan_kmalloc+0xd4/0xd8 [ 42.348209] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.348782] kasan_atomics+0xb8/0x2e8 [ 42.349349] kunit_try_run_case+0x14c/0x3d0 [ 42.349873] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.350628] kthread+0x24c/0x2d0 [ 42.351052] ret_from_fork+0x10/0x20 [ 42.351825] [ 42.352462] The buggy address belongs to the object at fff00000c65bde00 [ 42.352462] which belongs to the cache kmalloc-64 of size 64 [ 42.353830] The buggy address is located 0 bytes to the right of [ 42.353830] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.354423] [ 42.354855] The buggy address belongs to the physical page: [ 42.355659] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.356716] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.357590] page_type: f5(slab) [ 42.358094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.359015] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.359387] page dumped because: kasan: bad access detected [ 42.359940] [ 42.360317] Memory state around the buggy address: [ 42.360994] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.361865] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.362852] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.363610] ^ [ 42.364303] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.365164] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.365889] ================================================================== [ 40.891106] ================================================================== [ 40.891904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 40.892673] Read of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 40.893993] [ 40.894432] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 40.896165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 40.897480] Hardware name: linux,dummy-virt (DT) [ 40.898065] Call trace: [ 40.898664] show_stack+0x20/0x38 (C) [ 40.899201] dump_stack_lvl+0x8c/0xd0 [ 40.899795] print_report+0x118/0x5e0 [ 40.900564] kasan_report+0xc8/0x118 [ 40.901193] kasan_check_range+0x100/0x1a8 [ 40.901937] __kasan_check_read+0x20/0x30 [ 40.902826] kasan_atomics_helper+0x2b0/0x4858 [ 40.903560] kasan_atomics+0x198/0x2e8 [ 40.904201] kunit_try_run_case+0x14c/0x3d0 [ 40.904880] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.905737] kthread+0x24c/0x2d0 [ 40.906536] ret_from_fork+0x10/0x20 [ 40.906959] [ 40.907203] Allocated by task 254: [ 40.907582] kasan_save_stack+0x3c/0x68 [ 40.908063] kasan_save_track+0x20/0x40 [ 40.908749] kasan_save_alloc_info+0x40/0x58 [ 40.909475] __kasan_kmalloc+0xd4/0xd8 [ 40.910124] __kmalloc_cache_noprof+0x15c/0x3c8 [ 40.910850] kasan_atomics+0xb8/0x2e8 [ 40.911360] kunit_try_run_case+0x14c/0x3d0 [ 40.912269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 40.913009] kthread+0x24c/0x2d0 [ 40.913858] ret_from_fork+0x10/0x20 [ 40.914652] [ 40.915171] The buggy address belongs to the object at fff00000c65bde00 [ 40.915171] which belongs to the cache kmalloc-64 of size 64 [ 40.916581] The buggy address is located 0 bytes to the right of [ 40.916581] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 40.918352] [ 40.919227] The buggy address belongs to the physical page: [ 40.920055] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 40.920969] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 40.922765] page_type: f5(slab) [ 40.923468] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 40.924149] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 40.925107] page dumped because: kasan: bad access detected [ 40.926363] [ 40.926753] Memory state around the buggy address: [ 40.927319] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.928076] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 40.929316] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 40.930544] ^ [ 40.931087] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.932854] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 40.933937] ================================================================== [ 42.034462] ================================================================== [ 42.035167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 42.035853] Write of size 4 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.036428] [ 42.036825] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.038034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.038721] Hardware name: linux,dummy-virt (DT) [ 42.039359] Call trace: [ 42.039847] show_stack+0x20/0x38 (C) [ 42.040522] dump_stack_lvl+0x8c/0xd0 [ 42.041177] print_report+0x118/0x5e0 [ 42.041820] kasan_report+0xc8/0x118 [ 42.042464] kasan_check_range+0x100/0x1a8 [ 42.043138] __kasan_check_write+0x20/0x30 [ 42.043771] kasan_atomics_helper+0xd3c/0x4858 [ 42.044499] kasan_atomics+0x198/0x2e8 [ 42.045025] kunit_try_run_case+0x14c/0x3d0 [ 42.045742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.046439] kthread+0x24c/0x2d0 [ 42.047056] ret_from_fork+0x10/0x20 [ 42.047723] [ 42.048099] Allocated by task 254: [ 42.048583] kasan_save_stack+0x3c/0x68 [ 42.049202] kasan_save_track+0x20/0x40 [ 42.049835] kasan_save_alloc_info+0x40/0x58 [ 42.050414] __kasan_kmalloc+0xd4/0xd8 [ 42.050978] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.051603] kasan_atomics+0xb8/0x2e8 [ 42.052079] kunit_try_run_case+0x14c/0x3d0 [ 42.052919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.053723] kthread+0x24c/0x2d0 [ 42.054340] ret_from_fork+0x10/0x20 [ 42.054961] [ 42.055387] The buggy address belongs to the object at fff00000c65bde00 [ 42.055387] which belongs to the cache kmalloc-64 of size 64 [ 42.056830] The buggy address is located 0 bytes to the right of [ 42.056830] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.058114] [ 42.058414] The buggy address belongs to the physical page: [ 42.059092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.059936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.060795] page_type: f5(slab) [ 42.061380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.062393] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.063354] page dumped because: kasan: bad access detected [ 42.064162] [ 42.064594] Memory state around the buggy address: [ 42.065216] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.065967] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.066830] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.067660] ^ [ 42.068253] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.069033] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.069817] ================================================================== [ 43.118614] ================================================================== [ 43.119361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 43.120069] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 43.120779] [ 43.121036] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 43.123112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 43.123673] Hardware name: linux,dummy-virt (DT) [ 43.124209] Call trace: [ 43.124667] show_stack+0x20/0x38 (C) [ 43.125279] dump_stack_lvl+0x8c/0xd0 [ 43.125885] print_report+0x118/0x5e0 [ 43.126514] kasan_report+0xc8/0x118 [ 43.127102] kasan_check_range+0x100/0x1a8 [ 43.127715] __kasan_check_write+0x20/0x30 [ 43.128306] kasan_atomics_helper+0x175c/0x4858 [ 43.128990] kasan_atomics+0x198/0x2e8 [ 43.129612] kunit_try_run_case+0x14c/0x3d0 [ 43.130254] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.130964] kthread+0x24c/0x2d0 [ 43.131536] ret_from_fork+0x10/0x20 [ 43.132106] [ 43.132425] Allocated by task 254: [ 43.132966] kasan_save_stack+0x3c/0x68 [ 43.133499] kasan_save_track+0x20/0x40 [ 43.134088] kasan_save_alloc_info+0x40/0x58 [ 43.134723] __kasan_kmalloc+0xd4/0xd8 [ 43.135212] __kmalloc_cache_noprof+0x15c/0x3c8 [ 43.135873] kasan_atomics+0xb8/0x2e8 [ 43.136378] kunit_try_run_case+0x14c/0x3d0 [ 43.136983] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 43.137720] kthread+0x24c/0x2d0 [ 43.138223] ret_from_fork+0x10/0x20 [ 43.139094] [ 43.139601] The buggy address belongs to the object at fff00000c65bde00 [ 43.139601] which belongs to the cache kmalloc-64 of size 64 [ 43.141147] The buggy address is located 0 bytes to the right of [ 43.141147] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 43.142589] [ 43.142916] The buggy address belongs to the physical page: [ 43.143810] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 43.144687] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 43.145613] page_type: f5(slab) [ 43.146296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 43.147325] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 43.148321] page dumped because: kasan: bad access detected [ 43.149135] [ 43.149460] Memory state around the buggy address: [ 43.150025] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.151121] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 43.152105] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 43.153056] ^ [ 43.153870] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.154847] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 43.155783] ================================================================== [ 42.257057] ================================================================== [ 42.258121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 42.259092] Write of size 8 at addr fff00000c65bde30 by task kunit_try_catch/254 [ 42.260026] [ 42.260521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 42.261705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 42.262326] Hardware name: linux,dummy-virt (DT) [ 42.262991] Call trace: [ 42.263499] show_stack+0x20/0x38 (C) [ 42.264178] dump_stack_lvl+0x8c/0xd0 [ 42.264818] print_report+0x118/0x5e0 [ 42.265531] kasan_report+0xc8/0x118 [ 42.266163] kasan_check_range+0x100/0x1a8 [ 42.266872] __kasan_check_write+0x20/0x30 [ 42.267539] kasan_atomics_helper+0xeb8/0x4858 [ 42.268225] kasan_atomics+0x198/0x2e8 [ 42.268861] kunit_try_run_case+0x14c/0x3d0 [ 42.269567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.270332] kthread+0x24c/0x2d0 [ 42.270932] ret_from_fork+0x10/0x20 [ 42.271517] [ 42.271902] Allocated by task 254: [ 42.272409] kasan_save_stack+0x3c/0x68 [ 42.273061] kasan_save_track+0x20/0x40 [ 42.273647] kasan_save_alloc_info+0x40/0x58 [ 42.274300] __kasan_kmalloc+0xd4/0xd8 [ 42.274947] __kmalloc_cache_noprof+0x15c/0x3c8 [ 42.275658] kasan_atomics+0xb8/0x2e8 [ 42.276271] kunit_try_run_case+0x14c/0x3d0 [ 42.276881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 42.277628] kthread+0x24c/0x2d0 [ 42.278147] ret_from_fork+0x10/0x20 [ 42.278779] [ 42.279087] The buggy address belongs to the object at fff00000c65bde00 [ 42.279087] which belongs to the cache kmalloc-64 of size 64 [ 42.280081] The buggy address is located 0 bytes to the right of [ 42.280081] allocated 48-byte region [fff00000c65bde00, fff00000c65bde30) [ 42.281430] [ 42.281822] The buggy address belongs to the physical page: [ 42.282403] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1065bd [ 42.283284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 42.284136] page_type: f5(slab) [ 42.284738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 42.285635] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 42.286371] page dumped because: kasan: bad access detected [ 42.287107] [ 42.287409] Memory state around the buggy address: [ 42.288042] fff00000c65bdd00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.288877] fff00000c65bdd80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 42.289683] >fff00000c65bde00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 42.290371] ^ [ 42.291026] fff00000c65bde80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.291700] fff00000c65bdf00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 42.292558] ==================================================================
[ 32.720732] ================================================================== [ 32.722731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 32.723966] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.725097] [ 32.725535] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.727433] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.727985] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.729660] Call Trace: [ 32.729879] <TASK> [ 32.730186] dump_stack_lvl+0x73/0xb0 [ 32.730603] print_report+0xd1/0x640 [ 32.731563] ? __virt_addr_valid+0x1db/0x2d0 [ 32.732043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.732511] kasan_report+0x102/0x140 [ 32.733366] ? kasan_atomics_helper+0x3e0/0x5450 [ 32.733994] ? kasan_atomics_helper+0x3e0/0x5450 [ 32.734782] kasan_check_range+0x10c/0x1c0 [ 32.735543] __kasan_check_read+0x15/0x20 [ 32.736003] kasan_atomics_helper+0x3e0/0x5450 [ 32.737527] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.738076] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.738910] ? kasan_save_alloc_info+0x3b/0x50 [ 32.739618] ? kasan_atomics+0x153/0x310 [ 32.740185] kasan_atomics+0x1dd/0x310 [ 32.740597] ? __pfx_kasan_atomics+0x10/0x10 [ 32.741541] ? __pfx_read_tsc+0x10/0x10 [ 32.742476] ? ktime_get_ts64+0x84/0x230 [ 32.743087] kunit_try_run_case+0x1b3/0x490 [ 32.744025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.744730] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.745455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.745998] ? __kthread_parkme+0x82/0x160 [ 32.746994] ? preempt_count_sub+0x50/0x80 [ 32.747879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.748344] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.749469] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.750079] kthread+0x257/0x310 [ 32.751846] ? __pfx_kthread+0x10/0x10 [ 32.752098] ret_from_fork+0x41/0x80 [ 32.752334] ? __pfx_kthread+0x10/0x10 [ 32.752573] ret_from_fork_asm+0x1a/0x30 [ 32.752899] </TASK> [ 32.753063] [ 32.753191] Allocated by task 272: [ 32.753398] kasan_save_stack+0x3d/0x60 [ 32.753644] kasan_save_track+0x18/0x40 [ 32.756009] kasan_save_alloc_info+0x3b/0x50 [ 32.757904] __kasan_kmalloc+0xb7/0xc0 [ 32.759141] __kmalloc_cache_noprof+0x184/0x410 [ 32.760417] kasan_atomics+0x96/0x310 [ 32.761930] kunit_try_run_case+0x1b3/0x490 [ 32.763359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.765005] kthread+0x257/0x310 [ 32.765715] ret_from_fork+0x41/0x80 [ 32.766596] ret_from_fork_asm+0x1a/0x30 [ 32.767036] [ 32.767296] The buggy address belongs to the object at ffff8881029f9480 [ 32.767296] which belongs to the cache kmalloc-64 of size 64 [ 32.769110] The buggy address is located 0 bytes to the right of [ 32.769110] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.770582] [ 32.770991] The buggy address belongs to the physical page: [ 32.771587] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.772238] flags: 0x200000000000000(node=0|zone=2) [ 32.772601] page_type: f5(slab) [ 32.773331] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.773997] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.774998] page dumped because: kasan: bad access detected [ 32.775818] [ 32.775960] Memory state around the buggy address: [ 32.777000] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.778340] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.779513] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.780874] ^ [ 32.781886] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.782676] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.783470] ================================================================== [ 32.839315] ================================================================== [ 32.840099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 32.841306] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.842739] [ 32.842951] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.844328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.844629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.845850] Call Trace: [ 32.846250] <TASK> [ 32.846476] dump_stack_lvl+0x73/0xb0 [ 32.846888] print_report+0xd1/0x640 [ 32.847739] ? __virt_addr_valid+0x1db/0x2d0 [ 32.848372] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.849205] kasan_report+0x102/0x140 [ 32.849576] ? kasan_atomics_helper+0x4a1/0x5450 [ 32.850287] ? kasan_atomics_helper+0x4a1/0x5450 [ 32.851198] kasan_check_range+0x10c/0x1c0 [ 32.851598] __kasan_check_write+0x18/0x20 [ 32.852455] kasan_atomics_helper+0x4a1/0x5450 [ 32.853306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.854496] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.855001] ? kasan_save_alloc_info+0x3b/0x50 [ 32.855560] ? kasan_atomics+0x153/0x310 [ 32.856191] kasan_atomics+0x1dd/0x310 [ 32.856526] ? __pfx_kasan_atomics+0x10/0x10 [ 32.857084] ? __pfx_read_tsc+0x10/0x10 [ 32.857425] ? ktime_get_ts64+0x84/0x230 [ 32.857880] kunit_try_run_case+0x1b3/0x490 [ 32.858465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.859023] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.859483] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.860032] ? __kthread_parkme+0x82/0x160 [ 32.860527] ? preempt_count_sub+0x50/0x80 [ 32.861110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.861582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.862268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.863053] kthread+0x257/0x310 [ 32.863454] ? __pfx_kthread+0x10/0x10 [ 32.864052] ret_from_fork+0x41/0x80 [ 32.864340] ? __pfx_kthread+0x10/0x10 [ 32.864917] ret_from_fork_asm+0x1a/0x30 [ 32.865388] </TASK> [ 32.865790] [ 32.866314] Allocated by task 272: [ 32.866585] kasan_save_stack+0x3d/0x60 [ 32.867202] kasan_save_track+0x18/0x40 [ 32.867783] kasan_save_alloc_info+0x3b/0x50 [ 32.868156] __kasan_kmalloc+0xb7/0xc0 [ 32.868743] __kmalloc_cache_noprof+0x184/0x410 [ 32.869258] kasan_atomics+0x96/0x310 [ 32.869579] kunit_try_run_case+0x1b3/0x490 [ 32.870243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.870995] kthread+0x257/0x310 [ 32.871298] ret_from_fork+0x41/0x80 [ 32.871898] ret_from_fork_asm+0x1a/0x30 [ 32.872317] [ 32.872572] The buggy address belongs to the object at ffff8881029f9480 [ 32.872572] which belongs to the cache kmalloc-64 of size 64 [ 32.873777] The buggy address is located 0 bytes to the right of [ 32.873777] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.874931] [ 32.875238] The buggy address belongs to the physical page: [ 32.875827] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.876488] flags: 0x200000000000000(node=0|zone=2) [ 32.877125] page_type: f5(slab) [ 32.877420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.878463] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.879360] page dumped because: kasan: bad access detected [ 32.880001] [ 32.880225] Memory state around the buggy address: [ 32.880656] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.881276] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.882132] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.882802] ^ [ 32.883384] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.884119] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.884849] ================================================================== [ 35.168921] ================================================================== [ 35.169793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 35.170243] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.170981] [ 35.171188] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.173789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.174087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.174669] Call Trace: [ 35.175041] <TASK> [ 35.175316] dump_stack_lvl+0x73/0xb0 [ 35.175661] print_report+0xd1/0x640 [ 35.176112] ? __virt_addr_valid+0x1db/0x2d0 [ 35.176848] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.177356] kasan_report+0x102/0x140 [ 35.177825] ? kasan_atomics_helper+0x1f44/0x5450 [ 35.178403] ? kasan_atomics_helper+0x1f44/0x5450 [ 35.178999] kasan_check_range+0x10c/0x1c0 [ 35.179499] __kasan_check_write+0x18/0x20 [ 35.180001] kasan_atomics_helper+0x1f44/0x5450 [ 35.180499] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.181114] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.181567] ? kasan_save_alloc_info+0x3b/0x50 [ 35.182097] ? kasan_atomics+0x153/0x310 [ 35.182758] kasan_atomics+0x1dd/0x310 [ 35.183120] ? __pfx_kasan_atomics+0x10/0x10 [ 35.183776] ? __pfx_read_tsc+0x10/0x10 [ 35.184092] ? ktime_get_ts64+0x84/0x230 [ 35.184670] kunit_try_run_case+0x1b3/0x490 [ 35.185165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.185685] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.186348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.186892] ? __kthread_parkme+0x82/0x160 [ 35.187347] ? preempt_count_sub+0x50/0x80 [ 35.187941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.188354] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.189129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.189696] kthread+0x257/0x310 [ 35.190211] ? __pfx_kthread+0x10/0x10 [ 35.190784] ret_from_fork+0x41/0x80 [ 35.191077] ? __pfx_kthread+0x10/0x10 [ 35.191645] ret_from_fork_asm+0x1a/0x30 [ 35.192111] </TASK> [ 35.192470] [ 35.192746] Allocated by task 272: [ 35.193164] kasan_save_stack+0x3d/0x60 [ 35.193726] kasan_save_track+0x18/0x40 [ 35.194079] kasan_save_alloc_info+0x3b/0x50 [ 35.194547] __kasan_kmalloc+0xb7/0xc0 [ 35.195082] __kmalloc_cache_noprof+0x184/0x410 [ 35.195555] kasan_atomics+0x96/0x310 [ 35.196100] kunit_try_run_case+0x1b3/0x490 [ 35.196716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.197232] kthread+0x257/0x310 [ 35.197730] ret_from_fork+0x41/0x80 [ 35.198085] ret_from_fork_asm+0x1a/0x30 [ 35.198490] [ 35.198860] The buggy address belongs to the object at ffff8881029f9480 [ 35.198860] which belongs to the cache kmalloc-64 of size 64 [ 35.199851] The buggy address is located 0 bytes to the right of [ 35.199851] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.201110] [ 35.201364] The buggy address belongs to the physical page: [ 35.201997] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.202679] flags: 0x200000000000000(node=0|zone=2) [ 35.203036] page_type: f5(slab) [ 35.203450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.204129] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.204931] page dumped because: kasan: bad access detected [ 35.205533] [ 35.205894] Memory state around the buggy address: [ 35.206480] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.207280] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.208041] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.208755] ^ [ 35.209121] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.210511] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.211054] ================================================================== [ 32.564794] ================================================================== [ 32.565633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 32.566343] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.567292] [ 32.567896] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.568480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.569388] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.570116] Call Trace: [ 32.570318] <TASK> [ 32.571041] dump_stack_lvl+0x73/0xb0 [ 32.571618] print_report+0xd1/0x640 [ 32.572312] ? __virt_addr_valid+0x1db/0x2d0 [ 32.572734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.573242] kasan_report+0x102/0x140 [ 32.573625] ? kasan_atomics_helper+0x4ba4/0x5450 [ 32.574891] ? kasan_atomics_helper+0x4ba4/0x5450 [ 32.575543] __asan_report_store4_noabort+0x1b/0x30 [ 32.575964] kasan_atomics_helper+0x4ba4/0x5450 [ 32.576542] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.577162] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.577878] ? kasan_save_alloc_info+0x3b/0x50 [ 32.578306] ? kasan_atomics+0x153/0x310 [ 32.578783] kasan_atomics+0x1dd/0x310 [ 32.579333] ? __pfx_kasan_atomics+0x10/0x10 [ 32.580156] ? __pfx_read_tsc+0x10/0x10 [ 32.580681] ? ktime_get_ts64+0x84/0x230 [ 32.581863] kunit_try_run_case+0x1b3/0x490 [ 32.582587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.583398] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.584384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.585358] ? __kthread_parkme+0x82/0x160 [ 32.585862] ? preempt_count_sub+0x50/0x80 [ 32.586302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.586804] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.587524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.588043] kthread+0x257/0x310 [ 32.588516] ? __pfx_kthread+0x10/0x10 [ 32.589051] ret_from_fork+0x41/0x80 [ 32.589401] ? __pfx_kthread+0x10/0x10 [ 32.589857] ret_from_fork_asm+0x1a/0x30 [ 32.590450] </TASK> [ 32.590937] [ 32.591094] Allocated by task 272: [ 32.591780] kasan_save_stack+0x3d/0x60 [ 32.592063] kasan_save_track+0x18/0x40 [ 32.592482] kasan_save_alloc_info+0x3b/0x50 [ 32.593239] __kasan_kmalloc+0xb7/0xc0 [ 32.593622] __kmalloc_cache_noprof+0x184/0x410 [ 32.594101] kasan_atomics+0x96/0x310 [ 32.594858] kunit_try_run_case+0x1b3/0x490 [ 32.595246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.595985] kthread+0x257/0x310 [ 32.596741] ret_from_fork+0x41/0x80 [ 32.597230] ret_from_fork_asm+0x1a/0x30 [ 32.597532] [ 32.597764] The buggy address belongs to the object at ffff8881029f9480 [ 32.597764] which belongs to the cache kmalloc-64 of size 64 [ 32.598679] The buggy address is located 0 bytes to the right of [ 32.598679] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.600287] [ 32.600466] The buggy address belongs to the physical page: [ 32.601150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.601859] flags: 0x200000000000000(node=0|zone=2) [ 32.602182] page_type: f5(slab) [ 32.602852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.603505] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.604523] page dumped because: kasan: bad access detected [ 32.605079] [ 32.605503] Memory state around the buggy address: [ 32.605830] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.606536] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.607526] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.608407] ^ [ 32.608811] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.609591] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.610304] ================================================================== [ 35.446851] ================================================================== [ 35.447881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 35.448485] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.449144] [ 35.449382] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.450317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.450796] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.451527] Call Trace: [ 35.452485] <TASK> [ 35.452804] dump_stack_lvl+0x73/0xb0 [ 35.453083] print_report+0xd1/0x640 [ 35.453401] ? __virt_addr_valid+0x1db/0x2d0 [ 35.453901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.454489] kasan_report+0x102/0x140 [ 35.454990] ? kasan_atomics_helper+0x218b/0x5450 [ 35.455515] ? kasan_atomics_helper+0x218b/0x5450 [ 35.456061] kasan_check_range+0x10c/0x1c0 [ 35.456442] __kasan_check_write+0x18/0x20 [ 35.457298] kasan_atomics_helper+0x218b/0x5450 [ 35.457913] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.458430] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.458871] ? kasan_save_alloc_info+0x3b/0x50 [ 35.459250] ? kasan_atomics+0x153/0x310 [ 35.459767] kasan_atomics+0x1dd/0x310 [ 35.460143] ? __pfx_kasan_atomics+0x10/0x10 [ 35.460678] ? __pfx_read_tsc+0x10/0x10 [ 35.461074] ? ktime_get_ts64+0x84/0x230 [ 35.461450] kunit_try_run_case+0x1b3/0x490 [ 35.461913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.462254] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.462871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.463478] ? __kthread_parkme+0x82/0x160 [ 35.463952] ? preempt_count_sub+0x50/0x80 [ 35.464352] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.464853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.465509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.466473] kthread+0x257/0x310 [ 35.467124] ? __pfx_kthread+0x10/0x10 [ 35.467787] ret_from_fork+0x41/0x80 [ 35.468181] ? __pfx_kthread+0x10/0x10 [ 35.468489] ret_from_fork_asm+0x1a/0x30 [ 35.469136] </TASK> [ 35.469342] [ 35.469589] Allocated by task 272: [ 35.470474] kasan_save_stack+0x3d/0x60 [ 35.470945] kasan_save_track+0x18/0x40 [ 35.471334] kasan_save_alloc_info+0x3b/0x50 [ 35.471762] __kasan_kmalloc+0xb7/0xc0 [ 35.472558] __kmalloc_cache_noprof+0x184/0x410 [ 35.473312] kasan_atomics+0x96/0x310 [ 35.473996] kunit_try_run_case+0x1b3/0x490 [ 35.474593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.475252] kthread+0x257/0x310 [ 35.475584] ret_from_fork+0x41/0x80 [ 35.476175] ret_from_fork_asm+0x1a/0x30 [ 35.476590] [ 35.476972] The buggy address belongs to the object at ffff8881029f9480 [ 35.476972] which belongs to the cache kmalloc-64 of size 64 [ 35.477804] The buggy address is located 0 bytes to the right of [ 35.477804] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.479744] [ 35.479912] The buggy address belongs to the physical page: [ 35.480620] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.481820] flags: 0x200000000000000(node=0|zone=2) [ 35.482438] page_type: f5(slab) [ 35.482932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.483660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.484604] page dumped because: kasan: bad access detected [ 35.485169] [ 35.485418] Memory state around the buggy address: [ 35.486235] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.487043] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.488211] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.488846] ^ [ 35.489249] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.489859] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.490653] ================================================================== [ 33.558591] ================================================================== [ 33.559529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 33.560043] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.560552] [ 33.562632] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.563745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.564266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.565220] Call Trace: [ 33.565555] <TASK> [ 33.565929] dump_stack_lvl+0x73/0xb0 [ 33.566429] print_report+0xd1/0x640 [ 33.566943] ? __virt_addr_valid+0x1db/0x2d0 [ 33.567443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.568077] kasan_report+0x102/0x140 [ 33.568533] ? kasan_atomics_helper+0xd48/0x5450 [ 33.569116] ? kasan_atomics_helper+0xd48/0x5450 [ 33.569728] kasan_check_range+0x10c/0x1c0 [ 33.570130] __kasan_check_write+0x18/0x20 [ 33.570667] kasan_atomics_helper+0xd48/0x5450 [ 33.571148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.571813] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.572234] ? kasan_save_alloc_info+0x3b/0x50 [ 33.572754] ? kasan_atomics+0x153/0x310 [ 33.573151] kasan_atomics+0x1dd/0x310 [ 33.573614] ? __pfx_kasan_atomics+0x10/0x10 [ 33.574173] ? __pfx_read_tsc+0x10/0x10 [ 33.574744] ? ktime_get_ts64+0x84/0x230 [ 33.575233] kunit_try_run_case+0x1b3/0x490 [ 