Date
Nov. 22, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-x86_64 |
[ 29.317015] ================================================================== [ 29.318122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 29.319331] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.320011] [ 29.320439] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.321466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.322183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.323128] Call Trace: [ 29.323605] <TASK> [ 29.324011] dump_stack_lvl+0x73/0xb0 [ 29.324513] print_report+0xd1/0x640 [ 29.325080] ? __virt_addr_valid+0x1db/0x2d0 [ 29.325697] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.326451] kasan_report+0x102/0x140 [ 29.326990] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.327656] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.328488] __asan_report_store4_noabort+0x1b/0x30 [ 29.329121] kasan_atomics_helper+0x4b70/0x5450 [ 29.329800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.330595] ? ret_from_fork_asm+0x1a/0x30 [ 29.331196] ? ret_from_fork+0x41/0x80 [ 29.331797] kasan_atomics+0x1dd/0x310 [ 29.332441] ? __pfx_kasan_atomics+0x10/0x10 [ 29.333024] ? __pfx_read_tsc+0x10/0x10 [ 29.333579] ? ktime_get_ts64+0x84/0x230 [ 29.333960] kunit_try_run_case+0x1b3/0x490 [ 29.334729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.335229] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.335641] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.336550] ? __kthread_parkme+0x82/0x160 [ 29.337119] ? preempt_count_sub+0x50/0x80 [ 29.337861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.338625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.339212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.339706] kthread+0x257/0x310 [ 29.339968] ? __pfx_kthread+0x10/0x10 [ 29.340237] ret_from_fork+0x41/0x80 [ 29.341448] ? __pfx_kthread+0x10/0x10 [ 29.342218] ret_from_fork_asm+0x1a/0x30 [ 29.342967] </TASK> [ 29.343257] [ 29.343416] Allocated by task 273: [ 29.343800] kasan_save_stack+0x3d/0x60 [ 29.344121] kasan_save_track+0x18/0x40 [ 29.344651] kasan_save_alloc_info+0x3b/0x50 [ 29.344966] __kasan_kmalloc+0xb7/0xc0 [ 29.345512] __kmalloc_cache_noprof+0x184/0x410 [ 29.346487] kasan_atomics+0x96/0x310 [ 29.347011] kunit_try_run_case+0x1b3/0x490 [ 29.347716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.348163] kthread+0x257/0x310 [ 29.348582] ret_from_fork+0x41/0x80 [ 29.348946] ret_from_fork_asm+0x1a/0x30 [ 29.349183] [ 29.349334] The buggy address belongs to the object at ffff888101abdc80 [ 29.349334] which belongs to the cache kmalloc-64 of size 64 [ 29.350962] The buggy address is located 0 bytes to the right of [ 29.350962] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.352255] [ 29.352728] The buggy address belongs to the physical page: [ 29.353649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.354490] flags: 0x200000000000000(node=0|zone=2) [ 29.355070] page_type: f5(slab) [ 29.355332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.356179] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.357033] page dumped because: kasan: bad access detected [ 29.357379] [ 29.357649] Memory state around the buggy address: [ 29.358085] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.358840] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.359254] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.359851] ^ [ 29.360308] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.360857] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.361528] ================================================================== [ 30.644754] ================================================================== [ 30.649596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 30.650180] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.650559] [ 30.650737] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.651277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.651525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.654689] Call Trace: [ 30.655215] <TASK> [ 30.655920] dump_stack_lvl+0x73/0xb0 [ 30.656531] print_report+0xd1/0x640 [ 30.657099] ? __virt_addr_valid+0x1db/0x2d0 [ 30.657763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.658600] kasan_report+0x102/0x140 [ 30.659260] ? kasan_atomics_helper+0x13b6/0x5450 [ 30.659946] ? kasan_atomics_helper+0x13b6/0x5450 [ 30.660707] kasan_check_range+0x10c/0x1c0 [ 30.661081] __kasan_check_read+0x15/0x20 [ 30.661445] kasan_atomics_helper+0x13b6/0x5450 [ 30.662285] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.662578] ? ret_from_fork_asm+0x1a/0x30 [ 30.663372] ? ret_from_fork+0x41/0x80 [ 30.664010] kasan_atomics+0x1dd/0x310 [ 30.664715] ? __pfx_kasan_atomics+0x10/0x10 [ 30.665102] ? __pfx_read_tsc+0x10/0x10 [ 30.665522] ? ktime_get_ts64+0x84/0x230 [ 30.665972] kunit_try_run_case+0x1b3/0x490 [ 30.666535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.666888] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.667516] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.667965] ? __kthread_parkme+0x82/0x160 [ 30.668410] ? preempt_count_sub+0x50/0x80 [ 30.668803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.669404] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.669960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.670438] kthread+0x257/0x310 [ 30.670897] ? __pfx_kthread+0x10/0x10 [ 30.671333] ret_from_fork+0x41/0x80 [ 30.671781] ? __pfx_kthread+0x10/0x10 [ 30.672109] ret_from_fork_asm+0x1a/0x30 [ 30.672705] </TASK> [ 30.673025] [ 30.673251] Allocated by task 273: [ 30.673619] kasan_save_stack+0x3d/0x60 [ 30.674006] kasan_save_track+0x18/0x40 [ 30.674500] kasan_save_alloc_info+0x3b/0x50 [ 30.674801] __kasan_kmalloc+0xb7/0xc0 [ 30.675232] __kmalloc_cache_noprof+0x184/0x410 [ 30.675794] kasan_atomics+0x96/0x310 [ 30.676124] kunit_try_run_case+0x1b3/0x490 [ 30.676561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.677133] kthread+0x257/0x310 [ 30.677411] ret_from_fork+0x41/0x80 [ 30.677864] ret_from_fork_asm+0x1a/0x30 [ 30.678342] [ 30.678565] The buggy address belongs to the object at ffff888101abdc80 [ 30.678565] which belongs to the cache kmalloc-64 of size 64 [ 30.679694] The buggy address is located 0 bytes to the right of [ 30.679694] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.680540] [ 30.680707] The buggy address belongs to the physical page: [ 30.681367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.682191] flags: 0x200000000000000(node=0|zone=2) [ 30.682769] page_type: f5(slab) [ 30.683234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.684046] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.684732] page dumped because: kasan: bad access detected [ 30.685389] [ 30.685629] Memory state around the buggy address: [ 30.686148] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.686928] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.687668] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.688399] ^ [ 30.688931] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.689162] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.689532] ================================================================== [ 30.900934] ================================================================== [ 30.901572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 30.902578] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.903036] [ 30.903219] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.904291] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.904855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.905874] Call Trace: [ 30.906226] <TASK> [ 30.906569] dump_stack_lvl+0x73/0xb0 [ 30.907084] print_report+0xd1/0x640 [ 30.907649] ? __virt_addr_valid+0x1db/0x2d0 [ 30.908214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.908945] kasan_report+0x102/0x140 [ 30.909496] ? kasan_atomics_helper+0x1650/0x5450 [ 30.910092] ? kasan_atomics_helper+0x1650/0x5450 [ 30.910650] kasan_check_range+0x10c/0x1c0 [ 30.911066] __kasan_check_write+0x18/0x20 [ 30.911485] kasan_atomics_helper+0x1650/0x5450 [ 30.912000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.912526] ? ret_from_fork_asm+0x1a/0x30 [ 30.912999] ? ret_from_fork+0x41/0x80 [ 30.913512] kasan_atomics+0x1dd/0x310 [ 30.913926] ? __pfx_kasan_atomics+0x10/0x10 [ 30.914476] ? __pfx_read_tsc+0x10/0x10 [ 30.914920] ? ktime_get_ts64+0x84/0x230 [ 30.915383] kunit_try_run_case+0x1b3/0x490 [ 30.915707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.916277] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.916812] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.917299] ? __kthread_parkme+0x82/0x160 [ 30.917773] ? preempt_count_sub+0x50/0x80 [ 30.918314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.918764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.919456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.920025] kthread+0x257/0x310 [ 30.920482] ? __pfx_kthread+0x10/0x10 [ 30.920835] ret_from_fork+0x41/0x80 [ 30.921283] ? __pfx_kthread+0x10/0x10 [ 30.921681] ret_from_fork_asm+0x1a/0x30 [ 30.922151] </TASK> [ 30.922466] [ 30.922692] Allocated by task 273: [ 30.923113] kasan_save_stack+0x3d/0x60 [ 30.923525] kasan_save_track+0x18/0x40 [ 30.923961] kasan_save_alloc_info+0x3b/0x50 [ 30.924361] __kasan_kmalloc+0xb7/0xc0 [ 30.924734] __kmalloc_cache_noprof+0x184/0x410 [ 30.925205] kasan_atomics+0x96/0x310 [ 30.925651] kunit_try_run_case+0x1b3/0x490 [ 30.926153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.926578] kthread+0x257/0x310 [ 30.926954] ret_from_fork+0x41/0x80 [ 30.927429] ret_from_fork_asm+0x1a/0x30 [ 30.927904] [ 30.928082] The buggy address belongs to the object at ffff888101abdc80 [ 30.928082] which belongs to the cache kmalloc-64 of size 64 [ 30.929035] The buggy address is located 0 bytes to the right of [ 30.929035] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.930022] [ 30.930320] The buggy address belongs to the physical page: [ 30.930755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.931441] flags: 0x200000000000000(node=0|zone=2) [ 30.931744] page_type: f5(slab) [ 30.932009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.932630] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.934322] page dumped because: kasan: bad access detected [ 30.935216] [ 30.935963] Memory state around the buggy address: [ 30.936565] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.937335] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.937809] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.938643] ^ [ 30.939179] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.940030] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.940910] ================================================================== [ 31.938366] ================================================================== [ 31.938793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 31.939958] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.940577] [ 31.940841] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.941345] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.941599] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.942326] Call Trace: [ 31.942685] <TASK> [ 31.943093] dump_stack_lvl+0x73/0xb0 [ 31.943628] print_report+0xd1/0x640 [ 31.944070] ? __virt_addr_valid+0x1db/0x2d0 [ 31.944680] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.945298] kasan_report+0x102/0x140 [ 31.945693] ? kasan_atomics_helper+0x5117/0x5450 [ 31.946164] ? kasan_atomics_helper+0x5117/0x5450 [ 31.946683] __asan_report_load8_noabort+0x18/0x20 [ 31.947446] kasan_atomics_helper+0x5117/0x5450 [ 31.947971] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.948489] ? ret_from_fork_asm+0x1a/0x30 [ 31.948782] ? ret_from_fork+0x41/0x80 [ 31.949110] kasan_atomics+0x1dd/0x310 [ 31.949580] ? __pfx_kasan_atomics+0x10/0x10 [ 31.950154] ? __pfx_read_tsc+0x10/0x10 [ 31.950645] ? ktime_get_ts64+0x84/0x230 [ 31.951139] kunit_try_run_case+0x1b3/0x490 [ 31.951702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.952296] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.952836] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.953488] ? __kthread_parkme+0x82/0x160 [ 31.953950] ? preempt_count_sub+0x50/0x80 [ 31.954477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.954954] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.955647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.956021] kthread+0x257/0x310 [ 31.956336] ? __pfx_kthread+0x10/0x10 [ 31.956795] ret_from_fork+0x41/0x80 [ 31.957233] ? __pfx_kthread+0x10/0x10 [ 31.957644] ret_from_fork_asm+0x1a/0x30 [ 31.958171] </TASK> [ 31.958359] [ 31.958583] Allocated by task 273: [ 31.959056] kasan_save_stack+0x3d/0x60 [ 31.959636] kasan_save_track+0x18/0x40 [ 31.960226] kasan_save_alloc_info+0x3b/0x50 [ 31.960545] __kasan_kmalloc+0xb7/0xc0 [ 31.960858] __kmalloc_cache_noprof+0x184/0x410 [ 31.961237] kasan_atomics+0x96/0x310 [ 31.961662] kunit_try_run_case+0x1b3/0x490 [ 31.962134] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.962729] kthread+0x257/0x310 [ 31.963127] ret_from_fork+0x41/0x80 [ 31.963616] ret_from_fork_asm+0x1a/0x30 [ 31.964132] [ 31.964349] The buggy address belongs to the object at ffff888101abdc80 [ 31.964349] which belongs to the cache kmalloc-64 of size 64 [ 31.965361] The buggy address is located 0 bytes to the right of [ 31.965361] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.966294] [ 31.966534] The buggy address belongs to the physical page: [ 31.966982] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.967504] flags: 0x200000000000000(node=0|zone=2) [ 31.968326] page_type: f5(slab) [ 31.968721] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.969229] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.969930] page dumped because: kasan: bad access detected [ 31.970482] [ 31.970637] Memory state around the buggy address: [ 31.970929] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.971726] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.972704] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.973248] ^ [ 31.973612] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.974373] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.975041] ================================================================== [ 31.474769] ================================================================== [ 31.475555] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 31.476297] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.476902] [ 31.477172] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.478024] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.479245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.481946] Call Trace: [ 31.482175] <TASK> [ 31.482374] dump_stack_lvl+0x73/0xb0 [ 31.483947] print_report+0xd1/0x640 [ 31.484386] ? __virt_addr_valid+0x1db/0x2d0 [ 31.484880] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.486491] kasan_report+0x102/0x140 [ 31.486927] ? kasan_atomics_helper+0x1e13/0x5450 [ 31.488276] ? kasan_atomics_helper+0x1e13/0x5450 [ 31.488986] kasan_check_range+0x10c/0x1c0 [ 31.489839] __kasan_check_write+0x18/0x20 [ 31.490557] kasan_atomics_helper+0x1e13/0x5450 [ 31.490984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.491529] ? ret_from_fork_asm+0x1a/0x30 [ 31.492092] ? ret_from_fork+0x41/0x80 [ 31.492573] kasan_atomics+0x1dd/0x310 [ 31.493005] ? __pfx_kasan_atomics+0x10/0x10 [ 31.493408] ? __pfx_read_tsc+0x10/0x10 [ 31.493885] ? ktime_get_ts64+0x84/0x230 [ 31.494337] kunit_try_run_case+0x1b3/0x490 [ 31.494704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.495214] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.495877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.496289] ? __kthread_parkme+0x82/0x160 [ 31.496663] ? preempt_count_sub+0x50/0x80 [ 31.497140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.497600] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.497995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.498538] kthread+0x257/0x310 [ 31.499093] ? __pfx_kthread+0x10/0x10 [ 31.499630] ret_from_fork+0x41/0x80 [ 31.500067] ? __pfx_kthread+0x10/0x10 [ 31.500638] ret_from_fork_asm+0x1a/0x30 [ 31.501128] </TASK> [ 31.501525] [ 31.501750] Allocated by task 273: [ 31.502029] kasan_save_stack+0x3d/0x60 [ 31.502585] kasan_save_track+0x18/0x40 [ 31.502932] kasan_save_alloc_info+0x3b/0x50 [ 31.503408] __kasan_kmalloc+0xb7/0xc0 [ 31.503894] __kmalloc_cache_noprof+0x184/0x410 [ 31.504228] kasan_atomics+0x96/0x310 [ 31.504737] kunit_try_run_case+0x1b3/0x490 [ 31.505105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.505713] kthread+0x257/0x310 [ 31.506110] ret_from_fork+0x41/0x80 [ 31.506422] ret_from_fork_asm+0x1a/0x30 [ 31.506701] [ 31.506881] The buggy address belongs to the object at ffff888101abdc80 [ 31.506881] which belongs to the cache kmalloc-64 of size 64 [ 31.507443] The buggy address is located 0 bytes to the right of [ 31.507443] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.508694] [ 31.509025] The buggy address belongs to the physical page: [ 31.509664] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.510440] flags: 0x200000000000000(node=0|zone=2) [ 31.510764] page_type: f5(slab) [ 31.512240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.512945] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.514781] page dumped because: kasan: bad access detected [ 31.515164] [ 31.515356] Memory state around the buggy address: [ 31.515793] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.516153] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.516976] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.517433] ^ [ 31.517736] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.518473] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.519116] ================================================================== [ 30.477080] ================================================================== [ 30.477784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 30.479353] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.480011] [ 30.480287] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.480986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.481238] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.481720] Call Trace: [ 30.482057] <TASK> [ 30.482374] dump_stack_lvl+0x73/0xb0 [ 30.482799] print_report+0xd1/0x640 [ 30.483238] ? __virt_addr_valid+0x1db/0x2d0 [ 30.483747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.484337] kasan_report+0x102/0x140 [ 30.484764] ? kasan_atomics_helper+0x1218/0x5450 [ 30.485285] ? kasan_atomics_helper+0x1218/0x5450 [ 30.485777] kasan_check_range+0x10c/0x1c0 [ 30.486114] __kasan_check_write+0x18/0x20 [ 30.486480] kasan_atomics_helper+0x1218/0x5450 [ 30.486963] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.487501] ? ret_from_fork_asm+0x1a/0x30 [ 30.487956] ? ret_from_fork+0x41/0x80 [ 30.488453] kasan_atomics+0x1dd/0x310 [ 30.488940] ? __pfx_kasan_atomics+0x10/0x10 [ 30.489381] ? __pfx_read_tsc+0x10/0x10 [ 30.489658] ? ktime_get_ts64+0x84/0x230 [ 30.490064] kunit_try_run_case+0x1b3/0x490 [ 30.490574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.491077] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.491619] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.492051] ? __kthread_parkme+0x82/0x160 [ 30.492478] ? preempt_count_sub+0x50/0x80 [ 30.492866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.493203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.493858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.494453] kthread+0x257/0x310 [ 30.494739] ? __pfx_kthread+0x10/0x10 [ 30.495177] ret_from_fork+0x41/0x80 [ 30.495504] ? __pfx_kthread+0x10/0x10 [ 30.495787] ret_from_fork_asm+0x1a/0x30 [ 30.496304] </TASK> [ 30.496602] [ 30.496841] Allocated by task 273: [ 30.497206] kasan_save_stack+0x3d/0x60 [ 30.497650] kasan_save_track+0x18/0x40 [ 30.498034] kasan_save_alloc_info+0x3b/0x50 [ 30.498533] __kasan_kmalloc+0xb7/0xc0 [ 30.498847] __kmalloc_cache_noprof+0x184/0x410 [ 30.499192] kasan_atomics+0x96/0x310 [ 30.499505] kunit_try_run_case+0x1b3/0x490 [ 30.499786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.500383] kthread+0x257/0x310 [ 30.500759] ret_from_fork+0x41/0x80 [ 30.501185] ret_from_fork_asm+0x1a/0x30 [ 30.501651] [ 30.501888] The buggy address belongs to the object at ffff888101abdc80 [ 30.501888] which belongs to the cache kmalloc-64 of size 64 [ 30.502947] The buggy address is located 0 bytes to the right of [ 30.502947] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.503849] [ 30.504023] The buggy address belongs to the physical page: [ 30.504485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.505170] flags: 0x200000000000000(node=0|zone=2) [ 30.505557] page_type: f5(slab) [ 30.505940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.506516] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.507010] page dumped because: kasan: bad access detected [ 30.507539] [ 30.507766] Memory state around the buggy address: [ 30.508137] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.508697] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.509214] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.511841] ^ [ 30.512330] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.513050] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.513523] ================================================================== [ 30.861738] ================================================================== [ 30.862862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 30.863526] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.864197] [ 30.864526] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.865511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.865993] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.866636] Call Trace: [ 30.867048] <TASK> [ 30.867529] dump_stack_lvl+0x73/0xb0 [ 30.867993] print_report+0xd1/0x640 [ 30.868551] ? __virt_addr_valid+0x1db/0x2d0 [ 30.868886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.869595] kasan_report+0x102/0x140 [ 30.870102] ? kasan_atomics_helper+0x15b7/0x5450 [ 30.870619] ? kasan_atomics_helper+0x15b7/0x5450 [ 30.871155] kasan_check_range+0x10c/0x1c0 [ 30.871568] __kasan_check_write+0x18/0x20 [ 30.872114] kasan_atomics_helper+0x15b7/0x5450 [ 30.872564] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.873211] ? ret_from_fork_asm+0x1a/0x30 [ 30.873627] ? ret_from_fork+0x41/0x80 [ 30.874186] kasan_atomics+0x1dd/0x310 [ 30.874597] ? __pfx_kasan_atomics+0x10/0x10 [ 30.875174] ? __pfx_read_tsc+0x10/0x10 [ 30.875598] ? ktime_get_ts64+0x84/0x230 [ 30.875941] kunit_try_run_case+0x1b3/0x490 [ 30.876598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.877184] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.877712] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.878355] ? __kthread_parkme+0x82/0x160 [ 30.878743] ? preempt_count_sub+0x50/0x80 [ 30.879074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.879682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.880561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.881189] kthread+0x257/0x310 [ 30.881686] ? __pfx_kthread+0x10/0x10 [ 30.882209] ret_from_fork+0x41/0x80 [ 30.882581] ? __pfx_kthread+0x10/0x10 [ 30.883102] ret_from_fork_asm+0x1a/0x30 [ 30.883552] </TASK> [ 30.883849] [ 30.884074] Allocated by task 273: [ 30.884465] kasan_save_stack+0x3d/0x60 [ 30.884745] kasan_save_track+0x18/0x40 [ 30.885271] kasan_save_alloc_info+0x3b/0x50 [ 30.885895] __kasan_kmalloc+0xb7/0xc0 [ 30.886436] __kmalloc_cache_noprof+0x184/0x410 [ 30.886897] kasan_atomics+0x96/0x310 [ 30.887393] kunit_try_run_case+0x1b3/0x490 [ 30.887682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.888213] kthread+0x257/0x310 [ 30.888707] ret_from_fork+0x41/0x80 [ 30.889302] ret_from_fork_asm+0x1a/0x30 [ 30.889799] [ 30.890137] The buggy address belongs to the object at ffff888101abdc80 [ 30.890137] which belongs to the cache kmalloc-64 of size 64 [ 30.891106] The buggy address is located 0 bytes to the right of [ 30.891106] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.891950] [ 30.892332] The buggy address belongs to the physical page: [ 30.892894] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.893562] flags: 0x200000000000000(node=0|zone=2) [ 30.894116] page_type: f5(slab) [ 30.894571] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.895157] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.896026] page dumped because: kasan: bad access detected [ 30.896635] [ 30.896887] Memory state around the buggy address: [ 30.897578] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.898419] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.898883] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.899215] ^ [ 30.899419] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.899632] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.899894] ================================================================== [ 30.602620] ================================================================== [ 30.603655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 30.604367] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.604991] [ 30.605283] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.606040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.606484] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.607370] Call Trace: [ 30.607682] <TASK> [ 30.607988] dump_stack_lvl+0x73/0xb0 [ 30.608442] print_report+0xd1/0x640 [ 30.608807] ? __virt_addr_valid+0x1db/0x2d0 [ 30.609509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.609994] kasan_report+0x102/0x140 [ 30.610520] ? kasan_atomics_helper+0x49d0/0x5450 [ 30.611055] ? kasan_atomics_helper+0x49d0/0x5450 [ 30.611432] __asan_report_load4_noabort+0x18/0x20 [ 30.612021] kasan_atomics_helper+0x49d0/0x5450 [ 30.612666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.613195] ? ret_from_fork_asm+0x1a/0x30 [ 30.613689] ? ret_from_fork+0x41/0x80 [ 30.614194] kasan_atomics+0x1dd/0x310 [ 30.614618] ? __pfx_kasan_atomics+0x10/0x10 [ 30.615003] ? __pfx_read_tsc+0x10/0x10 [ 30.615549] ? ktime_get_ts64+0x84/0x230 [ 30.616023] kunit_try_run_case+0x1b3/0x490 [ 30.616567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.617036] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.617632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.618203] ? __kthread_parkme+0x82/0x160 [ 30.618687] ? preempt_count_sub+0x50/0x80 [ 30.619153] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.619764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.620429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.620906] kthread+0x257/0x310 [ 30.621236] ? __pfx_kthread+0x10/0x10 [ 30.621643] ret_from_fork+0x41/0x80 [ 30.622125] ? __pfx_kthread+0x10/0x10 [ 30.622594] ret_from_fork_asm+0x1a/0x30 [ 30.623077] </TASK> [ 30.623360] [ 30.623577] Allocated by task 273: [ 30.623997] kasan_save_stack+0x3d/0x60 [ 30.624537] kasan_save_track+0x18/0x40 [ 30.624964] kasan_save_alloc_info+0x3b/0x50 [ 30.625530] __kasan_kmalloc+0xb7/0xc0 [ 30.626005] __kmalloc_cache_noprof+0x184/0x410 [ 30.626506] kasan_atomics+0x96/0x310 [ 30.626943] kunit_try_run_case+0x1b3/0x490 [ 30.627457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.628003] kthread+0x257/0x310 [ 30.628433] ret_from_fork+0x41/0x80 [ 30.628915] ret_from_fork_asm+0x1a/0x30 [ 30.629295] [ 30.629604] The buggy address belongs to the object at ffff888101abdc80 [ 30.629604] which belongs to the cache kmalloc-64 of size 64 [ 30.630709] The buggy address is located 0 bytes to the right of [ 30.630709] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.631633] [ 30.631789] The buggy address belongs to the physical page: [ 30.632475] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.633139] flags: 0x200000000000000(node=0|zone=2) [ 30.633650] page_type: f5(slab) [ 30.633932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.634433] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.635162] page dumped because: kasan: bad access detected [ 30.635730] [ 30.636011] Memory state around the buggy address: [ 30.636557] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.639469] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.641071] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.641677] ^ [ 30.642200] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.642710] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.643485] ================================================================== [ 30.395792] ================================================================== [ 30.396686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 30.397332] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.397860] [ 30.398028] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.399057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.399517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.400260] Call Trace: [ 30.400566] <TASK> [ 30.400789] dump_stack_lvl+0x73/0xb0 [ 30.401116] print_report+0xd1/0x640 [ 30.401396] ? __virt_addr_valid+0x1db/0x2d0 [ 30.401700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.402280] kasan_report+0x102/0x140 [ 30.402840] ? kasan_atomics_helper+0x1149/0x5450 [ 30.403362] ? kasan_atomics_helper+0x1149/0x5450 [ 30.403903] kasan_check_range+0x10c/0x1c0 [ 30.404362] __kasan_check_write+0x18/0x20 [ 30.404870] kasan_atomics_helper+0x1149/0x5450 [ 