Date
Nov. 26, 2024, 6:09 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 37.930867] ================================================================== [ 37.931664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.933082] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.933889] [ 37.934326] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.935437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.936053] Hardware name: linux,dummy-virt (DT) [ 37.936646] Call trace: [ 37.937073] show_stack+0x20/0x38 (C) [ 37.937730] dump_stack_lvl+0x8c/0xd0 [ 37.938381] print_report+0x118/0x5e0 [ 37.939003] kasan_report+0xc8/0x118 [ 37.939573] kasan_check_range+0x100/0x1a8 [ 37.940270] __kasan_check_write+0x20/0x30 [ 37.940894] kasan_atomics_helper+0x17ec/0x4858 [ 37.941526] kasan_atomics+0x198/0x2e8 [ 37.942185] kunit_try_run_case+0x14c/0x3d0 [ 37.942884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.943605] kthread+0x24c/0x2d0 [ 37.944106] ret_from_fork+0x10/0x20 [ 37.944739] [ 37.945134] Allocated by task 254: [ 37.945706] kasan_save_stack+0x3c/0x68 [ 37.946228] kasan_save_track+0x20/0x40 [ 37.946851] kasan_save_alloc_info+0x40/0x58 [ 37.947538] __kasan_kmalloc+0xd4/0xd8 [ 37.948052] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.948740] kasan_atomics+0xb8/0x2e8 [ 37.949281] kunit_try_run_case+0x14c/0x3d0 [ 37.950305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.951058] kthread+0x24c/0x2d0 [ 37.951585] ret_from_fork+0x10/0x20 [ 37.952047] [ 37.952419] The buggy address belongs to the object at fff00000c591a100 [ 37.952419] which belongs to the cache kmalloc-64 of size 64 [ 37.953548] The buggy address is located 0 bytes to the right of [ 37.953548] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.954840] [ 37.955232] The buggy address belongs to the physical page: [ 37.956018] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.956830] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.957639] page_type: f5(slab) [ 37.958159] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.959010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.959864] page dumped because: kasan: bad access detected [ 37.960499] [ 37.960866] Memory state around the buggy address: [ 37.961431] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.962305] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.963103] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.963881] ^ [ 37.964464] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.965363] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.966146] ================================================================== [ 35.547530] ================================================================== [ 35.548257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 35.548682] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.549590] [ 35.550006] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.551248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.551742] Hardware name: linux,dummy-virt (DT) [ 35.552444] Call trace: [ 35.552956] show_stack+0x20/0x38 (C) [ 35.553619] dump_stack_lvl+0x8c/0xd0 [ 35.554372] print_report+0x118/0x5e0 [ 35.555119] kasan_report+0xc8/0x118 [ 35.555894] kasan_check_range+0x100/0x1a8 [ 35.556708] __kasan_check_read+0x20/0x30 [ 35.557315] kasan_atomics_helper+0x1ec/0x4858 [ 35.558190] kasan_atomics+0x198/0x2e8 [ 35.558857] kunit_try_run_case+0x14c/0x3d0 [ 35.559447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.560266] kthread+0x24c/0x2d0 [ 35.560864] ret_from_fork+0x10/0x20 [ 35.561531] [ 35.561923] Allocated by task 254: [ 35.562486] kasan_save_stack+0x3c/0x68 [ 35.563124] kasan_save_track+0x20/0x40 [ 35.563738] kasan_save_alloc_info+0x40/0x58 [ 35.564381] __kasan_kmalloc+0xd4/0xd8 [ 35.565004] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.565607] kasan_atomics+0xb8/0x2e8 [ 35.566231] kunit_try_run_case+0x14c/0x3d0 [ 35.566769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.567566] kthread+0x24c/0x2d0 [ 35.568148] ret_from_fork+0x10/0x20 [ 35.568711] [ 35.569035] The buggy address belongs to the object at fff00000c591a100 [ 35.569035] which belongs to the cache kmalloc-64 of size 64 [ 35.570407] The buggy address is located 0 bytes to the right of [ 35.570407] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.571639] [ 35.572039] The buggy address belongs to the physical page: [ 35.572789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.573614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.574455] page_type: f5(slab) [ 35.574948] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.575881] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.576701] page dumped because: kasan: bad access detected [ 35.577486] [ 35.577824] Memory state around the buggy address: [ 35.578558] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.579500] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.580355] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.581172] ^ [ 35.581848] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.582656] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.583458] ================================================================== [ 37.512607] ================================================================== [ 37.513500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 37.514235] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.515193] [ 37.515531] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.516670] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.517283] Hardware name: linux,dummy-virt (DT) [ 37.517788] Call trace: [ 37.518266] show_stack+0x20/0x38 (C) [ 37.518896] dump_stack_lvl+0x8c/0xd0 [ 37.519480] print_report+0x118/0x5e0 [ 37.520087] kasan_report+0xc8/0x118 [ 37.520709] kasan_check_range+0x100/0x1a8 [ 37.521317] __kasan_check_write+0x20/0x30 [ 37.522012] kasan_atomics_helper+0x147c/0x4858 [ 37.522638] kasan_atomics+0x198/0x2e8 [ 37.523314] kunit_try_run_case+0x14c/0x3d0 [ 37.524038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.524815] kthread+0x24c/0x2d0 [ 37.525316] ret_from_fork+0x10/0x20 [ 37.525965] [ 37.526333] Allocated by task 254: [ 37.526896] kasan_save_stack+0x3c/0x68 [ 37.527412] kasan_save_track+0x20/0x40 [ 37.528086] kasan_save_alloc_info+0x40/0x58 [ 37.528683] __kasan_kmalloc+0xd4/0xd8 [ 37.529176] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.529940] kasan_atomics+0xb8/0x2e8 [ 37.530590] kunit_try_run_case+0x14c/0x3d0 [ 37.531280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.532137] kthread+0x24c/0x2d0 [ 37.532693] ret_from_fork+0x10/0x20 [ 37.533337] [ 37.533734] The buggy address belongs to the object at fff00000c591a100 [ 37.533734] which belongs to the cache kmalloc-64 of size 64 [ 37.534999] The buggy address is located 0 bytes to the right of [ 37.534999] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.536278] [ 37.536692] The buggy address belongs to the physical page: [ 37.537362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.538379] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.539178] page_type: f5(slab) [ 37.539777] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.540684] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.541657] page dumped because: kasan: bad access detected [ 37.542470] [ 37.542853] Memory state around the buggy address: [ 37.543579] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.544454] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.545366] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.546174] ^ [ 37.546835] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.547706] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.548541] ================================================================== [ 35.822271] ================================================================== [ 35.823471] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 35.824366] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.825410] [ 35.825824] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.827519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.828344] Hardware name: linux,dummy-virt (DT) [ 35.828753] Call trace: [ 35.829374] show_stack+0x20/0x38 (C) [ 35.829995] dump_stack_lvl+0x8c/0xd0 [ 35.830689] print_report+0x118/0x5e0 [ 35.831310] kasan_report+0xc8/0x118 [ 35.831858] kasan_check_range+0x100/0x1a8 [ 35.832649] __kasan_check_write+0x20/0x30 [ 35.833331] kasan_atomics_helper+0x414/0x4858 [ 35.834095] kasan_atomics+0x198/0x2e8 [ 35.834634] kunit_try_run_case+0x14c/0x3d0 [ 35.835283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.836043] kthread+0x24c/0x2d0 [ 35.836637] ret_from_fork+0x10/0x20 [ 35.837240] [ 35.837611] Allocated by task 254: [ 35.838178] kasan_save_stack+0x3c/0x68 [ 35.838727] kasan_save_track+0x20/0x40 [ 35.839341] kasan_save_alloc_info+0x40/0x58 [ 35.839946] __kasan_kmalloc+0xd4/0xd8 [ 35.840524] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.841207] kasan_atomics+0xb8/0x2e8 [ 35.841802] kunit_try_run_case+0x14c/0x3d0 [ 35.842349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.843140] kthread+0x24c/0x2d0 [ 35.843699] ret_from_fork+0x10/0x20 [ 35.844250] [ 35.844554] The buggy address belongs to the object at fff00000c591a100 [ 35.844554] which belongs to the cache kmalloc-64 of size 64 [ 35.845965] The buggy address is located 0 bytes to the right of [ 35.845965] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.847393] [ 35.847712] The buggy address belongs to the physical page: [ 35.848460] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.849206] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.850085] page_type: f5(slab) [ 35.850637] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.851563] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.852521] page dumped because: kasan: bad access detected [ 35.853062] [ 35.853430] Memory state around the buggy address: [ 35.854121] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.855041] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.855795] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.856691] ^ [ 35.857285] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.858119] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.858865] ================================================================== [ 36.433547] ================================================================== [ 36.434279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.435070] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.435728] [ 36.436719] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.438034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.438774] Hardware name: linux,dummy-virt (DT) [ 36.439582] Call trace: [ 36.440221] show_stack+0x20/0x38 (C) [ 36.441029] dump_stack_lvl+0x8c/0xd0 [ 36.441805] print_report+0x118/0x5e0 [ 36.442609] kasan_report+0xc8/0x118 [ 36.443383] kasan_check_range+0x100/0x1a8 [ 36.444205] __kasan_check_write+0x20/0x30 [ 36.444780] kasan_atomics_helper+0xad4/0x4858 [ 36.445379] kasan_atomics+0x198/0x2e8 [ 36.446440] kunit_try_run_case+0x14c/0x3d0 [ 36.447036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.447954] kthread+0x24c/0x2d0 [ 36.448680] ret_from_fork+0x10/0x20 [ 36.449465] [ 36.449995] Allocated by task 254: [ 36.450658] kasan_save_stack+0x3c/0x68 [ 36.451452] kasan_save_track+0x20/0x40 [ 36.452286] kasan_save_alloc_info+0x40/0x58 [ 36.453114] __kasan_kmalloc+0xd4/0xd8 [ 36.453885] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.454558] kasan_atomics+0xb8/0x2e8 [ 36.455070] kunit_try_run_case+0x14c/0x3d0 [ 36.455592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.456682] kthread+0x24c/0x2d0 [ 36.457403] ret_from_fork+0x10/0x20 [ 36.458207] [ 36.458744] The buggy address belongs to the object at fff00000c591a100 [ 36.458744] which belongs to the cache kmalloc-64 of size 64 [ 36.460334] The buggy address is located 0 bytes to the right of [ 36.460334] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.461946] [ 36.462495] The buggy address belongs to the physical page: [ 36.463208] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.464062] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.464793] page_type: f5(slab) [ 36.465796] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.466882] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.467949] page dumped because: kasan: bad access detected [ 36.468806] [ 36.469379] Memory state around the buggy address: [ 36.470110] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.471175] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.472213] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.473235] ^ [ 36.474078] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.475165] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.476185] ================================================================== [ 35.586135] ================================================================== [ 35.587523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 35.588366] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.590195] [ 35.590617] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.591659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.592226] Hardware name: linux,dummy-virt (DT) [ 35.592759] Call trace: [ 35.593239] show_stack+0x20/0x38 (C) [ 35.593896] dump_stack_lvl+0x8c/0xd0 [ 35.594556] print_report+0x118/0x5e0 [ 35.595206] kasan_report+0xc8/0x118 [ 35.595855] kasan_check_range+0x100/0x1a8 [ 35.596566] __kasan_check_write+0x20/0x30 [ 35.597274] kasan_atomics_helper+0x24c/0x4858 [ 35.597849] kasan_atomics+0x198/0x2e8 [ 35.598528] kunit_try_run_case+0x14c/0x3d0 [ 35.599131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.599949] kthread+0x24c/0x2d0 [ 35.600509] ret_from_fork+0x10/0x20 [ 35.601177] [ 35.601496] Allocated by task 254: [ 35.602045] kasan_save_stack+0x3c/0x68 [ 35.602544] kasan_save_track+0x20/0x40 [ 35.603168] kasan_save_alloc_info+0x40/0x58 [ 35.603825] __kasan_kmalloc+0xd4/0xd8 [ 35.604337] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.605000] kasan_atomics+0xb8/0x2e8 [ 35.605628] kunit_try_run_case+0x14c/0x3d0 [ 35.606268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.607073] kthread+0x24c/0x2d0 [ 35.607607] ret_from_fork+0x10/0x20 [ 35.608222] [ 35.608576] The buggy address belongs to the object at fff00000c591a100 [ 35.608576] which belongs to the cache kmalloc-64 of size 64 [ 35.609738] The buggy address is located 0 bytes to the right of [ 35.609738] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.612085] [ 35.612443] The buggy address belongs to the physical page: [ 35.613357] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.614263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.614849] page_type: f5(slab) [ 35.616191] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.617276] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.617896] page dumped because: kasan: bad access detected [ 35.618539] [ 35.618858] Memory state around the buggy address: [ 35.619476] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.620394] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.621093] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.621986] ^ [ 35.622607] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.623444] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.624231] ================================================================== [ 36.599421] ================================================================== [ 36.600512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 36.601671] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.602436] [ 36.603261] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.604520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.605277] Hardware name: linux,dummy-virt (DT) [ 36.605996] Call trace: [ 36.606479] show_stack+0x20/0x38 (C) [ 36.607176] dump_stack_lvl+0x8c/0xd0 [ 36.607689] print_report+0x118/0x5e0 [ 36.608341] kasan_report+0xc8/0x118 [ 36.608985] kasan_check_range+0x100/0x1a8 [ 36.609554] __kasan_check_write+0x20/0x30 [ 36.610279] kasan_atomics_helper+0xc08/0x4858 [ 36.610948] kasan_atomics+0x198/0x2e8 [ 36.611643] kunit_try_run_case+0x14c/0x3d0 [ 36.612333] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.613119] kthread+0x24c/0x2d0 [ 36.613714] ret_from_fork+0x10/0x20 [ 36.614344] [ 36.614708] Allocated by task 254: [ 36.615238] kasan_save_stack+0x3c/0x68 [ 36.615842] kasan_save_track+0x20/0x40 [ 36.616497] kasan_save_alloc_info+0x40/0x58 [ 36.617098] __kasan_kmalloc+0xd4/0xd8 [ 36.617749] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.618388] kasan_atomics+0xb8/0x2e8 [ 36.619059] kunit_try_run_case+0x14c/0x3d0 [ 36.619719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.620459] kthread+0x24c/0x2d0 [ 36.621059] ret_from_fork+0x10/0x20 [ 36.621663] [ 36.622114] The buggy address belongs to the object at fff00000c591a100 [ 36.622114] which belongs to the cache kmalloc-64 of size 64 [ 36.623382] The buggy address is located 0 bytes to the right of [ 36.623382] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.624670] [ 36.625107] The buggy address belongs to the physical page: [ 36.626276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.627229] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.628105] page_type: f5(slab) [ 36.628634] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.629596] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.630515] page dumped because: kasan: bad access detected [ 36.631200] [ 36.631579] Memory state around the buggy address: [ 36.632315] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.633083] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.634036] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.634821] ^ [ 36.635516] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.636356] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.637210] ================================================================== [ 36.392887] ================================================================== [ 36.393767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.394672] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.395412] [ 36.395813] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.396804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.397438] Hardware name: linux,dummy-virt (DT) [ 36.398106] Call trace: [ 36.398584] show_stack+0x20/0x38 (C) [ 36.399201] dump_stack_lvl+0x8c/0xd0 [ 36.399761] print_report+0x118/0x5e0 [ 36.400392] kasan_report+0xc8/0x118 [ 36.400806] kasan_check_range+0x100/0x1a8 [ 36.401353] __kasan_check_write+0x20/0x30 [ 36.401875] kasan_atomics_helper+0xa6c/0x4858 [ 36.403606] kasan_atomics+0x198/0x2e8 [ 36.404522] kunit_try_run_case+0x14c/0x3d0 [ 36.405196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.405886] kthread+0x24c/0x2d0 [ 36.406514] ret_from_fork+0x10/0x20 [ 36.407117] [ 36.407450] Allocated by task 254: [ 36.408014] kasan_save_stack+0x3c/0x68 [ 36.408554] kasan_save_track+0x20/0x40 [ 36.409192] kasan_save_alloc_info+0x40/0x58 [ 36.409752] __kasan_kmalloc+0xd4/0xd8 [ 36.410379] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.411005] kasan_atomics+0xb8/0x2e8 [ 36.411601] kunit_try_run_case+0x14c/0x3d0 [ 36.412217] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.412980] kthread+0x24c/0x2d0 [ 36.413540] ret_from_fork+0x10/0x20 [ 36.414090] [ 36.414463] The buggy address belongs to the object at fff00000c591a100 [ 36.414463] which belongs to the cache kmalloc-64 of size 64 [ 36.415730] The buggy address is located 0 bytes to the right of [ 36.415730] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.417078] [ 36.417457] The buggy address belongs to the physical page: [ 36.418166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.419065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.419936] page_type: f5(slab) [ 36.420508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.421402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.422223] page dumped because: kasan: bad access detected [ 36.423367] [ 36.423897] Memory state around the buggy address: [ 36.424712] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.425703] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.426733] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.427735] ^ [ 36.428557] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.429515] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.430511] ================================================================== [ 