33.576463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.577286] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.577808] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.578168] ? __kthread_parkme+0x82/0x160 [ 33.578762] ? preempt_count_sub+0x50/0x80 [ 33.579140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.579582] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.580314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.581429] kthread+0x257/0x310 [ 33.581869] ? __pfx_kthread+0x10/0x10 [ 33.582524] ret_from_fork+0x41/0x80 [ 33.583007] ? __pfx_kthread+0x10/0x10 [ 33.583418] ret_from_fork_asm+0x1a/0x30 [ 33.584541] </TASK> [ 33.584757] [ 33.584944] Allocated by task 272: [ 33.585887] kasan_save_stack+0x3d/0x60 [ 33.586548] kasan_save_track+0x18/0x40 [ 33.586932] kasan_save_alloc_info+0x3b/0x50 [ 33.587360] __kasan_kmalloc+0xb7/0xc0 [ 33.588304] __kmalloc_cache_noprof+0x184/0x410 [ 33.588724] kasan_atomics+0x96/0x310 [ 33.589278] kunit_try_run_case+0x1b3/0x490 [ 33.590129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.590613] kthread+0x257/0x310 [ 33.591256] ret_from_fork+0x41/0x80 [ 33.591442] ret_from_fork_asm+0x1a/0x30 [ 33.591632] [ 33.591804] The buggy address belongs to the object at ffff8881029f9480 [ 33.591804] which belongs to the cache kmalloc-64 of size 64 [ 33.593379] The buggy address is located 0 bytes to the right of [ 33.593379] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.594590] [ 33.594893] The buggy address belongs to the physical page: [ 33.595411] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.596460] flags: 0x200000000000000(node=0|zone=2) [ 33.597098] page_type: f5(slab) [ 33.597730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.598365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.599211] page dumped because: kasan: bad access detected [ 33.600263] [ 33.600715] Memory state around the buggy address: [ 33.601048] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.601639] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.602425] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.603028] ^ [ 33.603457] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.604053] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.604896] ================================================================== [ 34.008183] ================================================================== [ 34.009346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 34.010083] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.011571] [ 34.011878] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.013240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.013923] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.014636] Call Trace: [ 34.015360] <TASK> [ 34.015875] dump_stack_lvl+0x73/0xb0 [ 34.016492] print_report+0xd1/0x640 [ 34.017012] ? __virt_addr_valid+0x1db/0x2d0 [ 34.017776] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.018323] kasan_report+0x102/0x140 [ 34.019068] ? kasan_atomics_helper+0x1218/0x5450 [ 34.019737] ? kasan_atomics_helper+0x1218/0x5450 [ 34.020424] kasan_check_range+0x10c/0x1c0 [ 34.021091] __kasan_check_write+0x18/0x20 [ 34.021567] kasan_atomics_helper+0x1218/0x5450 [ 34.022361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.023281] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.024135] ? kasan_save_alloc_info+0x3b/0x50 [ 34.024739] ? kasan_atomics+0x153/0x310 [ 34.025262] kasan_atomics+0x1dd/0x310 [ 34.026356] ? __pfx_kasan_atomics+0x10/0x10 [ 34.026766] ? __pfx_read_tsc+0x10/0x10 [ 34.027384] ? ktime_get_ts64+0x84/0x230 [ 34.027972] kunit_try_run_case+0x1b3/0x490 [ 34.028407] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.029257] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.029738] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.030463] ? __kthread_parkme+0x82/0x160 [ 34.031079] ? preempt_count_sub+0x50/0x80 [ 34.031564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.032142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.033279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.033747] kthread+0x257/0x310 [ 34.034353] ? __pfx_kthread+0x10/0x10 [ 34.035083] ret_from_fork+0x41/0x80 [ 34.035491] ? __pfx_kthread+0x10/0x10 [ 34.035901] ret_from_fork_asm+0x1a/0x30 [ 34.036333] </TASK> [ 34.036527] [ 34.036808] Allocated by task 272: [ 34.037235] kasan_save_stack+0x3d/0x60 [ 34.037629] kasan_save_track+0x18/0x40 [ 34.038551] kasan_save_alloc_info+0x3b/0x50 [ 34.038999] __kasan_kmalloc+0xb7/0xc0 [ 34.039395] __kmalloc_cache_noprof+0x184/0x410 [ 34.040042] kasan_atomics+0x96/0x310 [ 34.040392] kunit_try_run_case+0x1b3/0x490 [ 34.040998] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.041583] kthread+0x257/0x310 [ 34.041994] ret_from_fork+0x41/0x80 [ 34.042466] ret_from_fork_asm+0x1a/0x30 [ 34.042987] [ 34.043245] The buggy address belongs to the object at ffff8881029f9480 [ 34.043245] which belongs to the cache kmalloc-64 of size 64 [ 34.044347] The buggy address is located 0 bytes to the right of [ 34.044347] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.045524] [ 34.045895] The buggy address belongs to the physical page: [ 34.046364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.047233] flags: 0x200000000000000(node=0|zone=2) [ 34.047765] page_type: f5(slab) [ 34.048239] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.048913] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.049747] page dumped because: kasan: bad access detected [ 34.050318] [ 34.050549] Memory state around the buggy address: [ 34.051083] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.051941] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.052474] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.053300] ^ [ 34.053732] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.054535] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.055245] ================================================================== [ 32.518648] ================================================================== [ 32.519618] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 32.520233] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.520935] [ 32.521108] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.522689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.523520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.524590] Call Trace: [ 32.525055] <TASK> [ 32.526047] dump_stack_lvl+0x73/0xb0 [ 32.526506] print_report+0xd1/0x640 [ 32.527191] ? __virt_addr_valid+0x1db/0x2d0 [ 32.528060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.529015] kasan_report+0x102/0x140 [ 32.529466] ? kasan_atomics_helper+0x4bbe/0x5450 [ 32.529975] ? kasan_atomics_helper+0x4bbe/0x5450 [ 32.530490] __asan_report_load4_noabort+0x18/0x20 [ 32.531028] kasan_atomics_helper+0x4bbe/0x5450 [ 32.531544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.532241] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.532810] ? kasan_save_alloc_info+0x3b/0x50 [ 32.533240] ? kasan_atomics+0x153/0x310 [ 32.533676] kasan_atomics+0x1dd/0x310 [ 32.534305] ? __pfx_kasan_atomics+0x10/0x10 [ 32.534928] ? __pfx_read_tsc+0x10/0x10 [ 32.535327] ? ktime_get_ts64+0x84/0x230 [ 32.535674] kunit_try_run_case+0x1b3/0x490 [ 32.536202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.536815] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.537444] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.538091] ? __kthread_parkme+0x82/0x160 [ 32.538494] ? preempt_count_sub+0x50/0x80 [ 32.538822] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.539869] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.540641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.541263] kthread+0x257/0x310 [ 32.541853] ? __pfx_kthread+0x10/0x10 [ 32.542312] ret_from_fork+0x41/0x80 [ 32.542762] ? __pfx_kthread+0x10/0x10 [ 32.543260] ret_from_fork_asm+0x1a/0x30 [ 32.543592] </TASK> [ 32.544288] [ 32.544500] Allocated by task 272: [ 32.544856] kasan_save_stack+0x3d/0x60 [ 32.545338] kasan_save_track+0x18/0x40 [ 32.545821] kasan_save_alloc_info+0x3b/0x50 [ 32.546531] __kasan_kmalloc+0xb7/0xc0 [ 32.546833] __kmalloc_cache_noprof+0x184/0x410 [ 32.547414] kasan_atomics+0x96/0x310 [ 32.547926] kunit_try_run_case+0x1b3/0x490 [ 32.548564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.548953] kthread+0x257/0x310 [ 32.549200] ret_from_fork+0x41/0x80 [ 32.549783] ret_from_fork_asm+0x1a/0x30 [ 32.550477] [ 32.550771] The buggy address belongs to the object at ffff8881029f9480 [ 32.550771] which belongs to the cache kmalloc-64 of size 64 [ 32.551756] The buggy address is located 0 bytes to the right of [ 32.551756] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.553174] [ 32.553553] The buggy address belongs to the physical page: [ 32.554098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.555074] flags: 0x200000000000000(node=0|zone=2) [ 32.555419] page_type: f5(slab) [ 32.555673] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.556529] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.557137] page dumped because: kasan: bad access detected [ 32.557838] [ 32.558064] Memory state around the buggy address: [ 32.558377] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.559470] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.560420] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.561099] ^ [ 32.561424] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.562238] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.563057] ================================================================== [ 34.147248] ================================================================== [ 34.148076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 34.148689] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.149169] [ 34.149431] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.150437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.150774] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.151685] Call Trace: [ 34.151917] <TASK> [ 34.152107] dump_stack_lvl+0x73/0xb0 [ 34.152587] print_report+0xd1/0x640 [ 34.153114] ? __virt_addr_valid+0x1db/0x2d0 [ 34.153688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.154227] kasan_report+0x102/0x140 [ 34.154727] ? kasan_atomics_helper+0x49d0/0x5450 [ 34.155058] ? kasan_atomics_helper+0x49d0/0x5450 [ 34.155745] __asan_report_load4_noabort+0x18/0x20 [ 34.156237] kasan_atomics_helper+0x49d0/0x5450 [ 34.156740] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.157309] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.157893] ? kasan_save_alloc_info+0x3b/0x50 [ 34.158260] ? kasan_atomics+0x153/0x310 [ 34.158592] kasan_atomics+0x1dd/0x310 [ 34.159163] ? __pfx_kasan_atomics+0x10/0x10 [ 34.159675] ? __pfx_read_tsc+0x10/0x10 [ 34.160175] ? ktime_get_ts64+0x84/0x230 [ 34.160589] kunit_try_run_case+0x1b3/0x490 [ 34.160979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.161574] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.162188] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.162660] ? __kthread_parkme+0x82/0x160 [ 34.162985] ? preempt_count_sub+0x50/0x80 [ 34.163444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.163891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.164354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.165065] kthread+0x257/0x310 [ 34.165379] ? __pfx_kthread+0x10/0x10 [ 34.165827] ret_from_fork+0x41/0x80 [ 34.166281] ? __pfx_kthread+0x10/0x10 [ 34.166568] ret_from_fork_asm+0x1a/0x30 [ 34.167138] </TASK> [ 34.167412] [ 34.167738] Allocated by task 272: [ 34.168130] kasan_save_stack+0x3d/0x60 [ 34.168518] kasan_save_track+0x18/0x40 [ 34.169049] kasan_save_alloc_info+0x3b/0x50 [ 34.169380] __kasan_kmalloc+0xb7/0xc0 [ 34.169728] __kmalloc_cache_noprof+0x184/0x410 [ 34.170285] kasan_atomics+0x96/0x310 [ 34.170867] kunit_try_run_case+0x1b3/0x490 [ 34.171328] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.172781] kthread+0x257/0x310 [ 34.173040] ret_from_fork+0x41/0x80 [ 34.173343] ret_from_fork_asm+0x1a/0x30 [ 34.174270] [ 34.174425] The buggy address belongs to the object at ffff8881029f9480 [ 34.174425] which belongs to the cache kmalloc-64 of size 64 [ 34.175472] The buggy address is located 0 bytes to the right of [ 34.175472] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.177284] [ 34.177538] The buggy address belongs to the physical page: [ 34.178357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.179934] flags: 0x200000000000000(node=0|zone=2) [ 34.180920] page_type: f5(slab) [ 34.181528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.182523] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.183473] page dumped because: kasan: bad access detected [ 34.183893] [ 34.184153] Memory state around the buggy address: [ 34.184569] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.185279] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.186316] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.186991] ^ [ 34.187599] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.188393] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.189096] ================================================================== [ 33.325479] ================================================================== [ 33.327310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 33.328128] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.328772] [ 33.328993] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.329812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.330201] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.331040] Call Trace: [ 33.331252] <TASK> [ 33.331541] dump_stack_lvl+0x73/0xb0 [ 33.332093] print_report+0xd1/0x640 [ 33.332476] ? __virt_addr_valid+0x1db/0x2d0 [ 33.332936] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.333353] kasan_report+0x102/0x140 [ 33.333890] ? kasan_atomics_helper+0xa2c/0x5450 [ 33.334449] ? kasan_atomics_helper+0xa2c/0x5450 [ 33.335026] kasan_check_range+0x10c/0x1c0 [ 33.335351] __kasan_check_write+0x18/0x20 [ 33.335934] kasan_atomics_helper+0xa2c/0x5450 [ 33.336350] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.336832] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.337155] ? kasan_save_alloc_info+0x3b/0x50 [ 33.337779] ? kasan_atomics+0x153/0x310 [ 33.338297] kasan_atomics+0x1dd/0x310 [ 33.338853] ? __pfx_kasan_atomics+0x10/0x10 [ 33.339331] ? __pfx_read_tsc+0x10/0x10 [ 33.339792] ? ktime_get_ts64+0x84/0x230 [ 33.340292] kunit_try_run_case+0x1b3/0x490 [ 33.340654] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.341197] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.341770] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.342337] ? __kthread_parkme+0x82/0x160 [ 33.342758] ? preempt_count_sub+0x50/0x80 [ 33.343230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.343818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.344214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.344925] kthread+0x257/0x310 [ 33.345354] ? __pfx_kthread+0x10/0x10 [ 33.345814] ret_from_fork+0x41/0x80 [ 33.346268] ? __pfx_kthread+0x10/0x10 [ 33.346742] ret_from_fork_asm+0x1a/0x30 [ 33.347245] </TASK> [ 33.347440] [ 33.347727] Allocated by task 272: [ 33.348138] kasan_save_stack+0x3d/0x60 [ 33.348655] kasan_save_track+0x18/0x40 [ 33.349062] kasan_save_alloc_info+0x3b/0x50 [ 33.349642] __kasan_kmalloc+0xb7/0xc0 [ 33.349963] __kmalloc_cache_noprof+0x184/0x410 [ 33.350487] kasan_atomics+0x96/0x310 [ 33.350890] kunit_try_run_case+0x1b3/0x490 [ 33.351310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.351845] kthread+0x257/0x310 [ 33.352201] ret_from_fork+0x41/0x80 [ 33.352678] ret_from_fork_asm+0x1a/0x30 [ 33.353125] [ 33.353321] The buggy address belongs to the object at ffff8881029f9480 [ 33.353321] which belongs to the cache kmalloc-64 of size 64 [ 33.354223] The buggy address is located 0 bytes to the right of [ 33.354223] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.355484] [ 33.356376] The buggy address belongs to the physical page: [ 33.356858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.357458] flags: 0x200000000000000(node=0|zone=2) [ 33.358589] page_type: f5(slab) [ 33.359427] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.360089] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.360678] page dumped because: kasan: bad access detected [ 33.361117] [ 33.361366] Memory state around the buggy address: [ 33.361750] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.362492] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.363535] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.364486] ^ [ 33.364893] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.365420] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.366477] ================================================================== [ 33.081454] ================================================================== [ 33.082495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 33.083369] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.084199] [ 33.084454] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.085469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.086017] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.086861] Call Trace: [ 33.087084] <TASK> [ 33.087278] dump_stack_lvl+0x73/0xb0 [ 33.087878] print_report+0xd1/0x640 [ 33.088335] ? __virt_addr_valid+0x1db/0x2d0 [ 33.088878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.089532] kasan_report+0x102/0x140 [ 33.089978] ? kasan_atomics_helper+0x730/0x5450 [ 33.090582] ? kasan_atomics_helper+0x730/0x5450 [ 33.091030] kasan_check_range+0x10c/0x1c0 [ 33.091565] __kasan_check_write+0x18/0x20 [ 33.092118] kasan_atomics_helper+0x730/0x5450 [ 33.092537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.093277] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.093815] ? kasan_save_alloc_info+0x3b/0x50 [ 33.094327] ? kasan_atomics+0x153/0x310 [ 33.094897] kasan_atomics+0x1dd/0x310 [ 33.095366] ? __pfx_kasan_atomics+0x10/0x10 [ 33.096023] ? __pfx_read_tsc+0x10/0x10 [ 33.096372] ? ktime_get_ts64+0x84/0x230 [ 33.096949] kunit_try_run_case+0x1b3/0x490 [ 33.097481] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.098030] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.098679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.099318] ? __kthread_parkme+0x82/0x160 [ 33.099873] ? preempt_count_sub+0x50/0x80 [ 33.100339] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.100961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.101570] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.102278] kthread+0x257/0x310 [ 33.102681] ? __pfx_kthread+0x10/0x10 [ 33.103222] ret_from_fork+0x41/0x80 [ 33.103717] ? __pfx_kthread+0x10/0x10 [ 33.104205] ret_from_fork_asm+0x1a/0x30 [ 33.104819] </TASK> [ 33.105086] [ 33.105320] Allocated by task 272: [ 33.105650] kasan_save_stack+0x3d/0x60 [ 33.106963] kasan_save_track+0x18/0x40 [ 33.107304] kasan_save_alloc_info+0x3b/0x50 [ 33.107755] __kasan_kmalloc+0xb7/0xc0 [ 33.108157] __kmalloc_cache_noprof+0x184/0x410 [ 33.108562] kasan_atomics+0x96/0x310 [ 33.109023] kunit_try_run_case+0x1b3/0x490 [ 33.109430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.110645] kthread+0x257/0x310 [ 33.111097] ret_from_fork+0x41/0x80 [ 33.111908] ret_from_fork_asm+0x1a/0x30 [ 33.112176] [ 33.112455] The buggy address belongs to the object at ffff8881029f9480 [ 33.112455] which belongs to the cache kmalloc-64 of size 64 [ 33.114352] The buggy address is located 0 bytes to the right of [ 33.114352] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.116046] [ 33.116198] The buggy address belongs to the physical page: [ 33.117245] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.117831] flags: 0x200000000000000(node=0|zone=2) [ 33.118509] page_type: f5(slab) [ 33.118997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.120113] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.120694] page dumped because: kasan: bad access detected [ 33.121402] [ 33.121722] Memory state around the buggy address: [ 33.122438] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.123293] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.124086] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.125068] ^ [ 33.125747] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.126439] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.127552] ================================================================== [ 33.182687] ================================================================== [ 33.183955] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 33.184934] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.186177] [ 33.186383] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.187813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.188288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.189365] Call Trace: [ 33.189921] <TASK> [ 33.190219] dump_stack_lvl+0x73/0xb0 [ 33.191057] print_report+0xd1/0x640 [ 33.191457] ? __virt_addr_valid+0x1db/0x2d0 [ 33.192171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.192680] kasan_report+0x102/0x140 [ 33.193438] ? kasan_atomics_helper+0x861/0x5450 [ 33.194002] ? kasan_atomics_helper+0x861/0x5450 [ 33.194495] kasan_check_range+0x10c/0x1c0 [ 33.195404] __kasan_check_write+0x18/0x20 [ 33.196093] kasan_atomics_helper+0x861/0x5450 [ 33.196564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.197469] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.198158] ? kasan_save_alloc_info+0x3b/0x50 [ 33.198908] ? kasan_atomics+0x153/0x310 [ 33.199298] kasan_atomics+0x1dd/0x310 [ 33.199688] ? __pfx_kasan_atomics+0x10/0x10 [ 33.200518] ? __pfx_read_tsc+0x10/0x10 [ 33.201130] ? ktime_get_ts64+0x84/0x230 [ 33.201872] kunit_try_run_case+0x1b3/0x490 [ 33.202521] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.203143] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.203832] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.204443] ? __kthread_parkme+0x82/0x160 [ 33.205181] ? preempt_count_sub+0x50/0x80 [ 33.205851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.206519] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.207110] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.208025] kthread+0x257/0x310 [ 33.208594] ? __pfx_kthread+0x10/0x10 [ 33.209286] ret_from_fork+0x41/0x80 [ 33.210014] ? __pfx_kthread+0x10/0x10 [ 33.210430] ret_from_fork_asm+0x1a/0x30 [ 33.210922] </TASK> [ 33.211187] [ 33.211390] Allocated by task 272: [ 33.212427] kasan_save_stack+0x3d/0x60 [ 33.212817] kasan_save_track+0x18/0x40 [ 33.213514] kasan_save_alloc_info+0x3b/0x50 [ 33.213892] __kasan_kmalloc+0xb7/0xc0 [ 33.214694] __kmalloc_cache_noprof+0x184/0x410 [ 33.215201] kasan_atomics+0x96/0x310 [ 33.215890] kunit_try_run_case+0x1b3/0x490 [ 33.216575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.217429] kthread+0x257/0x310 [ 33.217737] ret_from_fork+0x41/0x80 [ 33.218437] ret_from_fork_asm+0x1a/0x30 [ 33.218951] [ 33.219193] The buggy address belongs to the object at ffff8881029f9480 [ 33.219193] which belongs to the cache kmalloc-64 of size 64 [ 33.220873] The buggy address is located 0 bytes to the right of [ 33.220873] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.222637] [ 33.223041] The buggy address belongs to the physical page: [ 33.223646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.224738] flags: 0x200000000000000(node=0|zone=2) [ 33.225271] page_type: f5(slab) [ 33.226194] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.226879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.227556] page dumped because: kasan: bad access detected [ 33.228439] [ 33.228742] Memory state around the buggy address: [ 33.229397] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.230402] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.231075] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.231928] ^ [ 33.232448] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.233399] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.234301] ================================================================== [ 33.235232] ================================================================== [ 33.237136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 33.237786] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.238846] [ 33.239124] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.240399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.240779] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.241869] Call Trace: [ 33.242239] <TASK> [ 33.242451] dump_stack_lvl+0x73/0xb0 [ 33.242984] print_report+0xd1/0x640 [ 33.243454] ? __virt_addr_valid+0x1db/0x2d0 [ 33.244258] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.244774] kasan_report+0x102/0x140 [ 33.245279] ? kasan_atomics_helper+0x8fa/0x5450 [ 33.246015] ? kasan_atomics_helper+0x8fa/0x5450 [ 33.246444] kasan_check_range+0x10c/0x1c0 [ 33.247194] __kasan_check_write+0x18/0x20 [ 33.247678] kasan_atomics_helper+0x8fa/0x5450 [ 33.248158] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.248783] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.249399] ? kasan_save_alloc_info+0x3b/0x50 [ 33.250091] ? kasan_atomics+0x153/0x310 [ 33.250590] kasan_atomics+0x1dd/0x310 [ 33.251097] ? __pfx_kasan_atomics+0x10/0x10 [ 33.251791] ? __pfx_read_tsc+0x10/0x10 [ 33.252205] ? ktime_get_ts64+0x84/0x230 [ 33.252671] kunit_try_run_case+0x1b3/0x490 [ 33.253092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.253665] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.254165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.254534] ? __kthread_parkme+0x82/0x160 [ 33.255057] ? preempt_count_sub+0x50/0x80 [ 33.255604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.256287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.256962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.257597] kthread+0x257/0x310 [ 33.258010] ? __pfx_kthread+0x10/0x10 [ 33.258438] ret_from_fork+0x41/0x80 [ 33.258933] ? __pfx_kthread+0x10/0x10 [ 33.259548] ret_from_fork_asm+0x1a/0x30 [ 33.260084] </TASK> [ 33.260342] [ 33.260592] Allocated by task 272: [ 33.261018] kasan_save_stack+0x3d/0x60 [ 33.261413] kasan_save_track+0x18/0x40 [ 33.261904] kasan_save_alloc_info+0x3b/0x50 [ 33.262621] __kasan_kmalloc+0xb7/0xc0 [ 33.263044] __kmalloc_cache_noprof+0x184/0x410 [ 33.263354] kasan_atomics+0x96/0x310 [ 33.263722] kunit_try_run_case+0x1b3/0x490 [ 33.264359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.264874] kthread+0x257/0x310 [ 33.265230] ret_from_fork+0x41/0x80 [ 33.265545] ret_from_fork_asm+0x1a/0x30 [ 33.266389] [ 33.266549] The buggy address belongs to the object at ffff8881029f9480 [ 33.266549] which belongs to the cache kmalloc-64 of size 64 [ 33.267331] The buggy address is located 0 bytes to the right of [ 33.267331] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.269563] [ 33.269942] The buggy address belongs to the physical page: [ 33.270352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.271133] flags: 0x200000000000000(node=0|zone=2) [ 33.271590] page_type: f5(slab) [ 33.271929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.272636] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.273222] page dumped because: kasan: bad access detected [ 33.273733] [ 33.273984] Memory state around the buggy address: [ 33.274318] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.275070] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.275569] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.276376] ^ [ 33.276831] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.277431] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.277958] ================================================================== [ 34.704921] ================================================================== [ 34.705984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 34.706731] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.707299] [ 34.707627] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.708833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.709246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.710311] Call Trace: [ 34.710645] <TASK> [ 34.710862] dump_stack_lvl+0x73/0xb0 [ 34.711425] print_report+0xd1/0x640 [ 34.712130] ? __virt_addr_valid+0x1db/0x2d0 [ 34.712526] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.713061] kasan_report+0x102/0x140 [ 34.713494] ? kasan_atomics_helper+0x194b/0x5450 [ 34.713995] ? kasan_atomics_helper+0x194b/0x5450 [ 34.714726] kasan_check_range+0x10c/0x1c0 [ 34.715222] __kasan_check_write+0x18/0x20 [ 34.715644] kasan_atomics_helper+0x194b/0x5450 [ 34.716730] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.717312] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.717763] ? kasan_save_alloc_info+0x3b/0x50 [ 34.718245] ? kasan_atomics+0x153/0x310 [ 34.718820] kasan_atomics+0x1dd/0x310 [ 34.719132] ? __pfx_kasan_atomics+0x10/0x10 [ 34.719753] ? __pfx_read_tsc+0x10/0x10 [ 34.720075] ? ktime_get_ts64+0x84/0x230 [ 34.720522] kunit_try_run_case+0x1b3/0x490 [ 34.721136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.721669] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.722158] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.722544] ? __kthread_parkme+0x82/0x160 [ 34.723077] ? preempt_count_sub+0x50/0x80 [ 34.723576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.724031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.724663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.725291] kthread+0x257/0x310 [ 34.725561] ? __pfx_kthread+0x10/0x10 [ 34.726023] ret_from_fork+0x41/0x80 [ 34.726516] ? __pfx_kthread+0x10/0x10 [ 34.727049] ret_from_fork_asm+0x1a/0x30 [ 34.727463] </TASK> [ 34.727754] [ 34.727916] Allocated by task 272: [ 34.728265] kasan_save_stack+0x3d/0x60 [ 34.728829] kasan_save_track+0x18/0x40 [ 34.729260] kasan_save_alloc_info+0x3b/0x50 [ 34.729725] __kasan_kmalloc+0xb7/0xc0 [ 34.730077] __kmalloc_cache_noprof+0x184/0x410 [ 34.730392] kasan_atomics+0x96/0x310 [ 34.730917] kunit_try_run_case+0x1b3/0x490 [ 34.731423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.732108] kthread+0x257/0x310 [ 34.732380] ret_from_fork+0x41/0x80 [ 34.732766] ret_from_fork_asm+0x1a/0x30 [ 34.733212] [ 34.733374] The buggy address belongs to the object at ffff8881029f9480 [ 34.733374] which belongs to the cache kmalloc-64 of size 64 [ 34.734535] The buggy address is located 0 bytes to the right of [ 34.734535] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.735587] [ 34.735898] The buggy address belongs to the physical page: [ 34.736400] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.737116] flags: 0x200000000000000(node=0|zone=2) [ 34.737649] page_type: f5(slab) [ 34.738021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.738576] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.739301] page dumped because: kasan: bad access detected [ 34.739756] [ 34.740017] Memory state around the buggy address: [ 34.740480] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.741113] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.741834] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.742286] ^ [ 34.742806] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.743594] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.744239] ================================================================== [ 35.491974] ================================================================== [ 35.493738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 35.495176] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.496155] [ 