30.405346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.405950] ? ret_from_fork_asm+0x1a/0x30 [ 30.406282] ? ret_from_fork+0x41/0x80 [ 30.406585] kasan_atomics+0x1dd/0x310 [ 30.407874] ? __pfx_kasan_atomics+0x10/0x10 [ 30.409177] ? __pfx_read_tsc+0x10/0x10 [ 30.409634] ? ktime_get_ts64+0x84/0x230 [ 30.410039] kunit_try_run_case+0x1b3/0x490 [ 30.410910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.411239] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.411574] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.411923] ? __kthread_parkme+0x82/0x160 [ 30.412212] ? preempt_count_sub+0x50/0x80 [ 30.412503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.412806] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.416939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.417491] kthread+0x257/0x310 [ 30.418554] ? __pfx_kthread+0x10/0x10 [ 30.418863] ret_from_fork+0x41/0x80 [ 30.419188] ? __pfx_kthread+0x10/0x10 [ 30.419476] ret_from_fork_asm+0x1a/0x30 [ 30.419776] </TASK> [ 30.421068] [ 30.421705] Allocated by task 273: [ 30.422485] kasan_save_stack+0x3d/0x60 [ 30.423009] kasan_save_track+0x18/0x40 [ 30.423175] kasan_save_alloc_info+0x3b/0x50 [ 30.423979] __kasan_kmalloc+0xb7/0xc0 [ 30.424401] __kmalloc_cache_noprof+0x184/0x410 [ 30.424883] kasan_atomics+0x96/0x310 [ 30.425293] kunit_try_run_case+0x1b3/0x490 [ 30.425707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.426180] kthread+0x257/0x310 [ 30.426448] ret_from_fork+0x41/0x80 [ 30.426700] ret_from_fork_asm+0x1a/0x30 [ 30.427011] [ 30.427167] The buggy address belongs to the object at ffff888101abdc80 [ 30.427167] which belongs to the cache kmalloc-64 of size 64 [ 30.428143] The buggy address is located 0 bytes to the right of [ 30.428143] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.428983] [ 30.429204] The buggy address belongs to the physical page: [ 30.429739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.430447] flags: 0x200000000000000(node=0|zone=2) [ 30.430841] page_type: f5(slab) [ 30.431091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.431805] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.432421] page dumped because: kasan: bad access detected [ 30.432723] [ 30.432925] Memory state around the buggy address: [ 30.433440] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.434114] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.434614] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.435000] ^ [ 30.435478] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.436106] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.436766] ================================================================== [ 30.813793] ================================================================== [ 30.814441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 30.814975] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.817289] [ 30.817453] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.818256] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.819001] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.820366] Call Trace: [ 30.820588] <TASK> [ 30.820765] dump_stack_lvl+0x73/0xb0 [ 30.821484] print_report+0xd1/0x640 [ 30.822153] ? __virt_addr_valid+0x1db/0x2d0 [ 30.822874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.823524] kasan_report+0x102/0x140 [ 30.824030] ? kasan_atomics_helper+0x151e/0x5450 [ 30.824881] ? kasan_atomics_helper+0x151e/0x5450 [ 30.825614] kasan_check_range+0x10c/0x1c0 [ 30.825968] __kasan_check_write+0x18/0x20 [ 30.826456] kasan_atomics_helper+0x151e/0x5450 [ 30.826839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.827475] ? ret_from_fork_asm+0x1a/0x30 [ 30.827913] ? ret_from_fork+0x41/0x80 [ 30.828294] kasan_atomics+0x1dd/0x310 [ 30.828698] ? __pfx_kasan_atomics+0x10/0x10 [ 30.830047] ? __pfx_read_tsc+0x10/0x10 [ 30.830405] ? ktime_get_ts64+0x84/0x230 [ 30.831038] kunit_try_run_case+0x1b3/0x490 [ 30.831868] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.832275] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.832920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.833402] ? __kthread_parkme+0x82/0x160 [ 30.833809] ? preempt_count_sub+0x50/0x80 [ 30.834665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.835438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.835997] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.837218] kthread+0x257/0x310 [ 30.837541] ? __pfx_kthread+0x10/0x10 [ 30.837864] ret_from_fork+0x41/0x80 [ 30.838543] ? __pfx_kthread+0x10/0x10 [ 30.839190] ret_from_fork_asm+0x1a/0x30 [ 30.839658] </TASK> [ 30.839933] [ 30.840121] Allocated by task 273: [ 30.841164] kasan_save_stack+0x3d/0x60 [ 30.841567] kasan_save_track+0x18/0x40 [ 30.842008] kasan_save_alloc_info+0x3b/0x50 [ 30.842436] __kasan_kmalloc+0xb7/0xc0 [ 30.842780] __kmalloc_cache_noprof+0x184/0x410 [ 30.843184] kasan_atomics+0x96/0x310 [ 30.844200] kunit_try_run_case+0x1b3/0x490 [ 30.844641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.845178] kthread+0x257/0x310 [ 30.845875] ret_from_fork+0x41/0x80 [ 30.846132] ret_from_fork_asm+0x1a/0x30 [ 30.846785] [ 30.847060] The buggy address belongs to the object at ffff888101abdc80 [ 30.847060] which belongs to the cache kmalloc-64 of size 64 [ 30.848480] The buggy address is located 0 bytes to the right of [ 30.848480] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.850021] [ 30.850184] The buggy address belongs to the physical page: [ 30.850481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.851246] flags: 0x200000000000000(node=0|zone=2) [ 30.852177] page_type: f5(slab) [ 30.852638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.853716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.854684] page dumped because: kasan: bad access detected [ 30.855104] [ 30.855352] Memory state around the buggy address: [ 30.856195] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.856708] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.857218] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.857765] ^ [ 30.858262] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.858776] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.860059] ================================================================== [ 31.224533] ================================================================== [ 31.225732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 31.226541] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.227412] [ 31.227748] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.229023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.229399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.230513] Call Trace: [ 31.230723] <TASK> [ 31.231181] dump_stack_lvl+0x73/0xb0 [ 31.232172] print_report+0xd1/0x640 [ 31.232737] ? __virt_addr_valid+0x1db/0x2d0 [ 31.233352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.233969] kasan_report+0x102/0x140 [ 31.234537] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.235060] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.235729] kasan_check_range+0x10c/0x1c0 [ 31.236209] __kasan_check_write+0x18/0x20 [ 31.236773] kasan_atomics_helper+0x1a80/0x5450 [ 31.237290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.238007] ? ret_from_fork_asm+0x1a/0x30 [ 31.238309] ? ret_from_fork+0x41/0x80 [ 31.238975] kasan_atomics+0x1dd/0x310 [ 31.239658] ? __pfx_kasan_atomics+0x10/0x10 [ 31.240213] ? __pfx_read_tsc+0x10/0x10 [ 31.240685] ? ktime_get_ts64+0x84/0x230 [ 31.241239] kunit_try_run_case+0x1b3/0x490 [ 31.241727] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.242415] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.242810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.243158] ? __kthread_parkme+0x82/0x160 [ 31.243668] ? preempt_count_sub+0x50/0x80 [ 31.244532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.245047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.245894] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.246287] kthread+0x257/0x310 [ 31.246877] ? __pfx_kthread+0x10/0x10 [ 31.247411] ret_from_fork+0x41/0x80 [ 31.248042] ? __pfx_kthread+0x10/0x10 [ 31.248622] ret_from_fork_asm+0x1a/0x30 [ 31.249015] </TASK> [ 31.249325] [ 31.249546] Allocated by task 273: [ 31.250141] kasan_save_stack+0x3d/0x60 [ 31.250695] kasan_save_track+0x18/0x40 [ 31.251266] kasan_save_alloc_info+0x3b/0x50 [ 31.251562] __kasan_kmalloc+0xb7/0xc0 [ 31.251836] __kmalloc_cache_noprof+0x184/0x410 [ 31.252335] kasan_atomics+0x96/0x310 [ 31.253006] kunit_try_run_case+0x1b3/0x490 [ 31.253602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.254360] kthread+0x257/0x310 [ 31.254734] ret_from_fork+0x41/0x80 [ 31.255230] ret_from_fork_asm+0x1a/0x30 [ 31.255880] [ 31.256044] The buggy address belongs to the object at ffff888101abdc80 [ 31.256044] which belongs to the cache kmalloc-64 of size 64 [ 31.257096] The buggy address is located 0 bytes to the right of [ 31.257096] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.257936] [ 31.258232] The buggy address belongs to the physical page: [ 31.258848] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.259702] flags: 0x200000000000000(node=0|zone=2) [ 31.260241] page_type: f5(slab) [ 31.260880] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.261449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.262178] page dumped because: kasan: bad access detected [ 31.262882] [ 31.263143] Memory state around the buggy address: [ 31.263741] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.264269] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.264983] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.265347] ^ [ 31.265790] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.267034] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.267748] ================================================================== [ 29.650375] ================================================================== [ 29.651070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 29.651643] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.653622] [ 29.654034] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.656737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.657666] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.658607] Call Trace: [ 29.658982] <TASK> [ 29.659187] dump_stack_lvl+0x73/0xb0 [ 29.659724] print_report+0xd1/0x640 [ 29.660584] ? __virt_addr_valid+0x1db/0x2d0 [ 29.660993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.661871] kasan_report+0x102/0x140 [ 29.662218] ? kasan_atomics_helper+0x730/0x5450 [ 29.662934] ? kasan_atomics_helper+0x730/0x5450 [ 29.663313] kasan_check_range+0x10c/0x1c0 [ 29.664233] __kasan_check_write+0x18/0x20 [ 29.664647] kasan_atomics_helper+0x730/0x5450 [ 29.665219] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.666052] ? ret_from_fork_asm+0x1a/0x30 [ 29.666444] ? ret_from_fork+0x41/0x80 [ 29.667088] kasan_atomics+0x1dd/0x310 [ 29.667768] ? __pfx_kasan_atomics+0x10/0x10 [ 29.668513] ? __pfx_read_tsc+0x10/0x10 [ 29.668916] ? ktime_get_ts64+0x84/0x230 [ 29.669557] kunit_try_run_case+0x1b3/0x490 [ 29.670172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.670856] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.671477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.672131] ? __kthread_parkme+0x82/0x160 [ 29.672844] ? preempt_count_sub+0x50/0x80 [ 29.673473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.674141] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.674914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.675626] kthread+0x257/0x310 [ 29.676155] ? __pfx_kthread+0x10/0x10 [ 29.676875] ret_from_fork+0x41/0x80 [ 29.677455] ? __pfx_kthread+0x10/0x10 [ 29.678026] ret_from_fork_asm+0x1a/0x30 [ 29.678631] </TASK> [ 29.679219] [ 29.679439] Allocated by task 273: [ 29.679793] kasan_save_stack+0x3d/0x60 [ 29.680163] kasan_save_track+0x18/0x40 [ 29.680677] kasan_save_alloc_info+0x3b/0x50 [ 29.681175] __kasan_kmalloc+0xb7/0xc0 [ 29.681548] __kmalloc_cache_noprof+0x184/0x410 [ 29.681948] kasan_atomics+0x96/0x310 [ 29.682375] kunit_try_run_case+0x1b3/0x490 [ 29.682996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.683362] kthread+0x257/0x310 [ 29.683659] ret_from_fork+0x41/0x80 [ 29.684129] ret_from_fork_asm+0x1a/0x30 [ 29.684690] [ 29.684932] The buggy address belongs to the object at ffff888101abdc80 [ 29.684932] which belongs to the cache kmalloc-64 of size 64 [ 29.685624] The buggy address is located 0 bytes to the right of [ 29.685624] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.686672] [ 29.686862] The buggy address belongs to the physical page: [ 29.687162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.687806] flags: 0x200000000000000(node=0|zone=2) [ 29.688309] page_type: f5(slab) [ 29.688685] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.689508] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.690211] page dumped because: kasan: bad access detected [ 29.690615] [ 29.690773] Memory state around the buggy address: [ 29.691075] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.691597] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.692342] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.693033] ^ [ 29.693616] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.694113] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.694673] ================================================================== [ 30.059847] ================================================================== [ 30.062933] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 30.063660] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.064084] [ 30.064266] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.065240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.065567] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.066031] Call Trace: [ 30.066242] <TASK> [ 30.066520] dump_stack_lvl+0x73/0xb0 [ 30.066979] print_report+0xd1/0x640 [ 30.067412] ? __virt_addr_valid+0x1db/0x2d0 [ 30.067900] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.068522] kasan_report+0x102/0x140 [ 30.068924] ? kasan_atomics_helper+0xd48/0x5450 [ 30.069303] ? kasan_atomics_helper+0xd48/0x5450 [ 30.069850] kasan_check_range+0x10c/0x1c0 [ 30.070164] __kasan_check_write+0x18/0x20 [ 30.070444] kasan_atomics_helper+0xd48/0x5450 [ 30.070747] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.071253] ? ret_from_fork_asm+0x1a/0x30 [ 30.071867] ? ret_from_fork+0x41/0x80 [ 30.072344] kasan_atomics+0x1dd/0x310 [ 30.072802] ? __pfx_kasan_atomics+0x10/0x10 [ 30.073333] ? __pfx_read_tsc+0x10/0x10 [ 30.073800] ? ktime_get_ts64+0x84/0x230 [ 30.074294] kunit_try_run_case+0x1b3/0x490 [ 30.074670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.075000] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.075315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.075631] ? __kthread_parkme+0x82/0x160 [ 30.076096] ? preempt_count_sub+0x50/0x80 [ 30.076699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.077272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.078569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.080100] kthread+0x257/0x310 [ 30.081018] ? __pfx_kthread+0x10/0x10 [ 30.082532] ret_from_fork+0x41/0x80 [ 30.083583] ? __pfx_kthread+0x10/0x10 [ 30.083979] ret_from_fork_asm+0x1a/0x30 [ 30.084872] </TASK> [ 30.085094] [ 30.085662] Allocated by task 273: [ 30.085967] kasan_save_stack+0x3d/0x60 [ 30.086588] kasan_save_track+0x18/0x40 [ 30.087488] kasan_save_alloc_info+0x3b/0x50 [ 30.087871] __kasan_kmalloc+0xb7/0xc0 [ 30.088144] __kmalloc_cache_noprof+0x184/0x410 [ 30.089104] kasan_atomics+0x96/0x310 [ 30.089436] kunit_try_run_case+0x1b3/0x490 [ 30.090029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.090952] kthread+0x257/0x310 [ 30.091687] ret_from_fork+0x41/0x80 [ 30.092021] ret_from_fork_asm+0x1a/0x30 [ 30.092597] [ 30.093202] The buggy address belongs to the object at ffff888101abdc80 [ 30.093202] which belongs to the cache kmalloc-64 of size 64 [ 30.094234] The buggy address is located 0 bytes to the right of [ 30.094234] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.095079] [ 30.095258] The buggy address belongs to the physical page: [ 30.095527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.095773] flags: 0x200000000000000(node=0|zone=2) [ 30.096777] page_type: f5(slab) [ 30.097053] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.098044] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.098916] page dumped because: kasan: bad access detected [ 30.099501] [ 30.099724] Memory state around the buggy address: [ 30.100062] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.101278] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.102168] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.102870] ^ [ 30.103606] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.104321] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.105182] ================================================================== [ 31.179072] ================================================================== [ 31.180560] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 31.181615] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.182214] [ 31.182873] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.184270] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.184648] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.185980] Call Trace: [ 31.186296] <TASK> [ 31.186913] dump_stack_lvl+0x73/0xb0 [ 31.187206] print_report+0xd1/0x640 [ 31.187635] ? __virt_addr_valid+0x1db/0x2d0 [ 31.188277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.189200] kasan_report+0x102/0x140 [ 31.189807] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.190330] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.191079] kasan_check_range+0x10c/0x1c0 [ 31.191522] __kasan_check_write+0x18/0x20 [ 31.192171] kasan_atomics_helper+0x19e4/0x5450 [ 31.192810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.193441] ? ret_from_fork_asm+0x1a/0x30 [ 31.194037] ? ret_from_fork+0x41/0x80 [ 31.194562] kasan_atomics+0x1dd/0x310 [ 31.195037] ? __pfx_kasan_atomics+0x10/0x10 [ 31.195602] ? __pfx_read_tsc+0x10/0x10 [ 31.196120] ? ktime_get_ts64+0x84/0x230 [ 31.196736] kunit_try_run_case+0x1b3/0x490 [ 31.197069] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.197311] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.197890] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.198486] ? __kthread_parkme+0x82/0x160 [ 31.199116] ? preempt_count_sub+0x50/0x80 [ 31.199769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.200361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.201185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.201843] kthread+0x257/0x310 [ 31.202310] ? __pfx_kthread+0x10/0x10 [ 31.202896] ret_from_fork+0x41/0x80 [ 31.203276] ? __pfx_kthread+0x10/0x10 [ 31.203577] ret_from_fork_asm+0x1a/0x30 [ 31.203776] </TASK> [ 31.203960] [ 31.204109] Allocated by task 273: [ 31.204560] kasan_save_stack+0x3d/0x60 [ 31.205006] kasan_save_track+0x18/0x40 [ 31.205401] kasan_save_alloc_info+0x3b/0x50 [ 31.205691] __kasan_kmalloc+0xb7/0xc0 [ 31.206190] __kmalloc_cache_noprof+0x184/0x410 [ 31.207282] kasan_atomics+0x96/0x310 [ 31.207720] kunit_try_run_case+0x1b3/0x490 [ 31.208069] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.208609] kthread+0x257/0x310 [ 31.209104] ret_from_fork+0x41/0x80 [ 31.209584] ret_from_fork_asm+0x1a/0x30 [ 31.209886] [ 31.210212] The buggy address belongs to the object at ffff888101abdc80 [ 31.210212] which belongs to the cache kmalloc-64 of size 64 [ 31.211741] The buggy address is located 0 bytes to the right of [ 31.211741] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.212847] [ 31.213186] The buggy address belongs to the physical page: [ 31.213536] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.214293] flags: 0x200000000000000(node=0|zone=2) [ 31.215226] page_type: f5(slab) [ 31.215609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.216537] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.217047] page dumped because: kasan: bad access detected [ 31.217350] [ 31.217661] Memory state around the buggy address: [ 31.218455] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.219360] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.220314] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.220902] ^ [ 31.221411] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.221955] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.222415] ================================================================== [ 31.314867] ================================================================== [ 31.315524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 31.316327] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.317107] [ 31.317465] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.318471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.318864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.319517] Call Trace: [ 31.319853] <TASK> [ 31.320192] dump_stack_lvl+0x73/0xb0 [ 31.320710] print_report+0xd1/0x640 [ 31.321015] ? __virt_addr_valid+0x1db/0x2d0 [ 31.321548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.322200] kasan_report+0x102/0x140 [ 31.322701] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.323521] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.324102] kasan_check_range+0x10c/0x1c0 [ 31.324637] __kasan_check_write+0x18/0x20 [ 31.324956] kasan_atomics_helper+0x1c19/0x5450 [ 31.325536] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.325971] ? ret_from_fork_asm+0x1a/0x30 [ 31.326486] ? ret_from_fork+0x41/0x80 [ 31.326948] kasan_atomics+0x1dd/0x310 [ 31.327357] ? __pfx_kasan_atomics+0x10/0x10 [ 31.327710] ? __pfx_read_tsc+0x10/0x10 [ 31.328161] ? ktime_get_ts64+0x84/0x230 [ 31.328648] kunit_try_run_case+0x1b3/0x490 [ 31.329187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.329666] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.330015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.330533] ? __kthread_parkme+0x82/0x160 [ 31.331047] ? preempt_count_sub+0x50/0x80 [ 31.331480] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.332001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.332409] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.333007] kthread+0x257/0x310 [ 31.333456] ? __pfx_kthread+0x10/0x10 [ 31.333947] ret_from_fork+0x41/0x80 [ 31.334412] ? __pfx_kthread+0x10/0x10 [ 31.334847] ret_from_fork_asm+0x1a/0x30 [ 31.335159] </TASK> [ 31.335536] [ 31.335762] Allocated by task 273: [ 31.336180] kasan_save_stack+0x3d/0x60 [ 31.336638] kasan_save_track+0x18/0x40 [ 31.337068] kasan_save_alloc_info+0x3b/0x50 [ 31.337504] __kasan_kmalloc+0xb7/0xc0 [ 31.337971] __kmalloc_cache_noprof+0x184/0x410 [ 31.338455] kasan_atomics+0x96/0x310 [ 31.338838] kunit_try_run_case+0x1b3/0x490 [ 31.339420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.339859] kthread+0x257/0x310 [ 31.340292] ret_from_fork+0x41/0x80 [ 31.340607] ret_from_fork_asm+0x1a/0x30 [ 31.341055] [ 31.341316] The buggy address belongs to the object at ffff888101abdc80 [ 31.341316] which belongs to the cache kmalloc-64 of size 64 [ 31.342199] The buggy address is located 0 bytes to the right of [ 31.342199] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.342977] [ 31.343209] The buggy address belongs to the physical page: [ 31.343631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.344409] flags: 0x200000000000000(node=0|zone=2) [ 31.344850] page_type: f5(slab) [ 31.345185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.345796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.346372] page dumped because: kasan: bad access detected [ 31.346921] [ 31.347081] Memory state around the buggy address: [ 31.347406] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.347777] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.348515] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.349222] ^ [ 31.349746] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.350312] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.350873] ================================================================== [ 30.236188] ================================================================== [ 30.236699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 30.237362] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.238045] [ 30.238337] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.238959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.239376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.240163] Call Trace: [ 30.240520] <TASK> [ 30.240856] dump_stack_lvl+0x73/0xb0 [ 30.241357] print_report+0xd1/0x640 [ 30.241675] ? __virt_addr_valid+0x1db/0x2d0 [ 30.242211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.242697] kasan_report+0x102/0x140 [ 30.243001] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.243368] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.243693] kasan_check_range+0x10c/0x1c0 [ 30.244131] __kasan_check_write+0x18/0x20 [ 30.244684] kasan_atomics_helper+0xfaa/0x5450 [ 30.245275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.245785] ? ret_from_fork_asm+0x1a/0x30 [ 30.246272] ? ret_from_fork+0x41/0x80 [ 30.246718] kasan_atomics+0x1dd/0x310 [ 30.247303] ? __pfx_kasan_atomics+0x10/0x10 [ 30.247833] ? __pfx_read_tsc+0x10/0x10 [ 30.248330] ? ktime_get_ts64+0x84/0x230 [ 30.248773] kunit_try_run_case+0x1b3/0x490 [ 30.249192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.249756] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.250215] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.250594] ? __kthread_parkme+0x82/0x160 [ 30.250906] ? preempt_count_sub+0x50/0x80 [ 30.251466] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.252044] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.252715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.253342] kthread+0x257/0x310 [ 30.253665] ? __pfx_kthread+0x10/0x10 [ 30.253982] ret_from_fork+0x41/0x80 [ 30.254293] ? __pfx_kthread+0x10/0x10 [ 30.254574] ret_from_fork_asm+0x1a/0x30 [ 30.254894] </TASK> [ 30.255216] [ 30.255511] Allocated by task 273: [ 30.255960] kasan_save_stack+0x3d/0x60 [ 30.256517] kasan_save_track+0x18/0x40 [ 30.256951] kasan_save_alloc_info+0x3b/0x50 [ 30.257487] __kasan_kmalloc+0xb7/0xc0 [ 30.257937] __kmalloc_cache_noprof+0x184/0x410 [ 30.258489] kasan_atomics+0x96/0x310 [ 30.258931] kunit_try_run_case+0x1b3/0x490 [ 30.259973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.261049] kthread+0x257/0x310 [ 30.261409] ret_from_fork+0x41/0x80 [ 30.261674] ret_from_fork_asm+0x1a/0x30 [ 30.262979] [ 30.263452] The buggy address belongs to the object at ffff888101abdc80 [ 30.263452] which belongs to the cache kmalloc-64 of size 64 [ 30.264301] The buggy address is located 0 bytes to the right of [ 30.264301] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.264910] [ 30.265134] The buggy address belongs to the physical page: [ 30.265628] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.266411] flags: 0x200000000000000(node=0|zone=2) [ 30.266912] page_type: f5(slab) [ 30.267293] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.267807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.268384] page dumped because: kasan: bad access detected [ 30.268890] [ 30.269114] Memory state around the buggy address: [ 30.269555] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.270160] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.270706] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.271457] ^ [ 30.271747] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.272445] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.273960] ================================================================== [ 30.438335] ================================================================== [ 30.439142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 30.439888] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.440537] [ 30.440720] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.441289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.441708] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.442561] Call Trace: [ 30.442864] <TASK> [ 30.443063] dump_stack_lvl+0x73/0xb0 [ 30.443627] print_report+0xd1/0x640 [ 30.444043] ? __virt_addr_valid+0x1db/0x2d0 [ 30.445322] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.445680] kasan_report+0x102/0x140 [ 30.446591] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.447097] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.447609] __asan_report_load4_noabort+0x18/0x20 [ 30.450045] kasan_atomics_helper+0x4a04/0x5450 [ 30.450401] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.450926] ? ret_from_fork_asm+0x1a/0x30 [ 30.451273] ? ret_from_fork+0x41/0x80 [ 30.451713] kasan_atomics+0x1dd/0x310 [ 30.452528] ? __pfx_kasan_atomics+0x10/0x10 [ 30.453294] ? __pfx_read_tsc+0x10/0x10 [ 30.453657] ? ktime_get_ts64+0x84/0x230 [ 30.454058] kunit_try_run_case+0x1b3/0x490 [ 30.454476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.454944] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.455284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.455804] ? __kthread_parkme+0x82/0x160 [ 30.456258] ? preempt_count_sub+0x50/0x80 [ 30.456697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.457198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.457703] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.458550] kthread+0x257/0x310 [ 30.458993] ? __pfx_kthread+0x10/0x10 [ 30.459426] ret_from_fork+0x41/0x80 [ 30.459759] ? __pfx_kthread+0x10/0x10 [ 30.460225] ret_from_fork_asm+0x1a/0x30 [ 30.460650] </TASK> [ 30.460860] [ 30.461078] Allocated by task 273: [ 30.461485] kasan_save_stack+0x3d/0x60 [ 30.461926] kasan_save_track+0x18/0x40 [ 30.462309] kasan_save_alloc_info+0x3b/0x50 [ 30.462601] __kasan_kmalloc+0xb7/0xc0 [ 30.462959] __kmalloc_cache_noprof+0x184/0x410 [ 30.463458] kasan_atomics+0x96/0x310 [ 30.463891] kunit_try_run_case+0x1b3/0x490 [ 30.464374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.464897] kthread+0x257/0x310 [ 30.465138] ret_from_fork+0x41/0x80 [ 30.465584] ret_from_fork_asm+0x1a/0x30 [ 30.466038] [ 30.466296] The buggy address belongs to the object at ffff888101abdc80 [ 30.466296] which belongs to the cache kmalloc-64 of size 64 [ 30.466911] The buggy address is located 0 bytes to the right of [ 30.466911] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.467537] [ 30.467771] The buggy address belongs to the physical page: [ 30.468325] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.469103] flags: 0x200000000000000(node=0|zone=2) [ 30.469639] page_type: f5(slab) [ 30.470029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.470732] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.471320] page dumped because: kasan: bad access detected [ 30.471772] [ 30.472008] Memory state around the buggy address: [ 30.472398] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.472763] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.473462] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.474107] ^ [ 30.474617] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475060] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.475639] ================================================================== [ 30.361197] ================================================================== [ 30.361652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 30.362093] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.362599] [ 30.362931] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.363743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.364344] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.365049] Call Trace: [ 30.365261] <TASK> [ 30.365458] dump_stack_lvl+0x73/0xb0 [ 30.365755] print_report+0xd1/0x640 [ 30.366203] ? __virt_addr_valid+0x1db/0x2d0 [ 30.366668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.367402] kasan_report+0x102/0x140 [ 30.367788] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.368302] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.368696] __asan_report_load4_noabort+0x18/0x20 [ 30.369197] kasan_atomics_helper+0x4a1e/0x5450 [ 30.369687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.370077] ? ret_from_fork_asm+0x1a/0x30 [ 30.370588] ? ret_from_fork+0x41/0x80 [ 30.370967] kasan_atomics+0x1dd/0x310 [ 30.371302] ? __pfx_kasan_atomics+0x10/0x10 [ 30.371678] ? __pfx_read_tsc+0x10/0x10 [ 30.371974] ? ktime_get_ts64+0x84/0x230 [ 30.372261] kunit_try_run_case+0x1b3/0x490 [ 30.372724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.373391] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.373961] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.374587] ? __kthread_parkme+0x82/0x160 [ 30.374982] ? preempt_count_sub+0x50/0x80 [ 30.375276] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.375965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.376709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.377086] kthread+0x257/0x310 [ 30.377348] ? __pfx_kthread+0x10/0x10 [ 30.377617] ret_from_fork+0x41/0x80 [ 30.378011] ? __pfx_kthread+0x10/0x10 [ 30.378463] ret_from_fork_asm+0x1a/0x30 [ 30.379005] </TASK> [ 30.379364] [ 30.379587] Allocated by task 273: [ 30.379964] kasan_save_stack+0x3d/0x60 [ 30.380401] kasan_save_track+0x18/0x40 [ 30.380745] kasan_save_alloc_info+0x3b/0x50 [ 30.381060] __kasan_kmalloc+0xb7/0xc0 [ 30.381433] __kmalloc_cache_noprof+0x184/0x410 [ 30.381964] kasan_atomics+0x96/0x310 [ 30.382398] kunit_try_run_case+0x1b3/0x490 [ 30.382859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.383382] kthread+0x257/0x310 [ 30.383675] ret_from_fork+0x41/0x80 [ 30.384092] ret_from_fork_asm+0x1a/0x30 [ 30.384476] [ 30.384700] The buggy address belongs to the object at ffff888101abdc80 [ 30.384700] which belongs to the cache kmalloc-64 of size 64 [ 30.385515] The buggy address is located 0 bytes to the right of [ 30.385515] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.386810] [ 30.387009] The buggy address belongs to the physical page: [ 30.387308] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.387710] flags: 0x200000000000000(node=0|zone=2) [ 30.388210] page_type: f5(slab) [ 30.388575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.389614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.390324] page dumped because: kasan: bad access detected [ 30.390814] [ 30.391056] Memory state around the buggy address: [ 30.391534] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.391956] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.392384] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.393047] ^ [ 30.393664] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.394324] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.394694] ================================================================== [ 31.269891] ================================================================== [ 31.270862] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 31.271320] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.272163] [ 31.272398] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.273191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.274213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.274993] Call Trace: [ 31.275922] <TASK> [ 31.276259] dump_stack_lvl+0x73/0xb0 [ 31.276769] print_report+0xd1/0x640 [ 31.276986] ? __virt_addr_valid+0x1db/0x2d0 [ 31.277161] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.277986] kasan_report+0x102/0x140 [ 31.278360] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.278736] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.279394] kasan_check_range+0x10c/0x1c0 [ 31.279723] __kasan_check_write+0x18/0x20 [ 31.280130] kasan_atomics_helper+0x1b23/0x5450 [ 31.281252] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.281758] ? ret_from_fork_asm+0x1a/0x30 [ 31.282559] ? ret_from_fork+0x41/0x80 [ 31.283294] kasan_atomics+0x1dd/0x310 [ 31.283648] ? __pfx_kasan_atomics+0x10/0x10 [ 31.284280] ? __pfx_read_tsc+0x10/0x10 [ 31.284914] ? ktime_get_ts64+0x84/0x230 [ 31.285521] kunit_try_run_case+0x1b3/0x490 [ 31.286197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.286849] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.287557] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.288289] ? __kthread_parkme+0x82/0x160 [ 31.288985] ? preempt_count_sub+0x50/0x80 [ 31.289637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.290252] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.291156] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.291553] kthread+0x257/0x310 [ 31.292382] ? __pfx_kthread+0x10/0x10 [ 31.292783] ret_from_fork+0x41/0x80 [ 31.293492] ? __pfx_kthread+0x10/0x10 [ 31.293891] ret_from_fork_asm+0x1a/0x30 [ 31.294333] </TASK> [ 31.294525] [ 31.294739] Allocated by task 273: [ 31.295152] kasan_save_stack+0x3d/0x60 [ 31.295651] kasan_save_track+0x18/0x40 [ 31.296057] kasan_save_alloc_info+0x3b/0x50 [ 31.296442] __kasan_kmalloc+0xb7/0xc0 [ 31.296969] __kmalloc_cache_noprof+0x184/0x410 [ 31.297321] kasan_atomics+0x96/0x310 [ 31.297729] kunit_try_run_case+0x1b3/0x490 [ 31.298196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.298521] kthread+0x257/0x310 [ 31.298767] ret_from_fork+0x41/0x80 [ 31.299230] ret_from_fork_asm+0x1a/0x30 [ 31.299652] [ 31.299939] The buggy address belongs to the object at ffff888101abdc80 [ 31.299939] which belongs to the cache kmalloc-64 of size 64 [ 31.301325] The buggy address is located 0 bytes to the right of [ 31.301325] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.301947] [ 31.302101] The buggy address belongs to the physical page: [ 31.302505] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.303322] flags: 0x200000000000000(node=0|zone=2) [ 31.303837] page_type: f5(slab) [ 31.304385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.304984] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.305643] page dumped because: kasan: bad access detected [ 31.306123] [ 31.306312] Memory state around the buggy address: [ 31.306655] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.308044] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.309991] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.310760] ^ [ 31.311416] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.312288] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.312982] ================================================================== [ 31.088177] ================================================================== [ 31.088577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 31.089091] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.089881] [ 31.090201] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.090698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.091859] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.092781] Call Trace: [ 31.093307] <TASK> [ 31.093721] dump_stack_lvl+0x73/0xb0 [ 31.094314] print_report+0xd1/0x640 [ 31.094740] ? __virt_addr_valid+0x1db/0x2d0 [ 31.095159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.096037] kasan_report+0x102/0x140 [ 31.096622] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.097525] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.097990] kasan_check_range+0x10c/0x1c0 [ 31.098664] __kasan_check_write+0x18/0x20 [ 31.099031] kasan_atomics_helper+0x18b2/0x5450 [ 31.099556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.100060] ? ret_from_fork_asm+0x1a/0x30 [ 31.101106] ? ret_from_fork+0x41/0x80 [ 31.101493] kasan_atomics+0x1dd/0x310 [ 31.102290] ? __pfx_kasan_atomics+0x10/0x10 [ 31.102700] ? __pfx_read_tsc+0x10/0x10 [ 31.103287] ? ktime_get_ts64+0x84/0x230 [ 31.103655] kunit_try_run_case+0x1b3/0x490 [ 31.104074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.104917] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.105325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.106087] ? __kthread_parkme+0x82/0x160 [ 31.106691] ? preempt_count_sub+0x50/0x80 [ 31.107300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.107750] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.108258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.109208] kthread+0x257/0x310 [ 31.109561] ? __pfx_kthread+0x10/0x10 [ 31.110328] ret_from_fork+0x41/0x80 [ 31.110724] ? __pfx_kthread+0x10/0x10 [ 31.111106] ret_from_fork_asm+0x1a/0x30 [ 31.111582] </TASK> [ 31.111852] [ 31.112015] Allocated by task 273: [ 31.113217] kasan_save_stack+0x3d/0x60 [ 31.113600] kasan_save_track+0x18/0x40 [ 31.114357] kasan_save_alloc_info+0x3b/0x50 [ 31.114795] __kasan_kmalloc+0xb7/0xc0 [ 31.115180] __kmalloc_cache_noprof+0x184/0x410 [ 31.116004] kasan_atomics+0x96/0x310 [ 31.116478] kunit_try_run_case+0x1b3/0x490 [ 31.116864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.117291] kthread+0x257/0x310 [ 31.118271] ret_from_fork+0x41/0x80 [ 31.118609] ret_from_fork_asm+0x1a/0x30 [ 31.119195] [ 31.119682] The buggy address belongs to the object at ffff888101abdc80 [ 31.119682] which belongs to the cache kmalloc-64 of size 64 [ 31.120886] The buggy address is located 0 bytes to the right of [ 31.120886] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.122392] [ 31.122695] The buggy address belongs to the physical page: [ 31.123469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.124068] flags: 0x200000000000000(node=0|zone=2) [ 31.124538] page_type: f5(slab) [ 31.124870] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.125467] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.126027] page dumped because: kasan: bad access detected [ 31.126506] [ 31.126699] Memory state around the buggy address: [ 31.128037] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.128642] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.129731] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.130522] ^ [ 31.131149] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.131898] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.132632] ================================================================== [ 29.943767] ================================================================== [ 29.944334] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 29.944802] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.945203] [ 29.945508] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.946489] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.947067] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.948027] Call Trace: [ 29.948244] <TASK> [ 29.948443] dump_stack_lvl+0x73/0xb0 [ 29.948750] print_report+0xd1/0x640 [ 29.949159] ? __virt_addr_valid+0x1db/0x2d0 [ 29.949638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.950290] kasan_report+0x102/0x140 [ 29.950582] ? kasan_atomics_helper+0xb6b/0x5450 [ 29.950908] ? kasan_atomics_helper+0xb6b/0x5450 [ 29.951223] kasan_check_range+0x10c/0x1c0 [ 29.951520] __kasan_check_write+0x18/0x20 [ 29.951807] kasan_atomics_helper+0xb6b/0x5450 [ 29.952349] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.952878] ? ret_from_fork_asm+0x1a/0x30 [ 29.953457] ? ret_from_fork+0x41/0x80 [ 29.953940] kasan_atomics+0x1dd/0x310 [ 29.954377] ? __pfx_kasan_atomics+0x10/0x10 [ 29.954862] ? __pfx_read_tsc+0x10/0x10 [ 29.955323] ? ktime_get_ts64+0x84/0x230 [ 29.955790] kunit_try_run_case+0x1b3/0x490 [ 29.956297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.956806] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.957244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.957761] ? __kthread_parkme+0x82/0x160 [ 29.958147] ? preempt_count_sub+0x50/0x80 [ 29.958713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.959128] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.959899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.960238] kthread+0x257/0x310 [ 29.960665] ? __pfx_kthread+0x10/0x10 [ 29.961108] ret_from_fork+0x41/0x80 [ 29.961496] ? __pfx_kthread+0x10/0x10 [ 29.962025] ret_from_fork_asm+0x1a/0x30 [ 29.962470] </TASK> [ 29.962662] [ 29.962815] Allocated by task 273: [ 29.963072] kasan_save_stack+0x3d/0x60 [ 29.963343] kasan_save_track+0x18/0x40 [ 29.963605] kasan_save_alloc_info+0x3b/0x50 [ 29.963941] __kasan_kmalloc+0xb7/0xc0 [ 29.964364] __kmalloc_cache_noprof+0x184/0x410 [ 29.964850] kasan_atomics+0x96/0x310 [ 29.965260] kunit_try_run_case+0x1b3/0x490 [ 29.965785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.966342] kthread+0x257/0x310 [ 29.966717] ret_from_fork+0x41/0x80 [ 29.967106] ret_from_fork_asm+0x1a/0x30 [ 29.967669] [ 29.967896] The buggy address belongs to the object at ffff888101abdc80 [ 29.967896] which belongs to the cache kmalloc-64 of size 64 [ 29.968758] The buggy address is located 0 bytes to the right of [ 29.968758] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.969938] [ 29.970108] The buggy address belongs to the physical page: [ 29.970603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.971211] flags: 0x200000000000000(node=0|zone=2) [ 29.971693] page_type: f5(slab) [ 29.972089] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.972984] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.973563] page dumped because: kasan: bad access detected [ 29.974099] [ 29.974308] Memory state around the buggy address: [ 29.974597] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.974991] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.975357] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.975712] ^ [ 29.976159] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.976790] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.977671] ================================================================== [ 30.942806] ================================================================== [ 30.943645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 30.944290] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.946234] [ 30.946507] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.947579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.947979] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.949050] Call Trace: [ 30.949682] <TASK> [ 30.949873] dump_stack_lvl+0x73/0xb0 [ 30.950343] print_report+0xd1/0x640 [ 30.951210] ? __virt_addr_valid+0x1db/0x2d0 [ 30.951668] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.952580] kasan_report+0x102/0x140 [ 30.952964] ? kasan_atomics_helper+0x16e8/0x5450 [ 30.953632] ? kasan_atomics_helper+0x16e8/0x5450 [ 30.953977] kasan_check_range+0x10c/0x1c0 [ 30.954784] __kasan_check_write+0x18/0x20 [ 30.955414] kasan_atomics_helper+0x16e8/0x5450 [ 30.955874] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.956336] ? ret_from_fork_asm+0x1a/0x30 [ 30.956732] ? ret_from_fork+0x41/0x80 [ 30.957605] kasan_atomics+0x1dd/0x310 [ 30.958031] ? __pfx_kasan_atomics+0x10/0x10 [ 30.958764] ? __pfx_read_tsc+0x10/0x10 [ 30.959187] ? ktime_get_ts64+0x84/0x230 [ 30.959928] kunit_try_run_case+0x1b3/0x490 [ 30.960570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.961081] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.961861] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.962586] ? __kthread_parkme+0x82/0x160 [ 30.962979] ? preempt_count_sub+0x50/0x80 [ 30.963732] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.964198] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.965090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.965762] kthread+0x257/0x310 [ 30.966215] ? __pfx_kthread+0x10/0x10 [ 30.966605] ret_from_fork+0x41/0x80 [ 30.967376] ? __pfx_kthread+0x10/0x10 [ 30.967805] ret_from_fork_asm+0x1a/0x30 [ 30.968563] </TASK> [ 30.968792] [ 30.969069] Allocated by task 273: [ 30.969865] kasan_save_stack+0x3d/0x60 [ 30.970266] kasan_save_track+0x18/0x40 [ 30.970893] kasan_save_alloc_info+0x3b/0x50 [ 30.971674] __kasan_kmalloc+0xb7/0xc0 [ 30.972101] __kmalloc_cache_noprof+0x184/0x410 [ 30.972833] kasan_atomics+0x96/0x310 [ 30.973224] kunit_try_run_case+0x1b3/0x490 [ 30.973773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.974164] kthread+0x257/0x310 [ 30.974574] ret_from_fork+0x41/0x80 [ 30.974964] ret_from_fork_asm+0x1a/0x30 [ 30.975330] [ 30.975547] The buggy address belongs to the object at ffff888101abdc80 [ 30.975547] which belongs to the cache kmalloc-64 of size 64 [ 30.977201] The buggy address is located 0 bytes to the right of [ 30.977201] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.978704] [ 30.979362] The buggy address belongs to the physical page: [ 30.979675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.981003] flags: 0x200000000000000(node=0|zone=2) [ 30.981386] page_type: f5(slab) [ 30.981773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.982812] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.983352] page dumped because: kasan: bad access detected [ 30.984191] [ 30.984364] Memory state around the buggy address: [ 30.985104] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.986133] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.986886] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.987875] ^ [ 30.988588] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.989282] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.990136] ================================================================== [ 31.352169] ================================================================== [ 31.352928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 31.353923] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.354589] [ 31.354885] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.355675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.355920] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.356644] Call Trace: [ 31.357013] <TASK> [ 31.357346] dump_stack_lvl+0x73/0xb0 [ 31.357872] print_report+0xd1/0x640 [ 31.358364] ? __virt_addr_valid+0x1db/0x2d0 [ 31.359020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.359419] kasan_report+0x102/0x140 [ 31.359691] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.360181] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.360740] __asan_report_load8_noabort+0x18/0x20 [ 31.361285] kasan_atomics_helper+0x4f32/0x5450 [ 31.361752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.362297] ? ret_from_fork_asm+0x1a/0x30 [ 31.362595] ? ret_from_fork+0x41/0x80 [ 31.362920] kasan_atomics+0x1dd/0x310 [ 31.363396] ? __pfx_kasan_atomics+0x10/0x10 [ 31.363944] ? __pfx_read_tsc+0x10/0x10 [ 31.364464] ? ktime_get_ts64+0x84/0x230 [ 31.364927] kunit_try_run_case+0x1b3/0x490 [ 31.365495] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.365880] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.366212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.366586] ? __kthread_parkme+0x82/0x160 [ 31.366902] ? preempt_count_sub+0x50/0x80 [ 31.367423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.367961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.368592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.369195] kthread+0x257/0x310 [ 31.369628] ? __pfx_kthread+0x10/0x10 [ 31.370140] ret_from_fork+0x41/0x80 [ 31.370594] ? __pfx_kthread+0x10/0x10 [ 31.371051] ret_from_fork_asm+0x1a/0x30 [ 31.371479] </TASK> [ 31.371673] [ 31.371842] Allocated by task 273: [ 31.372206] kasan_save_stack+0x3d/0x60 [ 31.372721] kasan_save_track+0x18/0x40 [ 31.373186] kasan_save_alloc_info+0x3b/0x50 [ 31.373693] __kasan_kmalloc+0xb7/0xc0 [ 31.374436] __kmalloc_cache_noprof+0x184/0x410 [ 31.375251] kasan_atomics+0x96/0x310 [ 31.375603] kunit_try_run_case+0x1b3/0x490 [ 31.376067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.376508] kthread+0x257/0x310 [ 31.379030] ret_from_fork+0x41/0x80 [ 31.380130] ret_from_fork_asm+0x1a/0x30 [ 31.381140] [ 31.381757] The buggy address belongs to the object at ffff888101abdc80 [ 31.381757] which belongs to the cache kmalloc-64 of size 64 [ 31.383677] The buggy address is located 0 bytes to the right of [ 31.383677] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.384402] [ 31.384632] The buggy address belongs to the physical page: [ 31.385107] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.386494] flags: 0x200000000000000(node=0|zone=2) [ 31.386905] page_type: f5(slab) [ 31.387262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.388177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.388903] page dumped because: kasan: bad access detected [ 31.389560] [ 31.389785] Memory state around the buggy address: [ 31.390631] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.391240] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.391929] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.392527] ^ [ 31.393444] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.393854] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.394810] ================================================================== [ 29.407563] ================================================================== [ 29.407975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 29.408579] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.409371] [ 29.409669] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.410792] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.411172] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.412120] Call Trace: [ 29.412637] <TASK> [ 29.413331] dump_stack_lvl+0x73/0xb0 [ 29.413984] print_report+0xd1/0x640 [ 29.414512] ? __virt_addr_valid+0x1db/0x2d0 [ 29.415166] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.415893] kasan_report+0x102/0x140 [ 29.416451] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.417156] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.417898] __asan_report_load4_noabort+0x18/0x20 [ 29.418662] kasan_atomics_helper+0x4b56/0x5450 [ 29.419011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.419733] ? ret_from_fork_asm+0x1a/0x30 [ 29.420296] ? ret_from_fork+0x41/0x80 [ 29.420857] kasan_atomics+0x1dd/0x310 [ 29.421401] ? __pfx_kasan_atomics+0x10/0x10 [ 29.421962] ? __pfx_read_tsc+0x10/0x10 [ 29.422466] ? ktime_get_ts64+0x84/0x230 [ 29.423095] kunit_try_run_case+0x1b3/0x490 [ 29.423572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.424015] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.424344] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.424791] ? __kthread_parkme+0x82/0x160 [ 29.425248] ? preempt_count_sub+0x50/0x80 [ 29.425566] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.426099] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.426801] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.427253] kthread+0x257/0x310 [ 29.427689] ? __pfx_kthread+0x10/0x10 [ 29.428123] ret_from_fork+0x41/0x80 [ 29.428693] ? __pfx_kthread+0x10/0x10 [ 29.429001] ret_from_fork_asm+0x1a/0x30 [ 29.429514] </TASK> [ 29.429855] [ 29.430107] Allocated by task 273: [ 29.430337] kasan_save_stack+0x3d/0x60 [ 29.430817] kasan_save_track+0x18/0x40 [ 29.431441] kasan_save_alloc_info+0x3b/0x50 [ 29.431797] __kasan_kmalloc+0xb7/0xc0 [ 29.432086] __kmalloc_cache_noprof+0x184/0x410 [ 29.432442] kasan_atomics+0x96/0x310 [ 29.432884] kunit_try_run_case+0x1b3/0x490 [ 29.433463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.434015] kthread+0x257/0x310 [ 29.434416] ret_from_fork+0x41/0x80 [ 29.434866] ret_from_fork_asm+0x1a/0x30 [ 29.435317] [ 29.435502] The buggy address belongs to the object at ffff888101abdc80 [ 29.435502] which belongs to the cache kmalloc-64 of size 64 [ 29.436080] The buggy address is located 0 bytes to the right of [ 29.436080] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.436842] [ 29.437071] The buggy address belongs to the physical page: [ 29.437749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.438577] flags: 0x200000000000000(node=0|zone=2) [ 29.438912] page_type: f5(slab) [ 29.439154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.439938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.440792] page dumped because: kasan: bad access detected [ 29.441242] [ 29.441461] Memory state around the buggy address: [ 29.441789] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.442379] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.442850] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.443407] ^ [ 29.443908] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.444643] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.445050] ================================================================== [ 30.321578] ================================================================== [ 30.322309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 30.323540] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.324004] [ 30.324290] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.325639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.326262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.326937] Call Trace: [ 30.327174] <TASK> [ 30.328331] dump_stack_lvl+0x73/0xb0 [ 30.328697] print_report+0xd1/0x640 [ 30.329275] ? __virt_addr_valid+0x1db/0x2d0 [ 30.329705] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.330483] kasan_report+0x102/0x140 [ 30.330872] ? kasan_atomics_helper+0x107a/0x5450 [ 30.331290] ? kasan_atomics_helper+0x107a/0x5450 [ 30.331698] kasan_check_range+0x10c/0x1c0 [ 30.332635] __kasan_check_write+0x18/0x20 [ 30.333180] kasan_atomics_helper+0x107a/0x5450 [ 30.333930] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.334314] ? ret_from_fork_asm+0x1a/0x30 [ 30.335008] ? ret_from_fork+0x41/0x80 [ 30.335654] kasan_atomics+0x1dd/0x310 [ 30.336260] ? __pfx_kasan_atomics+0x10/0x10 [ 30.336698] ? __pfx_read_tsc+0x10/0x10 [ 30.337077] ? ktime_get_ts64+0x84/0x230 [ 30.337482] kunit_try_run_case+0x1b3/0x490 [ 30.338467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.338921] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.339532] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.340142] ? __kthread_parkme+0x82/0x160 [ 30.340761] ? preempt_count_sub+0x50/0x80 [ 30.341114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.341855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.342589] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.343324] kthread+0x257/0x310 [ 30.343603] ? __pfx_kthread+0x10/0x10 [ 30.344047] ret_from_fork+0x41/0x80 [ 30.344400] ? __pfx_kthread+0x10/0x10 [ 30.344845] ret_from_fork_asm+0x1a/0x30 [ 30.345178] </TASK> [ 30.345505] [ 30.345717] Allocated by task 273: [ 30.345983] kasan_save_stack+0x3d/0x60 [ 30.346389] kasan_save_track+0x18/0x40 [ 30.346814] kasan_save_alloc_info+0x3b/0x50 [ 30.347169] __kasan_kmalloc+0xb7/0xc0 [ 30.347436] __kmalloc_cache_noprof+0x184/0x410 [ 30.347909] kasan_atomics+0x96/0x310 [ 30.348383] kunit_try_run_case+0x1b3/0x490 [ 30.348804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.349418] kthread+0x257/0x310 [ 30.349701] ret_from_fork+0x41/0x80 [ 30.350059] ret_from_fork_asm+0x1a/0x30 [ 30.350334] [ 30.350494] The buggy address belongs to the object at ffff888101abdc80 [ 30.350494] which belongs to the cache kmalloc-64 of size 64 [ 30.351606] The buggy address is located 