36.757387] ================================================================== [ 36.758226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.759181] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.760072] [ 36.760687] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.761945] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.762473] Hardware name: linux,dummy-virt (DT) [ 36.763214] Call trace: [ 36.763607] show_stack+0x20/0x38 (C) [ 36.764340] dump_stack_lvl+0x8c/0xd0 [ 36.764935] print_report+0x118/0x5e0 [ 36.765565] kasan_report+0xc8/0x118 [ 36.766103] kasan_check_range+0x100/0x1a8 [ 36.766657] __kasan_check_write+0x20/0x30 [ 36.767276] kasan_atomics_helper+0xd3c/0x4858 [ 36.767967] kasan_atomics+0x198/0x2e8 [ 36.768469] kunit_try_run_case+0x14c/0x3d0 [ 36.769154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.770090] kthread+0x24c/0x2d0 [ 36.770740] ret_from_fork+0x10/0x20 [ 36.771438] [ 36.771839] Allocated by task 254: [ 36.772446] kasan_save_stack+0x3c/0x68 [ 36.773131] kasan_save_track+0x20/0x40 [ 36.773785] kasan_save_alloc_info+0x40/0x58 [ 36.774384] __kasan_kmalloc+0xd4/0xd8 [ 36.775062] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.775590] kasan_atomics+0xb8/0x2e8 [ 36.776138] kunit_try_run_case+0x14c/0x3d0 [ 36.776922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.777724] kthread+0x24c/0x2d0 [ 36.778362] ret_from_fork+0x10/0x20 [ 36.779004] [ 36.779397] The buggy address belongs to the object at fff00000c591a100 [ 36.779397] which belongs to the cache kmalloc-64 of size 64 [ 36.780710] The buggy address is located 0 bytes to the right of [ 36.780710] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.782066] [ 36.782373] The buggy address belongs to the physical page: [ 36.783216] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.784276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.785066] page_type: f5(slab) [ 36.785708] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.786665] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.787548] page dumped because: kasan: bad access detected [ 36.788224] [ 36.788621] Memory state around the buggy address: [ 36.789187] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.790138] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.790961] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.791883] ^ [ 36.792511] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.793382] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.794262] ================================================================== [ 37.065594] ================================================================== [ 37.066534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 37.068097] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.069975] [ 37.070390] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.071624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.072256] Hardware name: linux,dummy-virt (DT) [ 37.072823] Call trace: [ 37.073302] show_stack+0x20/0x38 (C) [ 37.073959] dump_stack_lvl+0x8c/0xd0 [ 37.074592] print_report+0x118/0x5e0 [ 37.075210] kasan_report+0xc8/0x118 [ 37.075873] kasan_check_range+0x100/0x1a8 [ 37.076500] __kasan_check_write+0x20/0x30 [ 37.077189] kasan_atomics_helper+0xf88/0x4858 [ 37.077887] kasan_atomics+0x198/0x2e8 [ 37.078554] kunit_try_run_case+0x14c/0x3d0 [ 37.079166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.079954] kthread+0x24c/0x2d0 [ 37.080551] ret_from_fork+0x10/0x20 [ 37.081123] [ 37.081485] Allocated by task 254: [ 37.082036] kasan_save_stack+0x3c/0x68 [ 37.082658] kasan_save_track+0x20/0x40 [ 37.083195] kasan_save_alloc_info+0x40/0x58 [ 37.083853] __kasan_kmalloc+0xd4/0xd8 [ 37.084491] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.085131] kasan_atomics+0xb8/0x2e8 [ 37.085635] kunit_try_run_case+0x14c/0x3d0 [ 37.086306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.087039] kthread+0x24c/0x2d0 [ 37.087599] ret_from_fork+0x10/0x20 [ 37.088183] [ 37.088549] The buggy address belongs to the object at fff00000c591a100 [ 37.088549] which belongs to the cache kmalloc-64 of size 64 [ 37.089813] The buggy address is located 0 bytes to the right of [ 37.089813] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.091086] [ 37.091412] The buggy address belongs to the physical page: [ 37.092153] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.093005] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.093841] page_type: f5(slab) [ 37.094428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.095360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.096163] page dumped because: kasan: bad access detected [ 37.096833] [ 37.097197] Memory state around the buggy address: [ 37.097875] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.098714] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.099448] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.100382] ^ [ 37.101087] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.101776] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.102682] ================================================================== [ 35.784153] ================================================================== [ 35.784925] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 35.785821] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.788137] [ 35.788505] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.789574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.790086] Hardware name: linux,dummy-virt (DT) [ 35.790752] Call trace: [ 35.791174] show_stack+0x20/0x38 (C) [ 35.791749] dump_stack_lvl+0x8c/0xd0 [ 35.792358] print_report+0x118/0x5e0 [ 35.792925] kasan_report+0xc8/0x118 [ 35.793496] kasan_check_range+0x100/0x1a8 [ 35.794080] __kasan_check_write+0x20/0x30 [ 35.794765] kasan_atomics_helper+0x3ac/0x4858 [ 35.795431] kasan_atomics+0x198/0x2e8 [ 35.796094] kunit_try_run_case+0x14c/0x3d0 [ 35.796770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.797591] kthread+0x24c/0x2d0 [ 35.798137] ret_from_fork+0x10/0x20 [ 35.798724] [ 35.799076] Allocated by task 254: [ 35.799637] kasan_save_stack+0x3c/0x68 [ 35.800274] kasan_save_track+0x20/0x40 [ 35.800852] kasan_save_alloc_info+0x40/0x58 [ 35.801546] __kasan_kmalloc+0xd4/0xd8 [ 35.802108] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.802796] kasan_atomics+0xb8/0x2e8 [ 35.803366] kunit_try_run_case+0x14c/0x3d0 [ 35.804031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.804761] kthread+0x24c/0x2d0 [ 35.805350] ret_from_fork+0x10/0x20 [ 35.805864] [ 35.806194] The buggy address belongs to the object at fff00000c591a100 [ 35.806194] which belongs to the cache kmalloc-64 of size 64 [ 35.807511] The buggy address is located 0 bytes to the right of [ 35.807511] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.808765] [ 35.809163] The buggy address belongs to the physical page: [ 35.809890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.810875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.811661] page_type: f5(slab) [ 35.812230] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.813116] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.813935] page dumped because: kasan: bad access detected [ 35.814465] [ 35.814829] Memory state around the buggy address: [ 35.815500] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.816274] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.817083] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.817932] ^ [ 35.818616] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.819423] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.820259] ================================================================== [ 36.124133] ================================================================== [ 36.125004] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 36.125628] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.126855] [ 36.127379] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.128876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.129499] Hardware name: linux,dummy-virt (DT) [ 36.130297] Call trace: [ 36.130852] show_stack+0x20/0x38 (C) [ 36.131417] dump_stack_lvl+0x8c/0xd0 [ 36.132034] print_report+0x118/0x5e0 [ 36.132642] kasan_report+0xc8/0x118 [ 36.133355] kasan_check_range+0x100/0x1a8 [ 36.134031] __kasan_check_write+0x20/0x30 [ 36.134608] kasan_atomics_helper+0x760/0x4858 [ 36.135220] kasan_atomics+0x198/0x2e8 [ 36.135769] kunit_try_run_case+0x14c/0x3d0 [ 36.136389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.137223] kthread+0x24c/0x2d0 [ 36.137735] ret_from_fork+0x10/0x20 [ 36.138313] [ 36.138666] Allocated by task 254: [ 36.139234] kasan_save_stack+0x3c/0x68 [ 36.139801] kasan_save_track+0x20/0x40 [ 36.140384] kasan_save_alloc_info+0x40/0x58 [ 36.141009] __kasan_kmalloc+0xd4/0xd8 [ 36.141563] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.142174] kasan_atomics+0xb8/0x2e8 [ 36.142691] kunit_try_run_case+0x14c/0x3d0 [ 36.143309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.144090] kthread+0x24c/0x2d0 [ 36.144673] ret_from_fork+0x10/0x20 [ 36.145227] [ 36.145625] The buggy address belongs to the object at fff00000c591a100 [ 36.145625] which belongs to the cache kmalloc-64 of size 64 [ 36.146773] The buggy address is located 0 bytes to the right of [ 36.146773] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.148029] [ 36.148401] The buggy address belongs to the physical page: [ 36.149085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.149924] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.150672] page_type: f5(slab) [ 36.151257] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.152128] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.152863] page dumped because: kasan: bad access detected [ 36.153603] [ 36.153981] Memory state around the buggy address: [ 36.154662] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.155522] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.156374] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.157178] ^ [ 36.157742] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.158623] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.159529] ================================================================== [ 37.213558] ================================================================== [ 37.214295] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 37.215063] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.215771] [ 37.216187] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.217443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.217980] Hardware name: linux,dummy-virt (DT) [ 37.218640] Call trace: [ 37.219033] show_stack+0x20/0x38 (C) [ 37.219681] dump_stack_lvl+0x8c/0xd0 [ 37.220537] print_report+0x118/0x5e0 [ 37.221170] kasan_report+0xc8/0x118 [ 37.221775] kasan_check_range+0x100/0x1a8 [ 37.222476] __kasan_check_write+0x20/0x30 [ 37.223153] kasan_atomics_helper+0x1128/0x4858 [ 37.223891] kasan_atomics+0x198/0x2e8 [ 37.224517] kunit_try_run_case+0x14c/0x3d0 [ 37.225224] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.226032] kthread+0x24c/0x2d0 [ 37.226613] ret_from_fork+0x10/0x20 [ 37.227282] [ 37.227624] Allocated by task 254: [ 37.228102] kasan_save_stack+0x3c/0x68 [ 37.228735] kasan_save_track+0x20/0x40 [ 37.229260] kasan_save_alloc_info+0x40/0x58 [ 37.229941] __kasan_kmalloc+0xd4/0xd8 [ 37.230477] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.231071] kasan_atomics+0xb8/0x2e8 [ 37.231674] kunit_try_run_case+0x14c/0x3d0 [ 37.232296] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.232916] kthread+0x24c/0x2d0 [ 37.233482] ret_from_fork+0x10/0x20 [ 37.234094] [ 37.234477] The buggy address belongs to the object at fff00000c591a100 [ 37.234477] which belongs to the cache kmalloc-64 of size 64 [ 37.235713] The buggy address is located 0 bytes to the right of [ 37.235713] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.236937] [ 37.237312] The buggy address belongs to the physical page: [ 37.238043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.238817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.239615] page_type: f5(slab) [ 37.240180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.241029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.241891] page dumped because: kasan: bad access detected [ 37.242437] [ 37.242819] Memory state around the buggy address: [ 37.243513] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.244231] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.245163] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.246093] ^ [ 37.246803] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.247624] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.248391] ================================================================== [ 37.665378] ================================================================== [ 37.666217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 37.667101] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.667806] [ 37.668202] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.669514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.670165] Hardware name: linux,dummy-virt (DT) [ 37.670754] Call trace: [ 37.671270] show_stack+0x20/0x38 (C) [ 37.671952] dump_stack_lvl+0x8c/0xd0 [ 37.672588] print_report+0x118/0x5e0 [ 37.673354] kasan_report+0xc8/0x118 [ 37.674037] __asan_report_load8_noabort+0x20/0x30 [ 37.674683] kasan_atomics_helper+0x3db0/0x4858 [ 37.675414] kasan_atomics+0x198/0x2e8 [ 37.676105] kunit_try_run_case+0x14c/0x3d0 [ 37.676732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.677572] kthread+0x24c/0x2d0 [ 37.678178] ret_from_fork+0x10/0x20 [ 37.678844] [ 37.679235] Allocated by task 254: [ 37.679821] kasan_save_stack+0x3c/0x68 [ 37.680426] kasan_save_track+0x20/0x40 [ 37.681048] kasan_save_alloc_info+0x40/0x58 [ 37.681752] __kasan_kmalloc+0xd4/0xd8 [ 37.682333] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.683086] kasan_atomics+0xb8/0x2e8 [ 37.683637] kunit_try_run_case+0x14c/0x3d0 [ 37.684332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.685068] kthread+0x24c/0x2d0 [ 37.685659] ret_from_fork+0x10/0x20 [ 37.686202] [ 37.686628] The buggy address belongs to the object at fff00000c591a100 [ 37.686628] which belongs to the cache kmalloc-64 of size 64 [ 37.687883] The buggy address is located 0 bytes to the right of [ 37.687883] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.689216] [ 37.689563] The buggy address belongs to the physical page: [ 37.690296] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.691215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.692099] page_type: f5(slab) [ 37.692580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.693529] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.694459] page dumped because: kasan: bad access detected [ 37.695162] [ 37.695514] Memory state around the buggy address: [ 37.696246] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.697051] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.697962] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.698815] ^ [ 37.699449] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.700346] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.701237] ================================================================== [ 36.242090] ================================================================== [ 36.243506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 36.244351] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.245169] [ 36.245560] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.247363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.248152] Hardware name: linux,dummy-virt (DT) [ 36.248832] Call trace: [ 36.249280] show_stack+0x20/0x38 (C) [ 36.249941] dump_stack_lvl+0x8c/0xd0 [ 36.250445] print_report+0x118/0x5e0 [ 36.250974] kasan_report+0xc8/0x118 [ 36.251595] __asan_report_load4_noabort+0x20/0x30 [ 36.252339] kasan_atomics_helper+0x42d8/0x4858 [ 36.253068] kasan_atomics+0x198/0x2e8 [ 36.253692] kunit_try_run_case+0x14c/0x3d0 [ 36.254412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.255131] kthread+0x24c/0x2d0 [ 36.255769] ret_from_fork+0x10/0x20 [ 36.256426] [ 36.256787] Allocated by task 254: [ 36.257348] kasan_save_stack+0x3c/0x68 [ 36.257957] kasan_save_track+0x20/0x40 [ 36.258558] kasan_save_alloc_info+0x40/0x58 [ 36.259244] __kasan_kmalloc+0xd4/0xd8 [ 36.259860] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.260502] kasan_atomics+0xb8/0x2e8 [ 36.261092] kunit_try_run_case+0x14c/0x3d0 [ 36.261751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.262833] kthread+0x24c/0x2d0 [ 36.263344] ret_from_fork+0x10/0x20 [ 36.263851] [ 36.264516] The buggy address belongs to the object at fff00000c591a100 [ 36.264516] which belongs to the cache kmalloc-64 of size 64 [ 36.265619] The buggy address is located 0 bytes to the right of [ 36.265619] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.266998] [ 36.267378] The buggy address belongs to the physical page: [ 36.268215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.269233] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.270437] page_type: f5(slab) [ 36.270891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.272030] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.273122] page dumped because: kasan: bad access detected [ 36.274015] [ 36.274568] Memory state around the buggy address: [ 36.275417] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.276426] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.277248] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.278288] ^ [ 36.279001] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.279716] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.280571] ================================================================== [ 37.473717] ================================================================== [ 37.474581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 37.476098] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.477120] [ 37.477455] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.478304] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.478925] Hardware name: linux,dummy-virt (DT) [ 37.479593] Call trace: [ 37.480075] show_stack+0x20/0x38 (C) [ 37.480741] dump_stack_lvl+0x8c/0xd0 [ 37.481405] print_report+0x118/0x5e0 [ 37.482030] kasan_report+0xc8/0x118 [ 37.482676] kasan_check_range+0x100/0x1a8 [ 37.483239] __kasan_check_write+0x20/0x30 [ 37.483932] kasan_atomics_helper+0x1414/0x4858 [ 37.484487] kasan_atomics+0x198/0x2e8 [ 37.485139] kunit_try_run_case+0x14c/0x3d0 [ 37.485758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.486605] kthread+0x24c/0x2d0 [ 37.487212] ret_from_fork+0x10/0x20 [ 37.487847] [ 37.488213] Allocated by task 254: [ 37.488758] kasan_save_stack+0x3c/0x68 [ 37.489357] kasan_save_track+0x20/0x40 [ 37.489995] kasan_save_alloc_info+0x40/0x58 [ 37.490590] __kasan_kmalloc+0xd4/0xd8 [ 37.491077] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.491746] kasan_atomics+0xb8/0x2e8 [ 37.492340] kunit_try_run_case+0x14c/0x3d0 [ 37.493012] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.493781] kthread+0x24c/0x2d0 [ 37.494363] ret_from_fork+0x10/0x20 [ 37.494979] [ 37.495357] The buggy address belongs to the object at fff00000c591a100 [ 37.495357] which belongs to the cache kmalloc-64 of size 64 [ 37.496735] The buggy address is located 0 bytes to the right of [ 37.496735] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.498216] [ 37.498594] The buggy address belongs to the physical page: [ 37.499351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.500213] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.501059] page_type: f5(slab) [ 37.501626] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.502538] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.503414] page dumped because: kasan: bad access detected [ 37.504094] [ 37.504446] Memory state around the buggy address: [ 37.505616] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.506536] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.507320] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.508043] ^ [ 37.508718] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.509531] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.510361] ================================================================== [ 35.861729] ================================================================== [ 