35.496999] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.498125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.498398] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.500028] Call Trace: [ 35.500275] <TASK> [ 35.500462] dump_stack_lvl+0x73/0xb0 [ 35.501244] print_report+0xd1/0x640 [ 35.501939] ? __virt_addr_valid+0x1db/0x2d0 [ 35.502380] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.503290] kasan_report+0x102/0x140 [ 35.503823] ? kasan_atomics_helper+0x4fa7/0x5450 [ 35.504058] ? kasan_atomics_helper+0x4fa7/0x5450 [ 35.504279] __asan_report_load8_noabort+0x18/0x20 [ 35.504491] kasan_atomics_helper+0x4fa7/0x5450 [ 35.504871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.505606] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.506464] ? kasan_save_alloc_info+0x3b/0x50 [ 35.507003] ? kasan_atomics+0x153/0x310 [ 35.507526] kasan_atomics+0x1dd/0x310 [ 35.508062] ? __pfx_kasan_atomics+0x10/0x10 [ 35.508536] ? __pfx_read_tsc+0x10/0x10 [ 35.508996] ? ktime_get_ts64+0x84/0x230 [ 35.509411] kunit_try_run_case+0x1b3/0x490 [ 35.510032] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.510444] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.510978] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.511436] ? __kthread_parkme+0x82/0x160 [ 35.511839] ? preempt_count_sub+0x50/0x80 [ 35.512183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.512755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.513242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.513794] kthread+0x257/0x310 [ 35.514232] ? __pfx_kthread+0x10/0x10 [ 35.514523] ret_from_fork+0x41/0x80 [ 35.514881] ? __pfx_kthread+0x10/0x10 [ 35.515318] ret_from_fork_asm+0x1a/0x30 [ 35.515877] </TASK> [ 35.516177] [ 35.516375] Allocated by task 272: [ 35.516666] kasan_save_stack+0x3d/0x60 [ 35.516969] kasan_save_track+0x18/0x40 [ 35.517397] kasan_save_alloc_info+0x3b/0x50 [ 35.517985] __kasan_kmalloc+0xb7/0xc0 [ 35.518458] __kmalloc_cache_noprof+0x184/0x410 [ 35.518992] kasan_atomics+0x96/0x310 [ 35.519365] kunit_try_run_case+0x1b3/0x490 [ 35.519935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.520418] kthread+0x257/0x310 [ 35.520750] ret_from_fork+0x41/0x80 [ 35.521244] ret_from_fork_asm+0x1a/0x30 [ 35.521663] [ 35.521894] The buggy address belongs to the object at ffff8881029f9480 [ 35.521894] which belongs to the cache kmalloc-64 of size 64 [ 35.522845] The buggy address is located 0 bytes to the right of [ 35.522845] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.524106] [ 35.524294] The buggy address belongs to the physical page: [ 35.524898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.525346] flags: 0x200000000000000(node=0|zone=2) [ 35.525923] page_type: f5(slab) [ 35.526357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.527135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.527876] page dumped because: kasan: bad access detected [ 35.528384] [ 35.528584] Memory state around the buggy address: [ 35.529143] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.529763] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.530356] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.530874] ^ [ 35.531179] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.532048] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.532785] ================================================================== [ 34.515830] ================================================================== [ 34.516363] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 34.517230] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.518121] [ 34.518404] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.519213] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.519489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.520768] Call Trace: [ 34.521233] <TASK> [ 34.521687] dump_stack_lvl+0x73/0xb0 [ 34.522213] print_report+0xd1/0x640 [ 34.522576] ? __virt_addr_valid+0x1db/0x2d0 [ 34.523273] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.524047] kasan_report+0x102/0x140 [ 34.524571] ? kasan_atomics_helper+0x16e8/0x5450 [ 34.525274] ? kasan_atomics_helper+0x16e8/0x5450 [ 34.525906] kasan_check_range+0x10c/0x1c0 [ 34.526429] __kasan_check_write+0x18/0x20 [ 34.527040] kasan_atomics_helper+0x16e8/0x5450 [ 34.527580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.528239] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.528869] ? kasan_save_alloc_info+0x3b/0x50 [ 34.529404] ? kasan_atomics+0x153/0x310 [ 34.529988] kasan_atomics+0x1dd/0x310 [ 34.530409] ? __pfx_kasan_atomics+0x10/0x10 [ 34.531118] ? __pfx_read_tsc+0x10/0x10 [ 34.531563] ? ktime_get_ts64+0x84/0x230 [ 34.532131] kunit_try_run_case+0x1b3/0x490 [ 34.532750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.533258] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.533905] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.534448] ? __kthread_parkme+0x82/0x160 [ 34.535151] ? preempt_count_sub+0x50/0x80 [ 34.535745] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.536268] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.537157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.537867] kthread+0x257/0x310 [ 34.538386] ? __pfx_kthread+0x10/0x10 [ 34.538686] ret_from_fork+0x41/0x80 [ 34.539283] ? __pfx_kthread+0x10/0x10 [ 34.539899] ret_from_fork_asm+0x1a/0x30 [ 34.540347] </TASK> [ 34.540603] [ 34.540779] Allocated by task 272: [ 34.541217] kasan_save_stack+0x3d/0x60 [ 34.541584] kasan_save_track+0x18/0x40 [ 34.542135] kasan_save_alloc_info+0x3b/0x50 [ 34.542448] __kasan_kmalloc+0xb7/0xc0 [ 34.542747] __kmalloc_cache_noprof+0x184/0x410 [ 34.543391] kasan_atomics+0x96/0x310 [ 34.544143] kunit_try_run_case+0x1b3/0x490 [ 34.544761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.545131] kthread+0x257/0x310 [ 34.545385] ret_from_fork+0x41/0x80 [ 34.546163] ret_from_fork_asm+0x1a/0x30 [ 34.546836] [ 34.547061] The buggy address belongs to the object at ffff8881029f9480 [ 34.547061] which belongs to the cache kmalloc-64 of size 64 [ 34.548427] The buggy address is located 0 bytes to the right of [ 34.548427] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.549910] [ 34.550194] The buggy address belongs to the physical page: [ 34.550968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.551975] flags: 0x200000000000000(node=0|zone=2) [ 34.552677] page_type: f5(slab) [ 34.553294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.554237] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.555062] page dumped because: kasan: bad access detected [ 34.555798] [ 34.556129] Memory state around the buggy address: [ 34.556665] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.557395] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.558373] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.559033] ^ [ 34.559643] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.560426] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.561306] ================================================================== [ 34.745369] ================================================================== [ 34.746123] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 34.746698] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.747468] [ 34.748751] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.749397] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.749580] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.750767] Call Trace: [ 34.751056] <TASK> [ 34.751315] dump_stack_lvl+0x73/0xb0 [ 34.752162] print_report+0xd1/0x640 [ 34.753342] ? __virt_addr_valid+0x1db/0x2d0 [ 34.754000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.754721] kasan_report+0x102/0x140 [ 34.755382] ? kasan_atomics_helper+0x19e4/0x5450 [ 34.756274] ? kasan_atomics_helper+0x19e4/0x5450 [ 34.756683] kasan_check_range+0x10c/0x1c0 [ 34.757340] __kasan_check_write+0x18/0x20 [ 34.758255] kasan_atomics_helper+0x19e4/0x5450 [ 34.759320] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.760152] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.761054] ? kasan_save_alloc_info+0x3b/0x50 [ 34.761511] ? kasan_atomics+0x153/0x310 [ 34.762243] kasan_atomics+0x1dd/0x310 [ 34.763026] ? __pfx_kasan_atomics+0x10/0x10 [ 34.763469] ? __pfx_read_tsc+0x10/0x10 [ 34.763924] ? ktime_get_ts64+0x84/0x230 [ 34.765952] kunit_try_run_case+0x1b3/0x490 [ 34.766587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.767120] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.767438] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.768244] ? __kthread_parkme+0x82/0x160 [ 34.768614] ? preempt_count_sub+0x50/0x80 [ 34.769161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.769898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.770374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.770849] kthread+0x257/0x310 [ 34.771295] ? __pfx_kthread+0x10/0x10 [ 34.771735] ret_from_fork+0x41/0x80 [ 34.772115] ? __pfx_kthread+0x10/0x10 [ 34.772421] ret_from_fork_asm+0x1a/0x30 [ 34.773082] </TASK> [ 34.773310] [ 34.773559] Allocated by task 272: [ 34.774068] kasan_save_stack+0x3d/0x60 [ 34.774367] kasan_save_track+0x18/0x40 [ 34.774645] kasan_save_alloc_info+0x3b/0x50 [ 34.775346] __kasan_kmalloc+0xb7/0xc0 [ 34.776015] __kmalloc_cache_noprof+0x184/0x410 [ 34.776474] kasan_atomics+0x96/0x310 [ 34.776850] kunit_try_run_case+0x1b3/0x490 [ 34.777147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.777596] kthread+0x257/0x310 [ 34.778058] ret_from_fork+0x41/0x80 [ 34.778399] ret_from_fork_asm+0x1a/0x30 [ 34.778684] [ 34.778864] The buggy address belongs to the object at ffff8881029f9480 [ 34.778864] which belongs to the cache kmalloc-64 of size 64 [ 34.780129] The buggy address is located 0 bytes to the right of [ 34.780129] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.782736] [ 34.783129] The buggy address belongs to the physical page: [ 34.783686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.784308] flags: 0x200000000000000(node=0|zone=2) [ 34.785071] page_type: f5(slab) [ 34.785419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.786238] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.787518] page dumped because: kasan: bad access detected [ 34.788661] [ 34.789005] Memory state around the buggy address: [ 34.789555] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.790466] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.791144] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.791420] ^ [ 34.791631] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.792316] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.792768] ================================================================== [ 33.031613] ================================================================== [ 33.032478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 33.033578] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.035218] [ 33.035412] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.036907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.037623] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.038535] Call Trace: [ 33.039258] <TASK> [ 33.039543] dump_stack_lvl+0x73/0xb0 [ 33.040245] print_report+0xd1/0x640 [ 33.040845] ? __virt_addr_valid+0x1db/0x2d0 [ 33.041422] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.042201] kasan_report+0x102/0x140 [ 33.043095] ? kasan_atomics_helper+0x698/0x5450 [ 33.043538] ? kasan_atomics_helper+0x698/0x5450 [ 33.044331] kasan_check_range+0x10c/0x1c0 [ 33.045094] __kasan_check_write+0x18/0x20 [ 33.045683] kasan_atomics_helper+0x698/0x5450 [ 33.046367] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.046876] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.047673] ? kasan_save_alloc_info+0x3b/0x50 [ 33.048045] ? kasan_atomics+0x153/0x310 [ 33.048729] kasan_atomics+0x1dd/0x310 [ 33.049183] ? __pfx_kasan_atomics+0x10/0x10 [ 33.050038] ? __pfx_read_tsc+0x10/0x10 [ 33.050354] ? ktime_get_ts64+0x84/0x230 [ 33.051317] kunit_try_run_case+0x1b3/0x490 [ 33.052258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.052645] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.053326] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.054085] ? __kthread_parkme+0x82/0x160 [ 33.054642] ? preempt_count_sub+0x50/0x80 [ 33.055296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.055998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.056852] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.057494] kthread+0x257/0x310 [ 33.058066] ? __pfx_kthread+0x10/0x10 [ 33.058613] ret_from_fork+0x41/0x80 [ 33.059068] ? __pfx_kthread+0x10/0x10 [ 33.059455] ret_from_fork_asm+0x1a/0x30 [ 33.060284] </TASK> [ 33.060529] [ 33.060680] Allocated by task 272: [ 33.061498] kasan_save_stack+0x3d/0x60 [ 33.062199] kasan_save_track+0x18/0x40 [ 33.062794] kasan_save_alloc_info+0x3b/0x50 [ 33.063306] __kasan_kmalloc+0xb7/0xc0 [ 33.063665] __kmalloc_cache_noprof+0x184/0x410 [ 33.064117] kasan_atomics+0x96/0x310 [ 33.064491] kunit_try_run_case+0x1b3/0x490 [ 33.065477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.066162] kthread+0x257/0x310 [ 33.066790] ret_from_fork+0x41/0x80 [ 33.067357] ret_from_fork_asm+0x1a/0x30 [ 33.068137] [ 33.068323] The buggy address belongs to the object at ffff8881029f9480 [ 33.068323] which belongs to the cache kmalloc-64 of size 64 [ 33.069355] The buggy address is located 0 bytes to the right of [ 33.069355] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.070594] [ 33.070905] The buggy address belongs to the physical page: [ 33.071442] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.072274] flags: 0x200000000000000(node=0|zone=2) [ 33.072713] page_type: f5(slab) [ 33.073268] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.073931] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.074644] page dumped because: kasan: bad access detected [ 33.075103] [ 33.075261] Memory state around the buggy address: [ 33.075764] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.076803] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.077463] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.078169] ^ [ 33.078818] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.079449] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.080173] ================================================================== [ 32.668922] ================================================================== [ 32.670292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 32.671446] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.673045] [ 32.673214] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.675267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.675765] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.677022] Call Trace: [ 32.677391] <TASK> [ 32.677872] dump_stack_lvl+0x73/0xb0 [ 32.678590] print_report+0xd1/0x640 [ 32.679526] ? __virt_addr_valid+0x1db/0x2d0 [ 32.680161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.681047] kasan_report+0x102/0x140 [ 32.681399] ? kasan_atomics_helper+0x4b70/0x5450 [ 32.681843] ? kasan_atomics_helper+0x4b70/0x5450 [ 32.682299] __asan_report_store4_noabort+0x1b/0x30 [ 32.683404] kasan_atomics_helper+0x4b70/0x5450 [ 32.683927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.684528] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.685147] ? kasan_save_alloc_info+0x3b/0x50 [ 32.685990] ? kasan_atomics+0x153/0x310 [ 32.686614] kasan_atomics+0x1dd/0x310 [ 32.687057] ? __pfx_kasan_atomics+0x10/0x10 [ 32.688324] ? __pfx_read_tsc+0x10/0x10 [ 32.688926] ? ktime_get_ts64+0x84/0x230 [ 32.689667] kunit_try_run_case+0x1b3/0x490 [ 32.690097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.690535] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.691455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.691929] ? __kthread_parkme+0x82/0x160 [ 32.692883] ? preempt_count_sub+0x50/0x80 [ 32.693840] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.694243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.695095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.696055] kthread+0x257/0x310 [ 32.696772] ? __pfx_kthread+0x10/0x10 [ 32.697331] ret_from_fork+0x41/0x80 [ 32.698388] ? __pfx_kthread+0x10/0x10 [ 32.698797] ret_from_fork_asm+0x1a/0x30 [ 32.699219] </TASK> [ 32.699475] [ 32.699650] Allocated by task 272: [ 32.700751] kasan_save_stack+0x3d/0x60 [ 32.701350] kasan_save_track+0x18/0x40 [ 32.701971] kasan_save_alloc_info+0x3b/0x50 [ 32.702509] __kasan_kmalloc+0xb7/0xc0 [ 32.703151] __kmalloc_cache_noprof+0x184/0x410 [ 32.703571] kasan_atomics+0x96/0x310 [ 32.703954] kunit_try_run_case+0x1b3/0x490 [ 32.704348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.704955] kthread+0x257/0x310 [ 32.705204] ret_from_fork+0x41/0x80 [ 32.706205] ret_from_fork_asm+0x1a/0x30 [ 32.706885] [ 32.707038] The buggy address belongs to the object at ffff8881029f9480 [ 32.707038] which belongs to the cache kmalloc-64 of size 64 [ 32.708222] The buggy address is located 0 bytes to the right of [ 32.708222] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.709038] [ 32.709323] The buggy address belongs to the physical page: [ 32.710061] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.710845] flags: 0x200000000000000(node=0|zone=2) [ 32.711161] page_type: f5(slab) [ 32.711719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.712646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.713284] page dumped because: kasan: bad access detected [ 32.713633] [ 32.714171] Memory state around the buggy address: [ 32.715006] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.715945] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.716566] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.717730] ^ [ 32.718186] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.718938] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.719819] ================================================================== [ 33.736417] ================================================================== [ 33.737684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 33.738249] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.739306] [ 33.739547] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.740548] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.741145] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.742122] Call Trace: [ 33.742334] <TASK> [ 33.742755] dump_stack_lvl+0x73/0xb0 [ 33.743341] print_report+0xd1/0x640 [ 33.744052] ? __virt_addr_valid+0x1db/0x2d0 [ 33.744585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.745095] kasan_report+0x102/0x140 [ 33.745798] ? kasan_atomics_helper+0xfaa/0x5450 [ 33.746329] ? kasan_atomics_helper+0xfaa/0x5450 [ 33.747048] kasan_check_range+0x10c/0x1c0 [ 33.747801] __kasan_check_write+0x18/0x20 [ 33.748024] kasan_atomics_helper+0xfaa/0x5450 [ 33.748235] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.748454] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.748923] ? kasan_save_alloc_info+0x3b/0x50 [ 33.749931] ? kasan_atomics+0x153/0x310 [ 33.750794] kasan_atomics+0x1dd/0x310 [ 33.751452] ? __pfx_kasan_atomics+0x10/0x10 [ 33.752018] ? __pfx_read_tsc+0x10/0x10 [ 33.752419] ? ktime_get_ts64+0x84/0x230 [ 33.752861] kunit_try_run_case+0x1b3/0x490 [ 33.753776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.754447] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.755293] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.755904] ? __kthread_parkme+0x82/0x160 [ 33.756454] ? preempt_count_sub+0x50/0x80 [ 33.757007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.757432] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.758150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.758770] kthread+0x257/0x310 [ 33.759227] ? __pfx_kthread+0x10/0x10 [ 33.759658] ret_from_fork+0x41/0x80 [ 33.760001] ? __pfx_kthread+0x10/0x10 [ 33.760359] ret_from_fork_asm+0x1a/0x30 [ 33.760796] </TASK> [ 33.761115] [ 33.761327] Allocated by task 272: [ 33.761655] kasan_save_stack+0x3d/0x60 [ 33.762005] kasan_save_track+0x18/0x40 [ 33.762343] kasan_save_alloc_info+0x3b/0x50 [ 33.762927] __kasan_kmalloc+0xb7/0xc0 [ 33.763347] __kmalloc_cache_noprof+0x184/0x410 [ 33.763843] kasan_atomics+0x96/0x310 [ 33.764127] kunit_try_run_case+0x1b3/0x490 [ 33.764582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.765241] kthread+0x257/0x310 [ 33.765642] ret_from_fork+0x41/0x80 [ 33.766069] ret_from_fork_asm+0x1a/0x30 [ 33.766357] [ 33.766512] The buggy address belongs to the object at ffff8881029f9480 [ 33.766512] which belongs to the cache kmalloc-64 of size 64 [ 33.767897] The buggy address is located 0 bytes to the right of [ 33.767897] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.768782] [ 33.768942] The buggy address belongs to the physical page: [ 33.769525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.770321] flags: 0x200000000000000(node=0|zone=2) [ 33.770845] page_type: f5(slab) [ 33.771126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.771837] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.772369] page dumped because: kasan: bad access detected [ 33.772765] [ 33.773024] Memory state around the buggy address: [ 33.773581] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.774317] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.774823] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.775243] ^ [ 33.775843] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.776580] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.777401] ================================================================== [ 33.368141] ================================================================== [ 33.370323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 33.371140] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.372294] [ 33.372518] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.373857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.374382] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.375387] Call Trace: [ 33.375663] <TASK> [ 33.375862] dump_stack_lvl+0x73/0xb0 [ 33.376565] print_report+0xd1/0x640 [ 33.377126] ? __virt_addr_valid+0x1db/0x2d0 [ 33.377583] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.378809] kasan_report+0x102/0x140 [ 33.379411] ? kasan_atomics_helper+0xac8/0x5450 [ 33.380126] ? kasan_atomics_helper+0xac8/0x5450 [ 33.380819] kasan_check_range+0x10c/0x1c0 [ 33.381429] __kasan_check_write+0x18/0x20 [ 33.382547] kasan_atomics_helper+0xac8/0x5450 [ 33.383048] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.383553] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.384152] ? kasan_save_alloc_info+0x3b/0x50 [ 33.384607] ? kasan_atomics+0x153/0x310 [ 33.385580] kasan_atomics+0x1dd/0x310 [ 33.386297] ? __pfx_kasan_atomics+0x10/0x10 [ 33.386851] ? __pfx_read_tsc+0x10/0x10 [ 33.387265] ? ktime_get_ts64+0x84/0x230 [ 33.387799] kunit_try_run_case+0x1b3/0x490 [ 33.388255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.388984] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.389637] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.390233] ? __kthread_parkme+0x82/0x160 [ 33.390993] ? preempt_count_sub+0x50/0x80 [ 33.391445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.392532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.393247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.393811] kthread+0x257/0x310 [ 33.394133] ? __pfx_kthread+0x10/0x10 [ 33.394618] ret_from_fork+0x41/0x80 [ 33.395092] ? __pfx_kthread+0x10/0x10 [ 33.395428] ret_from_fork_asm+0x1a/0x30 [ 33.396099] </TASK> [ 33.396329] [ 33.396603] Allocated by task 272: [ 33.397020] kasan_save_stack+0x3d/0x60 [ 33.397350] kasan_save_track+0x18/0x40 [ 33.397892] kasan_save_alloc_info+0x3b/0x50 [ 33.398265] __kasan_kmalloc+0xb7/0xc0 [ 33.398542] __kmalloc_cache_noprof+0x184/0x410 [ 33.399419] kasan_atomics+0x96/0x310 [ 33.400187] kunit_try_run_case+0x1b3/0x490 [ 33.400870] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.401440] kthread+0x257/0x310 [ 33.402446] ret_from_fork+0x41/0x80 [ 33.403013] ret_from_fork_asm+0x1a/0x30 [ 33.403501] [ 33.403678] The buggy address belongs to the object at ffff8881029f9480 [ 33.403678] which belongs to the cache kmalloc-64 of size 64 [ 33.404815] The buggy address is located 0 bytes to the right of [ 33.404815] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.406024] [ 33.406196] The buggy address belongs to the physical page: [ 33.406910] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.407571] flags: 0x200000000000000(node=0|zone=2) [ 33.408069] page_type: f5(slab) [ 33.408490] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.409192] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.409799] page dumped because: kasan: bad access detected [ 33.410620] [ 33.410889] Memory state around the buggy address: [ 33.411474] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.412111] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.412989] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.413493] ^ [ 33.414229] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.414996] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.415650] ================================================================== [ 35.069492] ================================================================== [ 35.071175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 35.071990] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.073290] [ 35.073477] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.074699] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.075313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.076419] Call Trace: [ 35.076781] <TASK> [ 35.077129] dump_stack_lvl+0x73/0xb0 [ 35.077416] print_report+0xd1/0x640 [ 35.077877] ? __virt_addr_valid+0x1db/0x2d0 [ 35.078568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.079281] kasan_report+0x102/0x140 [ 35.079751] ? kasan_atomics_helper+0x1e13/0x5450 [ 35.080296] ? kasan_atomics_helper+0x1e13/0x5450 [ 35.080885] kasan_check_range+0x10c/0x1c0 [ 35.081415] __kasan_check_write+0x18/0x20 [ 35.082087] kasan_atomics_helper+0x1e13/0x5450 [ 35.082495] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.083160] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.083780] ? kasan_save_alloc_info+0x3b/0x50 [ 35.084166] ? kasan_atomics+0x153/0x310 [ 35.084738] kasan_atomics+0x1dd/0x310 [ 35.085124] ? __pfx_kasan_atomics+0x10/0x10 [ 35.085688] ? __pfx_read_tsc+0x10/0x10 [ 35.086237] ? ktime_get_ts64+0x84/0x230 [ 35.086770] kunit_try_run_case+0x1b3/0x490 [ 35.087305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.087805] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.088329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.088746] ? __kthread_parkme+0x82/0x160 [ 35.089212] ? preempt_count_sub+0x50/0x80 [ 35.089698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.090139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.090682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.091283] kthread+0x257/0x310 [ 35.091573] ? __pfx_kthread+0x10/0x10 [ 35.092134] ret_from_fork+0x41/0x80 [ 35.092562] ? __pfx_kthread+0x10/0x10 [ 35.093063] ret_from_fork_asm+0x1a/0x30 [ 35.093560] </TASK> [ 35.094001] [ 35.094258] Allocated by task 272: [ 35.094734] kasan_save_stack+0x3d/0x60 [ 35.095285] kasan_save_track+0x18/0x40 [ 35.095905] kasan_save_alloc_info+0x3b/0x50 [ 35.096256] __kasan_kmalloc+0xb7/0xc0 [ 35.096862] __kmalloc_cache_noprof+0x184/0x410 [ 35.097273] kasan_atomics+0x96/0x310 [ 35.097887] kunit_try_run_case+0x1b3/0x490 [ 35.098363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.098970] kthread+0x257/0x310 [ 35.099440] ret_from_fork+0x41/0x80 [ 35.099946] ret_from_fork_asm+0x1a/0x30 [ 35.100521] [ 35.100799] The buggy address belongs to the object at ffff8881029f9480 [ 35.100799] which belongs to the cache kmalloc-64 of size 64 [ 35.101964] The buggy address is located 0 bytes to the right of [ 35.101964] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.103202] [ 35.103496] The buggy address belongs to the physical page: [ 35.104088] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.104816] flags: 0x200000000000000(node=0|zone=2) [ 35.105349] page_type: f5(slab) [ 35.105810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.106525] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.107306] page dumped because: kasan: bad access detected [ 35.107771] [ 35.108081] Memory state around the buggy address: [ 35.108583] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.109302] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.110026] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.110975] ^ [ 35.111532] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.112375] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.113407] ================================================================== [ 34.278294] ================================================================== [ 34.279021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 34.279747] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.280453] [ 34.280776] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.281746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.282170] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.282955] Call Trace: [ 34.283341] <TASK> [ 34.283715] dump_stack_lvl+0x73/0xb0 [ 34.284072] print_report+0xd1/0x640 [ 34.284524] ? __virt_addr_valid+0x1db/0x2d0 [ 34.285213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.285848] kasan_report+0x102/0x140 [ 34.286147] ? kasan_atomics_helper+0x1468/0x5450 [ 34.286871] ? kasan_atomics_helper+0x1468/0x5450 [ 34.287302] kasan_check_range+0x10c/0x1c0 [ 34.287952] __kasan_check_write+0x18/0x20 [ 34.288404] kasan_atomics_helper+0x1468/0x5450 [ 34.289021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.289447] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.289959] ? kasan_save_alloc_info+0x3b/0x50 [ 34.290296] ? kasan_atomics+0x153/0x310 [ 34.290869] kasan_atomics+0x1dd/0x310 [ 34.291454] ? __pfx_kasan_atomics+0x10/0x10 [ 34.291861] ? __pfx_read_tsc+0x10/0x10 [ 34.292388] ? ktime_get_ts64+0x84/0x230 [ 34.293000] kunit_try_run_case+0x1b3/0x490 [ 34.293476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.294038] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.294674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.295226] ? __kthread_parkme+0x82/0x160 [ 34.295694] ? preempt_count_sub+0x50/0x80 [ 34.296234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.296850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.297384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.298143] kthread+0x257/0x310 [ 34.298509] ? __pfx_kthread+0x10/0x10 [ 34.299033] ret_from_fork+0x41/0x80 [ 34.299880] ? __pfx_kthread+0x10/0x10 [ 34.300300] ret_from_fork_asm+0x1a/0x30 [ 34.301198] </TASK> [ 34.301619] [ 34.301886] Allocated by task 272: [ 34.302590] kasan_save_stack+0x3d/0x60 [ 34.302899] kasan_save_track+0x18/0x40 [ 34.303487] kasan_save_alloc_info+0x3b/0x50 [ 34.304448] __kasan_kmalloc+0xb7/0xc0 [ 34.305099] __kmalloc_cache_noprof+0x184/0x410 [ 34.305634] kasan_atomics+0x96/0x310 [ 34.306328] kunit_try_run_case+0x1b3/0x490 [ 34.307137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.307578] kthread+0x257/0x310 [ 34.308173] ret_from_fork+0x41/0x80 [ 34.308536] ret_from_fork_asm+0x1a/0x30 [ 34.309380] [ 34.309573] The buggy address belongs to the object at ffff8881029f9480 [ 34.309573] which