0 bytes to the right of [ 30.351606] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.352329] [ 30.352497] The buggy address belongs to the physical page: [ 30.352794] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.353526] flags: 0x200000000000000(node=0|zone=2) [ 30.354030] page_type: f5(slab) [ 30.354430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.355124] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.355577] page dumped because: kasan: bad access detected [ 30.355903] [ 30.356052] Memory state around the buggy address: [ 30.356584] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.357219] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.357852] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.358335] ^ [ 30.358745] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.359479] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.359864] ================================================================== [ 29.277934] ================================================================== [ 29.278306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 29.278703] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.279414] [ 29.279660] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.280673] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.281099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.281963] Call Trace: [ 29.282299] <TASK> [ 29.282648] dump_stack_lvl+0x73/0xb0 [ 29.283054] print_report+0xd1/0x640 [ 29.283533] ? __virt_addr_valid+0x1db/0x2d0 [ 29.284064] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.284460] kasan_report+0x102/0x140 [ 29.284735] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.285234] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.285966] __asan_report_load4_noabort+0x18/0x20 [ 29.286627] kasan_atomics_helper+0x4b8a/0x5450 [ 29.287198] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.287807] ? ret_from_fork_asm+0x1a/0x30 [ 29.288283] ? ret_from_fork+0x41/0x80 [ 29.288593] kasan_atomics+0x1dd/0x310 [ 29.289019] ? __pfx_kasan_atomics+0x10/0x10 [ 29.289696] ? __pfx_read_tsc+0x10/0x10 [ 29.290206] ? ktime_get_ts64+0x84/0x230 [ 29.290696] kunit_try_run_case+0x1b3/0x490 [ 29.291177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.291771] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.292325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.292890] ? __kthread_parkme+0x82/0x160 [ 29.293457] ? preempt_count_sub+0x50/0x80 [ 29.293920] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.294229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.294629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.295087] kthread+0x257/0x310 [ 29.295680] ? __pfx_kthread+0x10/0x10 [ 29.296216] ret_from_fork+0x41/0x80 [ 29.296789] ? __pfx_kthread+0x10/0x10 [ 29.297231] ret_from_fork_asm+0x1a/0x30 [ 29.297804] </TASK> [ 29.298171] [ 29.298442] Allocated by task 273: [ 29.298933] kasan_save_stack+0x3d/0x60 [ 29.299472] kasan_save_track+0x18/0x40 [ 29.299984] kasan_save_alloc_info+0x3b/0x50 [ 29.300545] __kasan_kmalloc+0xb7/0xc0 [ 29.300977] __kmalloc_cache_noprof+0x184/0x410 [ 29.301308] kasan_atomics+0x96/0x310 [ 29.301575] kunit_try_run_case+0x1b3/0x490 [ 29.301865] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.302528] kthread+0x257/0x310 [ 29.302974] ret_from_fork+0x41/0x80 [ 29.303401] ret_from_fork_asm+0x1a/0x30 [ 29.303911] [ 29.304200] The buggy address belongs to the object at ffff888101abdc80 [ 29.304200] which belongs to the cache kmalloc-64 of size 64 [ 29.305241] The buggy address is located 0 bytes to the right of [ 29.305241] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.306230] [ 29.306439] The buggy address belongs to the physical page: [ 29.306733] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.307622] flags: 0x200000000000000(node=0|zone=2) [ 29.308137] page_type: f5(slab) [ 29.308604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.309419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.310070] page dumped because: kasan: bad access detected [ 29.310640] [ 29.310882] Memory state around the buggy address: [ 29.311236] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.312024] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.312481] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.313199] ^ [ 29.315060] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315457] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315810] ================================================================== [ 31.561308] ================================================================== [ 31.562127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 31.562958] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.563352] [ 31.563539] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.564665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.565038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.565917] Call Trace: [ 31.566133] <TASK> [ 31.566423] dump_stack_lvl+0x73/0xb0 [ 31.566946] print_report+0xd1/0x640 [ 31.567394] ? __virt_addr_valid+0x1db/0x2d0 [ 31.567860] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.568208] kasan_report+0x102/0x140 [ 31.568482] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.569073] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.569675] kasan_check_range+0x10c/0x1c0 [ 31.570189] __kasan_check_write+0x18/0x20 [ 31.570636] kasan_atomics_helper+0x1f44/0x5450 [ 31.572329] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.572998] ? ret_from_fork_asm+0x1a/0x30 [ 31.573294] ? ret_from_fork+0x41/0x80 [ 31.573743] kasan_atomics+0x1dd/0x310 [ 31.574212] ? __pfx_kasan_atomics+0x10/0x10 [ 31.576009] ? __pfx_read_tsc+0x10/0x10 [ 31.576521] ? ktime_get_ts64+0x84/0x230 [ 31.577067] kunit_try_run_case+0x1b3/0x490 [ 31.577655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.578260] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.578896] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.579532] ? __kthread_parkme+0x82/0x160 [ 31.580069] ? preempt_count_sub+0x50/0x80 [ 31.580605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.580897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.581497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.582063] kthread+0x257/0x310 [ 31.582448] ? __pfx_kthread+0x10/0x10 [ 31.582741] ret_from_fork+0x41/0x80 [ 31.583223] ? __pfx_kthread+0x10/0x10 [ 31.583719] ret_from_fork_asm+0x1a/0x30 [ 31.584145] </TASK> [ 31.584488] [ 31.584690] Allocated by task 273: [ 31.585086] kasan_save_stack+0x3d/0x60 [ 31.585451] kasan_save_track+0x18/0x40 [ 31.585875] kasan_save_alloc_info+0x3b/0x50 [ 31.586434] __kasan_kmalloc+0xb7/0xc0 [ 31.586874] __kmalloc_cache_noprof+0x184/0x410 [ 31.587177] kasan_atomics+0x96/0x310 [ 31.587494] kunit_try_run_case+0x1b3/0x490 [ 31.587944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.588542] kthread+0x257/0x310 [ 31.588939] ret_from_fork+0x41/0x80 [ 31.589384] ret_from_fork_asm+0x1a/0x30 [ 31.589856] [ 31.590094] The buggy address belongs to the object at ffff888101abdc80 [ 31.590094] which belongs to the cache kmalloc-64 of size 64 [ 31.590709] The buggy address is located 0 bytes to the right of [ 31.590709] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.591866] [ 31.592101] The buggy address belongs to the physical page: [ 31.592582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.593172] flags: 0x200000000000000(node=0|zone=2) [ 31.593734] page_type: f5(slab) [ 31.594083] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.594533] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.595316] page dumped because: kasan: bad access detected [ 31.595847] [ 31.596068] Memory state around the buggy address: [ 31.596546] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.597075] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.597792] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.598314] ^ [ 31.598728] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.599519] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.600029] ================================================================== [ 31.682762] ================================================================== [ 31.683386] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 31.684031] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.684588] [ 31.684876] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.685558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.685838] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.686327] Call Trace: [ 31.686542] <TASK> [ 31.686740] dump_stack_lvl+0x73/0xb0 [ 31.687226] print_report+0xd1/0x640 [ 31.687696] ? __virt_addr_valid+0x1db/0x2d0 [ 31.688186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.688775] kasan_report+0x102/0x140 [ 31.689308] ? kasan_atomics_helper+0x4f9a/0x5450 [ 31.689809] ? kasan_atomics_helper+0x4f9a/0x5450 [ 31.690467] __asan_report_load8_noabort+0x18/0x20 [ 31.690939] kasan_atomics_helper+0x4f9a/0x5450 [ 31.691510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.691907] ? ret_from_fork_asm+0x1a/0x30 [ 31.692433] ? ret_from_fork+0x41/0x80 [ 31.692795] kasan_atomics+0x1dd/0x310 [ 31.693309] ? __pfx_kasan_atomics+0x10/0x10 [ 31.693625] ? __pfx_read_tsc+0x10/0x10 [ 31.693965] ? ktime_get_ts64+0x84/0x230 [ 31.694429] kunit_try_run_case+0x1b3/0x490 [ 31.694968] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.695501] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.696289] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.697034] ? __kthread_parkme+0x82/0x160 [ 31.699413] ? preempt_count_sub+0x50/0x80 [ 31.699857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.700361] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.700787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.702840] kthread+0x257/0x310 [ 31.704024] ? __pfx_kthread+0x10/0x10 [ 31.704314] ret_from_fork+0x41/0x80 [ 31.704580] ? __pfx_kthread+0x10/0x10 [ 31.704866] ret_from_fork_asm+0x1a/0x30 [ 31.705321] </TASK> [ 31.705597] [ 31.705806] Allocated by task 273: [ 31.706802] kasan_save_stack+0x3d/0x60 [ 31.707255] kasan_save_track+0x18/0x40 [ 31.707652] kasan_save_alloc_info+0x3b/0x50 [ 31.708120] __kasan_kmalloc+0xb7/0xc0 [ 31.708642] __kmalloc_cache_noprof+0x184/0x410 [ 31.710154] kasan_atomics+0x96/0x310 [ 31.710563] kunit_try_run_case+0x1b3/0x490 [ 31.711206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.711794] kthread+0x257/0x310 [ 31.712192] ret_from_fork+0x41/0x80 [ 31.712922] ret_from_fork_asm+0x1a/0x30 [ 31.713552] [ 31.713778] The buggy address belongs to the object at ffff888101abdc80 [ 31.713778] which belongs to the cache kmalloc-64 of size 64 [ 31.714690] The buggy address is located 0 bytes to the right of [ 31.714690] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.715865] [ 31.716199] The buggy address belongs to the physical page: [ 31.716739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.717459] flags: 0x200000000000000(node=0|zone=2) [ 31.717783] page_type: f5(slab) [ 31.718162] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.719192] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.720360] page dumped because: kasan: bad access detected [ 31.720966] [ 31.721124] Memory state around the buggy address: [ 31.721565] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.722420] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.722800] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.723549] ^ [ 31.724264] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.724863] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.725785] ================================================================== [ 31.435410] ================================================================== [ 31.435968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 31.436750] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.437395] [ 31.437670] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.438577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.439031] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.439740] Call Trace: [ 31.440065] <TASK> [ 31.440473] dump_stack_lvl+0x73/0xb0 [ 31.441011] print_report+0xd1/0x640 [ 31.441440] ? __virt_addr_valid+0x1db/0x2d0 [ 31.441967] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.442527] kasan_report+0x102/0x140 [ 31.442948] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.443597] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.444055] kasan_check_range+0x10c/0x1c0 [ 31.444565] __kasan_check_write+0x18/0x20 [ 31.445037] kasan_atomics_helper+0x1d7b/0x5450 [ 31.445591] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.446125] ? ret_from_fork_asm+0x1a/0x30 [ 31.446679] ? ret_from_fork+0x41/0x80 [ 31.447136] kasan_atomics+0x1dd/0x310 [ 31.447736] ? __pfx_kasan_atomics+0x10/0x10 [ 31.448075] ? __pfx_read_tsc+0x10/0x10 [ 31.448549] ? ktime_get_ts64+0x84/0x230 [ 31.449125] kunit_try_run_case+0x1b3/0x490 [ 31.449694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.450215] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.450585] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.450924] ? __kthread_parkme+0x82/0x160 [ 31.451536] ? preempt_count_sub+0x50/0x80 [ 31.452105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.452708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.453437] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.454020] kthread+0x257/0x310 [ 31.454392] ? __pfx_kthread+0x10/0x10 [ 31.454920] ret_from_fork+0x41/0x80 [ 31.455280] ? __pfx_kthread+0x10/0x10 [ 31.455706] ret_from_fork_asm+0x1a/0x30 [ 31.456104] </TASK> [ 31.456293] [ 31.456440] Allocated by task 273: [ 31.456665] kasan_save_stack+0x3d/0x60 [ 31.457161] kasan_save_track+0x18/0x40 [ 31.457631] kasan_save_alloc_info+0x3b/0x50 [ 31.458163] __kasan_kmalloc+0xb7/0xc0 [ 31.458707] __kmalloc_cache_noprof+0x184/0x410 [ 31.459235] kasan_atomics+0x96/0x310 [ 31.459768] kunit_try_run_case+0x1b3/0x490 [ 31.460227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.460594] kthread+0x257/0x310 [ 31.460854] ret_from_fork+0x41/0x80 [ 31.461370] ret_from_fork_asm+0x1a/0x30 [ 31.461954] [ 31.462188] The buggy address belongs to the object at ffff888101abdc80 [ 31.462188] which belongs to the cache kmalloc-64 of size 64 [ 31.463427] The buggy address is located 0 bytes to the right of [ 31.463427] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.464445] [ 31.464708] The buggy address belongs to the physical page: [ 31.465191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.465882] flags: 0x200000000000000(node=0|zone=2) [ 31.466424] page_type: f5(slab) [ 31.466896] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.467513] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.468140] page dumped because: kasan: bad access detected [ 31.468501] [ 31.468657] Memory state around the buggy address: [ 31.469158] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.470004] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.470755] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.471521] ^ [ 31.472004] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.472430] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.473157] ================================================================== [ 29.237731] ================================================================== [ 29.238952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 29.239600] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.240331] [ 29.240585] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.241235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.241721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.242432] Call Trace: [ 29.242697] <TASK> [ 29.242916] dump_stack_lvl+0x73/0xb0 [ 29.243430] print_report+0xd1/0x640 [ 29.243873] ? __virt_addr_valid+0x1db/0x2d0 [ 29.244414] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.244900] kasan_report+0x102/0x140 [ 29.245177] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.245748] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.246322] __asan_report_store4_noabort+0x1b/0x30 [ 29.246879] kasan_atomics_helper+0x4ba4/0x5450 [ 29.247363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.247733] ? ret_from_fork_asm+0x1a/0x30 [ 29.248196] ? ret_from_fork+0x41/0x80 [ 29.248587] kasan_atomics+0x1dd/0x310 [ 29.248993] ? __pfx_kasan_atomics+0x10/0x10 [ 29.249529] ? __pfx_read_tsc+0x10/0x10 [ 29.250011] ? ktime_get_ts64+0x84/0x230 [ 29.250498] kunit_try_run_case+0x1b3/0x490 [ 29.250945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.251523] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.252287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.252730] ? __kthread_parkme+0x82/0x160 [ 29.253328] ? preempt_count_sub+0x50/0x80 [ 29.253969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.254486] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.255291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.256011] kthread+0x257/0x310 [ 29.256301] ? __pfx_kthread+0x10/0x10 [ 29.256574] ret_from_fork+0x41/0x80 [ 29.256917] ? __pfx_kthread+0x10/0x10 [ 29.257467] ret_from_fork_asm+0x1a/0x30 [ 29.257963] </TASK> [ 29.258332] [ 29.258551] Allocated by task 273: [ 29.258980] kasan_save_stack+0x3d/0x60 [ 29.259515] kasan_save_track+0x18/0x40 [ 29.259959] kasan_save_alloc_info+0x3b/0x50 [ 29.260387] __kasan_kmalloc+0xb7/0xc0 [ 29.260799] __kmalloc_cache_noprof+0x184/0x410 [ 29.261143] kasan_atomics+0x96/0x310 [ 29.261660] kunit_try_run_case+0x1b3/0x490 [ 29.262200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.262730] kthread+0x257/0x310 [ 29.263290] ret_from_fork+0x41/0x80 [ 29.263613] ret_from_fork_asm+0x1a/0x30 [ 29.263907] [ 29.264200] The buggy address belongs to the object at ffff888101abdc80 [ 29.264200] which belongs to the cache kmalloc-64 of size 64 [ 29.265399] The buggy address is located 0 bytes to the right of [ 29.265399] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.266197] [ 29.266407] The buggy address belongs to the physical page: [ 29.266701] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.267626] flags: 0x200000000000000(node=0|zone=2) [ 29.268229] page_type: f5(slab) [ 29.268700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.269538] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.270123] page dumped because: kasan: bad access detected [ 29.270687] [ 29.270925] Memory state around the buggy address: [ 29.271428] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.272073] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.272642] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.273231] ^ [ 29.273782] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.274459] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.275042] ================================================================== [ 31.848772] ================================================================== [ 31.850977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 31.851453] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.851857] [ 31.852015] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.854067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.854864] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.856292] Call Trace: [ 31.856705] <TASK> [ 31.857197] dump_stack_lvl+0x73/0xb0 [ 31.857632] print_report+0xd1/0x640 [ 31.858002] ? __virt_addr_valid+0x1db/0x2d0 [ 31.859281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.859908] kasan_report+0x102/0x140 [ 31.860341] ? kasan_atomics_helper+0x4fa7/0x5450 [ 31.860755] ? kasan_atomics_helper+0x4fa7/0x5450 [ 31.861316] __asan_report_load8_noabort+0x18/0x20 [ 31.861839] kasan_atomics_helper+0x4fa7/0x5450 [ 31.862660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.863175] ? ret_from_fork_asm+0x1a/0x30 [ 31.864125] ? ret_from_fork+0x41/0x80 [ 31.864497] kasan_atomics+0x1dd/0x310 [ 31.864890] ? __pfx_kasan_atomics+0x10/0x10 [ 31.865764] ? __pfx_read_tsc+0x10/0x10 [ 31.866359] ? ktime_get_ts64+0x84/0x230 [ 31.866804] kunit_try_run_case+0x1b3/0x490 [ 31.867161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.867690] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.868068] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.868630] ? __kthread_parkme+0x82/0x160 [ 31.869027] ? preempt_count_sub+0x50/0x80 [ 31.869575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.870175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.870791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.871256] kthread+0x257/0x310 [ 31.871615] ? __pfx_kthread+0x10/0x10 [ 31.872311] ret_from_fork+0x41/0x80 [ 31.873325] ? __pfx_kthread+0x10/0x10 [ 31.873894] ret_from_fork_asm+0x1a/0x30 [ 31.874632] </TASK> [ 31.874916] [ 31.875140] Allocated by task 273: [ 31.875463] kasan_save_stack+0x3d/0x60 [ 31.875914] kasan_save_track+0x18/0x40 [ 31.876958] kasan_save_alloc_info+0x3b/0x50 [ 31.877234] __kasan_kmalloc+0xb7/0xc0 [ 31.877730] __kmalloc_cache_noprof+0x184/0x410 [ 31.878805] kasan_atomics+0x96/0x310 [ 31.879219] kunit_try_run_case+0x1b3/0x490 [ 31.879709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.880520] kthread+0x257/0x310 [ 31.880940] ret_from_fork+0x41/0x80 [ 31.881675] ret_from_fork_asm+0x1a/0x30 [ 31.881960] [ 31.882174] The buggy address belongs to the object at ffff888101abdc80 [ 31.882174] which belongs to the cache kmalloc-64 of size 64 [ 31.883368] The buggy address is located 0 bytes to the right of [ 31.883368] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.885077] [ 31.885587] The buggy address belongs to the physical page: [ 31.885986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.886874] flags: 0x200000000000000(node=0|zone=2) [ 31.887378] page_type: f5(slab) [ 31.888109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.888567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.889268] page dumped because: kasan: bad access detected [ 31.890059] [ 31.890305] Memory state around the buggy address: [ 31.890974] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.891980] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.892661] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.893365] ^ [ 31.893848] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.894709] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.895242] ================================================================== [ 29.697072] ================================================================== [ 29.698304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 29.698739] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.699448] [ 29.699688] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.700739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.701019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.701760] Call Trace: [ 29.702194] <TASK> [ 29.702512] dump_stack_lvl+0x73/0xb0 [ 29.702935] print_report+0xd1/0x640 [ 29.703218] ? __virt_addr_valid+0x1db/0x2d0 [ 29.703707] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.704331] kasan_report+0x102/0x140 [ 29.704703] ? kasan_atomics_helper+0x7c8/0x5450 [ 29.705118] ? kasan_atomics_helper+0x7c8/0x5450 [ 29.705444] kasan_check_range+0x10c/0x1c0 [ 29.705965] __kasan_check_write+0x18/0x20 [ 29.706468] kasan_atomics_helper+0x7c8/0x5450 [ 29.706990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.707441] ? ret_from_fork_asm+0x1a/0x30 [ 29.708027] ? ret_from_fork+0x41/0x80 [ 29.708461] kasan_atomics+0x1dd/0x310 [ 29.708845] ? __pfx_kasan_atomics+0x10/0x10 [ 29.709378] ? __pfx_read_tsc+0x10/0x10 [ 29.709689] ? ktime_get_ts64+0x84/0x230 [ 29.710018] kunit_try_run_case+0x1b3/0x490 [ 29.710381] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.710904] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.711416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.711948] ? __kthread_parkme+0x82/0x160 [ 29.712414] ? preempt_count_sub+0x50/0x80 [ 29.712708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.713226] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.714055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.714754] kthread+0x257/0x310 [ 29.715167] ? __pfx_kthread+0x10/0x10 [ 29.715613] ret_from_fork+0x41/0x80 [ 29.715916] ? __pfx_kthread+0x10/0x10 [ 29.716188] ret_from_fork_asm+0x1a/0x30 [ 29.716644] </TASK> [ 29.716948] [ 29.717203] Allocated by task 273: [ 29.717698] kasan_save_stack+0x3d/0x60 [ 29.718145] kasan_save_track+0x18/0x40 [ 29.718582] kasan_save_alloc_info+0x3b/0x50 [ 29.719048] __kasan_kmalloc+0xb7/0xc0 [ 29.719518] __kmalloc_cache_noprof+0x184/0x410 [ 29.719867] kasan_atomics+0x96/0x310 [ 29.720309] kunit_try_run_case+0x1b3/0x490 [ 29.720651] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.721110] kthread+0x257/0x310 [ 29.721639] ret_from_fork+0x41/0x80 [ 29.721937] ret_from_fork_asm+0x1a/0x30 [ 29.722216] [ 29.722436] The buggy address belongs to the object at ffff888101abdc80 [ 29.722436] which belongs to the cache kmalloc-64 of size 64 [ 29.723688] The buggy address is located 0 bytes to the right of [ 29.723688] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.724454] [ 29.724614] The buggy address belongs to the physical page: [ 29.725142] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.725871] flags: 0x200000000000000(node=0|zone=2) [ 29.726182] page_type: f5(slab) [ 29.726426] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.726810] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.727556] page dumped because: kasan: bad access detected [ 29.728089] [ 29.728318] Memory state around the buggy address: [ 29.728786] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.729634] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.730236] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.730784] ^ [ 29.731095] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.731637] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.732361] ================================================================== [ 30.690973] ================================================================== [ 30.691610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 30.692561] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.693346] [ 30.693458] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.693750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.693983] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.694583] Call Trace: [ 30.694949] <TASK> [ 30.695252] dump_stack_lvl+0x73/0xb0 [ 30.695605] print_report+0xd1/0x640 [ 30.695988] ? __virt_addr_valid+0x1db/0x2d0 [ 30.696559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.696998] kasan_report+0x102/0x140 [ 30.697495] ? kasan_atomics_helper+0x4eb0/0x5450 [ 30.697933] ? kasan_atomics_helper+0x4eb0/0x5450 [ 30.698498] __asan_report_load8_noabort+0x18/0x20 [ 30.699008] kasan_atomics_helper+0x4eb0/0x5450 [ 30.699551] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.700047] ? ret_from_fork_asm+0x1a/0x30 [ 30.700421] ? ret_from_fork+0x41/0x80 [ 30.700898] kasan_atomics+0x1dd/0x310 [ 30.701328] ? __pfx_kasan_atomics+0x10/0x10 [ 30.701752] ? __pfx_read_tsc+0x10/0x10 [ 30.702064] ? ktime_get_ts64+0x84/0x230 [ 30.702440] kunit_try_run_case+0x1b3/0x490 [ 30.702962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.703514] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.704028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.704510] ? __kthread_parkme+0x82/0x160 [ 30.704802] ? preempt_count_sub+0x50/0x80 [ 30.705294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.705743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.706322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.706887] kthread+0x257/0x310 [ 30.707185] ? __pfx_kthread+0x10/0x10 [ 30.707669] ret_from_fork+0x41/0x80 [ 30.708089] ? __pfx_kthread+0x10/0x10 [ 30.708471] ret_from_fork_asm+0x1a/0x30 [ 30.709031] </TASK> [ 30.709311] [ 30.709542] Allocated by task 273: [ 30.709785] kasan_save_stack+0x3d/0x60 [ 30.710246] kasan_save_track+0x18/0x40 [ 30.710679] kasan_save_alloc_info+0x3b/0x50 [ 30.711072] __kasan_kmalloc+0xb7/0xc0 [ 30.711383] __kmalloc_cache_noprof+0x184/0x410 [ 30.712115] kasan_atomics+0x96/0x310 [ 30.712585] kunit_try_run_case+0x1b3/0x490 [ 30.712895] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.713215] kthread+0x257/0x310 [ 30.713575] ret_from_fork+0x41/0x80 [ 30.716292] ret_from_fork_asm+0x1a/0x30 [ 30.717565] [ 30.717867] The buggy address belongs to the object at ffff888101abdc80 [ 30.717867] which belongs to the cache kmalloc-64 of size 64 [ 30.719198] The buggy address is located 0 bytes to the right of [ 30.719198] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.720515] [ 30.720807] The buggy address belongs to the physical page: [ 30.721452] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.722339] flags: 0x200000000000000(node=0|zone=2) [ 30.722727] page_type: f5(slab) [ 30.723182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.724288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.724522] page dumped because: kasan: bad access detected [ 30.724691] [ 30.724770] Memory state around the buggy address: [ 30.725032] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.725720] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.727201] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.727886] ^ [ 30.728238] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.728674] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.729379] ================================================================== [ 