35.862684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 35.863499] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.863874] [ 35.864328] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.865881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.866416] Hardware name: linux,dummy-virt (DT) [ 35.866940] Call trace: [ 35.867348] show_stack+0x20/0x38 (C) [ 35.867935] dump_stack_lvl+0x8c/0xd0 [ 35.868523] print_report+0x118/0x5e0 [ 35.869090] kasan_report+0xc8/0x118 [ 35.869715] kasan_check_range+0x100/0x1a8 [ 35.870395] __kasan_check_write+0x20/0x30 [ 35.871101] kasan_atomics_helper+0x47c/0x4858 [ 35.871715] kasan_atomics+0x198/0x2e8 [ 35.872387] kunit_try_run_case+0x14c/0x3d0 [ 35.873042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.873696] kthread+0x24c/0x2d0 [ 35.874299] ret_from_fork+0x10/0x20 [ 35.874944] [ 35.875358] Allocated by task 254: [ 35.875931] kasan_save_stack+0x3c/0x68 [ 35.876501] kasan_save_track+0x20/0x40 [ 35.877072] kasan_save_alloc_info+0x40/0x58 [ 35.877736] __kasan_kmalloc+0xd4/0xd8 [ 35.878241] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.878935] kasan_atomics+0xb8/0x2e8 [ 35.879530] kunit_try_run_case+0x14c/0x3d0 [ 35.880097] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.880819] kthread+0x24c/0x2d0 [ 35.881411] ret_from_fork+0x10/0x20 [ 35.881872] [ 35.882256] The buggy address belongs to the object at fff00000c591a100 [ 35.882256] which belongs to the cache kmalloc-64 of size 64 [ 35.883524] The buggy address is located 0 bytes to the right of [ 35.883524] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.884686] [ 35.885086] The buggy address belongs to the physical page: [ 35.885684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.886639] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.887387] page_type: f5(slab) [ 35.887885] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.888798] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.889745] page dumped because: kasan: bad access detected [ 35.890329] [ 35.890698] Memory state around the buggy address: [ 35.891392] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.892156] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.893002] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.893804] ^ [ 35.894428] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.895358] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.895998] ================================================================== [ 37.104073] ================================================================== [ 37.104879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 37.105767] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.106553] [ 37.106983] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.108236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.108766] Hardware name: linux,dummy-virt (DT) [ 37.109403] Call trace: [ 37.109863] show_stack+0x20/0x38 (C) [ 37.110562] dump_stack_lvl+0x8c/0xd0 [ 37.111098] print_report+0x118/0x5e0 [ 37.111739] kasan_report+0xc8/0x118 [ 37.112380] kasan_check_range+0x100/0x1a8 [ 37.112954] __kasan_check_write+0x20/0x30 [ 37.113631] kasan_atomics_helper+0xff0/0x4858 [ 37.114205] kasan_atomics+0x198/0x2e8 [ 37.114865] kunit_try_run_case+0x14c/0x3d0 [ 37.115617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.116410] kthread+0x24c/0x2d0 [ 37.117077] ret_from_fork+0x10/0x20 [ 37.117692] [ 37.118055] Allocated by task 254: [ 37.118493] kasan_save_stack+0x3c/0x68 [ 37.119123] kasan_save_track+0x20/0x40 [ 37.119617] kasan_save_alloc_info+0x40/0x58 [ 37.120293] __kasan_kmalloc+0xd4/0xd8 [ 37.120843] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.121422] kasan_atomics+0xb8/0x2e8 [ 37.122036] kunit_try_run_case+0x14c/0x3d0 [ 37.122700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.123345] kthread+0x24c/0x2d0 [ 37.123924] ret_from_fork+0x10/0x20 [ 37.124444] [ 37.124808] The buggy address belongs to the object at fff00000c591a100 [ 37.124808] which belongs to the cache kmalloc-64 of size 64 [ 37.126056] The buggy address is located 0 bytes to the right of [ 37.126056] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.127310] [ 37.127640] The buggy address belongs to the physical page: [ 37.128258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.129194] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.130006] page_type: f5(slab) [ 37.130574] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.131558] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.132488] page dumped because: kasan: bad access detected [ 37.133210] [ 37.133583] Memory state around the buggy address: [ 37.134091] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.135028] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.135823] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.136588] ^ [ 37.137238] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.137942] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.138831] ================================================================== [ 37.893614] ================================================================== [ 37.894272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.895235] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.896149] [ 37.896622] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.897642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.898311] Hardware name: linux,dummy-virt (DT) [ 37.898941] Call trace: [ 37.899410] show_stack+0x20/0x38 (C) [ 37.900144] dump_stack_lvl+0x8c/0xd0 [ 37.900821] print_report+0x118/0x5e0 [ 37.901432] kasan_report+0xc8/0x118 [ 37.902106] __asan_report_load8_noabort+0x20/0x30 [ 37.902787] kasan_atomics_helper+0x3e20/0x4858 [ 37.903541] kasan_atomics+0x198/0x2e8 [ 37.904170] kunit_try_run_case+0x14c/0x3d0 [ 37.904838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.905693] kthread+0x24c/0x2d0 [ 37.906344] ret_from_fork+0x10/0x20 [ 37.906921] [ 37.907336] Allocated by task 254: [ 37.907873] kasan_save_stack+0x3c/0x68 [ 37.908571] kasan_save_track+0x20/0x40 [ 37.909173] kasan_save_alloc_info+0x40/0x58 [ 37.909879] __kasan_kmalloc+0xd4/0xd8 [ 37.910432] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.911181] kasan_atomics+0xb8/0x2e8 [ 37.911729] kunit_try_run_case+0x14c/0x3d0 [ 37.912453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.913134] kthread+0x24c/0x2d0 [ 37.913731] ret_from_fork+0x10/0x20 [ 37.914309] [ 37.914739] The buggy address belongs to the object at fff00000c591a100 [ 37.914739] which belongs to the cache kmalloc-64 of size 64 [ 37.915936] The buggy address is located 0 bytes to the right of [ 37.915936] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.917309] [ 37.917722] The buggy address belongs to the physical page: [ 37.918375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.919412] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.920166] page_type: f5(slab) [ 37.920766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.921638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.922530] page dumped because: kasan: bad access detected [ 37.923221] [ 37.923615] Memory state around the buggy address: [ 37.924192] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.925120] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.926055] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.926871] ^ [ 37.927532] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.928381] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.929248] ================================================================== [ 37.702786] ================================================================== [ 37.703527] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 37.704541] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.705490] [ 37.705926] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.707069] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.707642] Hardware name: linux,dummy-virt (DT) [ 37.708351] Call trace: [ 37.708762] show_stack+0x20/0x38 (C) [ 37.709488] dump_stack_lvl+0x8c/0xd0 [ 37.710189] print_report+0x118/0x5e0 [ 37.710745] kasan_report+0xc8/0x118 [ 37.711424] kasan_check_range+0x100/0x1a8 [ 37.712050] __kasan_check_write+0x20/0x30 [ 37.712737] kasan_atomics_helper+0x1644/0x4858 [ 37.713550] kasan_atomics+0x198/0x2e8 [ 37.714238] kunit_try_run_case+0x14c/0x3d0 [ 37.714997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.715734] kthread+0x24c/0x2d0 [ 37.716368] ret_from_fork+0x10/0x20 [ 37.716977] [ 37.717329] Allocated by task 254: [ 37.717876] kasan_save_stack+0x3c/0x68 [ 37.718485] kasan_save_track+0x20/0x40 [ 37.719162] kasan_save_alloc_info+0x40/0x58 [ 37.719754] __kasan_kmalloc+0xd4/0xd8 [ 37.720422] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.721045] kasan_atomics+0xb8/0x2e8 [ 37.721685] kunit_try_run_case+0x14c/0x3d0 [ 37.722312] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.723214] kthread+0x24c/0x2d0 [ 37.723784] ret_from_fork+0x10/0x20 [ 37.724525] [ 37.724986] The buggy address belongs to the object at fff00000c591a100 [ 37.724986] which belongs to the cache kmalloc-64 of size 64 [ 37.726371] The buggy address is located 0 bytes to the right of [ 37.726371] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.727798] [ 37.728327] The buggy address belongs to the physical page: [ 37.729120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.730227] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.731205] page_type: f5(slab) [ 37.731665] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.732483] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.733306] page dumped because: kasan: bad access detected [ 37.734029] [ 37.734580] Memory state around the buggy address: [ 37.735373] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.736325] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.737271] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.738117] ^ [ 37.738806] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.739638] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.740489] ================================================================== [ 36.050077] ================================================================== [ 36.051451] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 36.052620] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.053436] [ 36.053720] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.054659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.055336] Hardware name: linux,dummy-virt (DT) [ 36.056009] Call trace: [ 36.056477] show_stack+0x20/0x38 (C) [ 36.057140] dump_stack_lvl+0x8c/0xd0 [ 36.057750] print_report+0x118/0x5e0 [ 36.058437] kasan_report+0xc8/0x118 [ 36.059001] kasan_check_range+0x100/0x1a8 [ 36.059533] __kasan_check_write+0x20/0x30 [ 36.060230] kasan_atomics_helper+0x684/0x4858 [ 36.060816] kasan_atomics+0x198/0x2e8 [ 36.061482] kunit_try_run_case+0x14c/0x3d0 [ 36.062089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.062852] kthread+0x24c/0x2d0 [ 36.063417] ret_from_fork+0x10/0x20 [ 36.064081] [ 36.064447] Allocated by task 254: [ 36.065017] kasan_save_stack+0x3c/0x68 [ 36.065548] kasan_save_track+0x20/0x40 [ 36.066177] kasan_save_alloc_info+0x40/0x58 [ 36.066850] __kasan_kmalloc+0xd4/0xd8 [ 36.067405] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.067946] kasan_atomics+0xb8/0x2e8 [ 36.068563] kunit_try_run_case+0x14c/0x3d0 [ 36.069109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.069874] kthread+0x24c/0x2d0 [ 36.070403] ret_from_fork+0x10/0x20 [ 36.071045] [ 36.071405] The buggy address belongs to the object at fff00000c591a100 [ 36.071405] which belongs to the cache kmalloc-64 of size 64 [ 36.072490] The buggy address is located 0 bytes to the right of [ 36.072490] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.073853] [ 36.074244] The buggy address belongs to the physical page: [ 36.074850] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.075890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.076645] page_type: f5(slab) [ 36.077150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.078041] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.078771] page dumped because: kasan: bad access detected [ 36.079525] [ 36.079859] Memory state around the buggy address: [ 36.080526] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.081239] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.082166] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.082972] ^ [ 36.083645] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.084402] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.085331] ================================================================== [ 36.987478] ================================================================== [ 36.988195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.989209] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.990060] [ 36.990524] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.991630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.992254] Hardware name: linux,dummy-virt (DT) [ 36.992964] Call trace: [ 36.993420] show_stack+0x20/0x38 (C) [ 36.994121] dump_stack_lvl+0x8c/0xd0 [ 36.994740] print_report+0x118/0x5e0 [ 36.995431] kasan_report+0xc8/0x118 [ 36.996129] kasan_check_range+0x100/0x1a8 [ 36.996720] __kasan_check_write+0x20/0x30 [ 36.997472] kasan_atomics_helper+0xeb8/0x4858 [ 36.998101] kasan_atomics+0x198/0x2e8 [ 36.998785] kunit_try_run_case+0x14c/0x3d0 [ 36.999487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.000260] kthread+0x24c/0x2d0 [ 37.000849] ret_from_fork+0x10/0x20 [ 37.001483] [ 37.001793] Allocated by task 254: [ 37.002409] kasan_save_stack+0x3c/0x68 [ 37.003072] kasan_save_track+0x20/0x40 [ 37.003644] kasan_save_alloc_info+0x40/0x58 [ 37.004356] __kasan_kmalloc+0xd4/0xd8 [ 37.004951] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.005711] kasan_atomics+0xb8/0x2e8 [ 37.006284] kunit_try_run_case+0x14c/0x3d0 [ 37.007004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.007671] kthread+0x24c/0x2d0 [ 37.008299] ret_from_fork+0x10/0x20 [ 37.008923] [ 37.009297] The buggy address belongs to the object at fff00000c591a100 [ 37.009297] which belongs to the cache kmalloc-64 of size 64 [ 37.010534] The buggy address is located 0 bytes to the right of [ 37.010534] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.011938] [ 37.012341] The buggy address belongs to the physical page: [ 37.013095] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.014018] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.014836] page_type: f5(slab) [ 37.015501] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.016435] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.017384] page dumped because: kasan: bad access detected [ 37.018074] [ 37.018435] Memory state around the buggy address: [ 37.019190] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019994] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.020851] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.021688] ^ [ 37.022323] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.023172] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.024096] ================================================================== [ 37.817369] ================================================================== [ 37.818140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.818895] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.819727] [ 37.820147] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.821078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.821676] Hardware name: linux,dummy-virt (DT) [ 37.822347] Call trace: [ 37.822804] show_stack+0x20/0x38 (C) [ 37.823458] dump_stack_lvl+0x8c/0xd0 [ 37.824109] print_report+0x118/0x5e0 [ 37.824757] kasan_report+0xc8/0x118 [ 37.825274] __asan_report_load8_noabort+0x20/0x30 [ 37.826087] kasan_atomics_helper+0x3e10/0x4858 [ 37.826785] kasan_atomics+0x198/0x2e8 [ 37.827378] kunit_try_run_case+0x14c/0x3d0 [ 37.827930] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.828701] kthread+0x24c/0x2d0 [ 37.829283] ret_from_fork+0x10/0x20 [ 37.830002] [ 37.830465] Allocated by task 254: [ 37.831029] kasan_save_stack+0x3c/0x68 [ 37.831655] kasan_save_track+0x20/0x40 [ 37.832274] kasan_save_alloc_info+0x40/0x58 [ 37.833014] __kasan_kmalloc+0xd4/0xd8 [ 37.833642] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.834327] kasan_atomics+0xb8/0x2e8 [ 37.834998] kunit_try_run_case+0x14c/0x3d0 [ 37.835674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.836472] kthread+0x24c/0x2d0 [ 37.837098] ret_from_fork+0x10/0x20 [ 37.837652] [ 37.838049] The buggy address belongs to the object at fff00000c591a100 [ 37.838049] which belongs to the cache kmalloc-64 of size 64 [ 37.839285] The buggy address is located 0 bytes to the right of [ 37.839285] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.840645] [ 37.841033] The buggy address belongs to the physical page: [ 37.841809] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.842638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.843549] page_type: f5(slab) [ 37.844134] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.844995] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.845941] page dumped because: kasan: bad access detected [ 37.846645] [ 37.847037] Memory state around the buggy address: [ 37.847738] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.848534] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.849450] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.850296] ^ [ 37.850897] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.851787] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.852649] ================================================================== [ 37.026138] ================================================================== [ 37.027146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 37.028583] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.029220] [ 37.029626] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.030771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.031388] Hardware name: linux,dummy-virt (DT) [ 37.031880] Call trace: [ 37.032397] show_stack+0x20/0x38 (C) [ 37.033117] dump_stack_lvl+0x8c/0xd0 [ 37.033783] print_report+0x118/0x5e0 [ 37.034521] kasan_report+0xc8/0x118 [ 37.035160] kasan_check_range+0x100/0x1a8 [ 37.035933] __kasan_check_write+0x20/0x30 [ 37.036578] kasan_atomics_helper+0xf20/0x4858 [ 37.037327] kasan_atomics+0x198/0x2e8 [ 37.038032] kunit_try_run_case+0x14c/0x3d0 [ 37.038841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.039749] kthread+0x24c/0x2d0 [ 37.040308] ret_from_fork+0x10/0x20 [ 37.040875] [ 37.041265] Allocated by task 254: [ 37.041813] kasan_save_stack+0x3c/0x68 [ 37.042403] kasan_save_track+0x20/0x40 [ 37.043079] kasan_save_alloc_info+0x40/0x58 [ 37.043773] __kasan_kmalloc+0xd4/0xd8 [ 37.044426] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.045135] kasan_atomics+0xb8/0x2e8 [ 37.045810] kunit_try_run_case+0x14c/0x3d0 [ 37.046457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.047281] kthread+0x24c/0x2d0 [ 37.047824] ret_from_fork+0x10/0x20 [ 37.048490] [ 37.048883] The buggy address belongs to the object at fff00000c591a100 [ 37.048883] which belongs to the cache kmalloc-64 of size 64 [ 37.050153] The buggy address is located 0 bytes to the right of [ 37.050153] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.051493] [ 37.051875] The buggy address belongs to the physical page: [ 37.052528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.053577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.054361] page_type: f5(slab) [ 37.054977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.055885] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.056821] page dumped because: kasan: bad access detected [ 37.057507] [ 37.057918] Memory state around the buggy address: [ 37.058523] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.059404] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.060295] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.061159] ^ [ 37.061774] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.062665] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.063503] ================================================================== [ 35.461921] ================================================================== [ 35.463261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 35.464165] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.465284] [ 