belongs to the cache kmalloc-64 of size 64 [ 34.311320] The buggy address is located 0 bytes to the right of [ 34.311320] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.312688] [ 34.312891] The buggy address belongs to the physical page: [ 34.313541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.315092] flags: 0x200000000000000(node=0|zone=2) [ 34.315506] page_type: f5(slab) [ 34.315946] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.317069] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.318011] page dumped because: kasan: bad access detected [ 34.318656] [ 34.318990] Memory state around the buggy address: [ 34.319779] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.320687] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.321442] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.322299] ^ [ 34.323086] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324145] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.324745] ================================================================== [ 32.978832] ================================================================== [ 32.979933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 32.981091] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.981940] [ 32.982139] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.983526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.983968] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.985136] Call Trace: [ 32.985346] <TASK> [ 32.985796] dump_stack_lvl+0x73/0xb0 [ 32.986434] print_report+0xd1/0x640 [ 32.987112] ? __virt_addr_valid+0x1db/0x2d0 [ 32.987610] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.988302] kasan_report+0x102/0x140 [ 32.988716] ? kasan_atomics_helper+0x5ff/0x5450 [ 32.989049] ? kasan_atomics_helper+0x5ff/0x5450 [ 32.989953] kasan_check_range+0x10c/0x1c0 [ 32.990647] __kasan_check_write+0x18/0x20 [ 32.991157] kasan_atomics_helper+0x5ff/0x5450 [ 32.991904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.992458] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.992967] ? kasan_save_alloc_info+0x3b/0x50 [ 32.993660] ? kasan_atomics+0x153/0x310 [ 32.994301] kasan_atomics+0x1dd/0x310 [ 32.994752] ? __pfx_kasan_atomics+0x10/0x10 [ 32.995433] ? __pfx_read_tsc+0x10/0x10 [ 32.996174] ? ktime_get_ts64+0x84/0x230 [ 32.997197] kunit_try_run_case+0x1b3/0x490 [ 32.997553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.998178] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.998591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.999112] ? __kthread_parkme+0x82/0x160 [ 32.999553] ? preempt_count_sub+0x50/0x80 [ 33.000118] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.000609] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.001652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.002298] kthread+0x257/0x310 [ 33.002759] ? __pfx_kthread+0x10/0x10 [ 33.003267] ret_from_fork+0x41/0x80 [ 33.003609] ? __pfx_kthread+0x10/0x10 [ 33.004057] ret_from_fork_asm+0x1a/0x30 [ 33.004551] </TASK> [ 33.005038] [ 33.005195] Allocated by task 272: [ 33.005667] kasan_save_stack+0x3d/0x60 [ 33.006016] kasan_save_track+0x18/0x40 [ 33.006626] kasan_save_alloc_info+0x3b/0x50 [ 33.007104] __kasan_kmalloc+0xb7/0xc0 [ 33.007406] __kmalloc_cache_noprof+0x184/0x410 [ 33.008213] kasan_atomics+0x96/0x310 [ 33.008568] kunit_try_run_case+0x1b3/0x490 [ 33.009152] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.009689] kthread+0x257/0x310 [ 33.010087] ret_from_fork+0x41/0x80 [ 33.010446] ret_from_fork_asm+0x1a/0x30 [ 33.011036] [ 33.011387] The buggy address belongs to the object at ffff8881029f9480 [ 33.011387] which belongs to the cache kmalloc-64 of size 64 [ 33.012349] The buggy address is located 0 bytes to the right of [ 33.012349] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.013256] [ 33.013510] The buggy address belongs to the physical page: [ 33.014348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.015182] flags: 0x200000000000000(node=0|zone=2) [ 33.017355] page_type: f5(slab) [ 33.017577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.018003] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.018398] page dumped because: kasan: bad access detected [ 33.018691] [ 33.020560] Memory state around the buggy address: [ 33.022302] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.024080] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.025796] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.027507] ^ [ 33.028555] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.029354] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.030293] ================================================================== [ 33.912956] ================================================================== [ 33.913878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 33.914869] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.915542] [ 33.915857] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.916893] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.917222] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.918146] Call Trace: [ 33.918427] <TASK> [ 33.918717] dump_stack_lvl+0x73/0xb0 [ 33.919136] print_report+0xd1/0x640 [ 33.919454] ? __virt_addr_valid+0x1db/0x2d0 [ 33.920145] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.920692] kasan_report+0x102/0x140 [ 33.921058] ? kasan_atomics_helper+0x1149/0x5450 [ 33.921472] ? kasan_atomics_helper+0x1149/0x5450 [ 33.921883] kasan_check_range+0x10c/0x1c0 [ 33.922325] __kasan_check_write+0x18/0x20 [ 33.922913] kasan_atomics_helper+0x1149/0x5450 [ 33.923511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.924172] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.924670] ? kasan_save_alloc_info+0x3b/0x50 [ 33.925205] ? kasan_atomics+0x153/0x310 [ 33.925590] kasan_atomics+0x1dd/0x310 [ 33.926019] ? __pfx_kasan_atomics+0x10/0x10 [ 33.926492] ? __pfx_read_tsc+0x10/0x10 [ 33.926997] ? ktime_get_ts64+0x84/0x230 [ 33.927418] kunit_try_run_case+0x1b3/0x490 [ 33.927938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.928268] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.928643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.929266] ? __kthread_parkme+0x82/0x160 [ 33.929851] ? preempt_count_sub+0x50/0x80 [ 33.930192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.930793] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.931424] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.931990] kthread+0x257/0x310 [ 33.932278] ? __pfx_kthread+0x10/0x10 [ 33.932564] ret_from_fork+0x41/0x80 [ 33.933108] ? __pfx_kthread+0x10/0x10 [ 33.933648] ret_from_fork_asm+0x1a/0x30 [ 33.934034] </TASK> [ 33.934240] [ 33.934433] Allocated by task 272: [ 33.934931] kasan_save_stack+0x3d/0x60 [ 33.935439] kasan_save_track+0x18/0x40 [ 33.935947] kasan_save_alloc_info+0x3b/0x50 [ 33.936338] __kasan_kmalloc+0xb7/0xc0 [ 33.936662] __kmalloc_cache_noprof+0x184/0x410 [ 33.937190] kasan_atomics+0x96/0x310 [ 33.937550] kunit_try_run_case+0x1b3/0x490 [ 33.938126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.938757] kthread+0x257/0x310 [ 33.939031] ret_from_fork+0x41/0x80 [ 33.939439] ret_from_fork_asm+0x1a/0x30 [ 33.939999] [ 33.940234] The buggy address belongs to the object at ffff8881029f9480 [ 33.940234] which belongs to the cache kmalloc-64 of size 64 [ 33.941237] The buggy address is located 0 bytes to the right of [ 33.941237] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.942284] [ 33.942534] The buggy address belongs to the physical page: [ 33.942983] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.943797] flags: 0x200000000000000(node=0|zone=2) [ 33.944216] page_type: f5(slab) [ 33.944503] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.945262] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.945758] page dumped because: kasan: bad access detected [ 33.946402] [ 33.946730] Memory state around the buggy address: [ 33.947132] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.947659] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.948447] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.949250] ^ [ 33.950293] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.951871] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.953013] ================================================================== [ 33.468880] ================================================================== [ 33.470884] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 33.471474] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.472341] [ 33.472517] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.474107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.474614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.475778] Call Trace: [ 33.476056] <TASK> [ 33.476316] dump_stack_lvl+0x73/0xb0 [ 33.476849] print_report+0xd1/0x640 [ 33.477525] ? __virt_addr_valid+0x1db/0x2d0 [ 33.478283] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.478851] kasan_report+0x102/0x140 [ 33.479207] ? kasan_atomics_helper+0xc71/0x5450 [ 33.479578] ? kasan_atomics_helper+0xc71/0x5450 [ 33.479849] kasan_check_range+0x10c/0x1c0 [ 33.480054] __kasan_check_write+0x18/0x20 [ 33.480244] kasan_atomics_helper+0xc71/0x5450 [ 33.480450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.481345] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.482357] ? kasan_save_alloc_info+0x3b/0x50 [ 33.482936] ? kasan_atomics+0x153/0x310 [ 33.483483] kasan_atomics+0x1dd/0x310 [ 33.484212] ? __pfx_kasan_atomics+0x10/0x10 [ 33.484548] ? __pfx_read_tsc+0x10/0x10 [ 33.485064] ? ktime_get_ts64+0x84/0x230 [ 33.485682] kunit_try_run_case+0x1b3/0x490 [ 33.486501] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.487048] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.487560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.488450] ? __kthread_parkme+0x82/0x160 [ 33.489362] ? preempt_count_sub+0x50/0x80 [ 33.490099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.490427] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.491227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.491792] kthread+0x257/0x310 [ 33.492313] ? __pfx_kthread+0x10/0x10 [ 33.492969] ret_from_fork+0x41/0x80 [ 33.493379] ? __pfx_kthread+0x10/0x10 [ 33.494307] ret_from_fork_asm+0x1a/0x30 [ 33.495299] </TASK> [ 33.495495] [ 33.495687] Allocated by task 272: [ 33.496131] kasan_save_stack+0x3d/0x60 [ 33.496599] kasan_save_track+0x18/0x40 [ 33.497300] kasan_save_alloc_info+0x3b/0x50 [ 33.498060] __kasan_kmalloc+0xb7/0xc0 [ 33.498499] __kmalloc_cache_noprof+0x184/0x410 [ 33.499287] kasan_atomics+0x96/0x310 [ 33.499777] kunit_try_run_case+0x1b3/0x490 [ 33.500395] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.501045] kthread+0x257/0x310 [ 33.501231] ret_from_fork+0x41/0x80 [ 33.501407] ret_from_fork_asm+0x1a/0x30 [ 33.501595] [ 33.501795] The buggy address belongs to the object at ffff8881029f9480 [ 33.501795] which belongs to the cache kmalloc-64 of size 64 [ 33.502896] The buggy address is located 0 bytes to the right of [ 33.502896] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.503655] [ 33.503929] The buggy address belongs to the physical page: [ 33.504662] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.505694] flags: 0x200000000000000(node=0|zone=2) [ 33.506072] page_type: f5(slab) [ 33.506325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.507251] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.508367] page dumped because: kasan: bad access detected [ 33.508824] [ 33.508984] Memory state around the buggy address: [ 33.509674] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.510605] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.511322] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.512171] ^ [ 33.512484] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.513330] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.514367] ================================================================== [ 34.877183] ================================================================== [ 34.878214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 34.878854] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.883155] [ 34.883318] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.883858] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.884100] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.884532] Call Trace: [ 34.886339] <TASK> [ 34.887105] dump_stack_lvl+0x73/0xb0 [ 34.888278] print_report+0xd1/0x640 [ 34.889428] ? __virt_addr_valid+0x1db/0x2d0 [ 34.891042] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.892631] kasan_report+0x102/0x140 [ 34.893242] ? kasan_atomics_helper+0x1c19/0x5450 [ 34.894110] ? kasan_atomics_helper+0x1c19/0x5450 [ 34.894912] kasan_check_range+0x10c/0x1c0 [ 34.895400] __kasan_check_write+0x18/0x20 [ 34.896092] kasan_atomics_helper+0x1c19/0x5450 [ 34.896912] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.897580] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.898097] ? kasan_save_alloc_info+0x3b/0x50 [ 34.898572] ? kasan_atomics+0x153/0x310 [ 34.898981] kasan_atomics+0x1dd/0x310 [ 34.900010] ? __pfx_kasan_atomics+0x10/0x10 [ 34.900291] ? __pfx_read_tsc+0x10/0x10 [ 34.900484] ? ktime_get_ts64+0x84/0x230 [ 34.901201] kunit_try_run_case+0x1b3/0x490 [ 34.902343] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.903133] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.903908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.904478] ? __kthread_parkme+0x82/0x160 [ 34.905294] ? preempt_count_sub+0x50/0x80 [ 34.905715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.906389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.907099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.907610] kthread+0x257/0x310 [ 34.908263] ? __pfx_kthread+0x10/0x10 [ 34.909145] ret_from_fork+0x41/0x80 [ 34.909492] ? __pfx_kthread+0x10/0x10 [ 34.909775] ret_from_fork_asm+0x1a/0x30 [ 34.910689] </TASK> [ 34.911011] [ 34.911254] Allocated by task 272: [ 34.911582] kasan_save_stack+0x3d/0x60 [ 34.912536] kasan_save_track+0x18/0x40 [ 34.912999] kasan_save_alloc_info+0x3b/0x50 [ 34.913406] __kasan_kmalloc+0xb7/0xc0 [ 34.914547] __kmalloc_cache_noprof+0x184/0x410 [ 34.915152] kasan_atomics+0x96/0x310 [ 34.915597] kunit_try_run_case+0x1b3/0x490 [ 34.916342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.917058] kthread+0x257/0x310 [ 34.917312] ret_from_fork+0x41/0x80 [ 34.918246] ret_from_fork_asm+0x1a/0x30 [ 34.918592] [ 34.918938] The buggy address belongs to the object at ffff8881029f9480 [ 34.918938] which belongs to the cache kmalloc-64 of size 64 [ 34.920222] The buggy address is located 0 bytes to the right of [ 34.920222] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.922015] [ 34.922463] The buggy address belongs to the physical page: [ 34.923348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.924264] flags: 0x200000000000000(node=0|zone=2) [ 34.924869] page_type: f5(slab) [ 34.925531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.926308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.926950] page dumped because: kasan: bad access detected [ 34.927430] [ 34.927639] Memory state around the buggy address: [ 34.928787] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.929678] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.930516] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.931386] ^ [ 34.932084] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.932973] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.933893] ================================================================== [ 34.421190] ================================================================== [ 34.421811] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 34.422659] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.423138] [ 34.423408] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.424207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.424689] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.425319] Call Trace: [ 34.425527] <TASK> [ 34.425887] dump_stack_lvl+0x73/0xb0 [ 34.426392] print_report+0xd1/0x640 [ 34.427079] ? __virt_addr_valid+0x1db/0x2d0 [ 34.427532] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.428256] kasan_report+0x102/0x140 [ 34.428546] ? kasan_atomics_helper+0x15b7/0x5450 [ 34.429162] ? kasan_atomics_helper+0x15b7/0x5450 [ 34.429659] kasan_check_range+0x10c/0x1c0 [ 34.430066] __kasan_check_write+0x18/0x20 [ 34.430370] kasan_atomics_helper+0x15b7/0x5450 [ 34.430893] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.431533] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.432209] ? kasan_save_alloc_info+0x3b/0x50 [ 34.432579] ? kasan_atomics+0x153/0x310 [ 34.433057] kasan_atomics+0x1dd/0x310 [ 34.433356] ? __pfx_kasan_atomics+0x10/0x10 [ 34.433920] ? __pfx_read_tsc+0x10/0x10 [ 34.434811] ? ktime_get_ts64+0x84/0x230 [ 34.435887] kunit_try_run_case+0x1b3/0x490 [ 34.436365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.436880] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.437329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.438365] ? __kthread_parkme+0x82/0x160 [ 34.438806] ? preempt_count_sub+0x50/0x80 [ 34.439497] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.440059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.441013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.441773] kthread+0x257/0x310 [ 34.442331] ? __pfx_kthread+0x10/0x10 [ 34.442952] ret_from_fork+0x41/0x80 [ 34.443352] ? __pfx_kthread+0x10/0x10 [ 34.444125] ret_from_fork_asm+0x1a/0x30 [ 34.444582] </TASK> [ 34.445253] [ 34.445396] Allocated by task 272: [ 34.445844] kasan_save_stack+0x3d/0x60 [ 34.446599] kasan_save_track+0x18/0x40 [ 34.447301] kasan_save_alloc_info+0x3b/0x50 [ 34.447988] __kasan_kmalloc+0xb7/0xc0 [ 34.448174] __kmalloc_cache_noprof+0x184/0x410 [ 34.448373] kasan_atomics+0x96/0x310 [ 34.448550] kunit_try_run_case+0x1b3/0x490 [ 34.449317] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.450270] kthread+0x257/0x310 [ 34.450993] ret_from_fork+0x41/0x80 [ 34.451626] ret_from_fork_asm+0x1a/0x30 [ 34.452288] [ 34.452544] The buggy address belongs to the object at ffff8881029f9480 [ 34.452544] which belongs to the cache kmalloc-64 of size 64 [ 34.453576] The buggy address is located 0 bytes to the right of [ 34.453576] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.454919] [ 34.455151] The buggy address belongs to the physical page: [ 34.455972] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.456519] flags: 0x200000000000000(node=0|zone=2) [ 34.457141] page_type: f5(slab) [ 34.457489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.458182] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.459020] page dumped because: kasan: bad access detected [ 34.459403] [ 34.459694] Memory state around the buggy address: [ 34.460581] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.461690] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.462201] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.462985] ^ [ 34.463469] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.464342] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.465225] ================================================================== [ 34.610091] ================================================================== [ 34.610993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 34.611982] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.612726] [ 34.613194] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.614362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.614637] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.616719] Call Trace: [ 34.617193] <TASK> [ 34.617387] dump_stack_lvl+0x73/0xb0 [ 34.617671] print_report+0xd1/0x640 [ 34.617949] ? __virt_addr_valid+0x1db/0x2d0 [ 34.618249] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.618577] kasan_report+0x102/0x140 [ 34.621413] ? kasan_atomics_helper+0x1819/0x5450 [ 34.622493] ? kasan_atomics_helper+0x1819/0x5450 [ 34.623995] kasan_check_range+0x10c/0x1c0 [ 34.625291] __kasan_check_write+0x18/0x20 [ 34.626857] kasan_atomics_helper+0x1819/0x5450 [ 34.628016] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.628929] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.629166] ? kasan_save_alloc_info+0x3b/0x50 [ 34.629378] ? kasan_atomics+0x153/0x310 [ 34.629579] kasan_atomics+0x1dd/0x310 [ 34.630307] ? __pfx_kasan_atomics+0x10/0x10 [ 34.630948] ? __pfx_read_tsc+0x10/0x10 [ 34.631454] ? ktime_get_ts64+0x84/0x230 [ 34.632068] kunit_try_run_case+0x1b3/0x490 [ 34.632547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.633170] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.633519] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.634059] ? __kthread_parkme+0x82/0x160 [ 34.634730] ? preempt_count_sub+0x50/0x80 [ 34.635266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.635830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.636452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.637100] kthread+0x257/0x310 [ 34.637477] ? __pfx_kthread+0x10/0x10 [ 34.637893] ret_from_fork+0x41/0x80 [ 34.638437] ? __pfx_kthread+0x10/0x10 [ 34.639057] ret_from_fork_asm+0x1a/0x30 [ 34.639532] </TASK> [ 34.640006] [ 34.640288] Allocated by task 272: [ 34.640816] kasan_save_stack+0x3d/0x60 [ 34.641267] kasan_save_track+0x18/0x40 [ 34.641944] kasan_save_alloc_info+0x3b/0x50 [ 34.642460] __kasan_kmalloc+0xb7/0xc0 [ 34.643003] __kmalloc_cache_noprof+0x184/0x410 [ 34.643485] kasan_atomics+0x96/0x310 [ 34.644057] kunit_try_run_case+0x1b3/0x490 [ 34.644416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.645240] kthread+0x257/0x310 [ 34.645543] ret_from_fork+0x41/0x80 [ 34.646154] ret_from_fork_asm+0x1a/0x30 [ 34.646509] [ 34.646894] The buggy address belongs to the object at ffff8881029f9480 [ 34.646894] which belongs to the cache kmalloc-64 of size 64 [ 34.648041] The buggy address is located 0 bytes to the right of [ 34.648041] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.649334] [ 34.649582] The buggy address belongs to the physical page: [ 34.650317] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.651127] flags: 0x200000000000000(node=0|zone=2) [ 34.651581] page_type: f5(slab) [ 34.652010] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.652589] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.653405] page dumped because: kasan: bad access detected [ 34.654099] [ 34.654349] Memory state around the buggy address: [ 34.654986] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.655828] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.656547] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.657213] ^ [ 34.657823] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.658268] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.658935] ================================================================== [ 35.262019] ================================================================== [ 35.263587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 35.264226] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.265069] [ 35.265280] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.266250] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.266523] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.267615] Call Trace: [ 35.268000] <TASK> [ 35.268214] dump_stack_lvl+0x73/0xb0 [ 35.268507] print_report+0xd1/0x640 [ 35.268941] ? __virt_addr_valid+0x1db/0x2d0 [ 35.269489] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.270281] kasan_report+0x102/0x140 [ 35.270842] ? kasan_atomics_helper+0x2007/0x5450 [ 35.271351] ? kasan_atomics_helper+0x2007/0x5450 [ 35.272658] kasan_check_range+0x10c/0x1c0 [ 35.273319] __kasan_check_write+0x18/0x20 [ 35.274253] kasan_atomics_helper+0x2007/0x5450 [ 35.275000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.275663] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.276585] ? kasan_save_alloc_info+0x3b/0x50 [ 35.277288] ? kasan_atomics+0x153/0x310 [ 35.278073] kasan_atomics+0x1dd/0x310 [ 35.278499] ? __pfx_kasan_atomics+0x10/0x10 [ 35.279304] ? __pfx_read_tsc+0x10/0x10 [ 35.279881] ? ktime_get_ts64+0x84/0x230 [ 35.280328] kunit_try_run_case+0x1b3/0x490 [ 35.281327] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.281760] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.282451] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.283226] ? __kthread_parkme+0x82/0x160 [ 35.283643] ? preempt_count_sub+0x50/0x80 [ 35.284523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.285217] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.285797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.286611] kthread+0x257/0x310 [ 35.287193] ? __pfx_kthread+0x10/0x10 [ 35.287789] ret_from_fork+0x41/0x80 [ 35.288526] ? __pfx_kthread+0x10/0x10 [ 35.289257] ret_from_fork_asm+0x1a/0x30 [ 35.289620] </TASK> [ 35.289831] [ 35.290477] Allocated by task 272: [ 35.290758] kasan_save_stack+0x3d/0x60 [ 35.291648] kasan_save_track+0x18/0x40 [ 35.292474] kasan_save_alloc_info+0x3b/0x50 [ 35.293280] __kasan_kmalloc+0xb7/0xc0 [ 35.293686] __kmalloc_cache_noprof+0x184/0x410 [ 35.294243] kasan_atomics+0x96/0x310 [ 35.294627] kunit_try_run_case+0x1b3/0x490 [ 35.295756] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.296331] kthread+0x257/0x310 [ 35.297022] ret_from_fork+0x41/0x80 [ 35.297733] ret_from_fork_asm+0x1a/0x30 [ 35.298137] [ 35.298389] The buggy address belongs to the object at ffff8881029f9480 [ 35.298389] which belongs to the cache kmalloc-64 of size 64 [ 35.299796] The buggy address is located 0 bytes to the right of [ 35.299796] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.300746] [ 35.300916] The buggy address belongs to the physical page: [ 35.301438] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.302579] flags: 0x200000000000000(node=0|zone=2) [ 35.302865] page_type: f5(slab) [ 35.303025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.303314] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.303596] page dumped because: kasan: bad access detected [ 35.304334] [ 35.304763] Memory state around the buggy address: [ 35.305272] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.306876] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.307623] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.308225] ^ [ 35.308644] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.309288] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.309807] ================================================================== [ 34.325568] ================================================================== [ 34.327393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 34.328112] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.329364] [ 34.329500] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.330418] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.331551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.332529] Call Trace: [ 34.333271] <TASK> [ 34.333523] dump_stack_lvl+0x73/0xb0 [ 34.334263] print_report+0xd1/0x640 [ 34.335074] ? __virt_addr_valid+0x1db/0x2d0 [ 34.335727] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.336395] kasan_report+0x102/0x140 [ 34.336759] ? kasan_atomics_helper+0x50d6/0x5450 [ 34.337240] ? kasan_atomics_helper+0x50d6/0x5450 [ 34.338172] __asan_report_store8_noabort+0x1b/0x30 [ 34.338946] kasan_atomics_helper+0x50d6/0x5450 [ 34.339563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.340257] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.340886] ? kasan_save_alloc_info+0x3b/0x50 [ 34.341472] ? kasan_atomics+0x153/0x310 [ 34.341942] kasan_atomics+0x1dd/0x310 [ 34.342592] ? __pfx_kasan_atomics+0x10/0x10 [ 34.343306] ? __pfx_read_tsc+0x10/0x10 [ 34.343665] ? ktime_get_ts64+0x84/0x230 [ 34.344340] kunit_try_run_case+0x1b3/0x490 [ 34.345012] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.345926] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.346236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.346534] ? __kthread_parkme+0x82/0x160 [ 34.346976] ? preempt_count_sub+0x50/0x80 [ 34.347378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.348322] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.349140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.349459] kthread+0x257/0x310 [ 34.349931] ? __pfx_kthread+0x10/0x10 [ 34.352130] ret_from_fork+0x41/0x80 [ 34.352401] ? __pfx_kthread+0x10/0x10 [ 34.352649] ret_from_fork_asm+0x1a/0x30 [ 34.353094] </TASK> [ 34.353666] [ 34.353940] Allocated by task 272: [ 34.354197] kasan_save_stack+0x3d/0x60 [ 34.354461] kasan_save_track+0x18/0x40 [ 34.354768] kasan_save_alloc_info+0x3b/0x50 [ 34.355251] __kasan_kmalloc+0xb7/0xc0 [ 34.355528] __kmalloc_cache_noprof+0x184/0x410 [ 34.356397] kasan_atomics+0x96/0x310 [ 34.357941] kunit_try_run_case+0x1b3/0x490 [ 34.358927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.359247] kthread+0x257/0x310 [ 34.359465] ret_from_fork+0x41/0x80 [ 34.359831] ret_from_fork_asm+0x1a/0x30 [ 34.361384] [ 34.362006] The buggy address belongs to the object at ffff8881029f9480 [ 34.362006] which belongs to the cache kmalloc-64 of size 64 [ 34.364475] The buggy address is located 0 bytes to the right of [ 34.364475] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.365480] [ 34.365797] The buggy address belongs to the physical page: [ 34.366220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.366950] flags: 0x200000000000000(node=0|zone=2) [ 34.367489] page_type: f5(slab) [ 34.368044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.368661] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.369514] page dumped because: kasan: bad access detected [ 34.370116] [ 34.370372] Memory state around the buggy address: [ 34.371119] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.371854] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.372397] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.373198] ^ [ 34.373800] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.374542] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.375301] ================================================================== [ 34.466742] ================================================================== [ 34.468347] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 34.469910] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.470550] [ 34.470945] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.472162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.472526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.474236] Call Trace: [ 34.474534] <TASK> [ 34.475360] dump_stack_lvl+0x73/0xb0 [ 34.475763] print_report+0xd1/0x640 [ 34.476303] ? __virt_addr_valid+0x1db/0x2d0 [ 34.476913] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.477377] kasan_report+0x102/0x140 [ 34.477761] ? kasan_atomics_helper+0x1650/0x5450 [ 34.478605] ? kasan_atomics_helper+0x1650/0x5450 [ 34.479245] kasan_check_range+0x10c/0x1c0 [ 34.479947] __kasan_check_write+0x18/0x20 [ 34.480332] kasan_atomics_helper+0x1650/0x5450 [ 34.480824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.481293] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.481833] ? kasan_save_alloc_info+0x3b/0x50 [ 34.482203] ? kasan_atomics+0x153/0x310 [ 34.482875] kasan_atomics+0x1dd/0x310 [ 34.483499] ? __pfx_kasan_atomics+0x10/0x10 [ 34.484134] ? __pfx_read_tsc+0x10/0x10 [ 34.484797] ? ktime_get_ts64+0x84/0x230 [ 34.485354] kunit_try_run_case+0x1b3/0x490 [ 