31.601628] ================================================================== [ 31.602343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 31.604148] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.604619] [ 31.604806] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.605520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.606461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.608066] Call Trace: [ 31.608752] <TASK> [ 31.609055] dump_stack_lvl+0x73/0xb0 [ 31.609533] print_report+0xd1/0x640 [ 31.610071] ? __virt_addr_valid+0x1db/0x2d0 [ 31.610591] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.611233] kasan_report+0x102/0x140 [ 31.611770] ? kasan_atomics_helper+0x4f73/0x5450 [ 31.612166] ? kasan_atomics_helper+0x4f73/0x5450 [ 31.612803] __asan_report_load8_noabort+0x18/0x20 [ 31.613529] kasan_atomics_helper+0x4f73/0x5450 [ 31.613918] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.614354] ? ret_from_fork_asm+0x1a/0x30 [ 31.614726] ? ret_from_fork+0x41/0x80 [ 31.615174] kasan_atomics+0x1dd/0x310 [ 31.615568] ? __pfx_kasan_atomics+0x10/0x10 [ 31.616677] ? __pfx_read_tsc+0x10/0x10 [ 31.617319] ? ktime_get_ts64+0x84/0x230 [ 31.617962] kunit_try_run_case+0x1b3/0x490 [ 31.618613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.619052] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.619560] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.620216] ? __kthread_parkme+0x82/0x160 [ 31.621136] ? preempt_count_sub+0x50/0x80 [ 31.621771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.622728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.623195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.623929] kthread+0x257/0x310 [ 31.624553] ? __pfx_kthread+0x10/0x10 [ 31.625249] ret_from_fork+0x41/0x80 [ 31.625739] ? __pfx_kthread+0x10/0x10 [ 31.626191] ret_from_fork_asm+0x1a/0x30 [ 31.626614] </TASK> [ 31.626920] [ 31.627142] Allocated by task 273: [ 31.627466] kasan_save_stack+0x3d/0x60 [ 31.627850] kasan_save_track+0x18/0x40 [ 31.628269] kasan_save_alloc_info+0x3b/0x50 [ 31.629240] __kasan_kmalloc+0xb7/0xc0 [ 31.629584] __kmalloc_cache_noprof+0x184/0x410 [ 31.629909] kasan_atomics+0x96/0x310 [ 31.630174] kunit_try_run_case+0x1b3/0x490 [ 31.631099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.631792] kthread+0x257/0x310 [ 31.632305] ret_from_fork+0x41/0x80 [ 31.632887] ret_from_fork_asm+0x1a/0x30 [ 31.633449] [ 31.633685] The buggy address belongs to the object at ffff888101abdc80 [ 31.633685] which belongs to the cache kmalloc-64 of size 64 [ 31.634976] The buggy address is located 0 bytes to the right of [ 31.634976] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.636306] [ 31.636609] The buggy address belongs to the physical page: [ 31.637208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.638085] flags: 0x200000000000000(node=0|zone=2) [ 31.638515] page_type: f5(slab) [ 31.638849] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.639639] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.640278] page dumped because: kasan: bad access detected [ 31.640848] [ 31.641034] Memory state around the buggy address: [ 31.641381] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.642105] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.642588] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.643304] ^ [ 31.643681] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.644183] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.644854] ================================================================== [ 31.896379] ================================================================== [ 31.898351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 31.898986] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.900149] [ 31.900922] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.902109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.902777] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.903457] Call Trace: [ 31.903694] <TASK> [ 31.904254] dump_stack_lvl+0x73/0xb0 [ 31.904668] print_report+0xd1/0x640 [ 31.905036] ? __virt_addr_valid+0x1db/0x2d0 [ 31.905898] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.906631] kasan_report+0x102/0x140 [ 31.907032] ? kasan_atomics_helper+0x224d/0x5450 [ 31.907799] ? kasan_atomics_helper+0x224d/0x5450 [ 31.908275] kasan_check_range+0x10c/0x1c0 [ 31.909062] __kasan_check_write+0x18/0x20 [ 31.909661] kasan_atomics_helper+0x224d/0x5450 [ 31.910134] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.910904] ? ret_from_fork_asm+0x1a/0x30 [ 31.911328] ? ret_from_fork+0x41/0x80 [ 31.912151] kasan_atomics+0x1dd/0x310 [ 31.913025] ? __pfx_kasan_atomics+0x10/0x10 [ 31.913565] ? __pfx_read_tsc+0x10/0x10 [ 31.913925] ? ktime_get_ts64+0x84/0x230 [ 31.914315] kunit_try_run_case+0x1b3/0x490 [ 31.915091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.915892] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.916463] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.917033] ? __kthread_parkme+0x82/0x160 [ 31.917681] ? preempt_count_sub+0x50/0x80 [ 31.918152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.918455] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.919193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.919917] kthread+0x257/0x310 [ 31.920415] ? __pfx_kthread+0x10/0x10 [ 31.920869] ret_from_fork+0x41/0x80 [ 31.921070] ? __pfx_kthread+0x10/0x10 [ 31.921222] ret_from_fork_asm+0x1a/0x30 [ 31.921491] </TASK> [ 31.921769] [ 31.921988] Allocated by task 273: [ 31.922315] kasan_save_stack+0x3d/0x60 [ 31.922593] kasan_save_track+0x18/0x40 [ 31.923019] kasan_save_alloc_info+0x3b/0x50 [ 31.923534] __kasan_kmalloc+0xb7/0xc0 [ 31.923936] __kmalloc_cache_noprof+0x184/0x410 [ 31.924233] kasan_atomics+0x96/0x310 [ 31.924639] kunit_try_run_case+0x1b3/0x490 [ 31.925141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.925882] kthread+0x257/0x310 [ 31.926157] ret_from_fork+0x41/0x80 [ 31.926617] ret_from_fork_asm+0x1a/0x30 [ 31.926963] [ 31.927232] The buggy address belongs to the object at ffff888101abdc80 [ 31.927232] which belongs to the cache kmalloc-64 of size 64 [ 31.927883] The buggy address is located 0 bytes to the right of [ 31.927883] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.929134] [ 31.929405] The buggy address belongs to the physical page: [ 31.929775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.930496] flags: 0x200000000000000(node=0|zone=2) [ 31.931017] page_type: f5(slab) [ 31.931263] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.931654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.932052] page dumped because: kasan: bad access detected [ 31.932484] [ 31.932741] Memory state around the buggy address: [ 31.933259] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.934176] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.934784] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.935173] ^ [ 31.935724] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.936507] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.937127] ================================================================== [ 31.134789] ================================================================== [ 31.135721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 31.136552] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.137050] [ 31.137254] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.138962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.139886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.140655] Call Trace: [ 31.140925] <TASK> [ 31.141209] dump_stack_lvl+0x73/0xb0 [ 31.141811] print_report+0xd1/0x640 [ 31.142222] ? __virt_addr_valid+0x1db/0x2d0 [ 31.142530] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.143334] kasan_report+0x102/0x140 [ 31.143962] ? kasan_atomics_helper+0x194b/0x5450 [ 31.144447] ? kasan_atomics_helper+0x194b/0x5450 [ 31.144918] kasan_check_range+0x10c/0x1c0 [ 31.145504] __kasan_check_write+0x18/0x20 [ 31.146134] kasan_atomics_helper+0x194b/0x5450 [ 31.146761] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.147121] ? ret_from_fork_asm+0x1a/0x30 [ 31.147784] ? ret_from_fork+0x41/0x80 [ 31.148309] kasan_atomics+0x1dd/0x310 [ 31.148751] ? __pfx_kasan_atomics+0x10/0x10 [ 31.149282] ? __pfx_read_tsc+0x10/0x10 [ 31.149738] ? ktime_get_ts64+0x84/0x230 [ 31.150350] kunit_try_run_case+0x1b3/0x490 [ 31.150833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.151291] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.151788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.152373] ? __kthread_parkme+0x82/0x160 [ 31.152974] ? preempt_count_sub+0x50/0x80 [ 31.153287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.154165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.154719] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.155095] kthread+0x257/0x310 [ 31.155723] ? __pfx_kthread+0x10/0x10 [ 31.156286] ret_from_fork+0x41/0x80 [ 31.156919] ? __pfx_kthread+0x10/0x10 [ 31.157408] ret_from_fork_asm+0x1a/0x30 [ 31.157723] </TASK> [ 31.158071] [ 31.158319] Allocated by task 273: [ 31.159004] kasan_save_stack+0x3d/0x60 [ 31.159633] kasan_save_track+0x18/0x40 [ 31.160077] kasan_save_alloc_info+0x3b/0x50 [ 31.160423] __kasan_kmalloc+0xb7/0xc0 [ 31.160686] __kmalloc_cache_noprof+0x184/0x410 [ 31.161358] kasan_atomics+0x96/0x310 [ 31.162048] kunit_try_run_case+0x1b3/0x490 [ 31.162660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.163038] kthread+0x257/0x310 [ 31.163641] ret_from_fork+0x41/0x80 [ 31.164068] ret_from_fork_asm+0x1a/0x30 [ 31.164485] [ 31.164644] The buggy address belongs to the object at ffff888101abdc80 [ 31.164644] which belongs to the cache kmalloc-64 of size 64 [ 31.165860] The buggy address is located 0 bytes to the right of [ 31.165860] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.167192] [ 31.167357] The buggy address belongs to the physical page: [ 31.167723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.169000] flags: 0x200000000000000(node=0|zone=2) [ 31.169708] page_type: f5(slab) [ 31.170109] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.170989] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.171503] page dumped because: kasan: bad access detected [ 31.172037] [ 31.172221] Memory state around the buggy address: [ 31.173261] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.173644] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.174561] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.175655] ^ [ 31.175981] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.176878] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.177678] ================================================================== [ 29.820540] ================================================================== [ 29.821205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 29.821744] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.822410] [ 29.822602] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.823330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.823733] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.824599] Call Trace: [ 29.824877] <TASK> [ 29.825277] dump_stack_lvl+0x73/0xb0 [ 29.825696] print_report+0xd1/0x640 [ 29.826212] ? __virt_addr_valid+0x1db/0x2d0 [ 29.826744] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.827391] kasan_report+0x102/0x140 [ 29.827674] ? kasan_atomics_helper+0x993/0x5450 [ 29.828172] ? kasan_atomics_helper+0x993/0x5450 [ 29.828922] kasan_check_range+0x10c/0x1c0 [ 29.829561] __kasan_check_write+0x18/0x20 [ 29.830104] kasan_atomics_helper+0x993/0x5450 [ 29.830569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.831142] ? ret_from_fork_asm+0x1a/0x30 [ 29.831485] ? ret_from_fork+0x41/0x80 [ 29.831804] kasan_atomics+0x1dd/0x310 [ 29.832378] ? __pfx_kasan_atomics+0x10/0x10 [ 29.833045] ? __pfx_read_tsc+0x10/0x10 [ 29.833594] ? ktime_get_ts64+0x84/0x230 [ 29.834135] kunit_try_run_case+0x1b3/0x490 [ 29.834714] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.835123] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.835789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.836146] ? __kthread_parkme+0x82/0x160 [ 29.836478] ? preempt_count_sub+0x50/0x80 [ 29.836946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.837564] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.838336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.838963] kthread+0x257/0x310 [ 29.839240] ? __pfx_kthread+0x10/0x10 [ 29.839631] ret_from_fork+0x41/0x80 [ 29.839968] ? __pfx_kthread+0x10/0x10 [ 29.840492] ret_from_fork_asm+0x1a/0x30 [ 29.841049] </TASK> [ 29.841456] [ 29.841679] Allocated by task 273: [ 29.842065] kasan_save_stack+0x3d/0x60 [ 29.842597] kasan_save_track+0x18/0x40 [ 29.843108] kasan_save_alloc_info+0x3b/0x50 [ 29.843563] __kasan_kmalloc+0xb7/0xc0 [ 29.843851] __kmalloc_cache_noprof+0x184/0x410 [ 29.844299] kasan_atomics+0x96/0x310 [ 29.844798] kunit_try_run_case+0x1b3/0x490 [ 29.845435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.846087] kthread+0x257/0x310 [ 29.846491] ret_from_fork+0x41/0x80 [ 29.846756] ret_from_fork_asm+0x1a/0x30 [ 29.847213] [ 29.847478] The buggy address belongs to the object at ffff888101abdc80 [ 29.847478] which belongs to the cache kmalloc-64 of size 64 [ 29.849952] The buggy address is located 0 bytes to the right of [ 29.849952] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.851663] [ 29.851930] The buggy address belongs to the physical page: [ 29.852511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.853414] flags: 0x200000000000000(node=0|zone=2) [ 29.854169] page_type: f5(slab) [ 29.854717] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.855724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.856258] page dumped because: kasan: bad access detected [ 29.856661] [ 29.856851] Memory state around the buggy address: [ 29.857255] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.857955] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.858543] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.858970] ^ [ 29.859306] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.859981] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.860860] ================================================================== [ 29.364152] ================================================================== [ 29.364915] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 29.366265] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.366774] [ 29.366978] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.367951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.368249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.368994] Call Trace: [ 29.369351] <TASK> [ 29.369621] dump_stack_lvl+0x73/0xb0 [ 29.370074] print_report+0xd1/0x640 [ 29.370363] ? __virt_addr_valid+0x1db/0x2d0 [ 29.370899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.371241] kasan_report+0x102/0x140 [ 29.371662] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.372181] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.372560] kasan_check_range+0x10c/0x1c0 [ 29.372951] __kasan_check_read+0x15/0x20 [ 29.373420] kasan_atomics_helper+0x3e0/0x5450 [ 29.373769] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.374299] ? ret_from_fork_asm+0x1a/0x30 [ 29.374601] ? ret_from_fork+0x41/0x80 [ 29.375065] kasan_atomics+0x1dd/0x310 [ 29.375517] ? __pfx_kasan_atomics+0x10/0x10 [ 29.375811] ? __pfx_read_tsc+0x10/0x10 [ 29.377146] ? ktime_get_ts64+0x84/0x230 [ 29.378764] kunit_try_run_case+0x1b3/0x490 [ 29.379380] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.380178] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.380815] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.381308] ? __kthread_parkme+0x82/0x160 [ 29.381686] ? preempt_count_sub+0x50/0x80 [ 29.382159] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.382581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.383782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.384514] kthread+0x257/0x310 [ 29.385120] ? __pfx_kthread+0x10/0x10 [ 29.385811] ret_from_fork+0x41/0x80 [ 29.386454] ? __pfx_kthread+0x10/0x10 [ 29.387113] ret_from_fork_asm+0x1a/0x30 [ 29.387560] </TASK> [ 29.387862] [ 29.388343] Allocated by task 273: [ 29.388912] kasan_save_stack+0x3d/0x60 [ 29.389269] kasan_save_track+0x18/0x40 [ 29.390145] kasan_save_alloc_info+0x3b/0x50 [ 29.390773] __kasan_kmalloc+0xb7/0xc0 [ 29.391130] __kmalloc_cache_noprof+0x184/0x410 [ 29.391619] kasan_atomics+0x96/0x310 [ 29.392198] kunit_try_run_case+0x1b3/0x490 [ 29.392609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.393494] kthread+0x257/0x310 [ 29.393881] ret_from_fork+0x41/0x80 [ 29.394646] ret_from_fork_asm+0x1a/0x30 [ 29.395140] [ 29.395423] The buggy address belongs to the object at ffff888101abdc80 [ 29.395423] which belongs to the cache kmalloc-64 of size 64 [ 29.396194] The buggy address is located 0 bytes to the right of [ 29.396194] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.397796] [ 29.398052] The buggy address belongs to the physical page: [ 29.398739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.399807] flags: 0x200000000000000(node=0|zone=2) [ 29.400187] page_type: f5(slab) [ 29.400610] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.401577] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.402416] page dumped because: kasan: bad access detected [ 29.403048] [ 29.403270] Memory state around the buggy address: [ 29.403923] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.404487] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.405258] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.406228] ^ [ 29.406426] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.406635] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.406853] ================================================================== [ 29.776187] ================================================================== [ 29.776795] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 29.777513] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.778152] [ 29.778449] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.779124] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.779555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.780424] Call Trace: [ 29.780737] <TASK> [ 29.781038] dump_stack_lvl+0x73/0xb0 [ 29.781545] print_report+0xd1/0x640 [ 29.781958] ? __virt_addr_valid+0x1db/0x2d0 [ 29.782360] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.782919] kasan_report+0x102/0x140 [ 29.783428] ? kasan_atomics_helper+0x8fa/0x5450 [ 29.783759] ? kasan_atomics_helper+0x8fa/0x5450 [ 29.784103] kasan_check_range+0x10c/0x1c0 [ 29.784641] __kasan_check_write+0x18/0x20 [ 29.785118] kasan_atomics_helper+0x8fa/0x5450 [ 29.785675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.786206] ? ret_from_fork_asm+0x1a/0x30 [ 29.786699] ? ret_from_fork+0x41/0x80 [ 29.787194] kasan_atomics+0x1dd/0x310 [ 29.787640] ? __pfx_kasan_atomics+0x10/0x10 [ 29.787952] ? __pfx_read_tsc+0x10/0x10 [ 29.788314] ? ktime_get_ts64+0x84/0x230 [ 29.788677] kunit_try_run_case+0x1b3/0x490 [ 29.790158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.790522] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.790885] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.792609] ? __kthread_parkme+0x82/0x160 [ 29.793362] ? preempt_count_sub+0x50/0x80 [ 29.794214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.794663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.795202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.796228] kthread+0x257/0x310 [ 29.796887] ? __pfx_kthread+0x10/0x10 [ 29.797514] ret_from_fork+0x41/0x80 [ 29.797926] ? __pfx_kthread+0x10/0x10 [ 29.798335] ret_from_fork_asm+0x1a/0x30 [ 29.798768] </TASK> [ 29.799163] [ 29.799392] Allocated by task 273: [ 29.800010] kasan_save_stack+0x3d/0x60 [ 29.800517] kasan_save_track+0x18/0x40 [ 29.801107] kasan_save_alloc_info+0x3b/0x50 [ 29.801718] __kasan_kmalloc+0xb7/0xc0 [ 29.802266] __kmalloc_cache_noprof+0x184/0x410 [ 29.803025] kasan_atomics+0x96/0x310 [ 29.803581] kunit_try_run_case+0x1b3/0x490 [ 29.803889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.804423] kthread+0x257/0x310 [ 29.805551] ret_from_fork+0x41/0x80 [ 29.805916] ret_from_fork_asm+0x1a/0x30 [ 29.806209] [ 29.806816] The buggy address belongs to the object at ffff888101abdc80 [ 29.806816] which belongs to the cache kmalloc-64 of size 64 [ 29.807813] The buggy address is located 0 bytes to the right of [ 29.807813] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.809104] [ 29.809333] The buggy address belongs to the physical page: [ 29.810086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.811112] flags: 0x200000000000000(node=0|zone=2) [ 29.811795] page_type: f5(slab) [ 29.812219] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.813090] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.814104] page dumped because: kasan: bad access detected [ 29.814492] [ 29.814709] Memory state around the buggy address: [ 29.815434] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816294] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816907] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.817438] ^ [ 29.817915] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.818416] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.818912] ================================================================== [ 29.733872] ================================================================== [ 29.734797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 29.735560] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.736171] [ 29.736426] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.737095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.737355] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.737788] Call Trace: [ 29.738129] <TASK> [ 29.738418] dump_stack_lvl+0x73/0xb0 [ 29.738967] print_report+0xd1/0x640 [ 29.739432] ? __virt_addr_valid+0x1db/0x2d0 [ 29.739932] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.740568] kasan_report+0x102/0x140 [ 29.740993] ? kasan_atomics_helper+0x861/0x5450 [ 29.741531] ? kasan_atomics_helper+0x861/0x5450 [ 29.741939] kasan_check_range+0x10c/0x1c0 [ 29.742439] __kasan_check_write+0x18/0x20 [ 29.742849] kasan_atomics_helper+0x861/0x5450 [ 29.743163] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.743656] ? ret_from_fork_asm+0x1a/0x30 [ 29.744317] ? ret_from_fork+0x41/0x80 [ 29.744806] kasan_atomics+0x1dd/0x310 [ 29.745243] ? __pfx_kasan_atomics+0x10/0x10 [ 29.745647] ? __pfx_read_tsc+0x10/0x10 [ 29.746039] ? ktime_get_ts64+0x84/0x230 [ 29.746590] kunit_try_run_case+0x1b3/0x490 [ 29.747115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.747738] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.748184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.748725] ? __kthread_parkme+0x82/0x160 [ 29.749157] ? preempt_count_sub+0x50/0x80 [ 29.749461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.749761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.752546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.752914] kthread+0x257/0x310 [ 29.753175] ? __pfx_kthread+0x10/0x10 [ 29.753449] ret_from_fork+0x41/0x80 [ 29.753721] ? __pfx_kthread+0x10/0x10 [ 29.756436] ret_from_fork_asm+0x1a/0x30 [ 29.757807] </TASK> [ 29.758312] [ 29.758549] Allocated by task 273: [ 29.758929] kasan_save_stack+0x3d/0x60 [ 29.759412] kasan_save_track+0x18/0x40 [ 29.759816] kasan_save_alloc_info+0x3b/0x50 [ 29.760319] __kasan_kmalloc+0xb7/0xc0 [ 29.760740] __kmalloc_cache_noprof+0x184/0x410 [ 29.761060] kasan_atomics+0x96/0x310 [ 29.761556] kunit_try_run_case+0x1b3/0x490 [ 29.761959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.762541] kthread+0x257/0x310 [ 29.762862] ret_from_fork+0x41/0x80 [ 29.763426] ret_from_fork_asm+0x1a/0x30 [ 29.763861] [ 29.764112] The buggy address belongs to the object at ffff888101abdc80 [ 29.764112] which belongs to the cache kmalloc-64 of size 64 [ 29.765075] The buggy address is located 0 bytes to the right of [ 29.765075] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.765940] [ 29.766172] The buggy address belongs to the physical page: [ 29.766721] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.767351] flags: 0x200000000000000(node=0|zone=2) [ 29.767989] page_type: f5(slab) [ 29.768453] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.769119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.769790] page dumped because: kasan: bad access detected [ 29.770409] [ 29.770580] Memory state around the buggy address: [ 29.770879] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.771291] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.771958] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.772669] ^ [ 29.773158] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.773876] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.774410] ================================================================== [ 30.107721] ================================================================== [ 30.108345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 30.108756] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.109255] [ 30.109439] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.111001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.111772] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.112419] Call Trace: [ 30.113070] <TASK> [ 30.113318] dump_stack_lvl+0x73/0xb0 [ 30.114064] print_report+0xd1/0x640 [ 30.114610] ? __virt_addr_valid+0x1db/0x2d0 [ 30.115071] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.115866] kasan_report+0x102/0x140 [ 30.116222] ? kasan_atomics_helper+0xde1/0x5450 [ 30.117405] ? kasan_atomics_helper+0xde1/0x5450 [ 30.117779] kasan_check_range+0x10c/0x1c0 [ 30.118449] __kasan_check_write+0x18/0x20 [ 30.119174] kasan_atomics_helper+0xde1/0x5450 [ 30.120251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.120697] ? ret_from_fork_asm+0x1a/0x30 [ 30.121293] ? ret_from_fork+0x41/0x80 [ 30.122028] kasan_atomics+0x1dd/0x310 [ 30.122428] ? __pfx_kasan_atomics+0x10/0x10 [ 30.122808] ? __pfx_read_tsc+0x10/0x10 [ 30.123246] ? ktime_get_ts64+0x84/0x230 [ 30.123811] kunit_try_run_case+0x1b3/0x490 [ 30.124227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.124801] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.125198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.125526] ? __kthread_parkme+0x82/0x160 [ 30.126023] ? preempt_count_sub+0x50/0x80 [ 30.126806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.128001] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.128586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.129418] kthread+0x257/0x310 [ 30.129854] ? __pfx_kthread+0x10/0x10 [ 30.130646] ret_from_fork+0x41/0x80 [ 30.131108] ? __pfx_kthread+0x10/0x10 [ 30.131887] ret_from_fork_asm+0x1a/0x30 [ 30.132424] </TASK> [ 30.132653] [ 30.132889] Allocated by task 273: [ 30.133698] kasan_save_stack+0x3d/0x60 [ 30.134138] kasan_save_track+0x18/0x40 [ 30.134519] kasan_save_alloc_info+0x3b/0x50 [ 30.135316] __kasan_kmalloc+0xb7/0xc0 [ 30.135792] __kmalloc_cache_noprof+0x184/0x410 [ 30.136270] kasan_atomics+0x96/0x310 [ 30.137128] kunit_try_run_case+0x1b3/0x490 [ 30.137495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.138366] kthread+0x257/0x310 [ 30.138737] ret_from_fork+0x41/0x80 [ 30.139159] ret_from_fork_asm+0x1a/0x30 [ 30.140139] [ 30.140337] The buggy address belongs to the object at ffff888101abdc80 [ 30.140337] which belongs to the cache kmalloc-64 of size 64 [ 30.140975] The buggy address is located 0 bytes to the right of [ 30.140975] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.143351] [ 30.143550] The buggy address belongs to the physical page: [ 30.143884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.144942] flags: 0x200000000000000(node=0|zone=2) [ 30.145322] page_type: f5(slab) [ 30.146091] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.147042] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.147846] page dumped because: kasan: bad access detected [ 30.148481] [ 30.148657] Memory state around the buggy address: [ 30.149121] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.149913] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.150346] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.150663] ^ [ 30.150905] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.151121] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.151324] ================================================================== [ 30.193584] ================================================================== [ 30.194344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 30.195106] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.195779] [ 30.196077] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.196773] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.197064] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.197769] Call Trace: [ 30.198361] <TASK> [ 30.198612] dump_stack_lvl+0x73/0xb0 [ 30.200008] print_report+0xd1/0x640 [ 30.200386] ? __virt_addr_valid+0x1db/0x2d0 [ 30.202446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.203116] kasan_report+0x102/0x140 [ 30.203775] ? kasan_atomics_helper+0xf11/0x5450 [ 30.204538] ? kasan_atomics_helper+0xf11/0x5450 [ 30.204951] kasan_check_range+0x10c/0x1c0 [ 30.205548] __kasan_check_write+0x18/0x20 [ 30.206118] kasan_atomics_helper+0xf11/0x5450 [ 