35.465775] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.467370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.468065] Hardware name: linux,dummy-virt (DT) [ 35.468798] Call trace: [ 35.469366] show_stack+0x20/0x38 (C) [ 35.469888] dump_stack_lvl+0x8c/0xd0 [ 35.470640] print_report+0x118/0x5e0 [ 35.471313] kasan_report+0xc8/0x118 [ 35.471976] __asan_report_load4_noabort+0x20/0x30 [ 35.472789] kasan_atomics_helper+0x40a8/0x4858 [ 35.473589] kasan_atomics+0x198/0x2e8 [ 35.474192] kunit_try_run_case+0x14c/0x3d0 [ 35.474674] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.475508] kthread+0x24c/0x2d0 [ 35.476099] ret_from_fork+0x10/0x20 [ 35.476663] [ 35.477042] Allocated by task 254: [ 35.477541] kasan_save_stack+0x3c/0x68 [ 35.478150] kasan_save_track+0x20/0x40 [ 35.478783] kasan_save_alloc_info+0x40/0x58 [ 35.479449] __kasan_kmalloc+0xd4/0xd8 [ 35.479960] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.480646] kasan_atomics+0xb8/0x2e8 [ 35.481170] kunit_try_run_case+0x14c/0x3d0 [ 35.481832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.482549] kthread+0x24c/0x2d0 [ 35.483141] ret_from_fork+0x10/0x20 [ 35.483722] [ 35.484112] The buggy address belongs to the object at fff00000c591a100 [ 35.484112] which belongs to the cache kmalloc-64 of size 64 [ 35.485286] The buggy address is located 0 bytes to the right of [ 35.485286] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.486715] [ 35.487070] The buggy address belongs to the physical page: [ 35.487780] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.488742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.489623] page_type: f5(slab) [ 35.490151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.491160] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.491949] page dumped because: kasan: bad access detected [ 35.492757] [ 35.493123] Memory state around the buggy address: [ 35.493692] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.494615] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.495439] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.496325] ^ [ 35.496921] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.497742] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.498517] ================================================================== [ 36.160985] ================================================================== [ 36.161865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 36.162636] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.163857] [ 36.164273] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.165530] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.166147] Hardware name: linux,dummy-virt (DT) [ 36.166811] Call trace: [ 36.167250] show_stack+0x20/0x38 (C) [ 36.167849] dump_stack_lvl+0x8c/0xd0 [ 36.168453] print_report+0x118/0x5e0 [ 36.169072] kasan_report+0xc8/0x118 [ 36.169657] kasan_check_range+0x100/0x1a8 [ 36.170300] __kasan_check_write+0x20/0x30 [ 36.170938] kasan_atomics_helper+0x7cc/0x4858 [ 36.171499] kasan_atomics+0x198/0x2e8 [ 36.172153] kunit_try_run_case+0x14c/0x3d0 [ 36.172838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.173651] kthread+0x24c/0x2d0 [ 36.174265] ret_from_fork+0x10/0x20 [ 36.174942] [ 36.175285] Allocated by task 254: [ 36.175778] kasan_save_stack+0x3c/0x68 [ 36.176401] kasan_save_track+0x20/0x40 [ 36.176978] kasan_save_alloc_info+0x40/0x58 [ 36.177493] __kasan_kmalloc+0xd4/0xd8 [ 36.178123] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.178812] kasan_atomics+0xb8/0x2e8 [ 36.179395] kunit_try_run_case+0x14c/0x3d0 [ 36.179967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.180707] kthread+0x24c/0x2d0 [ 36.181290] ret_from_fork+0x10/0x20 [ 36.181879] [ 36.182215] The buggy address belongs to the object at fff00000c591a100 [ 36.182215] which belongs to the cache kmalloc-64 of size 64 [ 36.183428] The buggy address is located 0 bytes to the right of [ 36.183428] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.184716] [ 36.185107] The buggy address belongs to the physical page: [ 36.185885] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.186706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.187532] page_type: f5(slab) [ 36.188022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.189005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.189663] page dumped because: kasan: bad access detected [ 36.190423] [ 36.190796] Memory state around the buggy address: [ 36.191484] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.192301] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.193067] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.193967] ^ [ 36.194604] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.195573] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.197069] ================================================================== [ 37.177592] ================================================================== [ 37.178308] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 37.179269] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.180083] [ 37.181168] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.181922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.182360] Hardware name: linux,dummy-virt (DT) [ 37.182845] Call trace: [ 37.183346] show_stack+0x20/0x38 (C) [ 37.184036] dump_stack_lvl+0x8c/0xd0 [ 37.184717] print_report+0x118/0x5e0 [ 37.185464] kasan_report+0xc8/0x118 [ 37.186164] kasan_check_range+0x100/0x1a8 [ 37.186883] __kasan_check_write+0x20/0x30 [ 37.187581] kasan_atomics_helper+0x10c0/0x4858 [ 37.188335] kasan_atomics+0x198/0x2e8 [ 37.188630] kunit_try_run_case+0x14c/0x3d0 [ 37.188958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.189737] kthread+0x24c/0x2d0 [ 37.190257] ret_from_fork+0x10/0x20 [ 37.190874] [ 37.191250] Allocated by task 254: [ 37.191719] kasan_save_stack+0x3c/0x68 [ 37.192214] kasan_save_track+0x20/0x40 [ 37.192717] kasan_save_alloc_info+0x40/0x58 [ 37.193372] __kasan_kmalloc+0xd4/0xd8 [ 37.193861] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.194571] kasan_atomics+0xb8/0x2e8 [ 37.195070] kunit_try_run_case+0x14c/0x3d0 [ 37.195776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.196559] kthread+0x24c/0x2d0 [ 37.197072] ret_from_fork+0x10/0x20 [ 37.197664] [ 37.198057] The buggy address belongs to the object at fff00000c591a100 [ 37.198057] which belongs to the cache kmalloc-64 of size 64 [ 37.199336] The buggy address is located 0 bytes to the right of [ 37.199336] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.200563] [ 37.200951] The buggy address belongs to the physical page: [ 37.201593] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.202535] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.203295] page_type: f5(slab) [ 37.203861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.204683] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.205488] page dumped because: kasan: bad access detected [ 37.206242] [ 37.206617] Memory state around the buggy address: [ 37.207290] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.208116] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.208878] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.209676] ^ [ 37.210301] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.211142] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.211820] ================================================================== [ 36.521616] ================================================================== [ 36.522940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 36.523802] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.525017] [ 36.525319] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.526385] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.526879] Hardware name: linux,dummy-virt (DT) [ 36.527695] Call trace: [ 36.528231] show_stack+0x20/0x38 (C) [ 36.529036] dump_stack_lvl+0x8c/0xd0 [ 36.529605] print_report+0x118/0x5e0 [ 36.530376] kasan_report+0xc8/0x118 [ 36.531160] kasan_check_range+0x100/0x1a8 [ 36.531694] __kasan_check_write+0x20/0x30 [ 36.532230] kasan_atomics_helper+0xb70/0x4858 [ 36.532780] kasan_atomics+0x198/0x2e8 [ 36.533797] kunit_try_run_case+0x14c/0x3d0 [ 36.534660] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.535350] kthread+0x24c/0x2d0 [ 36.535806] ret_from_fork+0x10/0x20 [ 36.536588] [ 36.536972] Allocated by task 254: [ 36.537350] kasan_save_stack+0x3c/0x68 [ 36.538002] kasan_save_track+0x20/0x40 [ 36.538643] kasan_save_alloc_info+0x40/0x58 [ 36.539316] __kasan_kmalloc+0xd4/0xd8 [ 36.539798] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.540504] kasan_atomics+0xb8/0x2e8 [ 36.541070] kunit_try_run_case+0x14c/0x3d0 [ 36.541637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.542424] kthread+0x24c/0x2d0 [ 36.543072] ret_from_fork+0x10/0x20 [ 36.543611] [ 36.543951] The buggy address belongs to the object at fff00000c591a100 [ 36.543951] which belongs to the cache kmalloc-64 of size 64 [ 36.545181] The buggy address is located 0 bytes to the right of [ 36.545181] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.546429] [ 36.546813] The buggy address belongs to the physical page: [ 36.547501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.548419] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.549285] page_type: f5(slab) [ 36.549836] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.550591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.551539] page dumped because: kasan: bad access detected [ 36.552269] [ 36.552636] Memory state around the buggy address: [ 36.553325] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.554170] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.555114] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.555869] ^ [ 36.556571] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.557411] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.558139] ================================================================== [ 36.478139] ================================================================== [ 36.478711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.479811] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.482283] [ 36.482621] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.483461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.484035] Hardware name: linux,dummy-virt (DT) [ 36.484719] Call trace: [ 36.486003] show_stack+0x20/0x38 (C) [ 36.486550] dump_stack_lvl+0x8c/0xd0 [ 36.487398] print_report+0x118/0x5e0 [ 36.488167] kasan_report+0xc8/0x118 [ 36.489003] __asan_report_load4_noabort+0x20/0x30 [ 36.489872] kasan_atomics_helper+0x3dcc/0x4858 [ 36.490718] kasan_atomics+0x198/0x2e8 [ 36.491502] kunit_try_run_case+0x14c/0x3d0 [ 36.492273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.493298] kthread+0x24c/0x2d0 [ 36.493847] ret_from_fork+0x10/0x20 [ 36.494396] [ 36.494730] Allocated by task 254: [ 36.495254] kasan_save_stack+0x3c/0x68 [ 36.495840] kasan_save_track+0x20/0x40 [ 36.497046] kasan_save_alloc_info+0x40/0x58 [ 36.497843] __kasan_kmalloc+0xd4/0xd8 [ 36.498624] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.499452] kasan_atomics+0xb8/0x2e8 [ 36.500222] kunit_try_run_case+0x14c/0x3d0 [ 36.500969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.501593] kthread+0x24c/0x2d0 [ 36.502157] ret_from_fork+0x10/0x20 [ 36.502751] [ 36.503725] The buggy address belongs to the object at fff00000c591a100 [ 36.503725] which belongs to the cache kmalloc-64 of size 64 [ 36.505335] The buggy address is located 0 bytes to the right of [ 36.505335] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.506706] [ 36.507180] The buggy address belongs to the physical page: [ 36.508000] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.509048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.509916] page_type: f5(slab) [ 36.510571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.511600] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.512544] page dumped because: kasan: bad access detected [ 36.513261] [ 36.513703] Memory state around the buggy address: [ 36.514372] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.515359] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.516259] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.517187] ^ [ 36.517849] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.518789] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.519699] ================================================================== [ 36.833761] ================================================================== [ 36.834837] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.837066] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.837833] [ 36.838243] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.839310] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.839997] Hardware name: linux,dummy-virt (DT) [ 36.840721] Call trace: [ 36.841193] show_stack+0x20/0x38 (C) [ 36.841869] dump_stack_lvl+0x8c/0xd0 [ 36.842481] print_report+0x118/0x5e0 [ 36.843036] kasan_report+0xc8/0x118 [ 36.843695] kasan_check_range+0x100/0x1a8 [ 36.844415] __kasan_check_read+0x20/0x30 [ 36.845034] kasan_atomics_helper+0xdd4/0x4858 [ 36.845762] kasan_atomics+0x198/0x2e8 [ 36.846388] kunit_try_run_case+0x14c/0x3d0 [ 36.847060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.847723] kthread+0x24c/0x2d0 [ 36.848251] ret_from_fork+0x10/0x20 [ 36.848754] [ 36.849143] Allocated by task 254: [ 36.849684] kasan_save_stack+0x3c/0x68 [ 36.850325] kasan_save_track+0x20/0x40 [ 36.850836] kasan_save_alloc_info+0x40/0x58 [ 36.851522] __kasan_kmalloc+0xd4/0xd8 [ 36.852116] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.852793] kasan_atomics+0xb8/0x2e8 [ 36.853411] kunit_try_run_case+0x14c/0x3d0 [ 36.853967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.854674] kthread+0x24c/0x2d0 [ 36.855262] ret_from_fork+0x10/0x20 [ 36.855810] [ 36.856172] The buggy address belongs to the object at fff00000c591a100 [ 36.856172] which belongs to the cache kmalloc-64 of size 64 [ 36.857341] The buggy address is located 0 bytes to the right of [ 36.857341] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.858617] [ 36.859013] The buggy address belongs to the physical page: [ 36.859676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.860677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.861339] page_type: f5(slab) [ 36.861784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.862787] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.863745] page dumped because: kasan: bad access detected [ 36.864399] [ 36.864771] Memory state around the buggy address: [ 36.865329] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.866124] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.866986] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.867775] ^ [ 36.868477] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.869183] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.869839] ================================================================== [ 37.855558] ================================================================== [ 37.856964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.857487] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.857874] [ 37.858082] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.858584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.858830] Hardware name: linux,dummy-virt (DT) [ 37.859921] Call trace: [ 37.860397] show_stack+0x20/0x38 (C) [ 37.861132] dump_stack_lvl+0x8c/0xd0 [ 37.861856] print_report+0x118/0x5e0 [ 37.862672] kasan_report+0xc8/0x118 [ 37.863448] kasan_check_range+0x100/0x1a8 [ 37.864153] __kasan_check_write+0x20/0x30 [ 37.864842] kasan_atomics_helper+0x175c/0x4858 [ 37.865621] kasan_atomics+0x198/0x2e8 [ 37.866204] kunit_try_run_case+0x14c/0x3d0 [ 37.866953] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.867661] kthread+0x24c/0x2d0 [ 37.868301] ret_from_fork+0x10/0x20 [ 37.868928] [ 37.869337] Allocated by task 254: [ 37.869819] kasan_save_stack+0x3c/0x68 [ 37.870508] kasan_save_track+0x20/0x40 [ 37.871126] kasan_save_alloc_info+0x40/0x58 [ 37.871801] __kasan_kmalloc+0xd4/0xd8 [ 37.872407] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.873060] kasan_atomics+0xb8/0x2e8 [ 37.873654] kunit_try_run_case+0x14c/0x3d0 [ 37.874361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.875128] kthread+0x24c/0x2d0 [ 37.875677] ret_from_fork+0x10/0x20 [ 37.876333] [ 37.876727] The buggy address belongs to the object at fff00000c591a100 [ 37.876727] which belongs to the cache kmalloc-64 of size 64 [ 37.877968] The buggy address is located 0 bytes to the right of [ 37.877968] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.879322] [ 37.879777] The buggy address belongs to the physical page: [ 37.880422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.881367] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.882267] page_type: f5(slab) [ 37.882877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.883780] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.884663] page dumped because: kasan: bad access detected [ 37.885399] [ 37.885773] Memory state around the buggy address: [ 37.886356] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.887294] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.888185] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.889018] ^ [ 37.889647] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.890509] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.891358] ================================================================== [ 36.282305] ================================================================== [ 36.283113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 36.284828] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.285775] [ 36.286082] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.287240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.287846] Hardware name: linux,dummy-virt (DT) [ 36.288455] Call trace: [ 36.288817] show_stack+0x20/0x38 (C) [ 36.289473] dump_stack_lvl+0x8c/0xd0 [ 36.290021] print_report+0x118/0x5e0 [ 36.290675] kasan_report+0xc8/0x118 [ 36.291273] kasan_check_range+0x100/0x1a8 [ 36.291871] __kasan_check_write+0x20/0x30 [ 36.292574] kasan_atomics_helper+0x934/0x4858 [ 36.293232] kasan_atomics+0x198/0x2e8 [ 36.293841] kunit_try_run_case+0x14c/0x3d0 [ 36.294405] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.295231] kthread+0x24c/0x2d0 [ 36.295823] ret_from_fork+0x10/0x20 [ 36.296392] [ 36.296750] Allocated by task 254: [ 36.297274] kasan_save_stack+0x3c/0x68 [ 36.297895] kasan_save_track+0x20/0x40 [ 36.298421] kasan_save_alloc_info+0x40/0x58 [ 36.299125] __kasan_kmalloc+0xd4/0xd8 [ 36.299648] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.300346] kasan_atomics+0xb8/0x2e8 [ 36.300848] kunit_try_run_case+0x14c/0x3d0 [ 36.301511] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.302292] kthread+0x24c/0x2d0 [ 36.302856] ret_from_fork+0x10/0x20 [ 36.303423] [ 36.303788] The buggy address belongs to the object at fff00000c591a100 [ 36.303788] which belongs to the cache kmalloc-64 of size 64 [ 36.305002] The buggy address is located 0 bytes to the right of [ 36.305002] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.306288] [ 36.306664] The buggy address belongs to the physical page: [ 36.307404] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.308150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.309029] page_type: f5(slab) [ 36.309602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.310387] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.311354] page dumped because: kasan: bad access detected [ 36.312006] [ 36.312366] Memory state around the buggy address: [ 36.313056] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.313772] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.314587] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.315439] ^ [ 36.316084] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.316892] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.317686] ================================================================== [ 35.974850] ================================================================== [ 35.975541] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.977669] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.978608] [ 35.979001] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.980130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.980693] Hardware