34.486089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.486717] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.487244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.487934] ? __kthread_parkme+0x82/0x160 [ 34.488460] ? preempt_count_sub+0x50/0x80 [ 34.488940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.489647] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.490345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.490981] kthread+0x257/0x310 [ 34.491424] ? __pfx_kthread+0x10/0x10 [ 34.492098] ret_from_fork+0x41/0x80 [ 34.492728] ? __pfx_kthread+0x10/0x10 [ 34.493412] ret_from_fork_asm+0x1a/0x30 [ 34.494070] </TASK> [ 34.494550] [ 34.494923] Allocated by task 272: [ 34.495352] kasan_save_stack+0x3d/0x60 [ 34.496026] kasan_save_track+0x18/0x40 [ 34.496530] kasan_save_alloc_info+0x3b/0x50 [ 34.497119] __kasan_kmalloc+0xb7/0xc0 [ 34.497516] __kmalloc_cache_noprof+0x184/0x410 [ 34.498218] kasan_atomics+0x96/0x310 [ 34.498656] kunit_try_run_case+0x1b3/0x490 [ 34.499206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.499841] kthread+0x257/0x310 [ 34.500134] ret_from_fork+0x41/0x80 [ 34.500768] ret_from_fork_asm+0x1a/0x30 [ 34.501275] [ 34.501646] The buggy address belongs to the object at ffff8881029f9480 [ 34.501646] which belongs to the cache kmalloc-64 of size 64 [ 34.503014] The buggy address is located 0 bytes to the right of [ 34.503014] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.504265] [ 34.504529] The buggy address belongs to the physical page: [ 34.505258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.506046] flags: 0x200000000000000(node=0|zone=2) [ 34.506681] page_type: f5(slab) [ 34.507106] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.507886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.508560] page dumped because: kasan: bad access detected [ 34.509298] [ 34.509509] Memory state around the buggy address: [ 34.510185] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.511028] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.511829] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.512524] ^ [ 34.513099] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.513880] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.514668] ================================================================== [ 33.649507] ================================================================== [ 33.650252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 33.650901] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.651840] [ 33.652014] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.653321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.653758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.654659] Call Trace: [ 33.654893] <TASK> [ 33.655207] dump_stack_lvl+0x73/0xb0 [ 33.655722] print_report+0xd1/0x640 [ 33.656168] ? __virt_addr_valid+0x1db/0x2d0 [ 33.656604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.657107] kasan_report+0x102/0x140 [ 33.657394] ? kasan_atomics_helper+0xe79/0x5450 [ 33.657893] ? kasan_atomics_helper+0xe79/0x5450 [ 33.658579] kasan_check_range+0x10c/0x1c0 [ 33.659223] __kasan_check_write+0x18/0x20 [ 33.659870] kasan_atomics_helper+0xe79/0x5450 [ 33.660249] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.660921] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.661370] ? kasan_save_alloc_info+0x3b/0x50 [ 33.662062] ? kasan_atomics+0x153/0x310 [ 33.662458] kasan_atomics+0x1dd/0x310 [ 33.663017] ? __pfx_kasan_atomics+0x10/0x10 [ 33.663382] ? __pfx_read_tsc+0x10/0x10 [ 33.663854] ? ktime_get_ts64+0x84/0x230 [ 33.664440] kunit_try_run_case+0x1b3/0x490 [ 33.665023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.665491] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.666099] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.666662] ? __kthread_parkme+0x82/0x160 [ 33.667168] ? preempt_count_sub+0x50/0x80 [ 33.667739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.668158] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.668792] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.669451] kthread+0x257/0x310 [ 33.670085] ? __pfx_kthread+0x10/0x10 [ 33.670443] ret_from_fork+0x41/0x80 [ 33.670925] ? __pfx_kthread+0x10/0x10 [ 33.671728] ret_from_fork_asm+0x1a/0x30 [ 33.672456] </TASK> [ 33.672749] [ 33.672977] Allocated by task 272: [ 33.673473] kasan_save_stack+0x3d/0x60 [ 33.674070] kasan_save_track+0x18/0x40 [ 33.674497] kasan_save_alloc_info+0x3b/0x50 [ 33.674969] __kasan_kmalloc+0xb7/0xc0 [ 33.675249] __kmalloc_cache_noprof+0x184/0x410 [ 33.675764] kasan_atomics+0x96/0x310 [ 33.676263] kunit_try_run_case+0x1b3/0x490 [ 33.676805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.677300] kthread+0x257/0x310 [ 33.677676] ret_from_fork+0x41/0x80 [ 33.678017] ret_from_fork_asm+0x1a/0x30 [ 33.678440] [ 33.678652] The buggy address belongs to the object at ffff8881029f9480 [ 33.678652] which belongs to the cache kmalloc-64 of size 64 [ 33.679649] The buggy address is located 0 bytes to the right of [ 33.679649] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.680595] [ 33.680901] The buggy address belongs to the physical page: [ 33.681393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.681919] flags: 0x200000000000000(node=0|zone=2) [ 33.682252] page_type: f5(slab) [ 33.682672] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.683546] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.684431] page dumped because: kasan: bad access detected [ 33.685062] [ 33.685220] Memory state around the buggy address: [ 33.685525] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.686301] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.686977] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.687546] ^ [ 33.687954] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.688574] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.689107] ================================================================== [ 33.818595] ================================================================== [ 33.821481] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 33.822305] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.822690] [ 33.822870] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.824074] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.824569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.826739] Call Trace: [ 33.826934] <TASK> [ 33.827111] dump_stack_lvl+0x73/0xb0 [ 33.827371] print_report+0xd1/0x640 [ 33.828207] ? __virt_addr_valid+0x1db/0x2d0 [ 33.829074] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.830122] kasan_report+0x102/0x140 [ 33.830526] ? kasan_atomics_helper+0x107a/0x5450 [ 33.831370] ? kasan_atomics_helper+0x107a/0x5450 [ 33.831663] kasan_check_range+0x10c/0x1c0 [ 33.832409] __kasan_check_write+0x18/0x20 [ 33.833286] kasan_atomics_helper+0x107a/0x5450 [ 33.834021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.834594] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.835182] ? kasan_save_alloc_info+0x3b/0x50 [ 33.835641] ? kasan_atomics+0x153/0x310 [ 33.836210] kasan_atomics+0x1dd/0x310 [ 33.837002] ? __pfx_kasan_atomics+0x10/0x10 [ 33.837470] ? __pfx_read_tsc+0x10/0x10 [ 33.838267] ? ktime_get_ts64+0x84/0x230 [ 33.839229] kunit_try_run_case+0x1b3/0x490 [ 33.839661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.840175] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.840739] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.841649] ? __kthread_parkme+0x82/0x160 [ 33.842117] ? preempt_count_sub+0x50/0x80 [ 33.842564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.843316] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.844062] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.844610] kthread+0x257/0x310 [ 33.845564] ? __pfx_kthread+0x10/0x10 [ 33.846123] ret_from_fork+0x41/0x80 [ 33.846895] ? __pfx_kthread+0x10/0x10 [ 33.847527] ret_from_fork_asm+0x1a/0x30 [ 33.848051] </TASK> [ 33.848314] [ 33.848520] Allocated by task 272: [ 33.849769] kasan_save_stack+0x3d/0x60 [ 33.850032] kasan_save_track+0x18/0x40 [ 33.850925] kasan_save_alloc_info+0x3b/0x50 [ 33.851565] __kasan_kmalloc+0xb7/0xc0 [ 33.852040] __kmalloc_cache_noprof+0x184/0x410 [ 33.852527] kasan_atomics+0x96/0x310 [ 33.853152] kunit_try_run_case+0x1b3/0x490 [ 33.853607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.854717] kthread+0x257/0x310 [ 33.855174] ret_from_fork+0x41/0x80 [ 33.855879] ret_from_fork_asm+0x1a/0x30 [ 33.856177] [ 33.856679] The buggy address belongs to the object at ffff8881029f9480 [ 33.856679] which belongs to the cache kmalloc-64 of size 64 [ 33.858483] The buggy address is located 0 bytes to the right of [ 33.858483] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.860305] [ 33.860525] The buggy address belongs to the physical page: [ 33.861051] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.862188] flags: 0x200000000000000(node=0|zone=2) [ 33.862771] page_type: f5(slab) [ 33.863184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.864133] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.864758] page dumped because: kasan: bad access detected [ 33.865420] [ 33.865873] Memory state around the buggy address: [ 33.866257] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.867211] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.867940] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.868541] ^ [ 33.869408] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.870072] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.870756] ================================================================== [ 32.885823] ================================================================== [ 32.886326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 32.887754] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.888548] [ 32.888868] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.889724] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.890045] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.890857] Call Trace: [ 32.891151] <TASK> [ 32.891401] dump_stack_lvl+0x73/0xb0 [ 32.891924] print_report+0xd1/0x640 [ 32.892331] ? __virt_addr_valid+0x1db/0x2d0 [ 32.892883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.893356] kasan_report+0x102/0x140 [ 32.893802] ? kasan_atomics_helper+0x4b3c/0x5450 [ 32.894318] ? kasan_atomics_helper+0x4b3c/0x5450 [ 32.894878] __asan_report_store4_noabort+0x1b/0x30 [ 32.895409] kasan_atomics_helper+0x4b3c/0x5450 [ 32.895934] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.896416] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.896859] ? kasan_save_alloc_info+0x3b/0x50 [ 32.897429] ? kasan_atomics+0x153/0x310 [ 32.897872] kasan_atomics+0x1dd/0x310 [ 32.898377] ? __pfx_kasan_atomics+0x10/0x10 [ 32.898901] ? __pfx_read_tsc+0x10/0x10 [ 32.899296] ? ktime_get_ts64+0x84/0x230 [ 32.899669] kunit_try_run_case+0x1b3/0x490 [ 32.900167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.900534] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.901179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.901647] ? __kthread_parkme+0x82/0x160 [ 32.902071] ? preempt_count_sub+0x50/0x80 [ 32.902519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.902991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.903639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.904175] kthread+0x257/0x310 [ 32.904470] ? __pfx_kthread+0x10/0x10 [ 32.904899] ret_from_fork+0x41/0x80 [ 32.905310] ? __pfx_kthread+0x10/0x10 [ 32.905651] ret_from_fork_asm+0x1a/0x30 [ 32.906196] </TASK> [ 32.906491] [ 32.906778] Allocated by task 272: [ 32.907132] kasan_save_stack+0x3d/0x60 [ 32.907553] kasan_save_track+0x18/0x40 [ 32.908085] kasan_save_alloc_info+0x3b/0x50 [ 32.908412] __kasan_kmalloc+0xb7/0xc0 [ 32.908929] __kmalloc_cache_noprof+0x184/0x410 [ 32.909374] kasan_atomics+0x96/0x310 [ 32.909742] kunit_try_run_case+0x1b3/0x490 [ 32.910202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.910901] kthread+0x257/0x310 [ 32.911229] ret_from_fork+0x41/0x80 [ 32.911524] ret_from_fork_asm+0x1a/0x30 [ 32.912022] [ 32.912179] The buggy address belongs to the object at ffff8881029f9480 [ 32.912179] which belongs to the cache kmalloc-64 of size 64 [ 32.913470] The buggy address is located 0 bytes to the right of [ 32.913470] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.914427] [ 32.914745] The buggy address belongs to the physical page: [ 32.915175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.915901] flags: 0x200000000000000(node=0|zone=2) [ 32.916228] page_type: f5(slab) [ 32.916477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.917318] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.918382] page dumped because: kasan: bad access detected [ 32.919418] [ 32.919522] Memory state around the buggy address: [ 32.920259] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.921516] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.922240] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.922516] ^ [ 32.922817] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.924216] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.925078] ================================================================== [ 34.235901] ================================================================== [ 34.236809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 34.237510] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.238241] [ 34.238484] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.239569] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.240041] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.240822] Call Trace: [ 34.241157] <TASK> [ 34.241501] dump_stack_lvl+0x73/0xb0 [ 34.242030] print_report+0xd1/0x640 [ 34.242511] ? __virt_addr_valid+0x1db/0x2d0 [ 34.243082] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.243652] kasan_report+0x102/0x140 [ 34.244110] ? kasan_atomics_helper+0x4eb0/0x5450 [ 34.244586] ? kasan_atomics_helper+0x4eb0/0x5450 [ 34.245149] __asan_report_load8_noabort+0x18/0x20 [ 34.245849] kasan_atomics_helper+0x4eb0/0x5450 [ 34.246346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.246989] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.247574] ? kasan_save_alloc_info+0x3b/0x50 [ 34.248132] ? kasan_atomics+0x153/0x310 [ 34.248549] kasan_atomics+0x1dd/0x310 [ 34.249140] ? __pfx_kasan_atomics+0x10/0x10 [ 34.249743] ? __pfx_read_tsc+0x10/0x10 [ 34.250147] ? ktime_get_ts64+0x84/0x230 [ 34.250751] kunit_try_run_case+0x1b3/0x490 [ 34.251307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.251937] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.252363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.253102] ? __kthread_parkme+0x82/0x160 [ 34.253455] ? preempt_count_sub+0x50/0x80 [ 34.254090] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.254567] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.255176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.255747] kthread+0x257/0x310 [ 34.256162] ? __pfx_kthread+0x10/0x10 [ 34.256601] ret_from_fork+0x41/0x80 [ 34.257091] ? __pfx_kthread+0x10/0x10 [ 34.257575] ret_from_fork_asm+0x1a/0x30 [ 34.258106] </TASK> [ 34.258452] [ 34.258808] Allocated by task 272: [ 34.259167] kasan_save_stack+0x3d/0x60 [ 34.259731] kasan_save_track+0x18/0x40 [ 34.260237] kasan_save_alloc_info+0x3b/0x50 [ 34.260801] __kasan_kmalloc+0xb7/0xc0 [ 34.261143] __kmalloc_cache_noprof+0x184/0x410 [ 34.261796] kasan_atomics+0x96/0x310 [ 34.262163] kunit_try_run_case+0x1b3/0x490 [ 34.262593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.263353] kthread+0x257/0x310 [ 34.263655] ret_from_fork+0x41/0x80 [ 34.264188] ret_from_fork_asm+0x1a/0x30 [ 34.264817] [ 34.265018] The buggy address belongs to the object at ffff8881029f9480 [ 34.265018] which belongs to the cache kmalloc-64 of size 64 [ 34.266127] The buggy address is located 0 bytes to the right of [ 34.266127] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.267310] [ 34.267593] The buggy address belongs to the physical page: [ 34.268341] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.269175] flags: 0x200000000000000(node=0|zone=2) [ 34.269732] page_type: f5(slab) [ 34.270095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.270859] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.271624] page dumped because: kasan: bad access detected [ 34.272114] [ 34.272363] Memory state around the buggy address: [ 34.272938] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.273571] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.274465] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.275147] ^ [ 34.275522] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.276394] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.277041] ================================================================== [ 33.129815] ================================================================== [ 33.131016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 33.131722] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.133203] [ 33.133540] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.134797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.135213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.136306] Call Trace: [ 33.136879] <TASK> [ 33.137100] dump_stack_lvl+0x73/0xb0 [ 33.137515] print_report+0xd1/0x640 [ 33.138339] ? __virt_addr_valid+0x1db/0x2d0 [ 33.139118] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.139650] kasan_report+0x102/0x140 [ 33.140282] ? kasan_atomics_helper+0x7c8/0x5450 [ 33.140808] ? kasan_atomics_helper+0x7c8/0x5450 [ 33.141588] kasan_check_range+0x10c/0x1c0 [ 33.142250] __kasan_check_write+0x18/0x20 [ 33.142729] kasan_atomics_helper+0x7c8/0x5450 [ 33.143429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.144201] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.144667] ? kasan_save_alloc_info+0x3b/0x50 [ 33.145550] ? kasan_atomics+0x153/0x310 [ 33.146334] kasan_atomics+0x1dd/0x310 [ 33.146839] ? __pfx_kasan_atomics+0x10/0x10 [ 33.147586] ? __pfx_read_tsc+0x10/0x10 [ 33.148096] ? ktime_get_ts64+0x84/0x230 [ 33.149023] kunit_try_run_case+0x1b3/0x490 [ 33.149679] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.150223] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.151180] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.151665] ? __kthread_parkme+0x82/0x160 [ 33.152551] ? preempt_count_sub+0x50/0x80 [ 33.153437] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.153920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.154501] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.155292] kthread+0x257/0x310 [ 33.155929] ? __pfx_kthread+0x10/0x10 [ 33.156511] ret_from_fork+0x41/0x80 [ 33.157135] ? __pfx_kthread+0x10/0x10 [ 33.157524] ret_from_fork_asm+0x1a/0x30 [ 33.158309] </TASK> [ 33.158814] [ 33.159102] Allocated by task 272: [ 33.159460] kasan_save_stack+0x3d/0x60 [ 33.160089] kasan_save_track+0x18/0x40 [ 33.160888] kasan_save_alloc_info+0x3b/0x50 [ 33.161292] __kasan_kmalloc+0xb7/0xc0 [ 33.162190] __kmalloc_cache_noprof+0x184/0x410 [ 33.162584] kasan_atomics+0x96/0x310 [ 33.163268] kunit_try_run_case+0x1b3/0x490 [ 33.164122] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.164610] kthread+0x257/0x310 [ 33.165138] ret_from_fork+0x41/0x80 [ 33.165556] ret_from_fork_asm+0x1a/0x30 [ 33.166356] [ 33.166606] The buggy address belongs to the object at ffff8881029f9480 [ 33.166606] which belongs to the cache kmalloc-64 of size 64 [ 33.168141] The buggy address is located 0 bytes to the right of [ 33.168141] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.169545] [ 33.170108] The buggy address belongs to the physical page: [ 33.170680] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.171462] flags: 0x200000000000000(node=0|zone=2) [ 33.172258] page_type: f5(slab) [ 33.172716] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.173618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.174335] page dumped because: kasan: bad access detected [ 33.175365] [ 33.175629] Memory state around the buggy address: [ 33.176760] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.177358] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.178023] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.179188] ^ [ 33.179604] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.180445] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.181441] ================================================================== [ 33.689957] ================================================================== [ 33.690871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 33.691670] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.692467] [ 33.692786] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.693586] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.693925] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.694428] Call Trace: [ 33.694757] <TASK> [ 33.695032] dump_stack_lvl+0x73/0xb0 [ 33.695519] print_report+0xd1/0x640 [ 33.696053] ? __virt_addr_valid+0x1db/0x2d0 [ 33.696574] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.697077] kasan_report+0x102/0x140 [ 33.697364] ? kasan_atomics_helper+0xf11/0x5450 [ 33.697821] ? kasan_atomics_helper+0xf11/0x5450 [ 33.698400] kasan_check_range+0x10c/0x1c0 [ 33.698975] __kasan_check_write+0x18/0x20 [ 33.699472] kasan_atomics_helper+0xf11/0x5450 [ 33.700097] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.700582] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.700994] ? kasan_save_alloc_info+0x3b/0x50 [ 33.701541] ? kasan_atomics+0x153/0x310 [ 33.702374] kasan_atomics+0x1dd/0x310 [ 33.703275] ? __pfx_kasan_atomics+0x10/0x10 [ 33.704225] ? __pfx_read_tsc+0x10/0x10 [ 33.705117] ? ktime_get_ts64+0x84/0x230 [ 33.705652] kunit_try_run_case+0x1b3/0x490 [ 33.706031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.706533] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.707025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.707692] ? __kthread_parkme+0x82/0x160 [ 33.708196] ? preempt_count_sub+0x50/0x80 [ 33.708967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.709656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.710295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.711126] kthread+0x257/0x310 [ 33.711882] ? __pfx_kthread+0x10/0x10 [ 33.712285] ret_from_fork+0x41/0x80 [ 33.712642] ? __pfx_kthread+0x10/0x10 [ 33.713433] ret_from_fork_asm+0x1a/0x30 [ 33.714091] </TASK> [ 33.714352] [ 33.714537] Allocated by task 272: [ 33.715767] kasan_save_stack+0x3d/0x60 [ 33.716154] kasan_save_track+0x18/0x40 [ 33.716521] kasan_save_alloc_info+0x3b/0x50 [ 33.717032] __kasan_kmalloc+0xb7/0xc0 [ 33.717427] __kmalloc_cache_noprof+0x184/0x410 [ 33.718077] kasan_atomics+0x96/0x310 [ 33.718464] kunit_try_run_case+0x1b3/0x490 [ 33.718914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.719879] kthread+0x257/0x310 [ 33.720164] ret_from_fork+0x41/0x80 [ 33.720752] ret_from_fork_asm+0x1a/0x30 [ 33.721263] [ 33.721634] The buggy address belongs to the object at ffff8881029f9480 [ 33.721634] which belongs to the cache kmalloc-64 of size 64 [ 33.722769] The buggy address is located 0 bytes to the right of [ 33.722769] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.724172] [ 33.724547] The buggy address belongs to the physical page: [ 33.725155] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.726150] flags: 0x200000000000000(node=0|zone=2) [ 33.726832] page_type: f5(slab) [ 33.727104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.728035] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.728908] page dumped because: kasan: bad access detected [ 33.729448] [ 33.729878] Memory state around the buggy address: [ 33.730368] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.731243] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.731990] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.732694] ^ [ 33.733235] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.734236] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.735092] ================================================================== [ 33.280014] ================================================================== [ 33.282398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 33.282811] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.283191] [ 33.284827] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.286961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.288215] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.290094] Call Trace: [ 33.290536] <TASK> [ 33.290732] dump_stack_lvl+0x73/0xb0 [ 33.291000] print_report+0xd1/0x640 [ 33.291252] ? __virt_addr_valid+0x1db/0x2d0 [ 33.291524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.293071] kasan_report+0x102/0x140 [ 33.293537] ? kasan_atomics_helper+0x993/0x5450 [ 33.294124] ? kasan_atomics_helper+0x993/0x5450 [ 33.294766] kasan_check_range+0x10c/0x1c0 [ 33.295206] __kasan_check_write+0x18/0x20 [ 33.295670] kasan_atomics_helper+0x993/0x5450 [ 33.296049] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.296446] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.297090] ? kasan_save_alloc_info+0x3b/0x50 [ 33.297728] ? kasan_atomics+0x153/0x310 [ 33.298097] kasan_atomics+0x1dd/0x310 [ 33.298478] ? __pfx_kasan_atomics+0x10/0x10 [ 33.299096] ? __pfx_read_tsc+0x10/0x10 [ 33.299546] ? ktime_get_ts64+0x84/0x230 [ 33.299976] kunit_try_run_case+0x1b3/0x490 [ 33.300291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.300906] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.301443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.302037] ? __kthread_parkme+0x82/0x160 [ 33.302365] ? preempt_count_sub+0x50/0x80 [ 33.302936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.303270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.304019] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.304442] kthread+0x257/0x310 [ 33.304936] ? __pfx_kthread+0x10/0x10 [ 33.305402] ret_from_fork+0x41/0x80 [ 33.305843] ? __pfx_kthread+0x10/0x10 [ 33.306254] ret_from_fork_asm+0x1a/0x30 [ 33.306805] </TASK> [ 33.307039] [ 33.307196] Allocated by task 272: [ 33.307591] kasan_save_stack+0x3d/0x60 [ 33.308128] kasan_save_track+0x18/0x40 [ 33.308465] kasan_save_alloc_info+0x3b/0x50 [ 33.308952] __kasan_kmalloc+0xb7/0xc0 [ 33.309233] __kmalloc_cache_noprof+0x184/0x410 [ 33.309857] kasan_atomics+0x96/0x310 [ 33.310361] kunit_try_run_case+0x1b3/0x490 [ 33.310803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.311384] kthread+0x257/0x310 [ 33.311881] ret_from_fork+0x41/0x80 [ 33.312252] ret_from_fork_asm+0x1a/0x30 [ 33.312539] [ 33.312869] The buggy address belongs to the object at ffff8881029f9480 [ 33.312869] which belongs to the cache kmalloc-64 of size 64 [ 33.314127] The buggy address is located 0 bytes to the right of [ 33.314127] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.315247] [ 33.315456] The buggy address belongs to the physical page: [ 33.315865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.316792] flags: 0x200000000000000(node=0|zone=2) [ 33.317182] page_type: f5(slab) [ 33.317434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.318315] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.319129] page dumped because: kasan: bad access detected [ 33.319489] [ 33.319792] Memory state around the buggy address: [ 33.320339] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.320931] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.321635] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.322289] ^ [ 33.322873] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.323501] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.324468] ================================================================== [ 32.612739] ================================================================== [ 32.613673] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 32.614607] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.616268] [ 32.616457] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.617555] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.618874] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.619825] Call Trace: [ 32.620018] <TASK> [ 32.620594] dump_stack_lvl+0x73/0xb0 [ 32.621468] print_report+0xd1/0x640 [ 32.621894] ? __virt_addr_valid+0x1db/0x2d0 [ 32.622340] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.623282] kasan_report+0x102/0x140 [ 32.624047] ? kasan_atomics_helper+0x4b8a/0x5450 [ 32.624567] ? kasan_atomics_helper+0x4b8a/0x5450 [ 32.625419] __asan_report_load4_noabort+0x18/0x20 [ 32.626345] kasan_atomics_helper+0x4b8a/0x5450 [ 32.626883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.627210] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.628532] ? kasan_save_alloc_info+0x3b/0x50 [ 32.628879] ? kasan_atomics+0x153/0x310 [ 32.629718] kasan_atomics+0x1dd/0x310 [ 32.630774] ? __pfx_kasan_atomics+0x10/0x10 [ 32.631348] ? __pfx_read_tsc+0x10/0x10 [ 32.631771] ? ktime_get_ts64+0x84/0x230 [ 32.632196] kunit_try_run_case+0x1b3/0x490 [ 32.632645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.633243] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.634421] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.634764] ? __kthread_parkme+0x82/0x160 [ 32.635467] ? preempt_count_sub+0x50/0x80 [ 32.636393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.636618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.637109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.638502] kthread+0x257/0x310 [ 32.639043] ? __pfx_kthread+0x10/0x10 [ 32.639540] ret_from_fork+0x41/0x80 [ 32.639953] ? __pfx_kthread+0x10/0x10 [ 32.640742] ret_from_fork_asm+0x1a/0x30 [ 32.641240] </TASK> [ 32.641509] [ 32.641685] Allocated by task 272: [ 32.641949] kasan_save_stack+0x3d/0x60 [ 32.643231] kasan_save_track+0x18/0x40 [ 32.643571] kasan_save_alloc_info+0x3b/0x50 [ 32.644222] __kasan_kmalloc+0xb7/0xc0 [ 32.644835] __kmalloc_cache_noprof+0x184/0x410 [ 32.645800] kasan_atomics+0x96/0x310 [ 32.646198] kunit_try_run_case+0x1b3/0x490 [ 32.646634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.647728] kthread+0x257/0x310 [ 32.648049] ret_from_fork+0x41/0x80 [ 32.648885] ret_from_fork_asm+0x1a/0x30 [ 32.649654] [ 32.649887] The buggy address belongs to the object at ffff8881029f9480 [ 32.649887] which belongs to the cache kmalloc-64 of size 64 [ 32.651863] The buggy address is located 0 bytes to the right of [ 32.651863] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.653931] [ 32.654533] The buggy address belongs to the physical page: [ 32.655389] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.656164] flags: 0x200000000000000(node=0|zone=2) [ 32.656852] page_type: f5(slab) [ 32.657686] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.658647] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.659639] page dumped because: kasan: bad access detected [ 32.660516] [ 32.660745] Memory state around the buggy address: [ 32.661915] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.662569] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.663549] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.664297] ^ [ 32.665062] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.665921] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.667063] ================================================================== [ 33.605683] ================================================================== [ 33.606343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 