30.206599] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.207098] ? ret_from_fork_asm+0x1a/0x30 [ 30.207439] ? ret_from_fork+0x41/0x80 [ 30.207987] kasan_atomics+0x1dd/0x310 [ 30.208453] ? __pfx_kasan_atomics+0x10/0x10 [ 30.208814] ? __pfx_read_tsc+0x10/0x10 [ 30.209218] ? ktime_get_ts64+0x84/0x230 [ 30.209725] kunit_try_run_case+0x1b3/0x490 [ 30.210288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.210681] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.211287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.211812] ? __kthread_parkme+0x82/0x160 [ 30.212281] ? preempt_count_sub+0x50/0x80 [ 30.212771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.213308] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.213673] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.214344] kthread+0x257/0x310 [ 30.214743] ? __pfx_kthread+0x10/0x10 [ 30.215122] ret_from_fork+0x41/0x80 [ 30.215596] ? __pfx_kthread+0x10/0x10 [ 30.216035] ret_from_fork_asm+0x1a/0x30 [ 30.216545] </TASK> [ 30.216846] [ 30.217111] Allocated by task 273: [ 30.217462] kasan_save_stack+0x3d/0x60 [ 30.217942] kasan_save_track+0x18/0x40 [ 30.218346] kasan_save_alloc_info+0x3b/0x50 [ 30.218761] __kasan_kmalloc+0xb7/0xc0 [ 30.219220] __kmalloc_cache_noprof+0x184/0x410 [ 30.219591] kasan_atomics+0x96/0x310 [ 30.220019] kunit_try_run_case+0x1b3/0x490 [ 30.220389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.220711] kthread+0x257/0x310 [ 30.221151] ret_from_fork+0x41/0x80 [ 30.221595] ret_from_fork_asm+0x1a/0x30 [ 30.222099] [ 30.222408] The buggy address belongs to the object at ffff888101abdc80 [ 30.222408] which belongs to the cache kmalloc-64 of size 64 [ 30.223488] The buggy address is located 0 bytes to the right of [ 30.223488] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.224163] [ 30.224446] The buggy address belongs to the physical page: [ 30.224990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.225736] flags: 0x200000000000000(node=0|zone=2) [ 30.226225] page_type: f5(slab) [ 30.226514] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.226923] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.227338] page dumped because: kasan: bad access detected [ 30.227899] [ 30.228160] Memory state around the buggy address: [ 30.229640] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.230731] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.232185] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.232900] ^ [ 30.233444] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.234134] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.234682] ================================================================== [ 29.484059] ================================================================== [ 29.484505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 29.484956] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.485709] [ 29.486024] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.487193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.487473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.487930] Call Trace: [ 29.488139] <TASK> [ 29.488326] dump_stack_lvl+0x73/0xb0 [ 29.488803] print_report+0xd1/0x640 [ 29.489290] ? __virt_addr_valid+0x1db/0x2d0 [ 29.489917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.490609] kasan_report+0x102/0x140 [ 29.491056] ? kasan_atomics_helper+0x4b3c/0x5450 [ 29.491688] ? kasan_atomics_helper+0x4b3c/0x5450 [ 29.492200] __asan_report_store4_noabort+0x1b/0x30 [ 29.492702] kasan_atomics_helper+0x4b3c/0x5450 [ 29.493040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.493415] ? ret_from_fork_asm+0x1a/0x30 [ 29.494051] ? ret_from_fork+0x41/0x80 [ 29.494612] kasan_atomics+0x1dd/0x310 [ 29.495045] ? __pfx_kasan_atomics+0x10/0x10 [ 29.495440] ? __pfx_read_tsc+0x10/0x10 [ 29.495894] ? ktime_get_ts64+0x84/0x230 [ 29.496396] kunit_try_run_case+0x1b3/0x490 [ 29.496772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.497269] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.497742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.498171] ? __kthread_parkme+0x82/0x160 [ 29.498645] ? preempt_count_sub+0x50/0x80 [ 29.499021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.499341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.499695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.500366] kthread+0x257/0x310 [ 29.500789] ? __pfx_kthread+0x10/0x10 [ 29.501277] ret_from_fork+0x41/0x80 [ 29.501726] ? __pfx_kthread+0x10/0x10 [ 29.502108] ret_from_fork_asm+0x1a/0x30 [ 29.503007] </TASK> [ 29.503253] [ 29.503441] Allocated by task 273: [ 29.503752] kasan_save_stack+0x3d/0x60 [ 29.504134] kasan_save_track+0x18/0x40 [ 29.505005] kasan_save_alloc_info+0x3b/0x50 [ 29.505326] __kasan_kmalloc+0xb7/0xc0 [ 29.505592] __kmalloc_cache_noprof+0x184/0x410 [ 29.505915] kasan_atomics+0x96/0x310 [ 29.506180] kunit_try_run_case+0x1b3/0x490 [ 29.506460] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.506776] kthread+0x257/0x310 [ 29.509452] ret_from_fork+0x41/0x80 [ 29.509921] ret_from_fork_asm+0x1a/0x30 [ 29.510431] [ 29.510668] The buggy address belongs to the object at ffff888101abdc80 [ 29.510668] which belongs to the cache kmalloc-64 of size 64 [ 29.511997] The buggy address is located 0 bytes to the right of [ 29.511997] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.513285] [ 29.513539] The buggy address belongs to the physical page: [ 29.514156] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.515221] flags: 0x200000000000000(node=0|zone=2) [ 29.515794] page_type: f5(slab) [ 29.516213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.517014] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.517959] page dumped because: kasan: bad access detected [ 29.518621] [ 29.518888] Memory state around the buggy address: [ 29.519509] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.520351] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.521112] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.521895] ^ [ 29.522565] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.523317] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.523918] ================================================================== [ 30.514484] ================================================================== [ 30.515670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 30.517042] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.517759] [ 30.518087] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.519231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.519712] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.521807] Call Trace: [ 30.522063] <TASK> [ 30.522261] dump_stack_lvl+0x73/0xb0 [ 30.522571] print_report+0xd1/0x640 [ 30.523000] ? __virt_addr_valid+0x1db/0x2d0 [ 30.523951] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.525281] kasan_report+0x102/0x140 [ 30.525706] ? kasan_atomics_helper+0x49ea/0x5450 [ 30.526240] ? kasan_atomics_helper+0x49ea/0x5450 [ 30.526748] __asan_report_load4_noabort+0x18/0x20 [ 30.527392] kasan_atomics_helper+0x49ea/0x5450 [ 30.528047] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.529075] ? ret_from_fork_asm+0x1a/0x30 [ 30.529752] ? ret_from_fork+0x41/0x80 [ 30.530378] kasan_atomics+0x1dd/0x310 [ 30.530736] ? __pfx_kasan_atomics+0x10/0x10 [ 30.531217] ? __pfx_read_tsc+0x10/0x10 [ 30.532041] ? ktime_get_ts64+0x84/0x230 [ 30.532676] kunit_try_run_case+0x1b3/0x490 [ 30.533314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.533963] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.534949] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.535942] ? __kthread_parkme+0x82/0x160 [ 30.536310] ? preempt_count_sub+0x50/0x80 [ 30.537014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.537489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.537989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.538435] kthread+0x257/0x310 [ 30.538777] ? __pfx_kthread+0x10/0x10 [ 30.539391] ret_from_fork+0x41/0x80 [ 30.539852] ? __pfx_kthread+0x10/0x10 [ 30.540396] ret_from_fork_asm+0x1a/0x30 [ 30.540809] </TASK> [ 30.541195] [ 30.541502] Allocated by task 273: [ 30.541856] kasan_save_stack+0x3d/0x60 [ 30.542146] kasan_save_track+0x18/0x40 [ 30.542675] kasan_save_alloc_info+0x3b/0x50 [ 30.543295] __kasan_kmalloc+0xb7/0xc0 [ 30.543726] __kmalloc_cache_noprof+0x184/0x410 [ 30.544207] kasan_atomics+0x96/0x310 [ 30.544727] kunit_try_run_case+0x1b3/0x490 [ 30.545129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.545569] kthread+0x257/0x310 [ 30.546070] ret_from_fork+0x41/0x80 [ 30.546564] ret_from_fork_asm+0x1a/0x30 [ 30.547091] [ 30.547422] The buggy address belongs to the object at ffff888101abdc80 [ 30.547422] which belongs to the cache kmalloc-64 of size 64 [ 30.548288] The buggy address is located 0 bytes to the right of [ 30.548288] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.549329] [ 30.549539] The buggy address belongs to the physical page: [ 30.550147] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.550857] flags: 0x200000000000000(node=0|zone=2) [ 30.551397] page_type: f5(slab) [ 30.551753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.552558] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.553227] page dumped because: kasan: bad access detected [ 30.553737] [ 30.554018] Memory state around the buggy address: [ 30.554509] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.555194] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.555899] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.556626] ^ [ 30.557045] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.557782] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.558407] ================================================================== [ 29.979160] ================================================================== [ 29.980120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 29.981013] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.981836] [ 29.982092] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.983102] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.983601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.984275] Call Trace: [ 29.984495] <TASK> [ 29.984685] dump_stack_lvl+0x73/0xb0 [ 29.985046] print_report+0xd1/0x640 [ 29.985461] ? __virt_addr_valid+0x1db/0x2d0 [ 29.986017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.986779] kasan_report+0x102/0x140 [ 29.987244] ? kasan_atomics_helper+0xc71/0x5450 [ 29.987716] ? kasan_atomics_helper+0xc71/0x5450 [ 29.988120] kasan_check_range+0x10c/0x1c0 [ 29.988563] __kasan_check_write+0x18/0x20 [ 29.989029] kasan_atomics_helper+0xc71/0x5450 [ 29.989523] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.989961] ? ret_from_fork_asm+0x1a/0x30 [ 29.990252] ? ret_from_fork+0x41/0x80 [ 29.990557] kasan_atomics+0x1dd/0x310 [ 29.991024] ? __pfx_kasan_atomics+0x10/0x10 [ 29.991496] ? __pfx_read_tsc+0x10/0x10 [ 29.992039] ? ktime_get_ts64+0x84/0x230 [ 29.992748] kunit_try_run_case+0x1b3/0x490 [ 29.993233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.993712] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.994076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.994587] ? __kthread_parkme+0x82/0x160 [ 29.995089] ? preempt_count_sub+0x50/0x80 [ 29.995629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.995968] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.996353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.997097] kthread+0x257/0x310 [ 29.997605] ? __pfx_kthread+0x10/0x10 [ 29.998087] ret_from_fork+0x41/0x80 [ 29.998575] ? __pfx_kthread+0x10/0x10 [ 29.998925] ret_from_fork_asm+0x1a/0x30 [ 29.999236] </TASK> [ 29.999426] [ 29.999576] Allocated by task 273: [ 29.999797] kasan_save_stack+0x3d/0x60 [ 30.000241] kasan_save_track+0x18/0x40 [ 30.000652] kasan_save_alloc_info+0x3b/0x50 [ 30.001262] __kasan_kmalloc+0xb7/0xc0 [ 30.001730] __kmalloc_cache_noprof+0x184/0x410 [ 30.002246] kasan_atomics+0x96/0x310 [ 30.002680] kunit_try_run_case+0x1b3/0x490 [ 30.003147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.003904] kthread+0x257/0x310 [ 30.004285] ret_from_fork+0x41/0x80 [ 30.004723] ret_from_fork_asm+0x1a/0x30 [ 30.005063] [ 30.005221] The buggy address belongs to the object at ffff888101abdc80 [ 30.005221] which belongs to the cache kmalloc-64 of size 64 [ 30.006261] The buggy address is located 0 bytes to the right of [ 30.006261] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.007004] [ 30.007172] The buggy address belongs to the physical page: [ 30.007476] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.007901] flags: 0x200000000000000(node=0|zone=2) [ 30.008390] page_type: f5(slab) [ 30.008753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.009645] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.010265] page dumped because: kasan: bad access detected [ 30.010738] [ 30.010987] Memory state around the buggy address: [ 30.011463] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.011977] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.012578] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.013065] ^ [ 30.013667] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.014184] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.014752] ================================================================== [ 29.613655] ================================================================== [ 29.614299] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 29.615036] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.615747] [ 29.616015] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.616930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.617320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.618115] Call Trace: [ 29.618473] <TASK> [ 29.618755] dump_stack_lvl+0x73/0xb0 [ 29.619148] print_report+0xd1/0x640 [ 29.619750] ? __virt_addr_valid+0x1db/0x2d0 [ 29.620211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.620709] kasan_report+0x102/0x140 [ 29.621077] ? kasan_atomics_helper+0x698/0x5450 [ 29.621546] ? kasan_atomics_helper+0x698/0x5450 [ 29.623534] kasan_check_range+0x10c/0x1c0 [ 29.623921] __kasan_check_write+0x18/0x20 [ 29.624240] kasan_atomics_helper+0x698/0x5450 [ 29.624674] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.625283] ? ret_from_fork_asm+0x1a/0x30 [ 29.625696] ? ret_from_fork+0x41/0x80 [ 29.626031] kasan_atomics+0x1dd/0x310 [ 29.626429] ? __pfx_kasan_atomics+0x10/0x10 [ 29.626916] ? __pfx_read_tsc+0x10/0x10 [ 29.627223] ? ktime_get_ts64+0x84/0x230 [ 29.627709] kunit_try_run_case+0x1b3/0x490 [ 29.628081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.628523] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.629002] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.629572] ? __kthread_parkme+0x82/0x160 [ 29.629963] ? preempt_count_sub+0x50/0x80 [ 29.630459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.630770] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.631425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.631963] kthread+0x257/0x310 [ 29.632343] ? __pfx_kthread+0x10/0x10 [ 29.632628] ret_from_fork+0x41/0x80 [ 29.633040] ? __pfx_kthread+0x10/0x10 [ 29.633497] ret_from_fork_asm+0x1a/0x30 [ 29.633991] </TASK> [ 29.634278] [ 29.634460] Allocated by task 273: [ 29.634691] kasan_save_stack+0x3d/0x60 [ 29.634984] kasan_save_track+0x18/0x40 [ 29.635440] kasan_save_alloc_info+0x3b/0x50 [ 29.635905] __kasan_kmalloc+0xb7/0xc0 [ 29.636338] __kmalloc_cache_noprof+0x184/0x410 [ 29.636917] kasan_atomics+0x96/0x310 [ 29.637207] kunit_try_run_case+0x1b3/0x490 [ 29.637689] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.638080] kthread+0x257/0x310 [ 29.638499] ret_from_fork+0x41/0x80 [ 29.638800] ret_from_fork_asm+0x1a/0x30 [ 29.639200] [ 29.639401] The buggy address belongs to the object at ffff888101abdc80 [ 29.639401] which belongs to the cache kmalloc-64 of size 64 [ 29.640436] The buggy address is located 0 bytes to the right of [ 29.640436] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.641105] [ 29.641372] The buggy address belongs to the physical page: [ 29.641891] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.642479] flags: 0x200000000000000(node=0|zone=2) [ 29.642940] page_type: f5(slab) [ 29.643322] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.643813] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.644401] page dumped because: kasan: bad access detected [ 29.644699] [ 29.644940] Memory state around the buggy address: [ 29.645447] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.646114] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.646789] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.647321] ^ [ 29.647610] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.648291] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.648929] ================================================================== [ 30.991900] ================================================================== [ 30.993337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 30.993849] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.994571] [ 30.994842] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.996120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.996541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.997244] Call Trace: [ 30.997877] <TASK> [ 30.998100] dump_stack_lvl+0x73/0xb0 [ 30.998968] print_report+0xd1/0x640 [ 30.999209] ? __virt_addr_valid+0x1db/0x2d0 [ 30.999917] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.000723] kasan_report+0x102/0x140 [ 31.001122] ? kasan_atomics_helper+0x1780/0x5450 [ 31.001893] ? kasan_atomics_helper+0x1780/0x5450 [ 31.002635] kasan_check_range+0x10c/0x1c0 [ 31.003061] __kasan_check_write+0x18/0x20 [ 31.003774] kasan_atomics_helper+0x1780/0x5450 [ 31.004232] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.004991] ? ret_from_fork_asm+0x1a/0x30 [ 31.005691] ? ret_from_fork+0x41/0x80 [ 31.006115] kasan_atomics+0x1dd/0x310 [ 31.006807] ? __pfx_kasan_atomics+0x10/0x10 [ 31.007267] ? __pfx_read_tsc+0x10/0x10 [ 31.008275] ? ktime_get_ts64+0x84/0x230 [ 31.008645] kunit_try_run_case+0x1b3/0x490 [ 31.009366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.009787] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.010729] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.011196] ? __kthread_parkme+0x82/0x160 [ 31.011939] ? preempt_count_sub+0x50/0x80 [ 31.012598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.013066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.013944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.014647] kthread+0x257/0x310 [ 31.015081] ? __pfx_kthread+0x10/0x10 [ 31.015843] ret_from_fork+0x41/0x80 [ 31.016458] ? __pfx_kthread+0x10/0x10 [ 31.016933] ret_from_fork_asm+0x1a/0x30 [ 31.017306] </TASK> [ 31.018077] [ 31.018234] Allocated by task 273: [ 31.018477] kasan_save_stack+0x3d/0x60 [ 31.019405] kasan_save_track+0x18/0x40 [ 31.019807] kasan_save_alloc_info+0x3b/0x50 [ 31.020581] __kasan_kmalloc+0xb7/0xc0 [ 31.020975] __kmalloc_cache_noprof+0x184/0x410 [ 31.021371] kasan_atomics+0x96/0x310 [ 31.022157] kunit_try_run_case+0x1b3/0x490 [ 31.022624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.023459] kthread+0x257/0x310 [ 31.023841] ret_from_fork+0x41/0x80 [ 31.024249] ret_from_fork_asm+0x1a/0x30 [ 31.025355] [ 31.025500] The buggy address belongs to the object at ffff888101abdc80 [ 31.025500] which belongs to the cache kmalloc-64 of size 64 [ 31.026195] The buggy address is located 0 bytes to the right of [ 31.026195] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.027649] [ 31.027893] The buggy address belongs to the physical page: [ 31.028479] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.029199] flags: 0x200000000000000(node=0|zone=2) [ 31.029754] page_type: f5(slab) [ 31.030151] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.031365] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.032034] page dumped because: kasan: bad access detected [ 31.032949] [ 31.033172] Memory state around the buggy address: [ 31.034392] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.034894] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.035499] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.036491] ^ [ 31.036779] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.037412] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.037965] ================================================================== [ 31.039689] ================================================================== [ 31.040113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 31.041609] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.042117] [ 31.042959] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.043749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.044117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.044846] Call Trace: [ 31.045122] <TASK> [ 31.045346] dump_stack_lvl+0x73/0xb0 [ 31.045689] print_report+0xd1/0x640 [ 31.046759] ? __virt_addr_valid+0x1db/0x2d0 [ 31.047426] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.047790] kasan_report+0x102/0x140 [ 31.048778] ? kasan_atomics_helper+0x1819/0x5450 [ 31.049251] ? kasan_atomics_helper+0x1819/0x5450 [ 31.050128] kasan_check_range+0x10c/0x1c0 [ 31.050741] __kasan_check_write+0x18/0x20 [ 31.051154] kasan_atomics_helper+0x1819/0x5450 [ 31.052068] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.052887] ? ret_from_fork_asm+0x1a/0x30 [ 31.053267] ? ret_from_fork+0x41/0x80 [ 31.053747] kasan_atomics+0x1dd/0x310 [ 31.054184] ? __pfx_kasan_atomics+0x10/0x10 [ 31.055190] ? __pfx_read_tsc+0x10/0x10 [ 31.055568] ? ktime_get_ts64+0x84/0x230 [ 31.056331] kunit_try_run_case+0x1b3/0x490 [ 31.056733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.057314] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.057953] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.058353] ? __kthread_parkme+0x82/0x160 [ 31.058740] ? preempt_count_sub+0x50/0x80 [ 31.059183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.059585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.060665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.061322] kthread+0x257/0x310 [ 31.061928] ? __pfx_kthread+0x10/0x10 [ 31.062573] ret_from_fork+0x41/0x80 [ 31.063125] ? __pfx_kthread+0x10/0x10 [ 31.063580] ret_from_fork_asm+0x1a/0x30 [ 31.064357] </TASK> [ 31.064784] [ 31.064969] Allocated by task 273: [ 31.065843] kasan_save_stack+0x3d/0x60 [ 31.066178] kasan_save_track+0x18/0x40 [ 31.066657] kasan_save_alloc_info+0x3b/0x50 [ 31.067169] __kasan_kmalloc+0xb7/0xc0 [ 31.068071] __kmalloc_cache_noprof+0x184/0x410 [ 31.068750] kasan_atomics+0x96/0x310 [ 31.069380] kunit_try_run_case+0x1b3/0x490 [ 31.069798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.070789] kthread+0x257/0x310 [ 31.071135] ret_from_fork+0x41/0x80 [ 31.071519] ret_from_fork_asm+0x1a/0x30 [ 31.072480] [ 31.072675] The buggy address belongs to the object at ffff888101abdc80 [ 31.072675] which belongs to the cache kmalloc-64 of size 64 [ 31.074199] The buggy address is located 0 bytes to the right of [ 31.074199] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.075091] [ 31.075533] The buggy address belongs to the physical page: [ 31.076230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.076627] flags: 0x200000000000000(node=0|zone=2) [ 31.077121] page_type: f5(slab) [ 31.077475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.078840] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.079572] page dumped because: kasan: bad access detected [ 31.079954] [ 31.080477] Memory state around the buggy address: [ 31.080953] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.081622] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.082202] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.082732] ^ [ 31.083804] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.084767] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.085266] ================================================================== [ 29.189406] ================================================================== [ 29.190483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 29.191413] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.192221] [ 29.192902] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.193643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.194198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.195012] Call Trace: [ 29.195874] <TASK> [ 29.196176] dump_stack_lvl+0x73/0xb0 [ 29.197129] print_report+0xd1/0x640 [ 29.197493] ? __virt_addr_valid+0x1db/0x2d0 [ 29.198068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.198626] kasan_report+0x102/0x140 [ 29.198924] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.199508] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.200304] __asan_report_load4_noabort+0x18/0x20 [ 29.200804] kasan_atomics_helper+0x4bbe/0x5450 [ 29.201645] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.202495] ? ret_from_fork_asm+0x1a/0x30 [ 29.202842] ? ret_from_fork+0x41/0x80 [ 29.203143] kasan_atomics+0x1dd/0x310 [ 29.203810] ? __pfx_kasan_atomics+0x10/0x10 [ 29.204571] ? __pfx_read_tsc+0x10/0x10 [ 29.205028] ? ktime_get_ts64+0x84/0x230 [ 29.205775] kunit_try_run_case+0x1b3/0x490 [ 29.206119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.206977] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.207697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.208340] ? __kthread_parkme+0x82/0x160 [ 29.208638] ? preempt_count_sub+0x50/0x80 [ 29.209203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.209837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.210624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.211336] kthread+0x257/0x310 [ 29.211629] ? __pfx_kthread+0x10/0x10 [ 29.212642] ret_from_fork+0x41/0x80 [ 29.213611] ? __pfx_kthread+0x10/0x10 [ 29.214297] ret_from_fork_asm+0x1a/0x30 [ 29.214725] </TASK> [ 29.214969] [ 29.215136] Allocated by task 273: [ 29.216718] kasan_save_stack+0x3d/0x60 [ 29.217627] kasan_save_track+0x18/0x40 [ 29.218435] kasan_save_alloc_info+0x3b/0x50 [ 29.218804] __kasan_kmalloc+0xb7/0xc0 [ 29.219354] __kmalloc_cache_noprof+0x184/0x410 [ 29.219966] kasan_atomics+0x96/0x310 [ 29.220380] kunit_try_run_case+0x1b3/0x490 [ 29.220713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.221229] kthread+0x257/0x310 [ 29.221539] ret_from_fork+0x41/0x80 [ 29.222527] ret_from_fork_asm+0x1a/0x30 [ 29.222807] [ 29.223273] The buggy address belongs to the object at ffff888101abdc80 [ 29.223273] which belongs to the cache kmalloc-64 of size 64 [ 29.224204] The buggy address is located 0 bytes to the right of [ 29.224204] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.225243] [ 29.225512] The buggy address belongs to the physical page: [ 29.226441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.227318] flags: 0x200000000000000(node=0|zone=2) [ 29.227838] page_type: f5(slab) [ 29.228320] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.229223] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.230434] page dumped because: kasan: bad access detected [ 29.230754] [ 29.230984] Memory state around the buggy address: [ 29.231540] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.232347] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.233048] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.233712] ^ [ 29.234221] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.234686] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.236050] ================================================================== [ 29.570281] ================================================================== [ 29.570910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 29.572550] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.573139] [ 29.573417] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.574057] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.574314] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.575130] Call Trace: [ 29.575565] <TASK> [ 29.575894] dump_stack_lvl+0x73/0xb0 [ 29.576341] print_report+0xd1/0x640 [ 29.576736] ? __virt_addr_valid+0x1db/0x2d0 [ 29.577068] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.577501] kasan_report+0x102/0x140 [ 29.577979] ? kasan_atomics_helper+0x5ff/0x5450 [ 29.578684] ? kasan_atomics_helper+0x5ff/0x5450 [ 29.579299] kasan_check_range+0x10c/0x1c0 [ 29.579736] __kasan_check_write+0x18/0x20 [ 29.580075] kasan_atomics_helper+0x5ff/0x5450 [ 29.580386] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.580724] ? ret_from_fork_asm+0x1a/0x30 [ 29.581361] ? ret_from_fork+0x41/0x80 [ 29.581812] kasan_atomics+0x1dd/0x310 [ 29.582303] ? __pfx_kasan_atomics+0x10/0x10 [ 29.582801] ? __pfx_read_tsc+0x10/0x10 [ 29.583221] ? ktime_get_ts64+0x84/0x230 [ 29.583710] kunit_try_run_case+0x1b3/0x490 [ 29.584035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.584393] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.584921] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.585592] ? __kthread_parkme+0x82/0x160 [ 29.586056] ? preempt_count_sub+0x50/0x80 [ 29.586615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.586991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.587354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.587689] kthread+0x257/0x310 [ 29.587963] ? __pfx_kthread+0x10/0x10 [ 29.588478] ret_from_fork+0x41/0x80 [ 29.588976] ? __pfx_kthread+0x10/0x10 [ 29.589419] ret_from_fork_asm+0x1a/0x30 [ 29.589925] </TASK> [ 29.590239] [ 