name: linux,dummy-virt (DT) [ 35.981696] Call trace: [ 35.982168] show_stack+0x20/0x38 (C) [ 35.982744] dump_stack_lvl+0x8c/0xd0 [ 35.983361] print_report+0x118/0x5e0 [ 35.984025] kasan_report+0xc8/0x118 [ 35.984580] kasan_check_range+0x100/0x1a8 [ 35.985264] __kasan_check_write+0x20/0x30 [ 35.986004] kasan_atomics_helper+0x5b4/0x4858 [ 35.986680] kasan_atomics+0x198/0x2e8 [ 35.987264] kunit_try_run_case+0x14c/0x3d0 [ 35.988013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.988810] kthread+0x24c/0x2d0 [ 35.989489] ret_from_fork+0x10/0x20 [ 35.990143] [ 35.990526] Allocated by task 254: [ 35.991042] kasan_save_stack+0x3c/0x68 [ 35.991583] kasan_save_track+0x20/0x40 [ 35.992243] kasan_save_alloc_info+0x40/0x58 [ 35.992782] __kasan_kmalloc+0xd4/0xd8 [ 35.993414] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.994040] kasan_atomics+0xb8/0x2e8 [ 35.994558] kunit_try_run_case+0x14c/0x3d0 [ 35.995227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.996010] kthread+0x24c/0x2d0 [ 35.996563] ret_from_fork+0x10/0x20 [ 35.997053] [ 35.997414] The buggy address belongs to the object at fff00000c591a100 [ 35.997414] which belongs to the cache kmalloc-64 of size 64 [ 35.998623] The buggy address is located 0 bytes to the right of [ 35.998623] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.999872] [ 36.000266] The buggy address belongs to the physical page: [ 36.000933] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.001851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.002594] page_type: f5(slab) [ 36.003180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.004019] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.004932] page dumped because: kasan: bad access detected [ 36.005627] [ 36.005974] Memory state around the buggy address: [ 36.006666] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.007438] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.008287] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.009055] ^ [ 36.009695] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.010488] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.011260] ================================================================== [ 36.355768] ================================================================== [ 36.356827] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.357831] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.359009] [ 36.359861] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.360817] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.361442] Hardware name: linux,dummy-virt (DT) [ 36.361978] Call trace: [ 36.362438] show_stack+0x20/0x38 (C) [ 36.363086] dump_stack_lvl+0x8c/0xd0 [ 36.363732] print_report+0x118/0x5e0 [ 36.364308] kasan_report+0xc8/0x118 [ 36.364972] kasan_check_range+0x100/0x1a8 [ 36.365630] __kasan_check_write+0x20/0x30 [ 36.366281] kasan_atomics_helper+0xa04/0x4858 [ 36.367020] kasan_atomics+0x198/0x2e8 [ 36.367658] kunit_try_run_case+0x14c/0x3d0 [ 36.368346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.369074] kthread+0x24c/0x2d0 [ 36.369561] ret_from_fork+0x10/0x20 [ 36.370217] [ 36.370594] Allocated by task 254: [ 36.371132] kasan_save_stack+0x3c/0x68 [ 36.371751] kasan_save_track+0x20/0x40 [ 36.372382] kasan_save_alloc_info+0x40/0x58 [ 36.373008] __kasan_kmalloc+0xd4/0xd8 [ 36.373604] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.374264] kasan_atomics+0xb8/0x2e8 [ 36.374809] kunit_try_run_case+0x14c/0x3d0 [ 36.375502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.376244] kthread+0x24c/0x2d0 [ 36.376810] ret_from_fork+0x10/0x20 [ 36.377350] [ 36.377711] The buggy address belongs to the object at fff00000c591a100 [ 36.377711] which belongs to the cache kmalloc-64 of size 64 [ 36.378856] The buggy address is located 0 bytes to the right of [ 36.378856] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.380072] [ 36.380447] The buggy address belongs to the physical page: [ 36.381191] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.381956] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.382842] page_type: f5(slab) [ 36.383421] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.384405] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.385219] page dumped because: kasan: bad access detected [ 36.385777] [ 36.386158] Memory state around the buggy address: [ 36.386846] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.387676] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.388479] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.389254] ^ [ 36.389764] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.390705] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.391445] ================================================================== [ 37.437382] ================================================================== [ 37.438056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 37.439396] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.440690] [ 37.441101] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.442379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.442925] Hardware name: linux,dummy-virt (DT) [ 37.443579] Call trace: [ 37.444024] show_stack+0x20/0x38 (C) [ 37.444702] dump_stack_lvl+0x8c/0xd0 [ 37.445377] print_report+0x118/0x5e0 [ 37.446034] kasan_report+0xc8/0x118 [ 37.446515] __asan_report_load8_noabort+0x20/0x30 [ 37.447104] kasan_atomics_helper+0x3f04/0x4858 [ 37.447792] kasan_atomics+0x198/0x2e8 [ 37.448300] kunit_try_run_case+0x14c/0x3d0 [ 37.449015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.449652] kthread+0x24c/0x2d0 [ 37.450257] ret_from_fork+0x10/0x20 [ 37.450853] [ 37.451243] Allocated by task 254: [ 37.451791] kasan_save_stack+0x3c/0x68 [ 37.452364] kasan_save_track+0x20/0x40 [ 37.453001] kasan_save_alloc_info+0x40/0x58 [ 37.453594] __kasan_kmalloc+0xd4/0xd8 [ 37.454155] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.454847] kasan_atomics+0xb8/0x2e8 [ 37.455382] kunit_try_run_case+0x14c/0x3d0 [ 37.456044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.456689] kthread+0x24c/0x2d0 [ 37.457272] ret_from_fork+0x10/0x20 [ 37.457807] [ 37.458202] The buggy address belongs to the object at fff00000c591a100 [ 37.458202] which belongs to the cache kmalloc-64 of size 64 [ 37.459343] The buggy address is located 0 bytes to the right of [ 37.459343] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.460662] [ 37.461049] The buggy address belongs to the physical page: [ 37.461740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.462746] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.463567] page_type: f5(slab) [ 37.464148] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.464952] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.465864] page dumped because: kasan: bad access detected [ 37.466505] [ 37.466882] Memory state around the buggy address: [ 37.467569] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.468449] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.469260] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.470065] ^ [ 37.470660] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.471432] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.472419] ================================================================== [ 37.400694] ================================================================== [ 37.401409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 37.402392] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.403760] [ 37.404132] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.405178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.405822] Hardware name: linux,dummy-virt (DT) [ 37.406468] Call trace: [ 37.406868] show_stack+0x20/0x38 (C) [ 37.407532] dump_stack_lvl+0x8c/0xd0 [ 37.408097] print_report+0x118/0x5e0 [ 37.408728] kasan_report+0xc8/0x118 [ 37.409307] kasan_check_range+0x100/0x1a8 [ 37.409943] __kasan_check_write+0x20/0x30 [ 37.410630] kasan_atomics_helper+0x1384/0x4858 [ 37.411365] kasan_atomics+0x198/0x2e8 [ 37.412016] kunit_try_run_case+0x14c/0x3d0 [ 37.412594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.413371] kthread+0x24c/0x2d0 [ 37.413995] ret_from_fork+0x10/0x20 [ 37.414640] [ 37.415033] Allocated by task 254: [ 37.415538] kasan_save_stack+0x3c/0x68 [ 37.416121] kasan_save_track+0x20/0x40 [ 37.416658] kasan_save_alloc_info+0x40/0x58 [ 37.417330] __kasan_kmalloc+0xd4/0xd8 [ 37.417875] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.418497] kasan_atomics+0xb8/0x2e8 [ 37.419105] kunit_try_run_case+0x14c/0x3d0 [ 37.419767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.420513] kthread+0x24c/0x2d0 [ 37.420999] ret_from_fork+0x10/0x20 [ 37.421583] [ 37.421981] The buggy address belongs to the object at fff00000c591a100 [ 37.421981] which belongs to the cache kmalloc-64 of size 64 [ 37.423154] The buggy address is located 0 bytes to the right of [ 37.423154] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.424385] [ 37.424757] The buggy address belongs to the physical page: [ 37.425399] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.426377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.427096] page_type: f5(slab) [ 37.427653] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.428609] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.429417] page dumped because: kasan: bad access detected [ 37.430101] [ 37.430473] Memory state around the buggy address: [ 37.431027] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.431877] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.432708] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.433488] ^ [ 37.434124] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.434942] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.435748] ================================================================== [ 36.870671] ================================================================== [ 36.871625] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.872635] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.873620] [ 36.874084] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.875409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.876042] Hardware name: linux,dummy-virt (DT) [ 36.876734] Call trace: [ 36.877243] show_stack+0x20/0x38 (C) [ 36.877943] dump_stack_lvl+0x8c/0xd0 [ 36.878634] print_report+0x118/0x5e0 [ 36.879188] kasan_report+0xc8/0x118 [ 36.879878] __asan_report_load8_noabort+0x20/0x30 [ 36.880632] kasan_atomics_helper+0x3f58/0x4858 [ 36.881395] kasan_atomics+0x198/0x2e8 [ 36.882122] kunit_try_run_case+0x14c/0x3d0 [ 36.882794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.883551] kthread+0x24c/0x2d0 [ 36.884125] ret_from_fork+0x10/0x20 [ 36.884789] [ 36.885191] Allocated by task 254: [ 36.885744] kasan_save_stack+0x3c/0x68 [ 36.886317] kasan_save_track+0x20/0x40 [ 36.887053] kasan_save_alloc_info+0x40/0x58 [ 36.887584] __kasan_kmalloc+0xd4/0xd8 [ 36.888220] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.888925] kasan_atomics+0xb8/0x2e8 [ 36.889417] kunit_try_run_case+0x14c/0x3d0 [ 36.890096] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.890744] kthread+0x24c/0x2d0 [ 36.891337] ret_from_fork+0x10/0x20 [ 36.891872] [ 36.892252] The buggy address belongs to the object at fff00000c591a100 [ 36.892252] which belongs to the cache kmalloc-64 of size 64 [ 36.893465] The buggy address is located 0 bytes to the right of [ 36.893465] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.894710] [ 36.895101] The buggy address belongs to the physical page: [ 36.895700] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.896701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.897580] page_type: f5(slab) [ 36.898137] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.899076] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.900257] page dumped because: kasan: bad access detected [ 36.900997] [ 36.901528] Memory state around the buggy address: [ 36.902137] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.902938] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.903819] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.904638] ^ [ 36.905325] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.906091] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.906885] ================================================================== [ 35.898403] ================================================================== [ 35.900113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.901150] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.901971] [ 35.902519] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.903954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.904653] Hardware name: linux,dummy-virt (DT) [ 35.905455] Call trace: [ 35.905932] show_stack+0x20/0x38 (C) [ 35.906488] dump_stack_lvl+0x8c/0xd0 [ 35.907097] print_report+0x118/0x5e0 [ 35.907670] kasan_report+0xc8/0x118 [ 35.908239] kasan_check_range+0x100/0x1a8 [ 35.908929] __kasan_check_write+0x20/0x30 [ 35.909531] kasan_atomics_helper+0x4e4/0x4858 [ 35.910143] kasan_atomics+0x198/0x2e8 [ 35.910785] kunit_try_run_case+0x14c/0x3d0 [ 35.911824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.912568] kthread+0x24c/0x2d0 [ 35.913126] ret_from_fork+0x10/0x20 [ 35.913768] [ 35.914163] Allocated by task 254: [ 35.914588] kasan_save_stack+0x3c/0x68 [ 35.915230] kasan_save_track+0x20/0x40 [ 35.915806] kasan_save_alloc_info+0x40/0x58 [ 35.916489] __kasan_kmalloc+0xd4/0xd8 [ 35.917006] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.917685] kasan_atomics+0xb8/0x2e8 [ 35.918183] kunit_try_run_case+0x14c/0x3d0 [ 35.918858] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.919648] kthread+0x24c/0x2d0 [ 35.920252] ret_from_fork+0x10/0x20 [ 35.920863] [ 35.921293] The buggy address belongs to the object at fff00000c591a100 [ 35.921293] which belongs to the cache kmalloc-64 of size 64 [ 35.922528] The buggy address is located 0 bytes to the right of [ 35.922528] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.923641] [ 35.924031] The buggy address belongs to the physical page: [ 35.924754] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.925667] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.926493] page_type: f5(slab) [ 35.927065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.927953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.928792] page dumped because: kasan: bad access detected [ 35.929346] [ 35.929713] Memory state around the buggy address: [ 35.930341] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.931206] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.932048] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.932883] ^ [ 35.933504] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.934326] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.935157] ================================================================== [ 36.717776] ================================================================== [ 36.719557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.720616] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.721970] [ 36.722378] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.723662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.724204] Hardware name: linux,dummy-virt (DT) [ 36.724769] Call trace: [ 36.725203] show_stack+0x20/0x38 (C) [ 36.725770] dump_stack_lvl+0x8c/0xd0 [ 36.726480] print_report+0x118/0x5e0 [ 36.727101] kasan_report+0xc8/0x118 [ 36.727787] __asan_report_load4_noabort+0x20/0x30 [ 36.728529] kasan_atomics_helper+0x3dd8/0x4858 [ 36.729158] kasan_atomics+0x198/0x2e8 [ 36.729832] kunit_try_run_case+0x14c/0x3d0 [ 36.730535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.731377] kthread+0x24c/0x2d0 [ 36.731943] ret_from_fork+0x10/0x20 [ 36.732607] [ 36.733038] Allocated by task 254: [ 36.733627] kasan_save_stack+0x3c/0x68 [ 36.734249] kasan_save_track+0x20/0x40 [ 36.734839] kasan_save_alloc_info+0x40/0x58 [ 36.735545] __kasan_kmalloc+0xd4/0xd8 [ 36.736136] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.736838] kasan_atomics+0xb8/0x2e8 [ 36.737506] kunit_try_run_case+0x14c/0x3d0 [ 36.738164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.738987] kthread+0x24c/0x2d0 [ 36.739550] ret_from_fork+0x10/0x20 [ 36.740213] [ 36.740580] The buggy address belongs to the object at fff00000c591a100 [ 36.740580] which belongs to the cache kmalloc-64 of size 64 [ 36.741967] The buggy address is located 0 bytes to the right of [ 36.741967] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.743319] [ 36.743689] The buggy address belongs to the physical page: [ 36.744463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.745420] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.746261] page_type: f5(slab) [ 36.746882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.747782] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.748776] page dumped because: kasan: bad access detected [ 36.749430] [ 36.749847] Memory state around the buggy address: [ 36.750581] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.751400] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.752256] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.753129] ^ [ 36.753850] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.754730] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.755552] ================================================================== [ 36.201989] ================================================================== [ 36.202724] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 36.203369] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.204816] [ 36.205266] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.206654] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.207319] Hardware name: linux,dummy-virt (DT) [ 36.208008] Call trace: [ 36.208506] show_stack+0x20/0x38 (C) [ 36.209218] dump_stack_lvl+0x8c/0xd0 [ 36.209921] print_report+0x118/0x5e0 [ 36.210611] kasan_report+0xc8/0x118 [ 36.211298] kasan_check_range+0x100/0x1a8 [ 36.212061] __kasan_check_write+0x20/0x30 [ 36.213063] kasan_atomics_helper+0x894/0x4858 [ 36.213704] kasan_atomics+0x198/0x2e8 [ 36.214267] kunit_try_run_case+0x14c/0x3d0 [ 36.214893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.215708] kthread+0x24c/0x2d0 [ 36.216355] ret_from_fork+0x10/0x20 [ 36.217055] [ 36.217426] Allocated by task 254: [ 36.217985] kasan_save_stack+0x3c/0x68 [ 36.218653] kasan_save_track+0x20/0x40 [ 36.219234] kasan_save_alloc_info+0x40/0x58 [ 36.219934] __kasan_kmalloc+0xd4/0xd8 [ 36.220551] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.221205] kasan_atomics+0xb8/0x2e8 [ 36.221852] kunit_try_run_case+0x14c/0x3d0 [ 36.222576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.223286] kthread+0x24c/0x2d0 [ 36.223834] ret_from_fork+0x10/0x20 [ 36.224454] [ 36.224809] The buggy address belongs to the object at fff00000c591a100 [ 36.224809] which belongs to the cache kmalloc-64 of size 64 [ 36.226150] The buggy address is located 0 bytes to the right of [ 36.226150] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.227537] [ 36.227933] The buggy address belongs to the physical page: [ 36.228584] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.229650] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.230402] page_type: f5(slab) [ 36.231043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.231928] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.232858] page dumped because: kasan: bad access detected [ 36.233567] [ 36.233983] Memory state around the buggy address: [ 36.234626] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.235631] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.236441] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.237333] ^ [ 36.238292] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.239212] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.239790] ================================================================== [ 37.325365] ================================================================== [ 37.326497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 37.327856] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.328810] [ 37.329270] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.330409] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.331024] Hardware name: linux,dummy-virt (DT) [ 37.331629] Call trace: [ 37.332144] show_stack+0x20/0x38 (C) [ 