33.606837] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.607807] [ 33.608177] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.609096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.609526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.610249] Call Trace: [ 33.610518] <TASK> [ 33.610930] dump_stack_lvl+0x73/0xb0 [ 33.611431] print_report+0xd1/0x640 [ 33.611939] ? __virt_addr_valid+0x1db/0x2d0 [ 33.612371] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.612976] kasan_report+0x102/0x140 [ 33.613432] ? kasan_atomics_helper+0xde1/0x5450 [ 33.614024] ? kasan_atomics_helper+0xde1/0x5450 [ 33.614541] kasan_check_range+0x10c/0x1c0 [ 33.614931] __kasan_check_write+0x18/0x20 [ 33.615233] kasan_atomics_helper+0xde1/0x5450 [ 33.615925] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.616542] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.617223] ? kasan_save_alloc_info+0x3b/0x50 [ 33.617957] ? kasan_atomics+0x153/0x310 [ 33.618553] kasan_atomics+0x1dd/0x310 [ 33.619114] ? __pfx_kasan_atomics+0x10/0x10 [ 33.619533] ? __pfx_read_tsc+0x10/0x10 [ 33.620080] ? ktime_get_ts64+0x84/0x230 [ 33.620758] kunit_try_run_case+0x1b3/0x490 [ 33.621181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.621857] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.622318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.623002] ? __kthread_parkme+0x82/0x160 [ 33.623731] ? preempt_count_sub+0x50/0x80 [ 33.624243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.624841] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.625511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.626144] kthread+0x257/0x310 [ 33.626757] ? __pfx_kthread+0x10/0x10 [ 33.627167] ret_from_fork+0x41/0x80 [ 33.627787] ? __pfx_kthread+0x10/0x10 [ 33.628191] ret_from_fork_asm+0x1a/0x30 [ 33.628879] </TASK> [ 33.629151] [ 33.629514] Allocated by task 272: [ 33.629945] kasan_save_stack+0x3d/0x60 [ 33.630646] kasan_save_track+0x18/0x40 [ 33.630970] kasan_save_alloc_info+0x3b/0x50 [ 33.631540] __kasan_kmalloc+0xb7/0xc0 [ 33.631952] __kmalloc_cache_noprof+0x184/0x410 [ 33.632441] kasan_atomics+0x96/0x310 [ 33.632924] kunit_try_run_case+0x1b3/0x490 [ 33.633307] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.633903] kthread+0x257/0x310 [ 33.634306] ret_from_fork+0x41/0x80 [ 33.634582] ret_from_fork_asm+0x1a/0x30 [ 33.634934] [ 33.635165] The buggy address belongs to the object at ffff8881029f9480 [ 33.635165] which belongs to the cache kmalloc-64 of size 64 [ 33.636681] The buggy address is located 0 bytes to the right of [ 33.636681] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.637945] [ 33.638116] The buggy address belongs to the physical page: [ 33.638457] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.639436] flags: 0x200000000000000(node=0|zone=2) [ 33.640145] page_type: f5(slab) [ 33.640719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.641490] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.641996] page dumped because: kasan: bad access detected [ 33.642879] [ 33.643191] Memory state around the buggy address: [ 33.643854] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.644471] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.645407] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.646185] ^ [ 33.646821] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.647494] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.648228] ================================================================== [ 34.056450] ================================================================== [ 34.057149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 34.058152] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.058569] [ 34.058791] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.059959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.060282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.060859] Call Trace: [ 34.061131] <TASK> [ 34.061579] dump_stack_lvl+0x73/0xb0 [ 34.062436] print_report+0xd1/0x640 [ 34.063122] ? __virt_addr_valid+0x1db/0x2d0 [ 34.063900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.064757] kasan_report+0x102/0x140 [ 34.065045] ? kasan_atomics_helper+0x49ea/0x5450 [ 34.065688] ? kasan_atomics_helper+0x49ea/0x5450 [ 34.066588] __asan_report_load4_noabort+0x18/0x20 [ 34.067312] kasan_atomics_helper+0x49ea/0x5450 [ 34.067685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.068333] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.068972] ? kasan_save_alloc_info+0x3b/0x50 [ 34.069399] ? kasan_atomics+0x153/0x310 [ 34.069793] kasan_atomics+0x1dd/0x310 [ 34.070359] ? __pfx_kasan_atomics+0x10/0x10 [ 34.071044] ? __pfx_read_tsc+0x10/0x10 [ 34.071553] ? ktime_get_ts64+0x84/0x230 [ 34.072002] kunit_try_run_case+0x1b3/0x490 [ 34.072539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.073017] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.073554] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.074130] ? __kthread_parkme+0x82/0x160 [ 34.074595] ? preempt_count_sub+0x50/0x80 [ 34.075096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.075564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.076345] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.076970] kthread+0x257/0x310 [ 34.077474] ? __pfx_kthread+0x10/0x10 [ 34.077906] ret_from_fork+0x41/0x80 [ 34.078321] ? __pfx_kthread+0x10/0x10 [ 34.079266] ret_from_fork_asm+0x1a/0x30 [ 34.079979] </TASK> [ 34.080151] [ 34.080291] Allocated by task 272: [ 34.080502] kasan_save_stack+0x3d/0x60 [ 34.080777] kasan_save_track+0x18/0x40 [ 34.081020] kasan_save_alloc_info+0x3b/0x50 [ 34.081279] __kasan_kmalloc+0xb7/0xc0 [ 34.081516] __kmalloc_cache_noprof+0x184/0x410 [ 34.083249] kasan_atomics+0x96/0x310 [ 34.085551] kunit_try_run_case+0x1b3/0x490 [ 34.086795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.087512] kthread+0x257/0x310 [ 34.088477] ret_from_fork+0x41/0x80 [ 34.089151] ret_from_fork_asm+0x1a/0x30 [ 34.089773] [ 34.089914] The buggy address belongs to the object at ffff8881029f9480 [ 34.089914] which belongs to the cache kmalloc-64 of size 64 [ 34.090509] The buggy address is located 0 bytes to the right of [ 34.090509] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.093236] [ 34.093422] The buggy address belongs to the physical page: [ 34.094880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.095627] flags: 0x200000000000000(node=0|zone=2) [ 34.096747] page_type: f5(slab) [ 34.096995] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.097664] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.098423] page dumped because: kasan: bad access detected [ 34.098821] [ 34.099176] Memory state around the buggy address: [ 34.099791] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.100688] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.101767] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.102228] ^ [ 34.102755] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.103382] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.104272] ================================================================== [ 35.211511] ================================================================== [ 35.213529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 35.214239] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.215165] [ 35.216181] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.217121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.217366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.218171] Call Trace: [ 35.218454] <TASK> [ 35.219050] dump_stack_lvl+0x73/0xb0 [ 35.219451] print_report+0xd1/0x640 [ 35.219895] ? __virt_addr_valid+0x1db/0x2d0 [ 35.220652] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.221316] kasan_report+0x102/0x140 [ 35.221745] ? kasan_atomics_helper+0x4f73/0x5450 [ 35.222444] ? kasan_atomics_helper+0x4f73/0x5450 [ 35.223360] __asan_report_load8_noabort+0x18/0x20 [ 35.223839] kasan_atomics_helper+0x4f73/0x5450 [ 35.224257] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.224665] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.225489] ? kasan_save_alloc_info+0x3b/0x50 [ 35.226258] ? kasan_atomics+0x153/0x310 [ 35.226812] kasan_atomics+0x1dd/0x310 [ 35.227189] ? __pfx_kasan_atomics+0x10/0x10 [ 35.228480] ? __pfx_read_tsc+0x10/0x10 [ 35.228955] ? ktime_get_ts64+0x84/0x230 [ 35.229391] kunit_try_run_case+0x1b3/0x490 [ 35.229786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.230322] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.231469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.232578] ? __kthread_parkme+0x82/0x160 [ 35.233280] ? preempt_count_sub+0x50/0x80 [ 35.234178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.235206] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.236065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.236565] kthread+0x257/0x310 [ 35.237087] ? __pfx_kthread+0x10/0x10 [ 35.237435] ret_from_fork+0x41/0x80 [ 35.238235] ? __pfx_kthread+0x10/0x10 [ 35.238496] ret_from_fork_asm+0x1a/0x30 [ 35.239349] </TASK> [ 35.239630] [ 35.239874] Allocated by task 272: [ 35.240140] kasan_save_stack+0x3d/0x60 [ 35.240615] kasan_save_track+0x18/0x40 [ 35.241024] kasan_save_alloc_info+0x3b/0x50 [ 35.242286] __kasan_kmalloc+0xb7/0xc0 [ 35.242649] __kmalloc_cache_noprof+0x184/0x410 [ 35.243487] kasan_atomics+0x96/0x310 [ 35.243802] kunit_try_run_case+0x1b3/0x490 [ 35.244539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.245161] kthread+0x257/0x310 [ 35.245328] ret_from_fork+0x41/0x80 [ 35.245504] ret_from_fork_asm+0x1a/0x30 [ 35.245775] [ 35.246241] The buggy address belongs to the object at ffff8881029f9480 [ 35.246241] which belongs to the cache kmalloc-64 of size 64 [ 35.248335] The buggy address is located 0 bytes to the right of [ 35.248335] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.250748] [ 35.251185] The buggy address belongs to the physical page: [ 35.251472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.251971] flags: 0x200000000000000(node=0|zone=2) [ 35.252524] page_type: f5(slab) [ 35.252797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.253658] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.254495] page dumped because: kasan: bad access detected [ 35.255322] [ 35.255618] Memory state around the buggy address: [ 35.256090] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.256913] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.257693] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.258658] ^ [ 35.259249] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.260061] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.260795] ================================================================== [ 33.515543] ================================================================== [ 33.516713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 33.517338] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.518037] [ 33.518611] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.519374] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.519647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.520658] Call Trace: [ 33.521145] <TASK> [ 33.521491] dump_stack_lvl+0x73/0xb0 [ 33.521801] print_report+0xd1/0x640 [ 33.522100] ? __virt_addr_valid+0x1db/0x2d0 [ 33.522752] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.523419] kasan_report+0x102/0x140 [ 33.524041] ? kasan_atomics_helper+0x4a86/0x5450 [ 33.524617] ? kasan_atomics_helper+0x4a86/0x5450 [ 33.525196] __asan_report_load4_noabort+0x18/0x20 [ 33.525683] kasan_atomics_helper+0x4a86/0x5450 [ 33.526126] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.526463] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.527341] ? kasan_save_alloc_info+0x3b/0x50 [ 33.528088] ? kasan_atomics+0x153/0x310 [ 33.528623] kasan_atomics+0x1dd/0x310 [ 33.529108] ? __pfx_kasan_atomics+0x10/0x10 [ 33.529432] ? __pfx_read_tsc+0x10/0x10 [ 33.530160] ? ktime_get_ts64+0x84/0x230 [ 33.530670] kunit_try_run_case+0x1b3/0x490 [ 33.531099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.531642] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.532401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.533071] ? __kthread_parkme+0x82/0x160 [ 33.533505] ? preempt_count_sub+0x50/0x80 [ 33.534120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.534450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.535241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.536014] kthread+0x257/0x310 [ 33.536510] ? __pfx_kthread+0x10/0x10 [ 33.537025] ret_from_fork+0x41/0x80 [ 33.537307] ? __pfx_kthread+0x10/0x10 [ 33.537945] ret_from_fork_asm+0x1a/0x30 [ 33.538578] </TASK> [ 33.538983] [ 33.539145] Allocated by task 272: [ 33.539774] kasan_save_stack+0x3d/0x60 [ 33.540368] kasan_save_track+0x18/0x40 [ 33.540826] kasan_save_alloc_info+0x3b/0x50 [ 33.541380] __kasan_kmalloc+0xb7/0xc0 [ 33.541907] __kmalloc_cache_noprof+0x184/0x410 [ 33.542533] kasan_atomics+0x96/0x310 [ 33.542947] kunit_try_run_case+0x1b3/0x490 [ 33.544170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.544916] kthread+0x257/0x310 [ 33.545136] ret_from_fork+0x41/0x80 [ 33.545370] ret_from_fork_asm+0x1a/0x30 [ 33.545639] [ 33.545811] The buggy address belongs to the object at ffff8881029f9480 [ 33.545811] which belongs to the cache kmalloc-64 of size 64 [ 33.546497] The buggy address is located 0 bytes to the right of [ 33.546497] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.547428] [ 33.547572] The buggy address belongs to the physical page: [ 33.547971] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.548374] flags: 0x200000000000000(node=0|zone=2) [ 33.548799] page_type: f5(slab) [ 33.549049] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.549882] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.550474] page dumped because: kasan: bad access detected [ 33.550850] [ 33.550996] Memory state around the buggy address: [ 33.551287] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.553194] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.555511] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.555985] ^ [ 33.556263] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.556664] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.557197] ================================================================== [ 33.416443] ================================================================== [ 33.417768] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 33.418548] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.419985] [ 33.420176] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.421240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.421758] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.423196] Call Trace: [ 33.423847] <TASK> [ 33.424118] dump_stack_lvl+0x73/0xb0 [ 33.424541] print_report+0xd1/0x640 [ 33.425659] ? __virt_addr_valid+0x1db/0x2d0 [ 33.426124] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.426860] kasan_report+0x102/0x140 [ 33.427417] ? kasan_atomics_helper+0xb6b/0x5450 [ 33.428300] ? kasan_atomics_helper+0xb6b/0x5450 [ 33.429003] kasan_check_range+0x10c/0x1c0 [ 33.429593] __kasan_check_write+0x18/0x20 [ 33.430203] kasan_atomics_helper+0xb6b/0x5450 [ 33.430954] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.431618] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.432292] ? kasan_save_alloc_info+0x3b/0x50 [ 33.432810] ? kasan_atomics+0x153/0x310 [ 33.433219] kasan_atomics+0x1dd/0x310 [ 33.433593] ? __pfx_kasan_atomics+0x10/0x10 [ 33.434542] ? __pfx_read_tsc+0x10/0x10 [ 33.435168] ? ktime_get_ts64+0x84/0x230 [ 33.435781] kunit_try_run_case+0x1b3/0x490 [ 33.436487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.437281] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.438179] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.439253] ? __kthread_parkme+0x82/0x160 [ 33.439616] ? preempt_count_sub+0x50/0x80 [ 33.440180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.440965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.441733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.442284] kthread+0x257/0x310 [ 33.442642] ? __pfx_kthread+0x10/0x10 [ 33.443472] ret_from_fork+0x41/0x80 [ 33.444106] ? __pfx_kthread+0x10/0x10 [ 33.444800] ret_from_fork_asm+0x1a/0x30 [ 33.445395] </TASK> [ 33.445764] [ 33.445914] Allocated by task 272: [ 33.446280] kasan_save_stack+0x3d/0x60 [ 33.446695] kasan_save_track+0x18/0x40 [ 33.447653] kasan_save_alloc_info+0x3b/0x50 [ 33.448270] __kasan_kmalloc+0xb7/0xc0 [ 33.448949] __kmalloc_cache_noprof+0x184/0x410 [ 33.449413] kasan_atomics+0x96/0x310 [ 33.450492] kunit_try_run_case+0x1b3/0x490 [ 33.450990] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.451509] kthread+0x257/0x310 [ 33.452374] ret_from_fork+0x41/0x80 [ 33.452730] ret_from_fork_asm+0x1a/0x30 [ 33.453526] [ 33.453728] The buggy address belongs to the object at ffff8881029f9480 [ 33.453728] which belongs to the cache kmalloc-64 of size 64 [ 33.454637] The buggy address is located 0 bytes to the right of [ 33.454637] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.456207] [ 33.456659] The buggy address belongs to the physical page: [ 33.457516] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.458236] flags: 0x200000000000000(node=0|zone=2) [ 33.459051] page_type: f5(slab) [ 33.459489] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.460752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.461402] page dumped because: kasan: bad access detected [ 33.462410] [ 33.462595] Memory state around the buggy address: [ 33.462955] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.463812] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.464400] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.465599] ^ [ 33.466103] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.466830] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.467646] ================================================================== [ 32.784514] ================================================================== [ 32.785151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 32.785884] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.786823] [ 32.787299] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.788345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.788844] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.789944] Call Trace: [ 32.790356] <TASK> [ 32.790658] dump_stack_lvl+0x73/0xb0 [ 32.791096] print_report+0xd1/0x640 [ 32.791572] ? __virt_addr_valid+0x1db/0x2d0 [ 32.792551] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.793118] kasan_report+0x102/0x140 [ 32.793401] ? kasan_atomics_helper+0x4b56/0x5450 [ 32.794136] ? kasan_atomics_helper+0x4b56/0x5450 [ 32.794935] __asan_report_load4_noabort+0x18/0x20 [ 32.795465] kasan_atomics_helper+0x4b56/0x5450 [ 32.795960] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.796739] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.797282] ? kasan_save_alloc_info+0x3b/0x50 [ 32.797736] ? kasan_atomics+0x153/0x310 [ 32.798211] kasan_atomics+0x1dd/0x310 [ 32.798555] ? __pfx_kasan_atomics+0x10/0x10 [ 32.799656] ? __pfx_read_tsc+0x10/0x10 [ 32.801014] ? ktime_get_ts64+0x84/0x230 [ 32.801584] kunit_try_run_case+0x1b3/0x490 [ 32.802175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.803150] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.804113] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.805275] ? __kthread_parkme+0x82/0x160 [ 32.805639] ? preempt_count_sub+0x50/0x80 [ 32.806136] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.806874] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.807917] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.808856] kthread+0x257/0x310 [ 32.809216] ? __pfx_kthread+0x10/0x10 [ 32.810566] ret_from_fork+0x41/0x80 [ 32.810979] ? __pfx_kthread+0x10/0x10 [ 32.811461] ret_from_fork_asm+0x1a/0x30 [ 32.812127] </TASK> [ 32.812604] [ 32.812797] Allocated by task 272: [ 32.813836] kasan_save_stack+0x3d/0x60 [ 32.814239] kasan_save_track+0x18/0x40 [ 32.815025] kasan_save_alloc_info+0x3b/0x50 [ 32.815672] __kasan_kmalloc+0xb7/0xc0 [ 32.816105] __kmalloc_cache_noprof+0x184/0x410 [ 32.817033] kasan_atomics+0x96/0x310 [ 32.817509] kunit_try_run_case+0x1b3/0x490 [ 32.818258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.819070] kthread+0x257/0x310 [ 32.819685] ret_from_fork+0x41/0x80 [ 32.820077] ret_from_fork_asm+0x1a/0x30 [ 32.820534] [ 32.820784] The buggy address belongs to the object at ffff8881029f9480 [ 32.820784] which belongs to the cache kmalloc-64 of size 64 [ 32.822748] The buggy address is located 0 bytes to the right of [ 32.822748] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.824203] [ 32.824865] The buggy address belongs to the physical page: [ 32.825616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.826577] flags: 0x200000000000000(node=0|zone=2) [ 32.827127] page_type: f5(slab) [ 32.827418] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.828653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.829674] page dumped because: kasan: bad access detected [ 32.830177] [ 32.830392] Memory state around the buggy address: [ 32.831346] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.832255] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.832940] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.833598] ^ [ 32.835033] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.836230] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.838109] ================================================================== [ 35.402274] ================================================================== [ 35.402821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 35.403474] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.404246] [ 35.404512] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.405513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.406106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.406930] Call Trace: [ 35.407272] <TASK> [ 35.407566] dump_stack_lvl+0x73/0xb0 [ 35.407962] print_report+0xd1/0x640 [ 35.408499] ? __virt_addr_valid+0x1db/0x2d0 [ 35.408897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.409576] kasan_report+0x102/0x140 [ 35.410020] ? kasan_atomics_helper+0x4fb4/0x5450 [ 35.410545] ? kasan_atomics_helper+0x4fb4/0x5450 [ 35.411676] __asan_report_load8_noabort+0x18/0x20 [ 35.413360] kasan_atomics_helper+0x4fb4/0x5450 [ 35.414616] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.415282] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.416592] ? kasan_save_alloc_info+0x3b/0x50 [ 35.416905] ? kasan_atomics+0x153/0x310 [ 35.417188] kasan_atomics+0x1dd/0x310 [ 35.417466] ? __pfx_kasan_atomics+0x10/0x10 [ 35.418640] ? __pfx_read_tsc+0x10/0x10 [ 35.419961] ? ktime_get_ts64+0x84/0x230 [ 35.420445] kunit_try_run_case+0x1b3/0x490 [ 35.421056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.421406] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.421831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.422277] ? __kthread_parkme+0x82/0x160 [ 35.424220] ? preempt_count_sub+0x50/0x80 [ 35.424534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.424948] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.425445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.425928] kthread+0x257/0x310 [ 35.426184] ? __pfx_kthread+0x10/0x10 [ 35.426522] ret_from_fork+0x41/0x80 [ 35.426841] ? __pfx_kthread+0x10/0x10 [ 35.427097] ret_from_fork_asm+0x1a/0x30 [ 35.427395] </TASK> [ 35.427562] [ 35.427799] Allocated by task 272: [ 35.428148] kasan_save_stack+0x3d/0x60 [ 35.428656] kasan_save_track+0x18/0x40 [ 35.429147] kasan_save_alloc_info+0x3b/0x50 [ 35.429458] __kasan_kmalloc+0xb7/0xc0 [ 35.430005] __kmalloc_cache_noprof+0x184/0x410 [ 35.430453] kasan_atomics+0x96/0x310 [ 35.430922] kunit_try_run_case+0x1b3/0x490 [ 35.431242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.431896] kthread+0x257/0x310 [ 35.432298] ret_from_fork+0x41/0x80 [ 35.432676] ret_from_fork_asm+0x1a/0x30 [ 35.432999] [ 35.433161] The buggy address belongs to the object at ffff8881029f9480 [ 35.433161] which belongs to the cache kmalloc-64 of size 64 [ 35.434039] The buggy address is located 0 bytes to the right of [ 35.434039] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.435467] [ 35.435791] The buggy address belongs to the physical page: [ 35.436404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.437017] flags: 0x200000000000000(node=0|zone=2) [ 35.437586] page_type: f5(slab) [ 35.437974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.438690] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.439282] page dumped because: kasan: bad access detected [ 35.439858] [ 35.440108] Memory state around the buggy address: [ 35.440467] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.441158] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.441807] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.442295] ^ [ 35.442743] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.443526] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.445208] ================================================================== [ 35.025114] ================================================================== [ 35.025920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 35.026625] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.027117] [ 35.027404] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.028525] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.029122] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.030163] Call Trace: [ 35.030513] <TASK> [ 35.030799] dump_stack_lvl+0x73/0xb0 [ 35.031359] print_report+0xd1/0x640 [ 35.031935] ? __virt_addr_valid+0x1db/0x2d0 [ 35.032260] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.033099] kasan_report+0x102/0x140 [ 35.033506] ? kasan_atomics_helper+0x1d7b/0x5450 [ 35.034104] ? kasan_atomics_helper+0x1d7b/0x5450 [ 35.034448] kasan_check_range+0x10c/0x1c0 [ 35.035088] __kasan_check_write+0x18/0x20 [ 35.035675] kasan_atomics_helper+0x1d7b/0x5450 [ 35.036083] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.036501] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.037542] ? kasan_save_alloc_info+0x3b/0x50 [ 35.038075] ? kasan_atomics+0x153/0x310 [ 35.038747] kasan_atomics+0x1dd/0x310 [ 35.039049] ? __pfx_kasan_atomics+0x10/0x10 [ 35.039618] ? __pfx_read_tsc+0x10/0x10 [ 35.040152] ? ktime_get_ts64+0x84/0x230 [ 35.040724] kunit_try_run_case+0x1b3/0x490 [ 35.041105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.041606] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.042284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.042739] ? __kthread_parkme+0x82/0x160 [ 35.043273] ? preempt_count_sub+0x50/0x80 [ 35.043655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.044296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.044984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.045516] kthread+0x257/0x310 [ 35.045967] ? __pfx_kthread+0x10/0x10 [ 35.046264] ret_from_fork+0x41/0x80 [ 35.046796] ? __pfx_kthread+0x10/0x10 [ 35.047253] ret_from_fork_asm+0x1a/0x30 [ 35.047905] </TASK> [ 35.048215] [ 35.048411] Allocated by task 272: [ 35.048919] kasan_save_stack+0x3d/0x60 [ 35.049326] kasan_save_track+0x18/0x40 [ 35.049607] kasan_save_alloc_info+0x3b/0x50 [ 35.050258] __kasan_kmalloc+0xb7/0xc0 [ 35.050765] __kmalloc_cache_noprof+0x184/0x410 [ 35.051079] kasan_atomics+0x96/0x310 [ 35.051568] kunit_try_run_case+0x1b3/0x490 [ 35.052021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.052371] kthread+0x257/0x310 [ 35.052965] ret_from_fork+0x41/0x80 [ 35.053525] ret_from_fork_asm+0x1a/0x30 [ 35.054032] [ 35.054238] The buggy address belongs to the object at ffff8881029f9480 [ 35.054238] which belongs to the cache kmalloc-64 of size 64 [ 35.055310] The buggy address is located 0 bytes to the right of [ 35.055310] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.056829] [ 35.057082] The buggy address belongs to the physical page: [ 35.057502] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.058296] flags: 0x200000000000000(node=0|zone=2) [ 35.058804] page_type: f5(slab) [ 35.059167] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.060061] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.060817] page dumped because: kasan: bad access detected [ 35.061253] [ 35.061355] Memory state around the buggy address: [ 35.061554] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.063265] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.064559] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.065885] ^ [ 35.066560] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.067621] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.068589] ================================================================== [ 35.310886] ================================================================== [ 35.311543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 35.312085] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.312798] [ 35.313074] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.314018] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.314397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.315185] Call Trace: [ 35.315440] <TASK> [ 35.315795] dump_stack_lvl+0x73/0xb0 [ 35.316186] print_report+0xd1/0x640 [ 35.316576] ? __virt_addr_valid+0x1db/0x2d0 [ 35.316972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.317555] kasan_report+0x102/0x140 [ 35.318022] ? kasan_atomics_helper+0x4f9a/0x5450 [ 35.318648] ? kasan_atomics_helper+0x4f9a/0x5450 [ 35.319047] __asan_report_load8_noabort+0x18/0x20 [ 35.319526] kasan_atomics_helper+0x4f9a/0x5450 [ 35.320062] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.320728] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.321155] ? kasan_save_alloc_info+0x3b/0x50 [ 35.321595] ? kasan_atomics+0x153/0x310 [ 35.321972] kasan_atomics+0x1dd/0x310 [ 35.322460] ? __pfx_kasan_atomics+0x10/0x10 [ 35.322911] ? __pfx_read_tsc+0x10/0x10 [ 35.323308] ? ktime_get_ts64+0x84/0x230 [ 35.323781] kunit_try_run_case+0x1b3/0x490 [ 35.324244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.324812] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.325299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.325923] ? __kthread_parkme+0x82/0x160 [ 35.326383] ? preempt_count_sub+0x50/0x80 [ 35.326966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.327376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.327873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.328532] kthread+0x257/0x310 [ 35.328946] ? __pfx_kthread+0x10/0x10 [ 35.329388] ret_from_fork+0x41/0x80 [ 35.329884] ? __pfx_kthread+0x10/0x10 [ 35.330295] ret_from_fork_asm+0x1a/0x30 [ 35.330880] </TASK> [ 35.331108] [ 35.331358] Allocated by task 272: [ 35.331700] kasan_save_stack+0x3d/0x60 [ 35.332150] kasan_save_track+0x18/0x40 [ 35.332512] kasan_save_alloc_info+0x3b/0x50 [ 35.332995] __kasan_kmalloc+0xb7/0xc0 [ 35.333278] __kmalloc_cache_noprof+0x184/0x410 [ 35.333901] kasan_atomics+0x96/0x310 [ 35.335258] kunit_try_run_case+0x1b3/0x490 [ 35.335808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.336968] kthread+0x257/0x310 [ 35.337340] ret_from_fork+0x41/0x80 [ 35.338155] ret_from_fork_asm+0x1a/0x30 [ 35.338773] [ 35.339089] The buggy address belongs to the object at ffff8881029f9480 [ 35.339089] which belongs to the cache kmalloc-64 of size 64 [ 35.340677] The buggy address