29.590458] Allocated by task 273: [ 29.590811] kasan_save_stack+0x3d/0x60 [ 29.591255] kasan_save_track+0x18/0x40 [ 29.591684] kasan_save_alloc_info+0x3b/0x50 [ 29.592112] __kasan_kmalloc+0xb7/0xc0 [ 29.592538] __kmalloc_cache_noprof+0x184/0x410 [ 29.593019] kasan_atomics+0x96/0x310 [ 29.593289] kunit_try_run_case+0x1b3/0x490 [ 29.593734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.595395] kthread+0x257/0x310 [ 29.595780] ret_from_fork+0x41/0x80 [ 29.596205] ret_from_fork_asm+0x1a/0x30 [ 29.596611] [ 29.596786] The buggy address belongs to the object at ffff888101abdc80 [ 29.596786] which belongs to the cache kmalloc-64 of size 64 [ 29.600463] The buggy address is located 0 bytes to the right of [ 29.600463] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.601250] [ 29.601481] The buggy address belongs to the physical page: [ 29.602571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.603504] flags: 0x200000000000000(node=0|zone=2) [ 29.604084] page_type: f5(slab) [ 29.604554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.605260] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.605897] page dumped because: kasan: bad access detected [ 29.606394] [ 29.606569] Memory state around the buggy address: [ 29.608083] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.608456] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.609691] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.610158] ^ [ 29.611050] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.611494] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.612291] ================================================================== [ 29.903378] ================================================================== [ 29.903977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 29.904512] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.905216] [ 29.905492] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.906209] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.906644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.907104] Call Trace: [ 29.907506] <TASK> [ 29.907795] dump_stack_lvl+0x73/0xb0 [ 29.908311] print_report+0xd1/0x640 [ 29.908731] ? __virt_addr_valid+0x1db/0x2d0 [ 29.909185] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.909747] kasan_report+0x102/0x140 [ 29.910129] ? kasan_atomics_helper+0xac8/0x5450 [ 29.910659] ? kasan_atomics_helper+0xac8/0x5450 [ 29.911086] kasan_check_range+0x10c/0x1c0 [ 29.911632] __kasan_check_write+0x18/0x20 [ 29.912053] kasan_atomics_helper+0xac8/0x5450 [ 29.912471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.913014] ? ret_from_fork_asm+0x1a/0x30 [ 29.913515] ? ret_from_fork+0x41/0x80 [ 29.913946] kasan_atomics+0x1dd/0x310 [ 29.914238] ? __pfx_kasan_atomics+0x10/0x10 [ 29.914596] ? __pfx_read_tsc+0x10/0x10 [ 29.914895] ? ktime_get_ts64+0x84/0x230 [ 29.915391] kunit_try_run_case+0x1b3/0x490 [ 29.915927] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.916498] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.917012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.917607] ? __kthread_parkme+0x82/0x160 [ 29.918093] ? preempt_count_sub+0x50/0x80 [ 29.918627] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.919038] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.920151] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.920718] kthread+0x257/0x310 [ 29.923559] ? __pfx_kthread+0x10/0x10 [ 29.924001] ret_from_fork+0x41/0x80 [ 29.924620] ? __pfx_kthread+0x10/0x10 [ 29.925053] ret_from_fork_asm+0x1a/0x30 [ 29.925864] </TASK> [ 29.926211] [ 29.926653] Allocated by task 273: [ 29.927008] kasan_save_stack+0x3d/0x60 [ 29.927692] kasan_save_track+0x18/0x40 [ 29.927985] kasan_save_alloc_info+0x3b/0x50 [ 29.928805] __kasan_kmalloc+0xb7/0xc0 [ 29.929110] __kmalloc_cache_noprof+0x184/0x410 [ 29.929859] kasan_atomics+0x96/0x310 [ 29.930232] kunit_try_run_case+0x1b3/0x490 [ 29.930722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.931197] kthread+0x257/0x310 [ 29.931566] ret_from_fork+0x41/0x80 [ 29.931937] ret_from_fork_asm+0x1a/0x30 [ 29.932391] [ 29.932660] The buggy address belongs to the object at ffff888101abdc80 [ 29.932660] which belongs to the cache kmalloc-64 of size 64 [ 29.933266] The buggy address is located 0 bytes to the right of [ 29.933266] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.934319] [ 29.934558] The buggy address belongs to the physical page: [ 29.934918] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.935345] flags: 0x200000000000000(node=0|zone=2) [ 29.935884] page_type: f5(slab) [ 29.936362] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.937055] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.937564] page dumped because: kasan: bad access detected [ 29.938121] [ 29.938274] Memory state around the buggy address: [ 29.938912] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.939496] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.939964] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.940327] ^ [ 29.940611] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.941308] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.942179] ================================================================== [ 31.727137] ================================================================== [ 31.728789] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 31.729537] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.730250] [ 31.730546] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.731280] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.731891] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.732617] Call Trace: [ 31.733033] <TASK> [ 31.733331] dump_stack_lvl+0x73/0xb0 [ 31.733701] print_report+0xd1/0x640 [ 31.734215] ? __virt_addr_valid+0x1db/0x2d0 [ 31.734702] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.735306] kasan_report+0x102/0x140 [ 31.735863] ? kasan_atomics_helper+0x20c9/0x5450 [ 31.736290] ? kasan_atomics_helper+0x20c9/0x5450 [ 31.736847] kasan_check_range+0x10c/0x1c0 [ 31.737374] __kasan_check_write+0x18/0x20 [ 31.737738] kasan_atomics_helper+0x20c9/0x5450 [ 31.738282] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.738684] ? ret_from_fork_asm+0x1a/0x30 [ 31.739193] ? ret_from_fork+0x41/0x80 [ 31.739629] kasan_atomics+0x1dd/0x310 [ 31.740162] ? __pfx_kasan_atomics+0x10/0x10 [ 31.740557] ? __pfx_read_tsc+0x10/0x10 [ 31.741093] ? ktime_get_ts64+0x84/0x230 [ 31.741497] kunit_try_run_case+0x1b3/0x490 [ 31.742014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.742652] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.743223] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.743578] ? __kthread_parkme+0x82/0x160 [ 31.744469] ? preempt_count_sub+0x50/0x80 [ 31.745338] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.745684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.746288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.746717] kthread+0x257/0x310 [ 31.747711] ? __pfx_kthread+0x10/0x10 [ 31.748531] ret_from_fork+0x41/0x80 [ 31.748811] ? __pfx_kthread+0x10/0x10 [ 31.749752] ret_from_fork_asm+0x1a/0x30 [ 31.750238] </TASK> [ 31.750575] [ 31.750832] Allocated by task 273: [ 31.751263] kasan_save_stack+0x3d/0x60 [ 31.751801] kasan_save_track+0x18/0x40 [ 31.752338] kasan_save_alloc_info+0x3b/0x50 [ 31.752882] __kasan_kmalloc+0xb7/0xc0 [ 31.753407] __kmalloc_cache_noprof+0x184/0x410 [ 31.753965] kasan_atomics+0x96/0x310 [ 31.754456] kunit_try_run_case+0x1b3/0x490 [ 31.755007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.755615] kthread+0x257/0x310 [ 31.756107] ret_from_fork+0x41/0x80 [ 31.756712] ret_from_fork_asm+0x1a/0x30 [ 31.757227] [ 31.757475] The buggy address belongs to the object at ffff888101abdc80 [ 31.757475] which belongs to the cache kmalloc-64 of size 64 [ 31.758719] The buggy address is located 0 bytes to the right of [ 31.758719] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.760002] [ 31.760244] The buggy address belongs to the physical page: [ 31.760882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.761470] flags: 0x200000000000000(node=0|zone=2) [ 31.761650] page_type: f5(slab) [ 31.761785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.762288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.762806] page dumped because: kasan: bad access detected [ 31.763251] [ 31.763524] Memory state around the buggy address: [ 31.764008] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.764401] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.764802] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.765487] ^ [ 31.766151] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.766592] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.767104] ================================================================== [ 31.807674] ================================================================== [ 31.808633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 31.809352] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.809937] [ 31.810119] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.810612] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.811085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.811938] Call Trace: [ 31.812289] <TASK> [ 31.812582] dump_stack_lvl+0x73/0xb0 [ 31.813077] print_report+0xd1/0x640 [ 31.814616] ? __virt_addr_valid+0x1db/0x2d0 [ 31.814963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.815360] kasan_report+0x102/0x140 [ 31.815682] ? kasan_atomics_helper+0x218b/0x5450 [ 31.817932] ? kasan_atomics_helper+0x218b/0x5450 [ 31.818332] kasan_check_range+0x10c/0x1c0 [ 31.818793] __kasan_check_write+0x18/0x20 [ 31.819148] kasan_atomics_helper+0x218b/0x5450 [ 31.819691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.820169] ? ret_from_fork_asm+0x1a/0x30 [ 31.820466] ? ret_from_fork+0x41/0x80 [ 31.821045] kasan_atomics+0x1dd/0x310 [ 31.821569] ? __pfx_kasan_atomics+0x10/0x10 [ 31.822247] ? __pfx_read_tsc+0x10/0x10 [ 31.822784] ? ktime_get_ts64+0x84/0x230 [ 31.823326] kunit_try_run_case+0x1b3/0x490 [ 31.823888] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.824574] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.825164] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.825787] ? __kthread_parkme+0x82/0x160 [ 31.826409] ? preempt_count_sub+0x50/0x80 [ 31.826763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.827355] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.828090] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.828800] kthread+0x257/0x310 [ 31.829151] ? __pfx_kthread+0x10/0x10 [ 31.829651] ret_from_fork+0x41/0x80 [ 31.830185] ? __pfx_kthread+0x10/0x10 [ 31.830636] ret_from_fork_asm+0x1a/0x30 [ 31.831103] </TASK> [ 31.831465] [ 31.831640] Allocated by task 273: [ 31.831957] kasan_save_stack+0x3d/0x60 [ 31.832370] kasan_save_track+0x18/0x40 [ 31.832893] kasan_save_alloc_info+0x3b/0x50 [ 31.833382] __kasan_kmalloc+0xb7/0xc0 [ 31.833729] __kmalloc_cache_noprof+0x184/0x410 [ 31.834230] kasan_atomics+0x96/0x310 [ 31.834634] kunit_try_run_case+0x1b3/0x490 [ 31.835144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.835609] kthread+0x257/0x310 [ 31.835936] ret_from_fork+0x41/0x80 [ 31.836519] ret_from_fork_asm+0x1a/0x30 [ 31.836973] [ 31.837197] The buggy address belongs to the object at ffff888101abdc80 [ 31.837197] which belongs to the cache kmalloc-64 of size 64 [ 31.838228] The buggy address is located 0 bytes to the right of [ 31.838228] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.839165] [ 31.839458] The buggy address belongs to the physical page: [ 31.839921] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.840361] flags: 0x200000000000000(node=0|zone=2) [ 31.841020] page_type: f5(slab) [ 31.841470] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.842065] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.842681] page dumped because: kasan: bad access detected [ 31.843232] [ 31.843453] Memory state around the buggy address: [ 31.843844] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.844217] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.844900] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.845798] ^ [ 31.846263] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.846752] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.847131] ================================================================== [ 31.396710] ================================================================== [ 31.397349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 31.397610] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.397861] [ 31.398105] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.399114] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.399645] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.400484] Call Trace: [ 31.400800] <TASK> [ 31.401183] dump_stack_lvl+0x73/0xb0 [ 31.401647] print_report+0xd1/0x640 [ 31.402090] ? __virt_addr_valid+0x1db/0x2d0 [ 31.402626] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.403162] kasan_report+0x102/0x140 [ 31.403686] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.404122] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.404732] kasan_check_range+0x10c/0x1c0 [ 31.405161] __kasan_check_write+0x18/0x20 [ 31.405570] kasan_atomics_helper+0x1ce2/0x5450 [ 31.406122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.406683] ? ret_from_fork_asm+0x1a/0x30 [ 31.407228] ? ret_from_fork+0x41/0x80 [ 31.407718] kasan_atomics+0x1dd/0x310 [ 31.408117] ? __pfx_kasan_atomics+0x10/0x10 [ 31.408682] ? __pfx_read_tsc+0x10/0x10 [ 31.409211] ? ktime_get_ts64+0x84/0x230 [ 31.409650] kunit_try_run_case+0x1b3/0x490 [ 31.410219] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.410743] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.411200] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.411803] ? __kthread_parkme+0x82/0x160 [ 31.412393] ? preempt_count_sub+0x50/0x80 [ 31.412889] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.413496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.414071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.414839] kthread+0x257/0x310 [ 31.415429] ? __pfx_kthread+0x10/0x10 [ 31.415975] ret_from_fork+0x41/0x80 [ 31.416416] ? __pfx_kthread+0x10/0x10 [ 31.416654] ret_from_fork_asm+0x1a/0x30 [ 31.417209] </TASK> [ 31.417611] [ 31.417842] Allocated by task 273: [ 31.418137] kasan_save_stack+0x3d/0x60 [ 31.418622] kasan_save_track+0x18/0x40 [ 31.419184] kasan_save_alloc_info+0x3b/0x50 [ 31.419697] __kasan_kmalloc+0xb7/0xc0 [ 31.420155] __kmalloc_cache_noprof+0x184/0x410 [ 31.420631] kasan_atomics+0x96/0x310 [ 31.421087] kunit_try_run_case+0x1b3/0x490 [ 31.421459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.421781] kthread+0x257/0x310 [ 31.422063] ret_from_fork+0x41/0x80 [ 31.422511] ret_from_fork_asm+0x1a/0x30 [ 31.422956] [ 31.423288] The buggy address belongs to the object at ffff888101abdc80 [ 31.423288] which belongs to the cache kmalloc-64 of size 64 [ 31.424465] The buggy address is located 0 bytes to the right of [ 31.424465] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.425571] [ 31.425883] The buggy address belongs to the physical page: [ 31.426348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.426758] flags: 0x200000000000000(node=0|zone=2) [ 31.427322] page_type: f5(slab) [ 31.427723] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.428550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.429374] page dumped because: kasan: bad access detected [ 31.429882] [ 31.430090] Memory state around the buggy address: [ 31.430642] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.431319] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.431966] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.432359] ^ [ 31.432640] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.433272] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.433992] ================================================================== [ 29.525484] ================================================================== [ 29.527625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 29.528208] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.530669] [ 29.530887] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.531865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.532239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.532999] Call Trace: [ 29.533258] <TASK> [ 29.533493] dump_stack_lvl+0x73/0xb0 [ 29.534968] print_report+0xd1/0x640 [ 29.535579] ? __virt_addr_valid+0x1db/0x2d0 [ 29.536235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.537019] kasan_report+0x102/0x140 [ 29.537617] ? kasan_atomics_helper+0x566/0x5450 [ 29.538264] ? kasan_atomics_helper+0x566/0x5450 [ 29.539012] kasan_check_range+0x10c/0x1c0 [ 29.539659] __kasan_check_write+0x18/0x20 [ 29.540081] kasan_atomics_helper+0x566/0x5450 [ 29.540760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.541459] ? ret_from_fork_asm+0x1a/0x30 [ 29.542078] ? ret_from_fork+0x41/0x80 [ 29.542697] kasan_atomics+0x1dd/0x310 [ 29.543091] ? __pfx_kasan_atomics+0x10/0x10 [ 29.543850] ? __pfx_read_tsc+0x10/0x10 [ 29.544479] ? ktime_get_ts64+0x84/0x230 [ 29.544907] kunit_try_run_case+0x1b3/0x490 [ 29.545630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.546272] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.547304] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.547704] ? __kthread_parkme+0x82/0x160 [ 29.548312] ? preempt_count_sub+0x50/0x80 [ 29.548754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.549192] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.550387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.550836] kthread+0x257/0x310 [ 29.551457] ? __pfx_kthread+0x10/0x10 [ 29.551838] ret_from_fork+0x41/0x80 [ 29.552103] ? __pfx_kthread+0x10/0x10 [ 29.553044] ret_from_fork_asm+0x1a/0x30 [ 29.553796] </TASK> [ 29.554023] [ 29.554492] Allocated by task 273: [ 29.554881] kasan_save_stack+0x3d/0x60 [ 29.555332] kasan_save_track+0x18/0x40 [ 29.555702] kasan_save_alloc_info+0x3b/0x50 [ 29.556087] __kasan_kmalloc+0xb7/0xc0 [ 29.556445] __kmalloc_cache_noprof+0x184/0x410 [ 29.556955] kasan_atomics+0x96/0x310 [ 29.557308] kunit_try_run_case+0x1b3/0x490 [ 29.557585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.558216] kthread+0x257/0x310 [ 29.558620] ret_from_fork+0x41/0x80 [ 29.559074] ret_from_fork_asm+0x1a/0x30 [ 29.559436] [ 29.559636] The buggy address belongs to the object at ffff888101abdc80 [ 29.559636] which belongs to the cache kmalloc-64 of size 64 [ 29.560210] The buggy address is located 0 bytes to the right of [ 29.560210] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.561279] [ 29.561533] The buggy address belongs to the physical page: [ 29.561990] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.562395] flags: 0x200000000000000(node=0|zone=2) [ 29.562994] page_type: f5(slab) [ 29.563516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.564226] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.564632] page dumped because: kasan: bad access detected [ 29.565187] [ 29.565400] Memory state around the buggy address: [ 29.565852] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.566560] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.567180] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.567661] ^ [ 29.568170] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.568785] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.569204] ================================================================== [ 30.560512] ================================================================== [ 30.561927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 30.563330] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.564078] [ 30.564443] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.565309] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.565577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.566541] Call Trace: [ 30.566968] <TASK> [ 30.567293] dump_stack_lvl+0x73/0xb0 [ 30.567806] print_report+0xd1/0x640 [ 30.568464] ? __virt_addr_valid+0x1db/0x2d0 [ 30.569067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.569648] kasan_report+0x102/0x140 [ 30.570296] ? kasan_atomics_helper+0x12e7/0x5450 [ 30.570960] ? kasan_atomics_helper+0x12e7/0x5450 [ 30.571641] kasan_check_range+0x10c/0x1c0 [ 30.572350] __kasan_check_write+0x18/0x20 [ 30.572860] kasan_atomics_helper+0x12e7/0x5450 [ 30.573479] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.573858] ? ret_from_fork_asm+0x1a/0x30 [ 30.574512] ? ret_from_fork+0x41/0x80 [ 30.575087] kasan_atomics+0x1dd/0x310 [ 30.575637] ? __pfx_kasan_atomics+0x10/0x10 [ 30.575925] ? __pfx_read_tsc+0x10/0x10 [ 30.576471] ? ktime_get_ts64+0x84/0x230 [ 30.576939] kunit_try_run_case+0x1b3/0x490 [ 30.577287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.577668] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.578132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.578505] ? __kthread_parkme+0x82/0x160 [ 30.578951] ? preempt_count_sub+0x50/0x80 [ 30.579631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.580228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.580875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.581394] kthread+0x257/0x310 [ 30.581814] ? __pfx_kthread+0x10/0x10 [ 30.582378] ret_from_fork+0x41/0x80 [ 30.582839] ? __pfx_kthread+0x10/0x10 [ 30.583288] ret_from_fork_asm+0x1a/0x30 [ 30.583794] </TASK> [ 30.584115] [ 30.584417] Allocated by task 273: [ 30.584720] kasan_save_stack+0x3d/0x60 [ 30.585237] kasan_save_track+0x18/0x40 [ 30.585712] kasan_save_alloc_info+0x3b/0x50 [ 30.586278] __kasan_kmalloc+0xb7/0xc0 [ 30.586668] __kmalloc_cache_noprof+0x184/0x410 [ 30.587178] kasan_atomics+0x96/0x310 [ 30.587620] kunit_try_run_case+0x1b3/0x490 [ 30.588145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.588642] kthread+0x257/0x310 [ 30.589055] ret_from_fork+0x41/0x80 [ 30.589537] ret_from_fork_asm+0x1a/0x30 [ 30.589995] [ 30.590304] The buggy address belongs to the object at ffff888101abdc80 [ 30.590304] which belongs to the cache kmalloc-64 of size 64 [ 30.591336] The buggy address is located 0 bytes to the right of [ 30.591336] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.592232] [ 30.592587] The buggy address belongs to the physical page: [ 30.593089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.593715] flags: 0x200000000000000(node=0|zone=2) [ 30.594329] page_type: f5(slab) [ 30.594755] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.595342] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.596061] page dumped because: kasan: bad access detected [ 30.596490] [ 30.596649] Memory state around the buggy address: [ 30.597355] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.598040] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.598728] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.599391] ^ [ 30.599879] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.600635] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.601135] ================================================================== [ 30.731164] ================================================================== [ 30.731653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 30.732389] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.733100] [ 30.733335] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.734086] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.734396] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.735225] Call Trace: [ 30.735585] <TASK> [ 30.735887] dump_stack_lvl+0x73/0xb0 [ 30.736412] print_report+0xd1/0x640 [ 30.736766] ? __virt_addr_valid+0x1db/0x2d0 [ 30.737104] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.737726] kasan_report+0x102/0x140 [ 30.738152] ? kasan_atomics_helper+0x1468/0x5450 [ 30.738608] ? kasan_atomics_helper+0x1468/0x5450 [ 30.739214] kasan_check_range+0x10c/0x1c0 [ 30.739735] __kasan_check_write+0x18/0x20 [ 30.740209] kasan_atomics_helper+0x1468/0x5450 [ 30.740672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.741165] ? ret_from_fork_asm+0x1a/0x30 [ 30.741691] ? ret_from_fork+0x41/0x80 [ 30.742116] kasan_atomics+0x1dd/0x310 [ 30.742461] ? __pfx_kasan_atomics+0x10/0x10 [ 30.742770] ? __pfx_read_tsc+0x10/0x10 [ 30.743218] ? ktime_get_ts64+0x84/0x230 [ 30.743753] kunit_try_run_case+0x1b3/0x490 [ 30.744237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.744764] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.745357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.745797] ? __kthread_parkme+0x82/0x160 [ 30.746300] ? preempt_count_sub+0x50/0x80 [ 30.746607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.747110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.747785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.748430] kthread+0x257/0x310 [ 30.748843] ? __pfx_kthread+0x10/0x10 [ 30.749311] ret_from_fork+0x41/0x80 [ 30.749682] ? __pfx_kthread+0x10/0x10 [ 30.750162] ret_from_fork_asm+0x1a/0x30 [ 30.750680] </TASK> [ 30.751010] [ 30.751203] Allocated by task 273: [ 30.751610] kasan_save_stack+0x3d/0x60 [ 30.751939] kasan_save_track+0x18/0x40 [ 30.752447] kasan_save_alloc_info+0x3b/0x50 [ 30.752888] __kasan_kmalloc+0xb7/0xc0 [ 30.753346] __kmalloc_cache_noprof+0x184/0x410 [ 30.753790] kasan_atomics+0x96/0x310 [ 30.754168] kunit_try_run_case+0x1b3/0x490 [ 30.754676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.755166] kthread+0x257/0x310 [ 30.755592] ret_from_fork+0x41/0x80 [ 30.756059] ret_from_fork_asm+0x1a/0x30 [ 30.756610] [ 30.756899] The buggy address belongs to the object at ffff888101abdc80 [ 30.756899] which belongs to the cache kmalloc-64 of size 64 [ 30.757689] The buggy address is located 0 bytes to the right of [ 30.757689] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.758973] [ 30.759317] The buggy address belongs to the physical page: [ 30.759920] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.760771] flags: 0x200000000000000(node=0|zone=2) [ 30.761375] page_type: f5(slab) [ 30.761807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.762622] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.763432] page dumped because: kasan: bad access detected [ 30.763987] [ 30.764139] Memory state around the buggy address: [ 30.764664] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.765469] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.766239] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.767051] ^ [ 30.767607] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.768059] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.768607] ================================================================== [ 30.770201] ================================================================== [ 30.770854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 30.771485] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.772155] [ 30.772463] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.773205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.773667] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.774307] Call Trace: [ 30.774666] <TASK> [ 30.774978] dump_stack_lvl+0x73/0xb0 [ 30.775441] print_report+0xd1/0x640 [ 30.775915] ? __virt_addr_valid+0x1db/0x2d0 [ 30.776314] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.776889] kasan_report+0x102/0x140 [ 30.777170] ? kasan_atomics_helper+0x50d6/0x5450 [ 30.777690] ? kasan_atomics_helper+0x50d6/0x5450 [ 30.778238] __asan_report_store8_noabort+0x1b/0x30 [ 30.778786] kasan_atomics_helper+0x50d6/0x5450 [ 30.779361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.779691] ? ret_from_fork_asm+0x1a/0x30 [ 30.780161] ? ret_from_fork+0x41/0x80 [ 30.780494] kasan_atomics+0x1dd/0x310 [ 30.781012] ? __pfx_kasan_atomics+0x10/0x10 [ 30.781369] ? __pfx_read_tsc+0x10/0x10 [ 30.781648] ? ktime_get_ts64+0x84/0x230 [ 30.782139] kunit_try_run_case+0x1b3/0x490 [ 30.782647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.783158] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.783732] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.784099] ? __kthread_parkme+0x82/0x160 [ 30.784623] ? preempt_count_sub+0x50/0x80 [ 30.785010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.785371] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.786017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.786632] kthread+0x257/0x310 [ 30.787161] ? __pfx_kthread+0x10/0x10 [ 30.788294] ret_from_fork+0x41/0x80 [ 30.789538] ? __pfx_kthread+0x10/0x10 [ 30.789949] ret_from_fork_asm+0x1a/0x30 [ 30.790987] </TASK> [ 30.791538] [ 30.791709] Allocated by task 273: [ 30.792070] kasan_save_stack+0x3d/0x60 [ 30.792465] kasan_save_track+0x18/0x40 [ 30.792876] kasan_save_alloc_info+0x3b/0x50 [ 30.794048] __kasan_kmalloc+0xb7/0xc0 [ 30.794391] __kmalloc_cache_noprof+0x184/0x410 [ 30.795193] kasan_atomics+0x96/0x310 [ 30.795664] kunit_try_run_case+0x1b3/0x490 [ 30.796582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.797081] kthread+0x257/0x310 [ 30.797740] ret_from_fork+0x41/0x80 [ 30.798457] ret_from_fork_asm+0x1a/0x30 [ 30.799025] [ 30.799252] The buggy address belongs to the object at ffff888101abdc80 [ 30.799252] which belongs to the cache kmalloc-64 of size 64 [ 30.800305] The buggy address is located 0 bytes to the right of [ 30.800305] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.801738] [ 30.802212] The buggy address belongs to the physical page: [ 30.803206] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.804007] flags: 