37.332796] dump_stack_lvl+0x8c/0xd0 [ 37.333506] print_report+0x118/0x5e0 [ 37.334129] kasan_report+0xc8/0x118 [ 37.334818] kasan_check_range+0x100/0x1a8 [ 37.335591] __kasan_check_write+0x20/0x30 [ 37.336259] kasan_atomics_helper+0x126c/0x4858 [ 37.336927] kasan_atomics+0x198/0x2e8 [ 37.337602] kunit_try_run_case+0x14c/0x3d0 [ 37.338235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.339060] kthread+0x24c/0x2d0 [ 37.339581] ret_from_fork+0x10/0x20 [ 37.340213] [ 37.340523] Allocated by task 254: [ 37.341088] kasan_save_stack+0x3c/0x68 [ 37.341606] kasan_save_track+0x20/0x40 [ 37.342204] kasan_save_alloc_info+0x40/0x58 [ 37.342873] __kasan_kmalloc+0xd4/0xd8 [ 37.343509] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.344191] kasan_atomics+0xb8/0x2e8 [ 37.344657] kunit_try_run_case+0x14c/0x3d0 [ 37.345218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.346044] kthread+0x24c/0x2d0 [ 37.346614] ret_from_fork+0x10/0x20 [ 37.347225] [ 37.347591] The buggy address belongs to the object at fff00000c591a100 [ 37.347591] which belongs to the cache kmalloc-64 of size 64 [ 37.348764] The buggy address is located 0 bytes to the right of [ 37.348764] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.350001] [ 37.350365] The buggy address belongs to the physical page: [ 37.351022] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.351862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.352757] page_type: f5(slab) [ 37.353341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.354288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.355108] page dumped because: kasan: bad access detected [ 37.355682] [ 37.356076] Memory state around the buggy address: [ 37.356745] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.357575] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.358373] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.359183] ^ [ 37.359759] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.360539] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.361356] ================================================================== [ 37.363140] ================================================================== [ 37.364323] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 37.365272] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.366173] [ 37.366578] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.367779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.368417] Hardware name: linux,dummy-virt (DT) [ 37.369084] Call trace: [ 37.369510] show_stack+0x20/0x38 (C) [ 37.370173] dump_stack_lvl+0x8c/0xd0 [ 37.370817] print_report+0x118/0x5e0 [ 37.371404] kasan_report+0xc8/0x118 [ 37.371980] kasan_check_range+0x100/0x1a8 [ 37.372661] __kasan_check_write+0x20/0x30 [ 37.373250] kasan_atomics_helper+0x12d8/0x4858 [ 37.373964] kasan_atomics+0x198/0x2e8 [ 37.374615] kunit_try_run_case+0x14c/0x3d0 [ 37.375420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.376078] kthread+0x24c/0x2d0 [ 37.376645] ret_from_fork+0x10/0x20 [ 37.377246] [ 37.377574] Allocated by task 254: [ 37.378044] kasan_save_stack+0x3c/0x68 [ 37.378666] kasan_save_track+0x20/0x40 [ 37.379272] kasan_save_alloc_info+0x40/0x58 [ 37.379815] __kasan_kmalloc+0xd4/0xd8 [ 37.380452] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.381028] kasan_atomics+0xb8/0x2e8 [ 37.381636] kunit_try_run_case+0x14c/0x3d0 [ 37.382209] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.382891] kthread+0x24c/0x2d0 [ 37.383479] ret_from_fork+0x10/0x20 [ 37.383981] [ 37.384357] The buggy address belongs to the object at fff00000c591a100 [ 37.384357] which belongs to the cache kmalloc-64 of size 64 [ 37.385610] The buggy address is located 0 bytes to the right of [ 37.385610] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.386830] [ 37.387222] The buggy address belongs to the physical page: [ 37.387946] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.388705] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.389580] page_type: f5(slab) [ 37.390104] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.390986] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.391821] page dumped because: kasan: bad access detected [ 37.392401] [ 37.392770] Memory state around the buggy address: [ 37.393389] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.394257] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.395074] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.395876] ^ [ 37.396565] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.397294] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398121] ================================================================== [ 37.550484] ================================================================== [ 37.551285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 37.552293] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.553268] [ 37.553732] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.554625] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.555093] Hardware name: linux,dummy-virt (DT) [ 37.555720] Call trace: [ 37.556233] show_stack+0x20/0x38 (C) [ 37.557017] dump_stack_lvl+0x8c/0xd0 [ 37.557764] print_report+0x118/0x5e0 [ 37.558488] kasan_report+0xc8/0x118 [ 37.559048] kasan_check_range+0x100/0x1a8 [ 37.559782] __kasan_check_write+0x20/0x30 [ 37.560513] kasan_atomics_helper+0x14e4/0x4858 [ 37.561139] kasan_atomics+0x198/0x2e8 [ 37.561826] kunit_try_run_case+0x14c/0x3d0 [ 37.562464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.563326] kthread+0x24c/0x2d0 [ 37.563976] ret_from_fork+0x10/0x20 [ 37.564538] [ 37.564982] Allocated by task 254: [ 37.565507] kasan_save_stack+0x3c/0x68 [ 37.566160] kasan_save_track+0x20/0x40 [ 37.566655] kasan_save_alloc_info+0x40/0x58 [ 37.567368] __kasan_kmalloc+0xd4/0xd8 [ 37.567932] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.568627] kasan_atomics+0xb8/0x2e8 [ 37.569289] kunit_try_run_case+0x14c/0x3d0 [ 37.569966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.570758] kthread+0x24c/0x2d0 [ 37.571310] ret_from_fork+0x10/0x20 [ 37.571958] [ 37.572390] The buggy address belongs to the object at fff00000c591a100 [ 37.572390] which belongs to the cache kmalloc-64 of size 64 [ 37.573669] The buggy address is located 0 bytes to the right of [ 37.573669] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.575074] [ 37.575435] The buggy address belongs to the physical page: [ 37.576227] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.577042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.577952] page_type: f5(slab) [ 37.578520] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.579480] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.580357] page dumped because: kasan: bad access detected [ 37.581153] [ 37.581557] Memory state around the buggy address: [ 37.582192] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.583035] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.583918] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.584730] ^ [ 37.585354] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.586198] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.587062] ================================================================== [ 37.140727] ================================================================== [ 37.141515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 37.142303] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.143114] [ 37.143508] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.144653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.145272] Hardware name: linux,dummy-virt (DT) [ 37.145839] Call trace: [ 37.146314] show_stack+0x20/0x38 (C) [ 37.146935] dump_stack_lvl+0x8c/0xd0 [ 37.147492] print_report+0x118/0x5e0 [ 37.148060] kasan_report+0xc8/0x118 [ 37.148684] kasan_check_range+0x100/0x1a8 [ 37.149334] __kasan_check_write+0x20/0x30 [ 37.149871] kasan_atomics_helper+0x1058/0x4858 [ 37.150601] kasan_atomics+0x198/0x2e8 [ 37.151180] kunit_try_run_case+0x14c/0x3d0 [ 37.151755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.152565] kthread+0x24c/0x2d0 [ 37.153115] ret_from_fork+0x10/0x20 [ 37.153707] [ 37.154097] Allocated by task 254: [ 37.154650] kasan_save_stack+0x3c/0x68 [ 37.155262] kasan_save_track+0x20/0x40 [ 37.155956] kasan_save_alloc_info+0x40/0x58 [ 37.156546] __kasan_kmalloc+0xd4/0xd8 [ 37.157087] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.157761] kasan_atomics+0xb8/0x2e8 [ 37.158317] kunit_try_run_case+0x14c/0x3d0 [ 37.158992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.159588] kthread+0x24c/0x2d0 [ 37.160168] ret_from_fork+0x10/0x20 [ 37.160770] [ 37.161145] The buggy address belongs to the object at fff00000c591a100 [ 37.161145] which belongs to the cache kmalloc-64 of size 64 [ 37.162293] The buggy address is located 0 bytes to the right of [ 37.162293] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.163338] [ 37.163712] The buggy address belongs to the physical page: [ 37.164456] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.165491] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.166201] page_type: f5(slab) [ 37.166774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.167734] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.168547] page dumped because: kasan: bad access detected [ 37.169245] [ 37.169588] Memory state around the buggy address: [ 37.170278] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.171089] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.171896] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.172693] ^ [ 37.173315] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.174088] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.174950] ================================================================== [ 35.746704] ================================================================== [ 35.747830] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 35.748454] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.749811] [ 35.750237] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.751481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.751995] Hardware name: linux,dummy-virt (DT) [ 35.753209] Call trace: [ 35.753585] show_stack+0x20/0x38 (C) [ 35.754087] dump_stack_lvl+0x8c/0xd0 [ 35.754724] print_report+0x118/0x5e0 [ 35.755365] kasan_report+0xc8/0x118 [ 35.756038] __asan_report_store4_noabort+0x20/0x30 [ 35.756787] kasan_atomics_helper+0x3f94/0x4858 [ 35.757525] kasan_atomics+0x198/0x2e8 [ 35.758177] kunit_try_run_case+0x14c/0x3d0 [ 35.758807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.759595] kthread+0x24c/0x2d0 [ 35.760197] ret_from_fork+0x10/0x20 [ 35.760741] [ 35.761133] Allocated by task 254: [ 35.761649] kasan_save_stack+0x3c/0x68 [ 35.762301] kasan_save_track+0x20/0x40 [ 35.762874] kasan_save_alloc_info+0x40/0x58 [ 35.763481] __kasan_kmalloc+0xd4/0xd8 [ 35.763975] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.764664] kasan_atomics+0xb8/0x2e8 [ 35.765230] kunit_try_run_case+0x14c/0x3d0 [ 35.765892] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.766603] kthread+0x24c/0x2d0 [ 35.767058] ret_from_fork+0x10/0x20 [ 35.767664] [ 35.768053] The buggy address belongs to the object at fff00000c591a100 [ 35.768053] which belongs to the cache kmalloc-64 of size 64 [ 35.769336] The buggy address is located 0 bytes to the right of [ 35.769336] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.770928] [ 35.771314] The buggy address belongs to the physical page: [ 35.771950] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.772797] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.773586] page_type: f5(slab) [ 35.774076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.774928] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.775805] page dumped because: kasan: bad access detected [ 35.776547] [ 35.776859] Memory state around the buggy address: [ 35.777532] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.778330] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.779159] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.779993] ^ [ 35.780604] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.781331] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.782181] ================================================================== [ 37.588828] ================================================================== [ 37.589627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 37.590573] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.591426] [ 37.591866] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.592857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.593521] Hardware name: linux,dummy-virt (DT) [ 37.594219] Call trace: [ 37.594740] show_stack+0x20/0x38 (C) [ 37.595356] dump_stack_lvl+0x8c/0xd0 [ 37.596043] print_report+0x118/0x5e0 [ 37.596725] kasan_report+0xc8/0x118 [ 37.597354] kasan_check_range+0x100/0x1a8 [ 37.598100] __kasan_check_write+0x20/0x30 [ 37.598762] kasan_atomics_helper+0x154c/0x4858 [ 37.599494] kasan_atomics+0x198/0x2e8 [ 37.600075] kunit_try_run_case+0x14c/0x3d0 [ 37.600808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.601585] kthread+0x24c/0x2d0 [ 37.602192] ret_from_fork+0x10/0x20 [ 37.602798] [ 37.603190] Allocated by task 254: [ 37.603776] kasan_save_stack+0x3c/0x68 [ 37.604375] kasan_save_track+0x20/0x40 [ 37.605052] kasan_save_alloc_info+0x40/0x58 [ 37.605605] __kasan_kmalloc+0xd4/0xd8 [ 37.606265] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.606888] kasan_atomics+0xb8/0x2e8 [ 37.607547] kunit_try_run_case+0x14c/0x3d0 [ 37.608153] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.608923] kthread+0x24c/0x2d0 [ 37.609476] ret_from_fork+0x10/0x20 [ 37.610126] [ 37.610466] The buggy address belongs to the object at fff00000c591a100 [ 37.610466] which belongs to the cache kmalloc-64 of size 64 [ 37.611766] The buggy address is located 0 bytes to the right of [ 37.611766] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.613082] [ 37.613475] The buggy address belongs to the physical page: [ 37.614225] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.615236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.616021] page_type: f5(slab) [ 37.616624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.617471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.618423] page dumped because: kasan: bad access detected [ 37.619123] [ 37.619432] Memory state around the buggy address: [ 37.620124] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.620815] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.621732] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.622598] ^ [ 37.623289] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.624161] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.624966] ================================================================== [ 37.626813] ================================================================== [ 37.627656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 37.628800] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.629826] [ 37.630261] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.631413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.632097] Hardware name: linux,dummy-virt (DT) [ 37.632703] Call trace: [ 37.633271] show_stack+0x20/0x38 (C) [ 37.634014] dump_stack_lvl+0x8c/0xd0 [ 37.634666] print_report+0x118/0x5e0 [ 37.635338] kasan_report+0xc8/0x118 [ 37.635995] kasan_check_range+0x100/0x1a8 [ 37.636765] __kasan_check_write+0x20/0x30 [ 37.637387] kasan_atomics_helper+0x15b4/0x4858 [ 37.638081] kasan_atomics+0x198/0x2e8 [ 37.638728] kunit_try_run_case+0x14c/0x3d0 [ 37.639301] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.640153] kthread+0x24c/0x2d0 [ 37.640808] ret_from_fork+0x10/0x20 [ 37.641508] [ 37.641885] Allocated by task 254: [ 37.642512] kasan_save_stack+0x3c/0x68 [ 37.643181] kasan_save_track+0x20/0x40 [ 37.643780] kasan_save_alloc_info+0x40/0x58 [ 37.644431] __kasan_kmalloc+0xd4/0xd8 [ 37.645101] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.645677] kasan_atomics+0xb8/0x2e8 [ 37.646328] kunit_try_run_case+0x14c/0x3d0 [ 37.646945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.647710] kthread+0x24c/0x2d0 [ 37.648240] ret_from_fork+0x10/0x20 [ 37.648870] [ 37.649227] The buggy address belongs to the object at fff00000c591a100 [ 37.649227] which belongs to the cache kmalloc-64 of size 64 [ 37.650485] The buggy address is located 0 bytes to the right of [ 37.650485] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.651815] [ 37.652179] The buggy address belongs to the physical page: [ 37.652969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.653750] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.654686] page_type: f5(slab) [ 37.655230] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.656154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.657063] page dumped because: kasan: bad access detected [ 37.657730] [ 37.658137] Memory state around the buggy address: [ 37.658796] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.659565] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.660461] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.661374] ^ [ 37.662069] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.662920] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.663729] ================================================================== [ 36.559547] ================================================================== [ 36.560792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 36.562032] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.563138] [ 36.563677] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.564798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.565201] Hardware name: linux,dummy-virt (DT) [ 36.565838] Call trace: [ 36.566317] show_stack+0x20/0x38 (C) [ 36.566977] dump_stack_lvl+0x8c/0xd0 [ 36.567611] print_report+0x118/0x5e0 [ 36.568221] kasan_report+0xc8/0x118 [ 36.568874] __asan_report_load4_noabort+0x20/0x30 [ 36.569535] kasan_atomics_helper+0x3dbc/0x4858 [ 36.570300] kasan_atomics+0x198/0x2e8 [ 36.570937] kunit_try_run_case+0x14c/0x3d0 [ 36.571619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.572435] kthread+0x24c/0x2d0 [ 36.572958] ret_from_fork+0x10/0x20 [ 36.573627] [ 36.574000] Allocated by task 254: [ 36.574584] kasan_save_stack+0x3c/0x68 [ 36.575241] kasan_save_track+0x20/0x40 [ 36.575924] kasan_save_alloc_info+0x40/0x58 [ 36.576597] __kasan_kmalloc+0xd4/0xd8 [ 36.577201] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.577945] kasan_atomics+0xb8/0x2e8 [ 36.578560] kunit_try_run_case+0x14c/0x3d0 [ 36.579284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.580003] kthread+0x24c/0x2d0 [ 36.580621] ret_from_fork+0x10/0x20 [ 36.581099] [ 36.581483] The buggy address belongs to the object at fff00000c591a100 [ 36.581483] which belongs to the cache kmalloc-64 of size 64 [ 36.582699] The buggy address is located 0 bytes to the right of [ 36.582699] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.584134] [ 36.584494] The buggy address belongs to the physical page: [ 36.585265] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.586207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.587033] page_type: f5(slab) [ 36.587624] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.588501] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.589433] page dumped because: kasan: bad access detected [ 36.590115] [ 36.590497] Memory state around the buggy address: [ 36.591231] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.592023] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.592929] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.593744] ^ [ 36.594349] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.595263] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.596067] ================================================================== [ 37.743056] ================================================================== [ 37.743721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.744939] Read of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.746426] [ 37.747029] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.748571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.749039] Hardware name: linux,dummy-virt (DT) [ 37.749687] Call trace: [ 37.750160] show_stack+0x20/0x38 (C) [ 37.750690] dump_stack_lvl+0x8c/0xd0 [ 37.751349] print_report+0x118/0x5e0 [ 37.751858] kasan_report+0xc8/0x118 [ 37.752506] __asan_report_load8_noabort+0x20/0x30 [ 37.753272] kasan_atomics_helper+0x3df4/0x4858 [ 37.753981] kasan_atomics+0x198/0x2e8 [ 37.754669] kunit_try_run_case+0x14c/0x3d0 [ 37.755258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.755958] kthread+0x24c/0x2d0 [ 37.756753] ret_from_fork+0x10/0x20 [ 37.757412] [ 37.757828] Allocated by task 254: [ 37.758325] kasan_save_stack+0x3c/0x68 [ 37.758965] kasan_save_track+0x20/0x40 [ 37.759664] kasan_save_alloc_info+0x40/0x58 [ 37.760386] __kasan_kmalloc+0xd4/0xd8 [ 37.760876] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.761850] kasan_atomics+0xb8/0x2e8 [ 37.762573] kunit_try_run_case+0x14c/0x3d0 [ 37.763141] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.763795] kthread+0x24c/0x2d0 [ 37.764408] ret_from_fork+0x10/0x20 [ 37.764922] [ 37.765289] The buggy address belongs to the object at fff00000c591a100 [ 37.765289] which belongs to the cache kmalloc-64 of size 64 [ 37.766419] The buggy address is located 0 bytes to the right of [ 37.766419] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.767707] [ 37.768091] The buggy address belongs to the physical page: [ 37.768755] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.769659] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.770431] page_type: f5(slab) [ 37.771031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.771836] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.772791] page dumped because: kasan: bad access detected [ 37.773395] [ 37.773770] Memory state around the buggy address: [ 37.774461] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.775200] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.776123] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.776938] ^ [ 37.777622] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.778407] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.779248] ================================================================== [ 36.086655] ================================================================== [ 36.087521] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 36.088952] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.089753] [ 36.090175] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.091340] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.091959] Hardware name: linux,dummy-virt (DT) [ 36.092480] Call trace: [ 36.092962] show_stack+0x20/0x38 (C) [ 36.093519] dump_stack_lvl+0x8c/0xd0 [ 36.094180] print_report+0x118/0x5e0 [ 36.094827] kasan_report+0xc8/0x118 [ 36.095452] kasan_check_range+0x100/0x1a8 [ 36.096150] __kasan_check_write+0x20/0x30 [ 36.096763] kasan_atomics_helper+0x6ec/0x4858 [ 36.097479] kasan_atomics+0x198/0x2e8 [ 36.098139] kunit_try_run_case+0x14c/0x3d0 [ 36.098700] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.099488] kthread+0x24c/0x2d0 [ 36.100022] ret_from_fork+0x10/0x20 [ 36.100649] [ 36.101011] Allocated by task 254: [ 36.101557] kasan_save_stack+0x3c/0x68 [ 36.102182] kasan_save_track+0x20/0x40 [ 36.102716] kasan_save_alloc_info+0x40/0x58 [ 36.103395] __kasan_kmalloc+0xd4/0xd8 [ 36.103931] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.104612] kasan_atomics+0xb8/0x2e8 [ 36.105165] kunit_try_run_case+0x14c/0x3d0 [ 36.105856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.106488] kthread+0x24c/0x2d0 [ 36.107077] ret_from_fork+0x10/0x20 [ 36.107662] [ 36.108050] The buggy address belongs to the object at fff00000c591a100 [ 36.108050] which belongs to the cache kmalloc-64 of size 64 [ 36.109204] The buggy address is located 0 bytes to the right of [ 36.109204] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.110398] [ 36.110781] The buggy address belongs to the physical page: [ 36.111523] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.112443] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.113204] page_type: f5(slab) [ 36.113697] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.114598] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.115451] page dumped because: kasan: bad access detected [ 36.116097] [ 36.116469] Memory state around the buggy address: [ 36.117099] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.117877] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.118706] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.119356] ^ [ 36.120048] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.120879] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.121660] ================================================================== [ 35.937926] ================================================================== [ 35.938638] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.939436] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.940249] [ 35.941058] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.941963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.942592] Hardware name: linux,dummy-virt (DT) [ 35.943118] Call trace: [ 35.943573] show_stack+0x20/0x38 (C) [ 35.944232] dump_stack_lvl+0x8c/0xd0 [ 35.944888] print_report+0x118/0x5e0 [ 35.945553] kasan_report+0xc8/0x118 [ 35.946106] kasan_check_range+0x100/0x1a8 [ 35.946791] __kasan_check_write+0x20/0x30 [ 35.947460] kasan_atomics_helper+0x54c/0x4858 [ 35.948154] kasan_atomics+0x198/0x2e8 [ 35.948727] kunit_try_run_case+0x14c/0x3d0 [ 35.949361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.950094] kthread+0x24c/0x2d0 [ 35.950650] ret_from_fork+0x10/0x20 [ 35.951242] [ 35.951563] Allocated by task 254: [ 35.952135] kasan_save_stack+0x3c/0x68 [ 35.952743] kasan_save_track+0x20/0x40 [ 35.953338] kasan_save_alloc_info+0x40/0x58 [ 35.954022] __kasan_kmalloc+0xd4/0xd8 [ 35.954560] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.955258] kasan_atomics+0xb8/0x2e8 [ 35.955819] kunit_try_run_case+0x14c/0x3d0 [ 35.956400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.957192] kthread+0x24c/0x2d0 [ 35.957642] ret_from_fork+0x10/0x20 [ 35.958262] [ 35.958640] The buggy address belongs to the object at fff00000c591a100 [ 35.958640] which belongs to the cache kmalloc-64 of size 64 [ 35.959984] The buggy address is located 0 bytes to the right of [ 35.959984] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.961183] [ 35.961553] The buggy address belongs to the physical page: [ 35.962259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.963248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.964091] page_type: f5(slab) [ 35.964641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.965428] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.966379] page dumped because: kasan: bad access detected [ 35.966967] [ 35.967340] Memory state around the buggy address: [ 35.968029] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.968791] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.969606] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.970410] ^ [ 35.971049] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.971958] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.972848] ================================================================== [ 35.708723] ================================================================== [ 35.709444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 35.710238] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.711152] [ 35.711596] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.712528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.713262] Hardware name: linux,dummy-virt (DT) [ 35.713976] Call trace: [ 35.714460] show_stack+0x20/0x38 (C) [ 35.715193] dump_stack_lvl+0x8c/0xd0 [ 35.715815] print_report+0x118/0x5e0 [ 35.716531] kasan_report+0xc8/0x118 [ 35.717224] kasan_check_range+0x100/0x1a8 [ 35.717951] __kasan_check_write+0x20/0x30 [ 35.718579] kasan_atomics_helper+0x32c/0x4858 [ 35.719434] kasan_atomics+0x198/0x2e8 [ 35.720126] kunit_try_run_case+0x14c/0x3d0 [ 35.720919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.721752] kthread+0x24c/0x2d0 [ 35.722324] ret_from_fork+0x10/0x20 [ 35.722970] [ 35.723308] Allocated by task 254: [ 35.723869] kasan_save_stack+0x3c/0x68 [ 35.724598] kasan_save_track+0x20/0x40 [ 35.725075] kasan_save_alloc_info+0x40/0x58 [ 35.725810] __kasan_kmalloc+0xd4/0xd8 [ 35.726437] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.727066] kasan_atomics+0xb8/0x2e8 [ 35.727600] kunit_try_run_case+0x14c/0x3d0 [ 35.728218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.728892] kthread+0x24c/0x2d0 [ 35.729412] ret_from_fork+0x10/0x20 [ 35.729959] [ 35.730319] The buggy address belongs to the object at fff00000c591a100 [ 35.730319] which belongs to the cache kmalloc-64 of size 64 [ 35.731565] The buggy address is located 0 bytes to the right of [ 35.731565] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.732772] [ 35.733159] The buggy address belongs to the physical page: [ 35.733726] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.734740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.735604] page_type: f5(slab) [ 35.736084] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.736993] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.737838] page dumped because: kasan: bad access detected [ 35.738475] [ 35.738848] Memory state around the buggy address: [ 35.739817] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.740598] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.741495] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.742346] ^ [ 35.742918] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.743776] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.744521] ================================================================== [ 36.319151] ================================================================== [ 36.320537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 36.321336] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.322111] [ 36.322533] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.323580] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.324201] Hardware name: linux,dummy-virt (DT) [ 36.324734] Call trace: [ 36.325216] show_stack+0x20/0x38 (C) [ 36.325771] dump_stack_lvl+0x8c/0xd0 [ 36.326414] print_report+0x118/0x5e0 [ 36.327023] kasan_report+0xc8/0x118 [ 36.327534] kasan_check_range+0x100/0x1a8 [ 36.328201] __kasan_check_write+0x20/0x30 [ 36.328871] kasan_atomics_helper+0x99c/0x4858 [ 36.329484] kasan_atomics+0x198/0x2e8 [ 36.330141] kunit_try_run_case+0x14c/0x3d0 [ 36.330802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.331489] kthread+0x24c/0x2d0 [ 36.332095] ret_from_fork+0x10/0x20 [ 36.332634] [ 36.333021] Allocated by task 254: [ 36.333542] kasan_save_stack+0x3c/0x68 [ 36.334174] kasan_save_track+0x20/0x40 [ 36.334732] kasan_save_alloc_info+0x40/0x58 [ 36.335285] __kasan_kmalloc+0xd4/0xd8 [ 36.335893] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.336503] kasan_atomics+0xb8/0x2e8 [ 36.337068] kunit_try_run_case+0x14c/0x3d0 [ 36.337724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.338719] kthread+0x24c/0x2d0 [ 36.339292] ret_from_fork+0x10/0x20 [ 36.339849] [ 36.340198] The buggy address belongs to the object at fff00000c591a100 [ 36.340198] which belongs to the cache kmalloc-64 of size 64 [ 36.341326] The buggy address is located 0 bytes to the right of [ 36.341326] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.342620] [ 36.343007] The buggy address belongs to the physical page: [ 36.343631] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.344455] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.345242] page_type: f5(slab) [ 36.345769] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.346679] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.347532] page dumped because: kasan: bad access detected [ 36.348083] [ 36.348447] Memory state around the buggy address: [ 36.349149] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.349870] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.350718] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.351507] ^ [ 36.352133] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.352956] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.353849] ================================================================== [ 35.627557] ================================================================== [ 35.628278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 35.629097] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.629799] [ 35.630231] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.631479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.632028] Hardware name: linux,dummy-virt (DT) [ 35.632673] Call trace: [ 35.633141] show_stack+0x20/0x38 (C) [ 35.633743] dump_stack_lvl+0x8c/0xd0 [ 35.634324] print_report+0x118/0x5e0 [ 35.635015] kasan_report+0xc8/0x118 [ 35.635698] kasan_check_range+0x100/0x1a8 [ 35.636410] __kasan_check_read+0x20/0x30 [ 35.637003] kasan_atomics_helper+0x2b0/0x4858 [ 35.637710] kasan_atomics+0x198/0x2e8 [ 35.638375] kunit_try_run_case+0x14c/0x3d0 [ 35.639034] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.639831] kthread+0x24c/0x2d0 [ 35.640446] ret_from_fork+0x10/0x20 [ 35.641081] [ 35.641405] Allocated by task 254: [ 35.641979] kasan_save_stack+0x3c/0x68 [ 35.642517] kasan_save_track+0x20/0x40 [ 35.643155] kasan_save_alloc_info+0x40/0x58 [ 35.643742] __kasan_kmalloc+0xd4/0xd8 [ 35.644374] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.645065] kasan_atomics+0xb8/0x2e8 [ 35.645697] kunit_try_run_case+0x14c/0x3d0 [ 35.646288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.646966] kthread+0x24c/0x2d0 [ 35.647547] ret_from_fork+0x10/0x20 [ 35.648081] [ 35.648450] The buggy address belongs to the object at fff00000c591a100 [ 35.648450] which belongs to the cache kmalloc-64 of size 64 [ 35.649466] The buggy address is located 0 bytes to the right of [ 35.649466] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.650563] [ 35.650942] The buggy address belongs to the physical page: [ 35.651655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.652468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.653348] page_type: f5(slab) [ 35.653833] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.654673] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.655657] page dumped because: kasan: bad access detected [ 35.656251] [ 35.656605] Memory state around the buggy address: [ 35.657303] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.657999] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.658930] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.659657] ^ [ 35.660365] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.661188] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.662083] ================================================================== [ 36.013186] ================================================================== [ 36.013858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 36.015517] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.016407] [ 36.016844] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.017877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.018417] Hardware name: linux,dummy-virt (DT) [ 36.019077] Call trace: [ 36.019531] show_stack+0x20/0x38 (C) [ 36.020138] dump_stack_lvl+0x8c/0xd0 [ 36.020670] print_report+0x118/0x5e0 [ 36.021200] kasan_report+0xc8/0x118 [ 36.021823] kasan_check_range+0x100/0x1a8 [ 36.022538] __kasan_check_write+0x20/0x30 [ 36.023243] kasan_atomics_helper+0x61c/0x4858 [ 36.023935] kasan_atomics+0x198/0x2e8 [ 36.024495] kunit_try_run_case+0x14c/0x3d0 [ 36.025196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.026058] kthread+0x24c/0x2d0 [ 36.026649] ret_from_fork+0x10/0x20 [ 36.027240] [ 36.027577] Allocated by task 254: [ 36.028062] kasan_save_stack+0x3c/0x68 [ 36.028692] kasan_save_track+0x20/0x40 [ 36.029319] kasan_save_alloc_info+0x40/0x58 [ 36.029971] __kasan_kmalloc+0xd4/0xd8 [ 36.030586] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.031155] kasan_atomics+0xb8/0x2e8 [ 36.031760] kunit_try_run_case+0x14c/0x3d0 [ 36.032374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.033018] kthread+0x24c/0x2d0 [ 36.033579] ret_from_fork+0x10/0x20 [ 36.034161] [ 36.034534] The buggy address belongs to the object at fff00000c591a100 [ 36.034534] which belongs to the cache kmalloc-64 of size 64 [ 36.035798] The buggy address is located 0 bytes to the right of [ 36.035798] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.037211] [ 36.037530] The buggy address belongs to the physical page: [ 36.038272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.039077] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.039965] page_type: f5(slab) [ 36.040499] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.041295] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.042169] page dumped because: kasan: bad access detected [ 36.042758] [ 36.043142] Memory state around the buggy address: [ 36.043728] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.044500] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.045291] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.046167] ^ [ 36.046723] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.047581] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.048327] ================================================================== [ 36.795741] ================================================================== [ 36.797057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.798970] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.799990] [ 36.800356] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.801432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.802011] Hardware name: linux,dummy-virt (DT) [ 36.802673] Call trace: [ 36.803066] show_stack+0x20/0x38 (C) [ 36.803701] dump_stack_lvl+0x8c/0xd0 [ 36.804256] print_report+0x118/0x5e0 [ 36.804886] kasan_report+0xc8/0x118 [ 36.805467] __asan_report_load4_noabort+0x20/0x30 [ 36.806174] kasan_atomics_helper+0x3e04/0x4858 [ 36.806885] kasan_atomics+0x198/0x2e8 [ 36.807469] kunit_try_run_case+0x14c/0x3d0 [ 36.808185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.808985] kthread+0x24c/0x2d0 [ 36.809449] ret_from_fork+0x10/0x20 [ 36.810103] [ 36.810443] Allocated by task 254: [ 36.810973] kasan_save_stack+0x3c/0x68 [ 36.811601] kasan_save_track+0x20/0x40 [ 36.812256] kasan_save_alloc_info+0x40/0x58 [ 36.812845] __kasan_kmalloc+0xd4/0xd8 [ 36.813492] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.814033] kasan_atomics+0xb8/0x2e8 [ 36.814643] kunit_try_run_case+0x14c/0x3d0 [ 36.815236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.815925] kthread+0x24c/0x2d0 [ 36.816448] ret_from_fork+0x10/0x20 [ 36.817063] [ 36.817415] The buggy address belongs to the object at fff00000c591a100 [ 36.817415] which belongs to the cache kmalloc-64 of size 64 [ 36.818671] The buggy address is located 0 bytes to the right of [ 36.818671] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.819972] [ 36.820338] The buggy address belongs to the physical page: [ 36.821032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.821988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.822655] page_type: f5(slab) [ 36.823180] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.824085] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.824965] page dumped because: kasan: bad access detected [ 36.825591] [ 36.825978] Memory state around the buggy address: [ 36.826528] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.827402] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.828134] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.828934] ^ [ 36.829619] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.830411] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.831334] ================================================================== [ 37.250566] ================================================================== [ 37.251430] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 37.252259] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.253074] [ 37.253556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.254791] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.255353] Hardware name: linux,dummy-virt (DT) [ 37.255977] Call trace: [ 37.256435] show_stack+0x20/0x38 (C) [ 37.257108] dump_stack_lvl+0x8c/0xd0 [ 37.257690] print_report+0x118/0x5e0 [ 37.258355] kasan_report+0xc8/0x118 [ 37.259021] kasan_check_range+0x100/0x1a8 [ 37.259603] __kasan_check_write+0x20/0x30 [ 