is located 0 bytes to the right of [ 35.340677] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.341887] [ 35.342043] The buggy address belongs to the physical page: [ 35.342679] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.343957] flags: 0x200000000000000(node=0|zone=2) [ 35.344508] page_type: f5(slab) [ 35.345129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.345690] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.346425] page dumped because: kasan: bad access detected [ 35.347338] [ 35.347531] Memory state around the buggy address: [ 35.348276] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.349140] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.350350] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.351261] ^ [ 35.351753] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.352454] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.353196] ================================================================== [ 35.533966] ================================================================== [ 35.535288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 35.535893] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.536553] [ 35.536791] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.537693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.538051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.538644] Call Trace: [ 35.538962] <TASK> [ 35.539271] dump_stack_lvl+0x73/0xb0 [ 35.539692] print_report+0xd1/0x640 [ 35.540092] ? __virt_addr_valid+0x1db/0x2d0 [ 35.540486] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.541113] kasan_report+0x102/0x140 [ 35.541484] ? kasan_atomics_helper+0x224d/0x5450 [ 35.541940] ? kasan_atomics_helper+0x224d/0x5450 [ 35.542378] kasan_check_range+0x10c/0x1c0 [ 35.542854] __kasan_check_write+0x18/0x20 [ 35.543159] kasan_atomics_helper+0x224d/0x5450 [ 35.543590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.544187] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.544543] ? kasan_save_alloc_info+0x3b/0x50 [ 35.545130] ? kasan_atomics+0x153/0x310 [ 35.545685] kasan_atomics+0x1dd/0x310 [ 35.546023] ? __pfx_kasan_atomics+0x10/0x10 [ 35.546353] ? __pfx_read_tsc+0x10/0x10 [ 35.546884] ? ktime_get_ts64+0x84/0x230 [ 35.547409] kunit_try_run_case+0x1b3/0x490 [ 35.548016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.548485] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.548954] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.549414] ? __kthread_parkme+0x82/0x160 [ 35.549955] ? preempt_count_sub+0x50/0x80 [ 35.550326] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.550777] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.551470] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.552041] kthread+0x257/0x310 [ 35.552328] ? __pfx_kthread+0x10/0x10 [ 35.552818] ret_from_fork+0x41/0x80 [ 35.553101] ? __pfx_kthread+0x10/0x10 [ 35.553565] ret_from_fork_asm+0x1a/0x30 [ 35.554162] </TASK> [ 35.554490] [ 35.554741] Allocated by task 272: [ 35.555167] kasan_save_stack+0x3d/0x60 [ 35.555456] kasan_save_track+0x18/0x40 [ 35.555895] kasan_save_alloc_info+0x3b/0x50 [ 35.556442] __kasan_kmalloc+0xb7/0xc0 [ 35.556859] __kmalloc_cache_noprof+0x184/0x410 [ 35.557229] kasan_atomics+0x96/0x310 [ 35.557801] kunit_try_run_case+0x1b3/0x490 [ 35.558213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.558599] kthread+0x257/0x310 [ 35.559089] ret_from_fork+0x41/0x80 [ 35.559535] ret_from_fork_asm+0x1a/0x30 [ 35.560081] [ 35.560283] The buggy address belongs to the object at ffff8881029f9480 [ 35.560283] which belongs to the cache kmalloc-64 of size 64 [ 35.561226] The buggy address is located 0 bytes to the right of [ 35.561226] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.562429] [ 35.562591] The buggy address belongs to the physical page: [ 35.563194] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.564032] flags: 0x200000000000000(node=0|zone=2) [ 35.564475] page_type: f5(slab) [ 35.565266] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.566138] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.566976] page dumped because: kasan: bad access detected [ 35.567543] [ 35.567906] Memory state around the buggy address: [ 35.568259] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.568994] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.569654] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.570523] ^ [ 35.571056] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.571882] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.572544] ================================================================== [ 33.954028] ================================================================== [ 33.955510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 33.956724] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.957457] [ 33.958260] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.959336] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.960124] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.961233] Call Trace: [ 33.961590] <TASK> [ 33.962242] dump_stack_lvl+0x73/0xb0 [ 33.962550] print_report+0xd1/0x640 [ 33.963295] ? __virt_addr_valid+0x1db/0x2d0 [ 33.964027] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.964763] kasan_report+0x102/0x140 [ 33.965434] ? kasan_atomics_helper+0x4a04/0x5450 [ 33.965996] ? kasan_atomics_helper+0x4a04/0x5450 [ 33.966872] __asan_report_load4_noabort+0x18/0x20 [ 33.967546] kasan_atomics_helper+0x4a04/0x5450 [ 33.968105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.968948] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.969606] ? kasan_save_alloc_info+0x3b/0x50 [ 33.970293] ? kasan_atomics+0x153/0x310 [ 33.970951] kasan_atomics+0x1dd/0x310 [ 33.971290] ? __pfx_kasan_atomics+0x10/0x10 [ 33.972156] ? __pfx_read_tsc+0x10/0x10 [ 33.972714] ? ktime_get_ts64+0x84/0x230 [ 33.973220] kunit_try_run_case+0x1b3/0x490 [ 33.974144] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.974661] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.975183] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.975646] ? __kthread_parkme+0x82/0x160 [ 33.976561] ? preempt_count_sub+0x50/0x80 [ 33.977323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.978027] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.978844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.979566] kthread+0x257/0x310 [ 33.980108] ? __pfx_kthread+0x10/0x10 [ 33.980788] ret_from_fork+0x41/0x80 [ 33.981590] ? __pfx_kthread+0x10/0x10 [ 33.982243] ret_from_fork_asm+0x1a/0x30 [ 33.982828] </TASK> [ 33.983188] [ 33.983350] Allocated by task 272: [ 33.984329] kasan_save_stack+0x3d/0x60 [ 33.985138] kasan_save_track+0x18/0x40 [ 33.985790] kasan_save_alloc_info+0x3b/0x50 [ 33.986306] __kasan_kmalloc+0xb7/0xc0 [ 33.987131] __kmalloc_cache_noprof+0x184/0x410 [ 33.987557] kasan_atomics+0x96/0x310 [ 33.988269] kunit_try_run_case+0x1b3/0x490 [ 33.988962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.989494] kthread+0x257/0x310 [ 33.990359] ret_from_fork+0x41/0x80 [ 33.990763] ret_from_fork_asm+0x1a/0x30 [ 33.991501] [ 33.991846] The buggy address belongs to the object at ffff8881029f9480 [ 33.991846] which belongs to the cache kmalloc-64 of size 64 [ 33.993122] The buggy address is located 0 bytes to the right of [ 33.993122] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.994567] [ 33.995036] The buggy address belongs to the physical page: [ 33.995882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.996409] flags: 0x200000000000000(node=0|zone=2) [ 33.997075] page_type: f5(slab) [ 33.997973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.998933] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.999804] page dumped because: kasan: bad access detected [ 34.000346] [ 34.000934] Memory state around the buggy address: [ 34.001585] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.002427] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.003349] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.004415] ^ [ 34.004878] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.005547] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.006415] ================================================================== [ 35.354430] ================================================================== [ 35.355510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 35.356626] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.357986] [ 35.359006] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.360469] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.360910] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.361941] Call Trace: [ 35.362399] <TASK> [ 35.363159] dump_stack_lvl+0x73/0xb0 [ 35.363527] print_report+0xd1/0x640 [ 35.364023] ? __virt_addr_valid+0x1db/0x2d0 [ 35.364493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.365668] kasan_report+0x102/0x140 [ 35.366064] ? kasan_atomics_helper+0x20c9/0x5450 [ 35.366551] ? kasan_atomics_helper+0x20c9/0x5450 [ 35.367348] kasan_check_range+0x10c/0x1c0 [ 35.368067] __kasan_check_write+0x18/0x20 [ 35.368521] kasan_atomics_helper+0x20c9/0x5450 [ 35.369272] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.370080] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.370556] ? kasan_save_alloc_info+0x3b/0x50 [ 35.371689] ? kasan_atomics+0x153/0x310 [ 35.372146] kasan_atomics+0x1dd/0x310 [ 35.372527] ? __pfx_kasan_atomics+0x10/0x10 [ 35.373694] ? __pfx_read_tsc+0x10/0x10 [ 35.374077] ? ktime_get_ts64+0x84/0x230 [ 35.375039] kunit_try_run_case+0x1b3/0x490 [ 35.375484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.376278] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.377336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.377748] ? __kthread_parkme+0x82/0x160 [ 35.378210] ? preempt_count_sub+0x50/0x80 [ 35.379085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.379532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.380432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.381329] kthread+0x257/0x310 [ 35.381889] ? __pfx_kthread+0x10/0x10 [ 35.382432] ret_from_fork+0x41/0x80 [ 35.383114] ? __pfx_kthread+0x10/0x10 [ 35.383328] ret_from_fork_asm+0x1a/0x30 [ 35.383535] </TASK> [ 35.383789] [ 35.383956] Allocated by task 272: [ 35.384206] kasan_save_stack+0x3d/0x60 [ 35.384647] kasan_save_track+0x18/0x40 [ 35.384971] kasan_save_alloc_info+0x3b/0x50 [ 35.385280] __kasan_kmalloc+0xb7/0xc0 [ 35.385554] __kmalloc_cache_noprof+0x184/0x410 [ 35.386207] kasan_atomics+0x96/0x310 [ 35.386833] kunit_try_run_case+0x1b3/0x490 [ 35.387434] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.387962] kthread+0x257/0x310 [ 35.388216] ret_from_fork+0x41/0x80 [ 35.388480] ret_from_fork_asm+0x1a/0x30 [ 35.388969] [ 35.389282] The buggy address belongs to the object at ffff8881029f9480 [ 35.389282] which belongs to the cache kmalloc-64 of size 64 [ 35.390289] The buggy address is located 0 bytes to the right of [ 35.390289] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.391421] [ 35.391758] The buggy address belongs to the physical page: [ 35.392311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.393156] flags: 0x200000000000000(node=0|zone=2) [ 35.393798] page_type: f5(slab) [ 35.394158] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.394955] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.395757] page dumped because: kasan: bad access detected [ 35.396252] [ 35.396457] Memory state around the buggy address: [ 35.396961] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.397590] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.398341] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.399092] ^ [ 35.399532] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.400267] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.400996] ================================================================== [ 33.871819] ================================================================== [ 33.872951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 33.873793] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.875357] [ 33.875576] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.876522] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.877312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.878425] Call Trace: [ 33.878734] <TASK> [ 33.878959] dump_stack_lvl+0x73/0xb0 [ 33.879376] print_report+0xd1/0x640 [ 33.880204] ? __virt_addr_valid+0x1db/0x2d0 [ 33.880829] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.881487] kasan_report+0x102/0x140 [ 33.882281] ? kasan_atomics_helper+0x4a1e/0x5450 [ 33.882936] ? kasan_atomics_helper+0x4a1e/0x5450 [ 33.883168] __asan_report_load4_noabort+0x18/0x20 [ 33.883381] kasan_atomics_helper+0x4a1e/0x5450 [ 33.883593] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.884531] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.885414] ? kasan_save_alloc_info+0x3b/0x50 [ 33.886285] ? kasan_atomics+0x153/0x310 [ 33.886820] kasan_atomics+0x1dd/0x310 [ 33.887110] ? __pfx_kasan_atomics+0x10/0x10 [ 33.887472] ? __pfx_read_tsc+0x10/0x10 [ 33.887929] ? ktime_get_ts64+0x84/0x230 [ 33.888254] kunit_try_run_case+0x1b3/0x490 [ 33.888851] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.889181] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.889815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.890266] ? __kthread_parkme+0x82/0x160 [ 33.890759] ? preempt_count_sub+0x50/0x80 [ 33.891213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.891665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.892210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.892830] kthread+0x257/0x310 [ 33.893237] ? __pfx_kthread+0x10/0x10 [ 33.893581] ret_from_fork+0x41/0x80 [ 33.894152] ? __pfx_kthread+0x10/0x10 [ 33.894540] ret_from_fork_asm+0x1a/0x30 [ 33.895128] </TASK> [ 33.895394] [ 33.895665] Allocated by task 272: [ 33.895929] kasan_save_stack+0x3d/0x60 [ 33.896415] kasan_save_track+0x18/0x40 [ 33.896824] kasan_save_alloc_info+0x3b/0x50 [ 33.897351] __kasan_kmalloc+0xb7/0xc0 [ 33.897878] __kmalloc_cache_noprof+0x184/0x410 [ 33.898258] kasan_atomics+0x96/0x310 [ 33.898762] kunit_try_run_case+0x1b3/0x490 [ 33.899128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.899496] kthread+0x257/0x310 [ 33.899998] ret_from_fork+0x41/0x80 [ 33.900392] ret_from_fork_asm+0x1a/0x30 [ 33.900827] [ 33.901064] The buggy address belongs to the object at ffff8881029f9480 [ 33.901064] which belongs to the cache kmalloc-64 of size 64 [ 33.902178] The buggy address is located 0 bytes to the right of [ 33.902178] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.903186] [ 33.903428] The buggy address belongs to the physical page: [ 33.903971] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.904686] flags: 0x200000000000000(node=0|zone=2) [ 33.905169] page_type: f5(slab) [ 33.905529] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.906271] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.906945] page dumped because: kasan: bad access detected [ 33.907278] [ 33.907439] Memory state around the buggy address: [ 33.907907] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.908739] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.909274] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.909757] ^ [ 33.910138] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.910991] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.911822] ================================================================== [ 34.659888] ================================================================== [ 34.660473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 34.660919] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.662243] [ 34.662512] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.663632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.664148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.664992] Call Trace: [ 34.665276] <TASK> [ 34.665567] dump_stack_lvl+0x73/0xb0 [ 34.665961] print_report+0xd1/0x640 [ 34.666327] ? __virt_addr_valid+0x1db/0x2d0 [ 34.666895] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.667346] kasan_report+0x102/0x140 [ 34.667848] ? kasan_atomics_helper+0x18b2/0x5450 [ 34.668289] ? kasan_atomics_helper+0x18b2/0x5450 [ 34.668727] kasan_check_range+0x10c/0x1c0 [ 34.669503] __kasan_check_write+0x18/0x20 [ 34.669907] kasan_atomics_helper+0x18b2/0x5450 [ 34.670343] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.671046] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.671947] ? kasan_save_alloc_info+0x3b/0x50 [ 34.672338] ? kasan_atomics+0x153/0x310 [ 34.673058] kasan_atomics+0x1dd/0x310 [ 34.673468] ? __pfx_kasan_atomics+0x10/0x10 [ 34.674746] ? __pfx_read_tsc+0x10/0x10 [ 34.675342] ? ktime_get_ts64+0x84/0x230 [ 34.675834] kunit_try_run_case+0x1b3/0x490 [ 34.676277] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.676798] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.677300] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.678022] ? __kthread_parkme+0x82/0x160 [ 34.678673] ? preempt_count_sub+0x50/0x80 [ 34.679640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.680339] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.681376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.682233] kthread+0x257/0x310 [ 34.682951] ? __pfx_kthread+0x10/0x10 [ 34.683386] ret_from_fork+0x41/0x80 [ 34.684298] ? __pfx_kthread+0x10/0x10 [ 34.684922] ret_from_fork_asm+0x1a/0x30 [ 34.685437] </TASK> [ 34.685715] [ 34.685994] Allocated by task 272: [ 34.686265] kasan_save_stack+0x3d/0x60 [ 34.686737] kasan_save_track+0x18/0x40 [ 34.687046] kasan_save_alloc_info+0x3b/0x50 [ 34.687661] __kasan_kmalloc+0xb7/0xc0 [ 34.687990] __kmalloc_cache_noprof+0x184/0x410 [ 34.688632] kasan_atomics+0x96/0x310 [ 34.689012] kunit_try_run_case+0x1b3/0x490 [ 34.689526] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.690236] kthread+0x257/0x310 [ 34.690502] ret_from_fork+0x41/0x80 [ 34.691078] ret_from_fork_asm+0x1a/0x30 [ 34.691452] [ 34.691682] The buggy address belongs to the object at ffff8881029f9480 [ 34.691682] which belongs to the cache kmalloc-64 of size 64 [ 34.692996] The buggy address is located 0 bytes to the right of [ 34.692996] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.694146] [ 34.694403] The buggy address belongs to the physical page: [ 34.694763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.695586] flags: 0x200000000000000(node=0|zone=2) [ 34.696474] page_type: f5(slab) [ 34.696785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.697646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.698300] page dumped because: kasan: bad access detected [ 34.698836] [ 34.699089] Memory state around the buggy address: [ 34.699515] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.700239] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.700922] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.701403] ^ [ 34.702158] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.702574] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.703448] ================================================================== [ 34.190569] ================================================================== [ 34.192182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 34.193020] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.193900] [ 34.194249] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.195435] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.196261] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.197302] Call Trace: [ 34.197512] <TASK> [ 34.197874] dump_stack_lvl+0x73/0xb0 [ 34.198625] print_report+0xd1/0x640 [ 34.198939] ? __virt_addr_valid+0x1db/0x2d0 [ 34.199743] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.200690] kasan_report+0x102/0x140 [ 34.201362] ? kasan_atomics_helper+0x13b6/0x5450 [ 34.201719] ? kasan_atomics_helper+0x13b6/0x5450 [ 34.202614] kasan_check_range+0x10c/0x1c0 [ 34.203274] __kasan_check_read+0x15/0x20 [ 34.203990] kasan_atomics_helper+0x13b6/0x5450 [ 34.204569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.205175] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.205933] ? kasan_save_alloc_info+0x3b/0x50 [ 34.206486] ? kasan_atomics+0x153/0x310 [ 34.207083] kasan_atomics+0x1dd/0x310 [ 34.207445] ? __pfx_kasan_atomics+0x10/0x10 [ 34.208127] ? __pfx_read_tsc+0x10/0x10 [ 34.208465] ? ktime_get_ts64+0x84/0x230 [ 34.209133] kunit_try_run_case+0x1b3/0x490 [ 34.209759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.210190] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.210551] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.211256] ? __kthread_parkme+0x82/0x160 [ 34.211834] ? preempt_count_sub+0x50/0x80 [ 34.212238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.212920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.213349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.214137] kthread+0x257/0x310 [ 34.214515] ? __pfx_kthread+0x10/0x10 [ 34.215058] ret_from_fork+0x41/0x80 [ 34.215537] ? __pfx_kthread+0x10/0x10 [ 34.216079] ret_from_fork_asm+0x1a/0x30 [ 34.216467] </TASK> [ 34.216753] [ 34.217053] Allocated by task 272: [ 34.217579] kasan_save_stack+0x3d/0x60 [ 34.218030] kasan_save_track+0x18/0x40 [ 34.218383] kasan_save_alloc_info+0x3b/0x50 [ 34.218997] __kasan_kmalloc+0xb7/0xc0 [ 34.219444] __kmalloc_cache_noprof+0x184/0x410 [ 34.219900] kasan_atomics+0x96/0x310 [ 34.220514] kunit_try_run_case+0x1b3/0x490 [ 34.221101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.221695] kthread+0x257/0x310 [ 34.221986] ret_from_fork+0x41/0x80 [ 34.222380] ret_from_fork_asm+0x1a/0x30 [ 34.223041] [ 34.223282] The buggy address belongs to the object at ffff8881029f9480 [ 34.223282] which belongs to the cache kmalloc-64 of size 64 [ 34.224289] The buggy address is located 0 bytes to the right of [ 34.224289] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.225427] [ 34.225592] The buggy address belongs to the physical page: [ 34.226390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.227095] flags: 0x200000000000000(node=0|zone=2) [ 34.227786] page_type: f5(slab) [ 34.228221] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.229044] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.229652] page dumped because: kasan: bad access detected [ 34.230316] [ 34.230484] Memory state around the buggy address: [ 34.231090] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.231926] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.232489] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.233169] ^ [ 34.233735] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.234266] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.235034] ================================================================== [ 34.935174] ================================================================== [ 34.935893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 34.937684] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.938329] [ 34.938539] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.939682] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.940822] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.941571] Call Trace: [ 34.941972] <TASK> [ 34.942295] dump_stack_lvl+0x73/0xb0 [ 34.942860] print_report+0xd1/0x640 [ 34.943442] ? __virt_addr_valid+0x1db/0x2d0 [ 34.944130] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.944772] kasan_report+0x102/0x140 [ 34.945372] ? kasan_atomics_helper+0x4f32/0x5450 [ 34.945960] ? kasan_atomics_helper+0x4f32/0x5450 [ 34.946384] __asan_report_load8_noabort+0x18/0x20 [ 34.947047] kasan_atomics_helper+0x4f32/0x5450 [ 34.947467] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.948131] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.948506] ? kasan_save_alloc_info+0x3b/0x50 [ 34.949195] ? kasan_atomics+0x153/0x310 [ 34.949678] kasan_atomics+0x1dd/0x310 [ 34.950289] ? __pfx_kasan_atomics+0x10/0x10 [ 34.950859] ? __pfx_read_tsc+0x10/0x10 [ 34.951470] ? ktime_get_ts64+0x84/0x230 [ 34.951889] kunit_try_run_case+0x1b3/0x490 [ 34.952652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.953200] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.953844] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.954209] ? __kthread_parkme+0x82/0x160 [ 34.954874] ? preempt_count_sub+0x50/0x80 [ 34.955351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.955891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.956301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.957293] kthread+0x257/0x310 [ 34.957630] ? __pfx_kthread+0x10/0x10 [ 34.958030] ret_from_fork+0x41/0x80 [ 34.958482] ? __pfx_kthread+0x10/0x10 [ 34.959040] ret_from_fork_asm+0x1a/0x30 [ 34.959514] </TASK> [ 34.959729] [ 34.960036] Allocated by task 272: [ 34.960523] kasan_save_stack+0x3d/0x60 [ 34.961187] kasan_save_track+0x18/0x40 [ 34.961643] kasan_save_alloc_info+0x3b/0x50 [ 34.961970] __kasan_kmalloc+0xb7/0xc0 [ 34.962491] __kmalloc_cache_noprof+0x184/0x410 [ 34.963211] kasan_atomics+0x96/0x310 [ 34.963550] kunit_try_run_case+0x1b3/0x490 [ 34.964119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.964872] kthread+0x257/0x310 [ 34.965175] ret_from_fork+0x41/0x80 [ 34.965570] ret_from_fork_asm+0x1a/0x30 [ 34.966037] [ 34.966350] The buggy address belongs to the object at ffff8881029f9480 [ 34.966350] which belongs to the cache kmalloc-64 of size 64 [ 34.967343] The buggy address is located 0 bytes to the right of [ 34.967343] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.968656] [ 34.968851] The buggy address belongs to the physical page: [ 34.969470] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.970335] flags: 0x200000000000000(node=0|zone=2) [ 34.970948] page_type: f5(slab) [ 34.971197] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.971644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.972663] page dumped because: kasan: bad access detected [ 34.973170] [ 34.973346] Memory state around the buggy address: [ 34.973648] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.974308] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.975491] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.976244] ^ [ 34.976552] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.977737] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.978807] ================================================================== [ 35.115101] ================================================================== [ 35.116554] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 35.117554] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.118752] [ 35.118924] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.119866] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.120503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.121481] Call Trace: [ 35.122108] <TASK> [ 35.122578] dump_stack_lvl+0x73/0xb0 [ 35.123299] print_report+0xd1/0x640 [ 35.123994] ? __virt_addr_valid+0x1db/0x2d0 [ 35.124441] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.124990] kasan_report+0x102/0x140 [ 35.125385] ? kasan_atomics_helper+0x1eab/0x5450 [ 35.126314] ? kasan_atomics_helper+0x1eab/0x5450 [ 35.127390] kasan_check_range+0x10c/0x1c0 [ 35.128137] __kasan_check_write+0x18/0x20 [ 35.128510] kasan_atomics_helper+0x1eab/0x5450 [ 35.129267] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.130397] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.130836] ? kasan_save_alloc_info+0x3b/0x50 [ 35.131422] ? kasan_atomics+0x153/0x310 [ 35.132228] kasan_atomics+0x1dd/0x310 [ 35.132617] ? __pfx_kasan_atomics+0x10/0x10 [ 35.133470] ? __pfx_read_tsc+0x10/0x10 [ 35.134144] ? ktime_get_ts64+0x84/0x230 [ 35.134576] kunit_try_run_case+0x1b3/0x490 [ 35.135241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.136034] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.136640] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.137340] ? __kthread_parkme+0x82/0x160 [ 35.137998] ? preempt_count_sub+0x50/0x80 [ 35.138526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.139409] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.140276] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.141036] kthread+0x257/0x310 [ 35.141399] ? __pfx_kthread+0x10/0x10 [ 35.141828] ret_from_fork+0x41/0x80 [ 35.142613] ? __pfx_kthread+0x10/0x10 [ 35.142938] ret_from_fork_asm+0x1a/0x30 [ 35.143474] </TASK> [ 35.144884] [ 35.145021] Allocated by task 272: [ 35.145228] kasan_save_stack+0x3d/0x60 [ 35.145472] kasan_save_track+0x18/0x40 [ 35.145738] kasan_save_alloc_info+0x3b/0x50 [ 35.146006] __kasan_kmalloc+0xb7/0xc0 [ 35.146249] __kmalloc_cache_noprof+0x184/0x410 [ 35.146452] kasan_atomics+0x96/0x310 [ 35.146629] kunit_try_run_case+0x1b3/0x490 [ 35.147911] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.149201] kthread+0x257/0x310 [ 35.150263] ret_from_fork+0x41/0x80 [ 35.151174] ret_from_fork_asm+0x1a/0x30 [ 35.152264] [ 35.153335] The buggy address belongs to the object at ffff8881029f9480 [ 35.153335] which belongs to the cache kmalloc-64 of size 64 [ 35.154909] The buggy address is located 0 bytes to the right of [ 35.154909] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.156118] [ 35.156292] The buggy address belongs to the physical page: [ 35.157395] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.158266] flags: 0x200000000000000(node=0|zone=2) [ 35.158572] page_type: f5(slab) [ 35.158821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.160247] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.161611] page dumped because: kasan: bad access detected [ 35.162162] [ 35.162459] Memory state around the buggy address: [ 35.162992] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.163864] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.164547] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.165442] ^ [ 35.165966] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.166561] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.167362] ================================================================== [ 35.573540] ================================================================== [ 35.574407] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 35.575322] Read of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 35.576578] [ 35.577116] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 35.578123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.578305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 35.578649] Call Trace: [ 35.578872] <TASK> [ 35.579065] dump_stack_lvl+0x73/0xb0 [ 35.579571] print_report+0xd1/0x640 [ 35.579976] ? __virt_addr_valid+0x1db/0x2d0 [ 35.580188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 35.580424] kasan_report+0x102/0x140 [ 35.580605] ? kasan_atomics_helper+0x5117/0x5450 [ 35.581758] ? kasan_atomics_helper+0x5117/0x5450 [ 35.582147] __asan_report_load8_noabort+0x18/0x20 [ 35.582511] kasan_atomics_helper+0x5117/0x5450 [ 35.583202] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 35.584026] ? __kmalloc_cache_noprof+0x184/0x410 [ 35.584574] ? kasan_save_alloc_info+0x3b/0x50 [ 35.585332] ? kasan_atomics+0x153/0x310 [ 35.585950] kasan_atomics+0x1dd/0x310 [ 35.586500] ? __pfx_kasan_atomics+0x10/0x10 [ 35.587180] ? __pfx_read_tsc+0x10/0x10 [ 35.587741] ? ktime_get_ts64+0x84/0x230 [ 35.588239] kunit_try_run_case+0x1b3/0x490 [ 35.588670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.589141] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 35.589591] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 