0x200000000000000(node=0|zone=2) [ 30.804463] page_type: f5(slab) [ 30.804775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.805183] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.805914] page dumped because: kasan: bad access detected [ 30.807336] [ 30.807517] Memory state around the buggy address: [ 30.807813] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.808967] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.809636] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.810491] ^ [ 30.811059] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.811713] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.812540] ================================================================== [ 29.862414] ================================================================== [ 29.863204] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 29.863988] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.864589] [ 29.864855] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.865694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.866057] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.867045] Call Trace: [ 29.867343] <TASK> [ 29.867595] dump_stack_lvl+0x73/0xb0 [ 29.868159] print_report+0xd1/0x640 [ 29.868679] ? __virt_addr_valid+0x1db/0x2d0 [ 29.869208] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.869778] kasan_report+0x102/0x140 [ 29.870227] ? kasan_atomics_helper+0xa2c/0x5450 [ 29.870633] ? kasan_atomics_helper+0xa2c/0x5450 [ 29.870983] kasan_check_range+0x10c/0x1c0 [ 29.871576] __kasan_check_write+0x18/0x20 [ 29.872175] kasan_atomics_helper+0xa2c/0x5450 [ 29.872677] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.873176] ? ret_from_fork_asm+0x1a/0x30 [ 29.873650] ? ret_from_fork+0x41/0x80 [ 29.874220] kasan_atomics+0x1dd/0x310 [ 29.874685] ? __pfx_kasan_atomics+0x10/0x10 [ 29.875151] ? __pfx_read_tsc+0x10/0x10 [ 29.875582] ? ktime_get_ts64+0x84/0x230 [ 29.875896] kunit_try_run_case+0x1b3/0x490 [ 29.876361] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.877009] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.877735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.878262] ? __kthread_parkme+0x82/0x160 [ 29.878581] ? preempt_count_sub+0x50/0x80 [ 29.879173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.879856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.880435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.881031] kthread+0x257/0x310 [ 29.881388] ? __pfx_kthread+0x10/0x10 [ 29.881928] ret_from_fork+0x41/0x80 [ 29.883245] ? __pfx_kthread+0x10/0x10 [ 29.884336] ret_from_fork_asm+0x1a/0x30 [ 29.884687] </TASK> [ 29.884906] [ 29.885061] Allocated by task 273: [ 29.886603] kasan_save_stack+0x3d/0x60 [ 29.886973] kasan_save_track+0x18/0x40 [ 29.887323] kasan_save_alloc_info+0x3b/0x50 [ 29.888225] __kasan_kmalloc+0xb7/0xc0 [ 29.888649] __kmalloc_cache_noprof+0x184/0x410 [ 29.889219] kasan_atomics+0x96/0x310 [ 29.889744] kunit_try_run_case+0x1b3/0x490 [ 29.890194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.890879] kthread+0x257/0x310 [ 29.891334] ret_from_fork+0x41/0x80 [ 29.891561] ret_from_fork_asm+0x1a/0x30 [ 29.892016] [ 29.892277] The buggy address belongs to the object at ffff888101abdc80 [ 29.892277] which belongs to the cache kmalloc-64 of size 64 [ 29.893080] The buggy address is located 0 bytes to the right of [ 29.893080] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.894085] [ 29.894312] The buggy address belongs to the physical page: [ 29.894878] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.895479] flags: 0x200000000000000(node=0|zone=2) [ 29.895955] page_type: f5(slab) [ 29.896198] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.896913] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.897631] page dumped because: kasan: bad access detected [ 29.898068] [ 29.898225] Memory state around the buggy address: [ 29.898612] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.899293] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.899890] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.900551] ^ [ 29.901070] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.901496] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.902151] ================================================================== [ 31.520143] ================================================================== [ 31.520883] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 31.521492] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.521911] [ 31.522189] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.523077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.523582] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.524117] Call Trace: [ 31.524394] <TASK> [ 31.524703] dump_stack_lvl+0x73/0xb0 [ 31.525187] print_report+0xd1/0x640 [ 31.525604] ? __virt_addr_valid+0x1db/0x2d0 [ 31.526093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.526549] kasan_report+0x102/0x140 [ 31.527011] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.527579] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.527967] kasan_check_range+0x10c/0x1c0 [ 31.528513] __kasan_check_write+0x18/0x20 [ 31.528969] kasan_atomics_helper+0x1eab/0x5450 [ 31.529557] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.529944] ? ret_from_fork_asm+0x1a/0x30 [ 31.530415] ? ret_from_fork+0x41/0x80 [ 31.530921] kasan_atomics+0x1dd/0x310 [ 31.531328] ? __pfx_kasan_atomics+0x10/0x10 [ 31.531846] ? __pfx_read_tsc+0x10/0x10 [ 31.532174] ? ktime_get_ts64+0x84/0x230 [ 31.532623] kunit_try_run_case+0x1b3/0x490 [ 31.533074] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.533467] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.534026] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.534469] ? __kthread_parkme+0x82/0x160 [ 31.534841] ? preempt_count_sub+0x50/0x80 [ 31.535304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.535792] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.536220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.536565] kthread+0x257/0x310 [ 31.536847] ? __pfx_kthread+0x10/0x10 [ 31.537304] ret_from_fork+0x41/0x80 [ 31.537722] ? __pfx_kthread+0x10/0x10 [ 31.538285] ret_from_fork_asm+0x1a/0x30 [ 31.538754] </TASK> [ 31.539093] [ 31.539372] Allocated by task 273: [ 31.539718] kasan_save_stack+0x3d/0x60 [ 31.540844] kasan_save_track+0x18/0x40 [ 31.541261] kasan_save_alloc_info+0x3b/0x50 [ 31.541664] __kasan_kmalloc+0xb7/0xc0 [ 31.542030] __kmalloc_cache_noprof+0x184/0x410 [ 31.543530] kasan_atomics+0x96/0x310 [ 31.543999] kunit_try_run_case+0x1b3/0x490 [ 31.545386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.545984] kthread+0x257/0x310 [ 31.547148] ret_from_fork+0x41/0x80 [ 31.547638] ret_from_fork_asm+0x1a/0x30 [ 31.548007] [ 31.548187] The buggy address belongs to the object at ffff888101abdc80 [ 31.548187] which belongs to the cache kmalloc-64 of size 64 [ 31.550238] The buggy address is located 0 bytes to the right of [ 31.550238] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.551849] [ 31.552033] The buggy address belongs to the physical page: [ 31.553007] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.553439] flags: 0x200000000000000(node=0|zone=2) [ 31.553999] page_type: f5(slab) [ 31.554360] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.554937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.555420] page dumped because: kasan: bad access detected [ 31.555983] [ 31.556192] Memory state around the buggy address: [ 31.556480] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.557201] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.557697] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.558523] ^ [ 31.558962] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.559786] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.560276] ================================================================== [ 31.646375] ================================================================== [ 31.646993] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 31.647618] Write of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.648335] [ 31.648596] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.649461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.649889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.650612] Call Trace: [ 31.650941] <TASK> [ 31.651305] dump_stack_lvl+0x73/0xb0 [ 31.651653] print_report+0xd1/0x640 [ 31.652092] ? __virt_addr_valid+0x1db/0x2d0 [ 31.652623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.652993] kasan_report+0x102/0x140 [ 31.653504] ? kasan_atomics_helper+0x2007/0x5450 [ 31.654043] ? kasan_atomics_helper+0x2007/0x5450 [ 31.654596] kasan_check_range+0x10c/0x1c0 [ 31.655072] __kasan_check_write+0x18/0x20 [ 31.655572] kasan_atomics_helper+0x2007/0x5450 [ 31.655999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.656555] ? ret_from_fork_asm+0x1a/0x30 [ 31.657062] ? ret_from_fork+0x41/0x80 [ 31.657410] kasan_atomics+0x1dd/0x310 [ 31.657898] ? __pfx_kasan_atomics+0x10/0x10 [ 31.658402] ? __pfx_read_tsc+0x10/0x10 [ 31.658791] ? ktime_get_ts64+0x84/0x230 [ 31.659285] kunit_try_run_case+0x1b3/0x490 [ 31.659788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.660224] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.660660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.661127] ? __kthread_parkme+0x82/0x160 [ 31.661649] ? preempt_count_sub+0x50/0x80 [ 31.662094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.662554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.662940] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.663325] kthread+0x257/0x310 [ 31.663589] ? __pfx_kthread+0x10/0x10 [ 31.663885] ret_from_fork+0x41/0x80 [ 31.664382] ? __pfx_kthread+0x10/0x10 [ 31.664829] ret_from_fork_asm+0x1a/0x30 [ 31.665322] </TASK> [ 31.665615] [ 31.665851] Allocated by task 273: [ 31.666233] kasan_save_stack+0x3d/0x60 [ 31.666740] kasan_save_track+0x18/0x40 [ 31.667210] kasan_save_alloc_info+0x3b/0x50 [ 31.667742] __kasan_kmalloc+0xb7/0xc0 [ 31.668172] __kmalloc_cache_noprof+0x184/0x410 [ 31.668707] kasan_atomics+0x96/0x310 [ 31.669185] kunit_try_run_case+0x1b3/0x490 [ 31.669633] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.669991] kthread+0x257/0x310 [ 31.670233] ret_from_fork+0x41/0x80 [ 31.670534] ret_from_fork_asm+0x1a/0x30 [ 31.670978] [ 31.671274] The buggy address belongs to the object at ffff888101abdc80 [ 31.671274] which belongs to the cache kmalloc-64 of size 64 [ 31.672400] The buggy address is located 0 bytes to the right of [ 31.672400] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.673485] [ 31.673652] The buggy address belongs to the physical page: [ 31.674089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.674886] flags: 0x200000000000000(node=0|zone=2) [ 31.675427] page_type: f5(slab) [ 31.675769] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.676181] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.676930] page dumped because: kasan: bad access detected [ 31.677487] [ 31.677709] Memory state around the buggy address: [ 31.678293] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.678766] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.679574] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.680036] ^ [ 31.680576] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.681072] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.681629] ================================================================== [ 30.015634] ================================================================== [ 30.016754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 30.020001] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.020784] [ 30.020998] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.021493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.021749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.022550] Call Trace: [ 30.022962] <TASK> [ 30.023340] dump_stack_lvl+0x73/0xb0 [ 30.023792] print_report+0xd1/0x640 [ 30.024245] ? __virt_addr_valid+0x1db/0x2d0 [ 30.024746] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.025339] kasan_report+0x102/0x140 [ 30.025680] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.026036] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.026425] __asan_report_load4_noabort+0x18/0x20 [ 30.026943] kasan_atomics_helper+0x4a86/0x5450 [ 30.027477] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.028024] ? ret_from_fork_asm+0x1a/0x30 [ 30.028528] ? ret_from_fork+0x41/0x80 [ 30.028920] kasan_atomics+0x1dd/0x310 [ 30.029209] ? __pfx_kasan_atomics+0x10/0x10 [ 30.029681] ? __pfx_read_tsc+0x10/0x10 [ 30.030157] ? ktime_get_ts64+0x84/0x230 [ 30.030751] kunit_try_run_case+0x1b3/0x490 [ 30.031177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.031705] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.032090] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.032579] ? __kthread_parkme+0x82/0x160 [ 30.033081] ? preempt_count_sub+0x50/0x80 [ 30.033444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.033755] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.034142] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.034481] kthread+0x257/0x310 [ 30.034731] ? __pfx_kthread+0x10/0x10 [ 30.035242] ret_from_fork+0x41/0x80 [ 30.035650] ? __pfx_kthread+0x10/0x10 [ 30.036237] ret_from_fork_asm+0x1a/0x30 [ 30.036701] </TASK> [ 30.037056] [ 30.037315] Allocated by task 273: [ 30.037705] kasan_save_stack+0x3d/0x60 [ 30.038193] kasan_save_track+0x18/0x40 [ 30.038646] kasan_save_alloc_info+0x3b/0x50 [ 30.039108] __kasan_kmalloc+0xb7/0xc0 [ 30.039613] __kmalloc_cache_noprof+0x184/0x410 [ 30.040111] kasan_atomics+0x96/0x310 [ 30.040623] kunit_try_run_case+0x1b3/0x490 [ 30.041080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.041408] kthread+0x257/0x310 [ 30.041646] ret_from_fork+0x41/0x80 [ 30.041992] ret_from_fork_asm+0x1a/0x30 [ 30.042432] [ 30.042714] The buggy address belongs to the object at ffff888101abdc80 [ 30.042714] which belongs to the cache kmalloc-64 of size 64 [ 30.043993] The buggy address is located 0 bytes to the right of [ 30.043993] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.045399] [ 30.045566] The buggy address belongs to the physical page: [ 30.045886] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.046307] flags: 0x200000000000000(node=0|zone=2) [ 30.046603] page_type: f5(slab) [ 30.046862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.047567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.048264] page dumped because: kasan: bad access detected [ 30.048768] [ 30.048961] Memory state around the buggy address: [ 30.049406] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.052096] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.052566] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.053020] ^ [ 30.055114] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.055742] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.057503] ================================================================== [ 29.446192] ================================================================== [ 29.447017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 29.448533] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 29.449513] [ 29.449807] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 29.450627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.451024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.451685] Call Trace: [ 29.451939] <TASK> [ 29.452254] dump_stack_lvl+0x73/0xb0 [ 29.452749] print_report+0xd1/0x640 [ 29.453191] ? __virt_addr_valid+0x1db/0x2d0 [ 29.453563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.453936] kasan_report+0x102/0x140 [ 29.454213] ? kasan_atomics_helper+0x4a1/0x5450 [ 29.454694] ? kasan_atomics_helper+0x4a1/0x5450 [ 29.455241] kasan_check_range+0x10c/0x1c0 [ 29.455810] __kasan_check_write+0x18/0x20 [ 29.456290] kasan_atomics_helper+0x4a1/0x5450 [ 29.456774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.457330] ? ret_from_fork_asm+0x1a/0x30 [ 29.457810] ? ret_from_fork+0x41/0x80 [ 29.458302] kasan_atomics+0x1dd/0x310 [ 29.458696] ? __pfx_kasan_atomics+0x10/0x10 [ 29.459031] ? __pfx_read_tsc+0x10/0x10 [ 29.459494] ? ktime_get_ts64+0x84/0x230 [ 29.460301] kunit_try_run_case+0x1b3/0x490 [ 29.460768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.461272] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.461752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.462116] ? __kthread_parkme+0x82/0x160 [ 29.462503] ? preempt_count_sub+0x50/0x80 [ 29.463139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.463758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.464303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.464845] kthread+0x257/0x310 [ 29.465236] ? __pfx_kthread+0x10/0x10 [ 29.465535] ret_from_fork+0x41/0x80 [ 29.465805] ? __pfx_kthread+0x10/0x10 [ 29.466423] ret_from_fork_asm+0x1a/0x30 [ 29.466966] </TASK> [ 29.467252] [ 29.467469] Allocated by task 273: [ 29.467703] kasan_save_stack+0x3d/0x60 [ 29.467999] kasan_save_track+0x18/0x40 [ 29.468485] kasan_save_alloc_info+0x3b/0x50 [ 29.468979] __kasan_kmalloc+0xb7/0xc0 [ 29.469413] __kmalloc_cache_noprof+0x184/0x410 [ 29.469945] kasan_atomics+0x96/0x310 [ 29.470405] kunit_try_run_case+0x1b3/0x490 [ 29.470721] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.471236] kthread+0x257/0x310 [ 29.471631] ret_from_fork+0x41/0x80 [ 29.471959] ret_from_fork_asm+0x1a/0x30 [ 29.472471] [ 29.472669] The buggy address belongs to the object at ffff888101abdc80 [ 29.472669] which belongs to the cache kmalloc-64 of size 64 [ 29.473420] The buggy address is located 0 bytes to the right of [ 29.473420] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 29.474559] [ 29.474836] The buggy address belongs to the physical page: [ 29.475178] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 29.475779] flags: 0x200000000000000(node=0|zone=2) [ 29.476106] page_type: f5(slab) [ 29.476349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.476737] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.477427] page dumped because: kasan: bad access detected [ 29.478043] [ 29.478275] Memory state around the buggy address: [ 29.478969] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.479717] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.480418] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.480919] ^ [ 29.481439] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.481808] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.482539] ================================================================== [ 30.152300] ================================================================== [ 30.153210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 30.154072] Write of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.154972] [ 30.155384] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.156528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.157000] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.158013] Call Trace: [ 30.158293] <TASK> [ 30.158527] dump_stack_lvl+0x73/0xb0 [ 30.158962] print_report+0xd1/0x640 [ 30.160681] ? __virt_addr_valid+0x1db/0x2d0 [ 30.161093] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.162191] kasan_report+0x102/0x140 [ 30.162560] ? kasan_atomics_helper+0xe79/0x5450 [ 30.163134] ? kasan_atomics_helper+0xe79/0x5450 [ 30.163771] kasan_check_range+0x10c/0x1c0 [ 30.164450] __kasan_check_write+0x18/0x20 [ 30.164875] kasan_atomics_helper+0xe79/0x5450 [ 30.165920] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.166613] ? ret_from_fork_asm+0x1a/0x30 [ 30.166857] ? ret_from_fork+0x41/0x80 [ 30.167033] kasan_atomics+0x1dd/0x310 [ 30.167187] ? __pfx_kasan_atomics+0x10/0x10 [ 30.167813] ? __pfx_read_tsc+0x10/0x10 [ 30.168328] ? ktime_get_ts64+0x84/0x230 [ 30.168775] kunit_try_run_case+0x1b3/0x490 [ 30.169278] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.169740] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.170466] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.171069] ? __kthread_parkme+0x82/0x160 [ 30.171658] ? preempt_count_sub+0x50/0x80 [ 30.172201] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.172850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.173498] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.173922] kthread+0x257/0x310 [ 30.174345] ? __pfx_kthread+0x10/0x10 [ 30.174785] ret_from_fork+0x41/0x80 [ 30.175202] ? __pfx_kthread+0x10/0x10 [ 30.175646] ret_from_fork_asm+0x1a/0x30 [ 30.176152] </TASK> [ 30.176515] [ 30.176742] Allocated by task 273: [ 30.177206] kasan_save_stack+0x3d/0x60 [ 30.177684] kasan_save_track+0x18/0x40 [ 30.178032] kasan_save_alloc_info+0x3b/0x50 [ 30.178533] __kasan_kmalloc+0xb7/0xc0 [ 30.178956] __kmalloc_cache_noprof+0x184/0x410 [ 30.179410] kasan_atomics+0x96/0x310 [ 30.179756] kunit_try_run_case+0x1b3/0x490 [ 30.180230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.180806] kthread+0x257/0x310 [ 30.181200] ret_from_fork+0x41/0x80 [ 30.181640] ret_from_fork_asm+0x1a/0x30 [ 30.182034] [ 30.182195] The buggy address belongs to the object at ffff888101abdc80 [ 30.182195] which belongs to the cache kmalloc-64 of size 64 [ 30.183320] The buggy address is located 0 bytes to the right of [ 30.183320] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.184195] [ 30.184501] The buggy address belongs to the physical page: [ 30.184866] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.185456] flags: 0x200000000000000(node=0|zone=2) [ 30.185853] page_type: f5(slab) [ 30.186236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.186998] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.187706] page dumped because: kasan: bad access detected [ 30.188097] [ 30.188404] Memory state around the buggy address: [ 30.188872] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.189382] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.189862] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.190583] ^ [ 30.191074] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.191707] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.192194] ================================================================== [ 30.276094] ================================================================== [ 30.277376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 30.278017] Read of size 4 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 30.278598] [ 30.279133] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 30.280371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.281006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.281607] Call Trace: [ 30.281937] <TASK> [ 30.282200] dump_stack_lvl+0x73/0xb0 [ 30.282595] print_report+0xd1/0x640 [ 30.282972] ? __virt_addr_valid+0x1db/0x2d0 [ 30.283420] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.283991] kasan_report+0x102/0x140 [ 30.284386] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.284808] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.285669] __asan_report_load4_noabort+0x18/0x20 [ 30.286182] kasan_atomics_helper+0x4a38/0x5450 [ 30.286950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.287631] ? ret_from_fork_asm+0x1a/0x30 [ 30.288064] ? ret_from_fork+0x41/0x80 [ 30.288755] kasan_atomics+0x1dd/0x310 [ 30.289571] ? __pfx_kasan_atomics+0x10/0x10 [ 30.290002] ? __pfx_read_tsc+0x10/0x10 [ 30.290958] ? ktime_get_ts64+0x84/0x230 [ 30.291520] kunit_try_run_case+0x1b3/0x490 [ 30.291966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.292481] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.292908] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.293396] ? __kthread_parkme+0x82/0x160 [ 30.294191] ? preempt_count_sub+0x50/0x80 [ 30.294530] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.294983] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.296130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.296947] kthread+0x257/0x310 [ 30.297444] ? __pfx_kthread+0x10/0x10 [ 30.297715] ret_from_fork+0x41/0x80 [ 30.298183] ? __pfx_kthread+0x10/0x10 [ 30.298547] ret_from_fork_asm+0x1a/0x30 [ 30.299415] </TASK> [ 30.299712] [ 30.299940] Allocated by task 273: [ 30.300265] kasan_save_stack+0x3d/0x60 [ 30.300631] kasan_save_track+0x18/0x40 [ 30.301799] kasan_save_alloc_info+0x3b/0x50 [ 30.302160] __kasan_kmalloc+0xb7/0xc0 [ 30.303102] __kmalloc_cache_noprof+0x184/0x410 [ 30.303624] kasan_atomics+0x96/0x310 [ 30.303995] kunit_try_run_case+0x1b3/0x490 [ 30.304856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.305211] kthread+0x257/0x310 [ 30.305847] ret_from_fork+0x41/0x80 [ 30.306120] ret_from_fork_asm+0x1a/0x30 [ 30.306641] [ 30.306810] The buggy address belongs to the object at ffff888101abdc80 [ 30.306810] which belongs to the cache kmalloc-64 of size 64 [ 30.307791] The buggy address is located 0 bytes to the right of [ 30.307791] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 30.308970] [ 30.309444] The buggy address belongs to the physical page: [ 30.309980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 30.311489] flags: 0x200000000000000(node=0|zone=2) [ 30.311934] page_type: f5(slab) [ 30.312247] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.312915] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.314057] page dumped because: kasan: bad access detected [ 30.314856] [ 30.315330] Memory state around the buggy address: [ 30.315974] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.316636] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.317450] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.318153] ^ [ 30.318755] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.319566] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.320335] ================================================================== [ 31.768149] ================================================================== [ 31.768837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 31.769758] Read of size 8 at addr ffff888101abdcb0 by task kunit_try_catch/273 [ 31.770212] [ 31.770398] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241122 #1 [ 31.771130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.771549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.772332] Call Trace: [ 31.772591] <TASK> [ 31.772795] dump_stack_lvl+0x73/0xb0 [ 31.773291] print_report+0xd1/0x640 [ 31.773881] ? __virt_addr_valid+0x1db/0x2d0 [ 31.774443] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.774802] kasan_report+0x102/0x140 [ 31.775233] ? kasan_atomics_helper+0x4fb4/0x5450 [ 31.775741] ? kasan_atomics_helper+0x4fb4/0x5450 [ 31.776334] __asan_report_load8_noabort+0x18/0x20 [ 31.776897] kasan_atomics_helper+0x4fb4/0x5450 [ 31.777431] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.777777] ? ret_from_fork_asm+0x1a/0x30 [ 31.778508] ? ret_from_fork+0x41/0x80 [ 31.780337] kasan_atomics+0x1dd/0x310 [ 31.781070] ? __pfx_kasan_atomics+0x10/0x10 [ 31.782206] ? __pfx_read_tsc+0x10/0x10 [ 31.782975] ? ktime_get_ts64+0x84/0x230 [ 31.783460] kunit_try_run_case+0x1b3/0x490 [ 31.783918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.784229] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.784752] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.785250] ? __kthread_parkme+0x82/0x160 [ 31.785923] ? preempt_count_sub+0x50/0x80 [ 31.786848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.787247] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.787608] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.788100] kthread+0x257/0x310 [ 31.789140] ? __pfx_kthread+0x10/0x10 [ 31.789729] ret_from_fork+0x41/0x80 [ 31.790168] ? __pfx_kthread+0x10/0x10 [ 31.790465] ret_from_fork_asm+0x1a/0x30 [ 31.790979] </TASK> [ 31.791234] [ 31.791489] Allocated by task 273: [ 31.791857] kasan_save_stack+0x3d/0x60 [ 31.792283] kasan_save_track+0x18/0x40 [ 31.792665] kasan_save_alloc_info+0x3b/0x50 [ 31.792983] __kasan_kmalloc+0xb7/0xc0 [ 31.793383] __kmalloc_cache_noprof+0x184/0x410 [ 31.793884] kasan_atomics+0x96/0x310 [ 31.794319] kunit_try_run_case+0x1b3/0x490 [ 31.794720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.795069] kthread+0x257/0x310 [ 31.795480] ret_from_fork+0x41/0x80 [ 31.795925] ret_from_fork_asm+0x1a/0x30 [ 31.796426] [ 31.796646] The buggy address belongs to the object at ffff888101abdc80 [ 31.796646] which belongs to the cache kmalloc-64 of size 64 [ 31.797380] The buggy address is located 0 bytes to the right of [ 31.797380] allocated 48-byte region [ffff888101abdc80, ffff888101abdcb0) [ 31.798097] [ 31.798327] The buggy address belongs to the physical page: [ 31.798874] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101abd [ 31.799847] flags: 0x200000000000000(node=0|zone=2) [ 31.800335] page_type: f5(slab) [ 31.800596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.801207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.801588] page dumped because: kasan: bad access detected [ 31.802173] [ 31.802425] Memory state around the buggy address: [ 31.802937] ffff888101abdb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.803661] ffff888101abdc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.804060] >ffff888101abdc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.804561] ^ [ 31.805077] ffff888101abdd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.805974] ffff888101abdd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.806509] ==================================================================