35.590196] ? __kthread_parkme+0x82/0x160 [ 35.590502] ? preempt_count_sub+0x50/0x80 [ 35.591354] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.592093] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.592952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.593740] kthread+0x257/0x310 [ 35.594058] ? __pfx_kthread+0x10/0x10 [ 35.594684] ret_from_fork+0x41/0x80 [ 35.595221] ? __pfx_kthread+0x10/0x10 [ 35.595815] ret_from_fork_asm+0x1a/0x30 [ 35.596340] </TASK> [ 35.596568] [ 35.596950] Allocated by task 272: [ 35.597381] kasan_save_stack+0x3d/0x60 [ 35.597976] kasan_save_track+0x18/0x40 [ 35.598668] kasan_save_alloc_info+0x3b/0x50 [ 35.599341] __kasan_kmalloc+0xb7/0xc0 [ 35.599901] __kmalloc_cache_noprof+0x184/0x410 [ 35.600500] kasan_atomics+0x96/0x310 [ 35.600976] kunit_try_run_case+0x1b3/0x490 [ 35.601553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.602213] kthread+0x257/0x310 [ 35.602594] ret_from_fork+0x41/0x80 [ 35.603274] ret_from_fork_asm+0x1a/0x30 [ 35.603826] [ 35.604171] The buggy address belongs to the object at ffff8881029f9480 [ 35.604171] which belongs to the cache kmalloc-64 of size 64 [ 35.605355] The buggy address is located 0 bytes to the right of [ 35.605355] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.606526] [ 35.606845] The buggy address belongs to the physical page: [ 35.607646] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.608457] flags: 0x200000000000000(node=0|zone=2) [ 35.609127] page_type: f5(slab) [ 35.609389] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.610228] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.611071] page dumped because: kasan: bad access detected [ 35.611668] [ 35.611938] Memory state around the buggy address: [ 35.612532] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.613289] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.614072] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.614834] ^ [ 35.615283] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.616080] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.616862] ================================================================== [ 32.926748] ================================================================== [ 32.927718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 32.928960] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 32.930408] [ 32.930637] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 32.931416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.932202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.932990] Call Trace: [ 32.933265] <TASK> [ 32.933500] dump_stack_lvl+0x73/0xb0 [ 32.934559] print_report+0xd1/0x640 [ 32.935190] ? __virt_addr_valid+0x1db/0x2d0 [ 32.936012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.936775] kasan_report+0x102/0x140 [ 32.937312] ? kasan_atomics_helper+0x566/0x5450 [ 32.938209] ? kasan_atomics_helper+0x566/0x5450 [ 32.938943] kasan_check_range+0x10c/0x1c0 [ 32.939422] __kasan_check_write+0x18/0x20 [ 32.940063] kasan_atomics_helper+0x566/0x5450 [ 32.940691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.941399] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.942075] ? kasan_save_alloc_info+0x3b/0x50 [ 32.942597] ? kasan_atomics+0x153/0x310 [ 32.943682] kasan_atomics+0x1dd/0x310 [ 32.944044] ? __pfx_kasan_atomics+0x10/0x10 [ 32.944838] ? __pfx_read_tsc+0x10/0x10 [ 32.945161] ? ktime_get_ts64+0x84/0x230 [ 32.945898] kunit_try_run_case+0x1b3/0x490 [ 32.946390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.947466] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.947916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.948426] ? __kthread_parkme+0x82/0x160 [ 32.949162] ? preempt_count_sub+0x50/0x80 [ 32.949799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.950323] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.951223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.951776] kthread+0x257/0x310 [ 32.952141] ? __pfx_kthread+0x10/0x10 [ 32.952540] ret_from_fork+0x41/0x80 [ 32.953049] ? __pfx_kthread+0x10/0x10 [ 32.954162] ret_from_fork_asm+0x1a/0x30 [ 32.954586] </TASK> [ 32.954991] [ 32.955173] Allocated by task 272: [ 32.956121] kasan_save_stack+0x3d/0x60 [ 32.956534] kasan_save_track+0x18/0x40 [ 32.957226] kasan_save_alloc_info+0x3b/0x50 [ 32.958154] __kasan_kmalloc+0xb7/0xc0 [ 32.958724] __kmalloc_cache_noprof+0x184/0x410 [ 32.959643] kasan_atomics+0x96/0x310 [ 32.960125] kunit_try_run_case+0x1b3/0x490 [ 32.960627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.961433] kthread+0x257/0x310 [ 32.962349] ret_from_fork+0x41/0x80 [ 32.962644] ret_from_fork_asm+0x1a/0x30 [ 32.963357] [ 32.963547] The buggy address belongs to the object at ffff8881029f9480 [ 32.963547] which belongs to the cache kmalloc-64 of size 64 [ 32.964571] The buggy address is located 0 bytes to the right of [ 32.964571] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 32.966522] [ 32.966939] The buggy address belongs to the physical page: [ 32.967259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 32.968386] flags: 0x200000000000000(node=0|zone=2) [ 32.968788] page_type: f5(slab) [ 32.969530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.970388] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.971643] page dumped because: kasan: bad access detected [ 32.972103] [ 32.972314] Memory state around the buggy address: [ 32.973241] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.973519] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.973943] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.975083] ^ [ 32.975398] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.976320] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.977522] ================================================================== [ 33.778479] ================================================================== [ 33.779182] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 33.780290] Read of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 33.780799] [ 33.781049] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 33.782113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.782513] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.783234] Call Trace: [ 33.783580] <TASK> [ 33.783849] dump_stack_lvl+0x73/0xb0 [ 33.784258] print_report+0xd1/0x640 [ 33.784591] ? __virt_addr_valid+0x1db/0x2d0 [ 33.785041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.785406] kasan_report+0x102/0x140 [ 33.785962] ? kasan_atomics_helper+0x4a38/0x5450 [ 33.786552] ? kasan_atomics_helper+0x4a38/0x5450 [ 33.787754] __asan_report_load4_noabort+0x18/0x20 [ 33.788090] kasan_atomics_helper+0x4a38/0x5450 [ 33.788419] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.789059] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.789440] ? kasan_save_alloc_info+0x3b/0x50 [ 33.790032] ? kasan_atomics+0x153/0x310 [ 33.790490] kasan_atomics+0x1dd/0x310 [ 33.791022] ? __pfx_kasan_atomics+0x10/0x10 [ 33.791365] ? __pfx_read_tsc+0x10/0x10 [ 33.791922] ? ktime_get_ts64+0x84/0x230 [ 33.792252] kunit_try_run_case+0x1b3/0x490 [ 33.792849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.793254] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.793871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.794238] ? __kthread_parkme+0x82/0x160 [ 33.794799] ? preempt_count_sub+0x50/0x80 [ 33.795203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.795670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.796318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.796819] kthread+0x257/0x310 [ 33.797269] ? __pfx_kthread+0x10/0x10 [ 33.797737] ret_from_fork+0x41/0x80 [ 33.798213] ? __pfx_kthread+0x10/0x10 [ 33.798637] ret_from_fork_asm+0x1a/0x30 [ 33.799109] </TASK> [ 33.799386] [ 33.799561] Allocated by task 272: [ 33.799991] kasan_save_stack+0x3d/0x60 [ 33.800274] kasan_save_track+0x18/0x40 [ 33.800810] kasan_save_alloc_info+0x3b/0x50 [ 33.801318] __kasan_kmalloc+0xb7/0xc0 [ 33.801658] __kmalloc_cache_noprof+0x184/0x410 [ 33.802179] kasan_atomics+0x96/0x310 [ 33.802586] kunit_try_run_case+0x1b3/0x490 [ 33.803129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.803480] kthread+0x257/0x310 [ 33.803966] ret_from_fork+0x41/0x80 [ 33.804411] ret_from_fork_asm+0x1a/0x30 [ 33.804962] [ 33.805193] The buggy address belongs to the object at ffff8881029f9480 [ 33.805193] which belongs to the cache kmalloc-64 of size 64 [ 33.806231] The buggy address is located 0 bytes to the right of [ 33.806231] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 33.807269] [ 33.807443] The buggy address belongs to the physical page: [ 33.808024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 33.808817] flags: 0x200000000000000(node=0|zone=2) [ 33.809261] page_type: f5(slab) [ 33.809509] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.810431] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 33.811035] page dumped because: kasan: bad access detected [ 33.811674] [ 33.811882] Memory state around the buggy address: [ 33.812254] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.813434] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.815172] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.815529] ^ [ 33.815832] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.816196] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.816485] ================================================================== [ 34.979882] ================================================================== [ 34.981873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 34.982841] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.983756] [ 34.983983] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.985169] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.985692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.986780] Call Trace: [ 34.987242] <TASK> [ 34.987689] dump_stack_lvl+0x73/0xb0 [ 34.988340] print_report+0xd1/0x640 [ 34.989416] ? __virt_addr_valid+0x1db/0x2d0 [ 34.990211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.990783] kasan_report+0x102/0x140 [ 34.991133] ? kasan_atomics_helper+0x1ce2/0x5450 [ 34.991528] ? kasan_atomics_helper+0x1ce2/0x5450 [ 34.992059] kasan_check_range+0x10c/0x1c0 [ 34.992560] __kasan_check_write+0x18/0x20 [ 34.993131] kasan_atomics_helper+0x1ce2/0x5450 [ 34.993785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.994276] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.994812] ? kasan_save_alloc_info+0x3b/0x50 [ 34.995428] ? kasan_atomics+0x153/0x310 [ 34.995990] kasan_atomics+0x1dd/0x310 [ 34.996380] ? __pfx_kasan_atomics+0x10/0x10 [ 34.996827] ? __pfx_read_tsc+0x10/0x10 [ 34.997226] ? ktime_get_ts64+0x84/0x230 [ 34.997629] kunit_try_run_case+0x1b3/0x490 [ 34.998237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.998686] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.999203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.999845] ? __kthread_parkme+0x82/0x160 [ 35.000361] ? preempt_count_sub+0x50/0x80 [ 35.000938] ? __pfx_kunit_try_run_case+0x10/0x10 [ 35.001456] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 35.002107] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.002727] kthread+0x257/0x310 [ 35.003123] ? __pfx_kthread+0x10/0x10 [ 35.003562] ret_from_fork+0x41/0x80 [ 35.004146] ? __pfx_kthread+0x10/0x10 [ 35.004699] ret_from_fork_asm+0x1a/0x30 [ 35.005168] </TASK> [ 35.005382] [ 35.005767] Allocated by task 272: [ 35.006206] kasan_save_stack+0x3d/0x60 [ 35.006779] kasan_save_track+0x18/0x40 [ 35.007262] kasan_save_alloc_info+0x3b/0x50 [ 35.007772] __kasan_kmalloc+0xb7/0xc0 [ 35.008065] __kmalloc_cache_noprof+0x184/0x410 [ 35.008717] kasan_atomics+0x96/0x310 [ 35.009039] kunit_try_run_case+0x1b3/0x490 [ 35.009533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 35.010103] kthread+0x257/0x310 [ 35.010571] ret_from_fork+0x41/0x80 [ 35.011173] ret_from_fork_asm+0x1a/0x30 [ 35.011672] [ 35.011996] The buggy address belongs to the object at ffff8881029f9480 [ 35.011996] which belongs to the cache kmalloc-64 of size 64 [ 35.013054] The buggy address is located 0 bytes to the right of [ 35.013054] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 35.014280] [ 35.014438] The buggy address belongs to the physical page: [ 35.015130] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 35.015783] flags: 0x200000000000000(node=0|zone=2) [ 35.016450] page_type: f5(slab) [ 35.016871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 35.017649] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.018442] page dumped because: kasan: bad access detected [ 35.019038] [ 35.019299] Memory state around the buggy address: [ 35.019737] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.020592] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.021365] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.021956] ^ [ 35.022588] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.023294] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.023982] ================================================================== [ 34.105725] ================================================================== [ 34.106664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 34.108197] Write of size 4 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.108991] [ 34.109193] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.110135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.110647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.111397] Call Trace: [ 34.111840] <TASK> [ 34.112169] dump_stack_lvl+0x73/0xb0 [ 34.112655] print_report+0xd1/0x640 [ 34.113010] ? __virt_addr_valid+0x1db/0x2d0 [ 34.113590] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.114316] kasan_report+0x102/0x140 [ 34.114921] ? kasan_atomics_helper+0x12e7/0x5450 [ 34.115329] ? kasan_atomics_helper+0x12e7/0x5450 [ 34.115944] kasan_check_range+0x10c/0x1c0 [ 34.116303] __kasan_check_write+0x18/0x20 [ 34.116819] kasan_atomics_helper+0x12e7/0x5450 [ 34.117360] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.117940] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.118292] ? kasan_save_alloc_info+0x3b/0x50 [ 34.118972] ? kasan_atomics+0x153/0x310 [ 34.119438] kasan_atomics+0x1dd/0x310 [ 34.119992] ? __pfx_kasan_atomics+0x10/0x10 [ 34.120350] ? __pfx_read_tsc+0x10/0x10 [ 34.120954] ? ktime_get_ts64+0x84/0x230 [ 34.121460] kunit_try_run_case+0x1b3/0x490 [ 34.122027] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.122453] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.123083] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.123528] ? __kthread_parkme+0x82/0x160 [ 34.124138] ? preempt_count_sub+0x50/0x80 [ 34.124564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.125057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.125684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.126209] kthread+0x257/0x310 [ 34.126737] ? __pfx_kthread+0x10/0x10 [ 34.127163] ret_from_fork+0x41/0x80 [ 34.127536] ? __pfx_kthread+0x10/0x10 [ 34.128029] ret_from_fork_asm+0x1a/0x30 [ 34.128501] </TASK> [ 34.128897] [ 34.129087] Allocated by task 272: [ 34.129340] kasan_save_stack+0x3d/0x60 [ 34.129881] kasan_save_track+0x18/0x40 [ 34.130446] kasan_save_alloc_info+0x3b/0x50 [ 34.130938] __kasan_kmalloc+0xb7/0xc0 [ 34.131428] __kmalloc_cache_noprof+0x184/0x410 [ 34.132050] kasan_atomics+0x96/0x310 [ 34.132345] kunit_try_run_case+0x1b3/0x490 [ 34.132788] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.133472] kthread+0x257/0x310 [ 34.133914] ret_from_fork+0x41/0x80 [ 34.134410] ret_from_fork_asm+0x1a/0x30 [ 34.134951] [ 34.135191] The buggy address belongs to the object at ffff8881029f9480 [ 34.135191] which belongs to the cache kmalloc-64 of size 64 [ 34.136339] The buggy address is located 0 bytes to the right of [ 34.136339] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.137509] [ 34.137818] The buggy address belongs to the physical page: [ 34.138419] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.139202] flags: 0x200000000000000(node=0|zone=2) [ 34.139896] page_type: f5(slab) [ 34.140172] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.140978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.141803] page dumped because: kasan: bad access detected [ 34.142315] [ 34.142490] Memory state around the buggy address: [ 34.143016] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.143645] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.144197] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.144758] ^ [ 34.145066] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.145863] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.146478] ================================================================== [ 34.838526] ================================================================== [ 34.839082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 34.839686] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.840484] [ 34.841238] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.841949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.842489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.843398] Call Trace: [ 34.843611] <TASK> [ 34.844072] dump_stack_lvl+0x73/0xb0 [ 34.844537] print_report+0xd1/0x640 [ 34.845034] ? __virt_addr_valid+0x1db/0x2d0 [ 34.845578] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.846074] kasan_report+0x102/0x140 [ 34.846462] ? kasan_atomics_helper+0x1b23/0x5450 [ 34.847007] ? kasan_atomics_helper+0x1b23/0x5450 [ 34.847479] kasan_check_range+0x10c/0x1c0 [ 34.847951] __kasan_check_write+0x18/0x20 [ 34.848304] kasan_atomics_helper+0x1b23/0x5450 [ 34.848905] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.849339] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.849849] ? kasan_save_alloc_info+0x3b/0x50 [ 34.850192] ? kasan_atomics+0x153/0x310 [ 34.850506] kasan_atomics+0x1dd/0x310 [ 34.851031] ? __pfx_kasan_atomics+0x10/0x10 [ 34.851591] ? __pfx_read_tsc+0x10/0x10 [ 34.852053] ? ktime_get_ts64+0x84/0x230 [ 34.852362] kunit_try_run_case+0x1b3/0x490 [ 34.852729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.853303] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.854074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.854557] ? __kthread_parkme+0x82/0x160 [ 34.854950] ? preempt_count_sub+0x50/0x80 [ 34.855260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.855861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.856564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.857291] kthread+0x257/0x310 [ 34.857578] ? __pfx_kthread+0x10/0x10 [ 34.857887] ret_from_fork+0x41/0x80 [ 34.858385] ? __pfx_kthread+0x10/0x10 [ 34.858885] ret_from_fork_asm+0x1a/0x30 [ 34.859390] </TASK> [ 34.859670] [ 34.859873] Allocated by task 272: [ 34.860119] kasan_save_stack+0x3d/0x60 [ 34.860515] kasan_save_track+0x18/0x40 [ 34.861052] kasan_save_alloc_info+0x3b/0x50 [ 34.861566] __kasan_kmalloc+0xb7/0xc0 [ 34.862040] __kmalloc_cache_noprof+0x184/0x410 [ 34.862564] kasan_atomics+0x96/0x310 [ 34.862863] kunit_try_run_case+0x1b3/0x490 [ 34.863636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.864154] kthread+0x257/0x310 [ 34.864477] ret_from_fork+0x41/0x80 [ 34.864851] ret_from_fork_asm+0x1a/0x30 [ 34.865232] [ 34.865391] The buggy address belongs to the object at ffff8881029f9480 [ 34.865391] which belongs to the cache kmalloc-64 of size 64 [ 34.866045] The buggy address is located 0 bytes to the right of [ 34.866045] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.867687] [ 34.867888] The buggy address belongs to the physical page: [ 34.868220] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.868699] flags: 0x200000000000000(node=0|zone=2) [ 34.869270] page_type: f5(slab) [ 34.869719] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.870553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.871278] page dumped because: kasan: bad access detected [ 34.871765] [ 34.871948] Memory state around the buggy address: [ 34.872256] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.872855] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.873551] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.874277] ^ [ 34.874992] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.875404] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.876001] ================================================================== [ 34.562471] ================================================================== [ 34.563271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 34.564165] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.565082] [ 34.565328] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.566489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.566924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.567914] Call Trace: [ 34.568137] <TASK> [ 34.568572] dump_stack_lvl+0x73/0xb0 [ 34.569167] print_report+0xd1/0x640 [ 34.569609] ? __virt_addr_valid+0x1db/0x2d0 [ 34.570361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.571127] kasan_report+0x102/0x140 [ 34.571574] ? kasan_atomics_helper+0x1780/0x5450 [ 34.572169] ? kasan_atomics_helper+0x1780/0x5450 [ 34.572927] kasan_check_range+0x10c/0x1c0 [ 34.573351] __kasan_check_write+0x18/0x20 [ 34.573969] kasan_atomics_helper+0x1780/0x5450 [ 34.574550] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.575248] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.575899] ? kasan_save_alloc_info+0x3b/0x50 [ 34.576946] ? kasan_atomics+0x153/0x310 [ 34.577432] kasan_atomics+0x1dd/0x310 [ 34.578383] ? __pfx_kasan_atomics+0x10/0x10 [ 34.578793] ? __pfx_read_tsc+0x10/0x10 [ 34.579367] ? ktime_get_ts64+0x84/0x230 [ 34.580065] kunit_try_run_case+0x1b3/0x490 [ 34.580596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.581274] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.581871] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.582438] ? __kthread_parkme+0x82/0x160 [ 34.582967] ? preempt_count_sub+0x50/0x80 [ 34.583619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.584061] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.584773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.585373] kthread+0x257/0x310 [ 34.585820] ? __pfx_kthread+0x10/0x10 [ 34.586343] ret_from_fork+0x41/0x80 [ 34.586635] ? __pfx_kthread+0x10/0x10 [ 34.587305] ret_from_fork_asm+0x1a/0x30 [ 34.587919] </TASK> [ 34.588230] [ 34.588484] Allocated by task 272: [ 34.589083] kasan_save_stack+0x3d/0x60 [ 34.589524] kasan_save_track+0x18/0x40 [ 34.590175] kasan_save_alloc_info+0x3b/0x50 [ 34.590928] __kasan_kmalloc+0xb7/0xc0 [ 34.591434] __kmalloc_cache_noprof+0x184/0x410 [ 34.592159] kasan_atomics+0x96/0x310 [ 34.592606] kunit_try_run_case+0x1b3/0x490 [ 34.593087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.593969] kthread+0x257/0x310 [ 34.594327] ret_from_fork+0x41/0x80 [ 34.594961] ret_from_fork_asm+0x1a/0x30 [ 34.595439] [ 34.595742] The buggy address belongs to the object at ffff8881029f9480 [ 34.595742] which belongs to the cache kmalloc-64 of size 64 [ 34.597045] The buggy address is located 0 bytes to the right of [ 34.597045] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.598203] [ 34.598575] The buggy address belongs to the physical page: [ 34.599269] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.600148] flags: 0x200000000000000(node=0|zone=2) [ 34.600957] page_type: f5(slab) [ 34.601350] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.602475] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.603240] page dumped because: kasan: bad access detected [ 34.604013] [ 34.604227] Memory state around the buggy address: [ 34.604985] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.605687] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.606214] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.606875] ^ [ 34.607235] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.608114] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.608912] ================================================================== [ 34.377379] ================================================================== [ 34.378204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 34.378971] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.379991] [ 34.380231] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.381099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.381480] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.382463] Call Trace: [ 34.382814] <TASK> [ 34.383126] dump_stack_lvl+0x73/0xb0 [ 34.383521] print_report+0xd1/0x640 [ 34.384024] ? __virt_addr_valid+0x1db/0x2d0 [ 34.384475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.385045] kasan_report+0x102/0x140 [ 34.385519] ? kasan_atomics_helper+0x151e/0x5450 [ 34.386096] ? kasan_atomics_helper+0x151e/0x5450 [ 34.386533] kasan_check_range+0x10c/0x1c0 [ 34.387204] __kasan_check_write+0x18/0x20 [ 34.387522] kasan_atomics_helper+0x151e/0x5450 [ 34.388190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.388756] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.389311] ? kasan_save_alloc_info+0x3b/0x50 [ 34.389890] ? kasan_atomics+0x153/0x310 [ 34.390415] kasan_atomics+0x1dd/0x310 [ 34.390933] ? __pfx_kasan_atomics+0x10/0x10 [ 34.391482] ? __pfx_read_tsc+0x10/0x10 [ 34.391997] ? ktime_get_ts64+0x84/0x230 [ 34.392521] kunit_try_run_case+0x1b3/0x490 [ 34.392995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.393589] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.394161] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.394495] ? __kthread_parkme+0x82/0x160 [ 34.395021] ? preempt_count_sub+0x50/0x80 [ 34.395651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.396119] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.396768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.397323] kthread+0x257/0x310 [ 34.397800] ? __pfx_kthread+0x10/0x10 [ 34.398234] ret_from_fork+0x41/0x80 [ 34.398751] ? __pfx_kthread+0x10/0x10 [ 34.399180] ret_from_fork_asm+0x1a/0x30 [ 34.399721] </TASK> [ 34.400100] [ 34.400326] Allocated by task 272: [ 34.400746] kasan_save_stack+0x3d/0x60 [ 34.401351] kasan_save_track+0x18/0x40 [ 34.401835] kasan_save_alloc_info+0x3b/0x50 [ 34.402181] __kasan_kmalloc+0xb7/0xc0 [ 34.402747] __kmalloc_cache_noprof+0x184/0x410 [ 34.403302] kasan_atomics+0x96/0x310 [ 34.403882] kunit_try_run_case+0x1b3/0x490 [ 34.404322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.405050] kthread+0x257/0x310 [ 34.405368] ret_from_fork+0x41/0x80 [ 34.405934] ret_from_fork_asm+0x1a/0x30 [ 34.406286] [ 34.406547] The buggy address belongs to the object at ffff8881029f9480 [ 34.406547] which belongs to the cache kmalloc-64 of size 64 [ 34.407949] The buggy address is located 0 bytes to the right of [ 34.407949] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.409695] [ 34.409982] The buggy address belongs to the physical page: [ 34.410423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.411326] flags: 0x200000000000000(node=0|zone=2) [ 34.412141] page_type: f5(slab) [ 34.412386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.413140] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.413816] page dumped because: kasan: bad access detected [ 34.414303] [ 34.414600] Memory state around the buggy address: [ 34.415058] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.415967] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.416814] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.417417] ^ [ 34.418260] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.419111] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.420181] ================================================================== [ 34.794020] ================================================================== [ 34.794931] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 34.795578] Write of size 8 at addr ffff8881029f94b0 by task kunit_try_catch/272 [ 34.797865] [ 34.798203] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241120 #1 [ 34.799532] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.799972] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.801105] Call Trace: [ 34.801346] <TASK> [ 34.801533] dump_stack_lvl+0x73/0xb0 [ 34.802411] print_report+0xd1/0x640 [ 34.802867] ? __virt_addr_valid+0x1db/0x2d0 [ 34.803314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.803820] kasan_report+0x102/0x140 [ 34.804199] ? kasan_atomics_helper+0x1a80/0x5450 [ 34.804655] ? kasan_atomics_helper+0x1a80/0x5450 [ 34.805909] kasan_check_range+0x10c/0x1c0 [ 34.806503] __kasan_check_write+0x18/0x20 [ 34.807225] kasan_atomics_helper+0x1a80/0x5450 [ 34.807607] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.808407] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.809017] ? kasan_save_alloc_info+0x3b/0x50 [ 34.809742] ? kasan_atomics+0x153/0x310 [ 34.810391] kasan_atomics+0x1dd/0x310 [ 34.810955] ? __pfx_kasan_atomics+0x10/0x10 [ 34.811452] ? __pfx_read_tsc+0x10/0x10 [ 34.812213] ? ktime_get_ts64+0x84/0x230 [ 34.812967] kunit_try_run_case+0x1b3/0x490 [ 34.813610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.814307] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.815112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.815608] ? __kthread_parkme+0x82/0x160 [ 34.816392] ? preempt_count_sub+0x50/0x80 [ 34.817186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.817769] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.818337] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.818745] kthread+0x257/0x310 [ 34.819017] ? __pfx_kthread+0x10/0x10 [ 34.819482] ret_from_fork+0x41/0x80 [ 34.819865] ? __pfx_kthread+0x10/0x10 [ 34.820311] ret_from_fork_asm+0x1a/0x30 [ 34.820858] </TASK> [ 34.821183] [ 34.821342] Allocated by task 272: [ 34.821761] kasan_save_stack+0x3d/0x60 [ 34.822089] kasan_save_track+0x18/0x40 [ 34.822541] kasan_save_alloc_info+0x3b/0x50 [ 34.823047] __kasan_kmalloc+0xb7/0xc0 [ 34.823436] __kmalloc_cache_noprof+0x184/0x410 [ 34.823840] kasan_atomics+0x96/0x310 [ 34.824297] kunit_try_run_case+0x1b3/0x490 [ 34.824772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.825345] kthread+0x257/0x310 [ 34.825871] ret_from_fork+0x41/0x80 [ 34.826204] ret_from_fork_asm+0x1a/0x30 [ 34.826592] [ 34.826890] The buggy address belongs to the object at ffff8881029f9480 [ 34.826890] which belongs to the cache kmalloc-64 of size 64 [ 34.827953] The buggy address is located 0 bytes to the right of [ 34.827953] allocated 48-byte region [ffff8881029f9480, ffff8881029f94b0) [ 34.829077] [ 34.829245] The buggy address belongs to the physical page: [ 34.829782] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1029f9 [ 34.830671] flags: 0x200000000000000(node=0|zone=2) [ 34.831107] page_type: f5(slab) [ 34.831354] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.831992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.832767] page dumped because: kasan: bad access detected [ 34.833267] [ 34.833473] Memory state around the buggy address: [ 34.833911] ffff8881029f9380: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.834489] ffff8881029f9400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.835109] >ffff8881029f9480: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.835519] ^ [ 34.835974] ffff8881029f9500: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.836610] ffff8881029f9580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.837078] ==================================================================