37.260301] kasan_atomics_helper+0x1190/0x4858 [ 37.260973] kasan_atomics+0x198/0x2e8 [ 37.261467] kunit_try_run_case+0x14c/0x3d0 [ 37.262169] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.262811] kthread+0x24c/0x2d0 [ 37.263438] ret_from_fork+0x10/0x20 [ 37.264091] [ 37.264441] Allocated by task 254: [ 37.264937] kasan_save_stack+0x3c/0x68 [ 37.265596] kasan_save_track+0x20/0x40 [ 37.266121] kasan_save_alloc_info+0x40/0x58 [ 37.266766] __kasan_kmalloc+0xd4/0xd8 [ 37.267400] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.268070] kasan_atomics+0xb8/0x2e8 [ 37.268604] kunit_try_run_case+0x14c/0x3d0 [ 37.269243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.270024] kthread+0x24c/0x2d0 [ 37.270558] ret_from_fork+0x10/0x20 [ 37.271175] [ 37.271520] The buggy address belongs to the object at fff00000c591a100 [ 37.271520] which belongs to the cache kmalloc-64 of size 64 [ 37.272661] The buggy address is located 0 bytes to the right of [ 37.272661] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.273885] [ 37.274271] The buggy address belongs to the physical page: [ 37.275013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.275963] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.276679] page_type: f5(slab) [ 37.277263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.278077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.279018] page dumped because: kasan: bad access detected [ 37.279653] [ 37.280005] Memory state around the buggy address: [ 37.280692] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.281475] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.282340] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.283153] ^ [ 37.283833] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.284623] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.285540] ================================================================== [ 35.501167] ================================================================== [ 35.501977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 35.502850] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.504350] [ 35.504920] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.506260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.507054] Hardware name: linux,dummy-virt (DT) [ 35.507868] Call trace: [ 35.508514] show_stack+0x20/0x38 (C) [ 35.509277] dump_stack_lvl+0x8c/0xd0 [ 35.510135] print_report+0x118/0x5e0 [ 35.510944] kasan_report+0xc8/0x118 [ 35.511712] __asan_report_store4_noabort+0x20/0x30 [ 35.512601] kasan_atomics_helper+0x3f7c/0x4858 [ 35.513431] kasan_atomics+0x198/0x2e8 [ 35.514224] kunit_try_run_case+0x14c/0x3d0 [ 35.515085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.515741] kthread+0x24c/0x2d0 [ 35.516235] ret_from_fork+0x10/0x20 [ 35.516746] [ 35.517112] Allocated by task 254: [ 35.518131] kasan_save_stack+0x3c/0x68 [ 35.518741] kasan_save_track+0x20/0x40 [ 35.519645] kasan_save_alloc_info+0x40/0x58 [ 35.520276] __kasan_kmalloc+0xd4/0xd8 [ 35.521097] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.521929] kasan_atomics+0xb8/0x2e8 [ 35.522680] kunit_try_run_case+0x14c/0x3d0 [ 35.523343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.524358] kthread+0x24c/0x2d0 [ 35.525056] ret_from_fork+0x10/0x20 [ 35.525811] [ 35.526181] The buggy address belongs to the object at fff00000c591a100 [ 35.526181] which belongs to the cache kmalloc-64 of size 64 [ 35.527657] The buggy address is located 0 bytes to the right of [ 35.527657] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.529172] [ 35.529771] The buggy address belongs to the physical page: [ 35.530467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.531644] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.532457] page_type: f5(slab) [ 35.533285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.534369] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.535402] page dumped because: kasan: bad access detected [ 35.536264] [ 35.536786] Memory state around the buggy address: [ 35.537401] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.538522] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.539368] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.540433] ^ [ 35.541240] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.542257] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.543293] ================================================================== [ 37.780804] ================================================================== [ 37.781603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.782381] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.783627] [ 37.783998] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.784995] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.785643] Hardware name: linux,dummy-virt (DT) [ 37.786257] Call trace: [ 37.786711] show_stack+0x20/0x38 (C) [ 37.787266] dump_stack_lvl+0x8c/0xd0 [ 37.787934] print_report+0x118/0x5e0 [ 37.788531] kasan_report+0xc8/0x118 [ 37.789104] kasan_check_range+0x100/0x1a8 [ 37.789713] __kasan_check_write+0x20/0x30 [ 37.790270] kasan_atomics_helper+0x16d0/0x4858 [ 37.791012] kasan_atomics+0x198/0x2e8 [ 37.791572] kunit_try_run_case+0x14c/0x3d0 [ 37.792282] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.792968] kthread+0x24c/0x2d0 [ 37.793545] ret_from_fork+0x10/0x20 [ 37.794196] [ 37.794558] Allocated by task 254: [ 37.795008] kasan_save_stack+0x3c/0x68 [ 37.795676] kasan_save_track+0x20/0x40 [ 37.796197] kasan_save_alloc_info+0x40/0x58 [ 37.796856] __kasan_kmalloc+0xd4/0xd8 [ 37.797486] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.798078] kasan_atomics+0xb8/0x2e8 [ 37.798692] kunit_try_run_case+0x14c/0x3d0 [ 37.799317] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.799882] kthread+0x24c/0x2d0 [ 37.800468] ret_from_fork+0x10/0x20 [ 37.801036] [ 37.801409] The buggy address belongs to the object at fff00000c591a100 [ 37.801409] which belongs to the cache kmalloc-64 of size 64 [ 37.802585] The buggy address is located 0 bytes to the right of [ 37.802585] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.803861] [ 37.804257] The buggy address belongs to the physical page: [ 37.805002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.805934] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.806736] page_type: f5(slab) [ 37.807316] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.808039] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.808990] page dumped because: kasan: bad access detected [ 37.809719] [ 37.810057] Memory state around the buggy address: [ 37.810740] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.811509] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.812299] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.813150] ^ [ 37.813719] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.814566] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.815375] ================================================================== [ 36.676038] ================================================================== [ 36.676700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 36.677738] Write of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.678657] [ 36.679068] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.680388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.681060] Hardware name: linux,dummy-virt (DT) [ 36.681765] Call trace: [ 36.682219] show_stack+0x20/0x38 (C) [ 36.682864] dump_stack_lvl+0x8c/0xd0 [ 36.683562] print_report+0x118/0x5e0 [ 36.684209] kasan_report+0xc8/0x118 [ 36.684794] kasan_check_range+0x100/0x1a8 [ 36.685514] __kasan_check_write+0x20/0x30 [ 36.686140] kasan_atomics_helper+0xca0/0x4858 [ 36.686896] kasan_atomics+0x198/0x2e8 [ 36.687553] kunit_try_run_case+0x14c/0x3d0 [ 36.688234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.689092] kthread+0x24c/0x2d0 [ 36.689647] ret_from_fork+0x10/0x20 [ 36.690325] [ 36.690732] Allocated by task 254: [ 36.691336] kasan_save_stack+0x3c/0x68 [ 36.691889] kasan_save_track+0x20/0x40 [ 36.692561] kasan_save_alloc_info+0x40/0x58 [ 36.693218] __kasan_kmalloc+0xd4/0xd8 [ 36.693866] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.694766] kasan_atomics+0xb8/0x2e8 [ 36.695316] kunit_try_run_case+0x14c/0x3d0 [ 36.695882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.696930] kthread+0x24c/0x2d0 [ 36.697633] ret_from_fork+0x10/0x20 [ 36.698393] [ 36.698997] The buggy address belongs to the object at fff00000c591a100 [ 36.698997] which belongs to the cache kmalloc-64 of size 64 [ 36.700284] The buggy address is located 0 bytes to the right of [ 36.700284] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.701707] [ 36.702323] The buggy address belongs to the physical page: [ 36.702984] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.703858] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.704993] page_type: f5(slab) [ 36.705718] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.706799] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.707821] page dumped because: kasan: bad access detected [ 36.708672] [ 36.709022] Memory state around the buggy address: [ 36.709682] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.710482] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.711668] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.712664] ^ [ 36.713479] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.714470] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.715428] ================================================================== [ 36.639006] ================================================================== [ 36.639721] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 36.640731] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.641545] [ 36.641830] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.642878] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.643443] Hardware name: linux,dummy-virt (DT) [ 36.644158] Call trace: [ 36.644650] show_stack+0x20/0x38 (C) [ 36.645248] dump_stack_lvl+0x8c/0xd0 [ 36.645944] print_report+0x118/0x5e0 [ 36.646553] kasan_report+0xc8/0x118 [ 36.647224] __asan_report_load4_noabort+0x20/0x30 [ 36.648014] kasan_atomics_helper+0x3de4/0x4858 [ 36.648684] kasan_atomics+0x198/0x2e8 [ 36.649396] kunit_try_run_case+0x14c/0x3d0 [ 36.649986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.650830] kthread+0x24c/0x2d0 [ 36.651430] ret_from_fork+0x10/0x20 [ 36.652122] [ 36.652498] Allocated by task 254: [ 36.652987] kasan_save_stack+0x3c/0x68 [ 36.653661] kasan_save_track+0x20/0x40 [ 36.654313] kasan_save_alloc_info+0x40/0x58 [ 36.655021] __kasan_kmalloc+0xd4/0xd8 [ 36.655653] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.656289] kasan_atomics+0xb8/0x2e8 [ 36.656959] kunit_try_run_case+0x14c/0x3d0 [ 36.657610] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.658338] kthread+0x24c/0x2d0 [ 36.658963] ret_from_fork+0x10/0x20 [ 36.659493] [ 36.659863] The buggy address belongs to the object at fff00000c591a100 [ 36.659863] which belongs to the cache kmalloc-64 of size 64 [ 36.661170] The buggy address is located 0 bytes to the right of [ 36.661170] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.662493] [ 36.662880] The buggy address belongs to the physical page: [ 36.663504] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.664480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.665365] page_type: f5(slab) [ 36.665840] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.666830] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.667709] page dumped because: kasan: bad access detected [ 36.668418] [ 36.668764] Memory state around the buggy address: [ 36.669417] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.670290] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.671180] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.672003] ^ [ 36.672655] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.673492] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.674310] ================================================================== [ 36.946594] ================================================================== [ 36.948226] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.949467] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.950350] [ 36.950771] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.951694] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.952314] Hardware name: linux,dummy-virt (DT) [ 36.952988] Call trace: [ 36.953380] show_stack+0x20/0x38 (C) [ 36.953942] dump_stack_lvl+0x8c/0xd0 [ 36.954577] print_report+0x118/0x5e0 [ 36.955154] kasan_report+0xc8/0x118 [ 36.955709] __asan_report_store8_noabort+0x20/0x30 [ 36.956338] kasan_atomics_helper+0x3e5c/0x4858 [ 36.957054] kasan_atomics+0x198/0x2e8 [ 36.957585] kunit_try_run_case+0x14c/0x3d0 [ 36.958244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.959070] kthread+0x24c/0x2d0 [ 36.959668] ret_from_fork+0x10/0x20 [ 36.960318] [ 36.960656] Allocated by task 254: [ 36.961486] kasan_save_stack+0x3c/0x68 [ 36.962335] kasan_save_track+0x20/0x40 [ 36.962846] kasan_save_alloc_info+0x40/0x58 [ 36.963583] __kasan_kmalloc+0xd4/0xd8 [ 36.964138] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.964751] kasan_atomics+0xb8/0x2e8 [ 36.965791] kunit_try_run_case+0x14c/0x3d0 [ 36.966623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.967514] kthread+0x24c/0x2d0 [ 36.968210] ret_from_fork+0x10/0x20 [ 36.968965] [ 36.969486] The buggy address belongs to the object at fff00000c591a100 [ 36.969486] which belongs to the cache kmalloc-64 of size 64 [ 36.970848] The buggy address is located 0 bytes to the right of [ 36.970848] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.972291] [ 36.972650] The buggy address belongs to the physical page: [ 36.973392] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.974696] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.975638] page_type: f5(slab) [ 36.976386] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.977449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.978485] page dumped because: kasan: bad access detected [ 36.979347] [ 36.979857] Memory state around the buggy address: [ 36.980625] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.981468] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.982274] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.983370] ^ [ 36.983816] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.984860] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.985653] ================================================================== [ 35.664183] ================================================================== [ 35.665174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 35.665975] Read of size 4 at addr fff00000c591a130 by task kunit_try_catch/254 [ 35.666848] [ 35.668602] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.669665] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.670233] Hardware name: linux,dummy-virt (DT) [ 35.670868] Call trace: [ 35.671253] show_stack+0x20/0x38 (C) [ 35.671875] dump_stack_lvl+0x8c/0xd0 [ 35.672418] print_report+0x118/0x5e0 [ 35.673045] kasan_report+0xc8/0x118 [ 35.673576] __asan_report_load4_noabort+0x20/0x30 [ 35.674263] kasan_atomics_helper+0x40fc/0x4858 [ 35.675600] kasan_atomics+0x198/0x2e8 [ 35.676523] kunit_try_run_case+0x14c/0x3d0 [ 35.677235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.677838] kthread+0x24c/0x2d0 [ 35.678984] ret_from_fork+0x10/0x20 [ 35.679771] [ 35.680299] Allocated by task 254: [ 35.680839] kasan_save_stack+0x3c/0x68 [ 35.681692] kasan_save_track+0x20/0x40 [ 35.682301] kasan_save_alloc_info+0x40/0x58 [ 35.683189] __kasan_kmalloc+0xd4/0xd8 [ 35.683962] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.684613] kasan_atomics+0xb8/0x2e8 [ 35.685433] kunit_try_run_case+0x14c/0x3d0 [ 35.686095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.687063] kthread+0x24c/0x2d0 [ 35.687778] ret_from_fork+0x10/0x20 [ 35.688554] [ 35.688925] The buggy address belongs to the object at fff00000c591a100 [ 35.688925] which belongs to the cache kmalloc-64 of size 64 [ 35.690523] The buggy address is located 0 bytes to the right of [ 35.690523] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 35.691822] [ 35.692362] The buggy address belongs to the physical page: [ 35.693121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 35.694079] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.694818] page_type: f5(slab) [ 35.695467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.696570] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.697461] page dumped because: kasan: bad access detected [ 35.698141] [ 35.698551] Memory state around the buggy address: [ 35.699147] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.699976] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.700878] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.701717] ^ [ 35.702324] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.703107] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.703873] ================================================================== [ 37.287506] ================================================================== [ 37.288850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 37.289710] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 37.291393] [ 37.291842] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.293031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.293590] Hardware name: linux,dummy-virt (DT) [ 37.294297] Call trace: [ 37.294806] show_stack+0x20/0x38 (C) [ 37.295482] dump_stack_lvl+0x8c/0xd0 [ 37.296186] print_report+0x118/0x5e0 [ 37.296868] kasan_report+0xc8/0x118 [ 37.297550] kasan_check_range+0x100/0x1a8 [ 37.298262] __kasan_check_write+0x20/0x30 [ 37.298968] kasan_atomics_helper+0x11f8/0x4858 [ 37.299620] kasan_atomics+0x198/0x2e8 [ 37.300285] kunit_try_run_case+0x14c/0x3d0 [ 37.300994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.301680] kthread+0x24c/0x2d0 [ 37.302197] ret_from_fork+0x10/0x20 [ 37.302842] [ 37.303220] Allocated by task 254: [ 37.303714] kasan_save_stack+0x3c/0x68 [ 37.304241] kasan_save_track+0x20/0x40 [ 37.304856] kasan_save_alloc_info+0x40/0x58 [ 37.305469] __kasan_kmalloc+0xd4/0xd8 [ 37.306097] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.306654] kasan_atomics+0xb8/0x2e8 [ 37.307270] kunit_try_run_case+0x14c/0x3d0 [ 37.307869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.308513] kthread+0x24c/0x2d0 [ 37.309097] ret_from_fork+0x10/0x20 [ 37.309576] [ 37.309966] The buggy address belongs to the object at fff00000c591a100 [ 37.309966] which belongs to the cache kmalloc-64 of size 64 [ 37.311108] The buggy address is located 0 bytes to the right of [ 37.311108] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 37.312391] [ 37.312760] The buggy address belongs to the physical page: [ 37.313937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 37.314840] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.315866] page_type: f5(slab) [ 37.316430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.316831] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.317535] page dumped because: kasan: bad access detected [ 37.318227] [ 37.318547] Memory state around the buggy address: [ 37.319235] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.320162] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.320925] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.321701] ^ [ 37.322265] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.323080] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.323924] ================================================================== [ 36.909302] ================================================================== [ 36.910076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.910797] Write of size 8 at addr fff00000c591a130 by task kunit_try_catch/254 [ 36.911638] [ 36.912029] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.913120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.913726] Hardware name: linux,dummy-virt (DT) [ 36.914403] Call trace: [ 36.914826] show_stack+0x20/0x38 (C) [ 36.915490] dump_stack_lvl+0x8c/0xd0 [ 36.916084] print_report+0x118/0x5e0 [ 36.916694] kasan_report+0xc8/0x118 [ 36.917342] kasan_check_range+0x100/0x1a8 [ 36.918023] __kasan_check_write+0x20/0x30 [ 36.918710] kasan_atomics_helper+0xe44/0x4858 [ 36.919362] kasan_atomics+0x198/0x2e8 [ 36.920028] kunit_try_run_case+0x14c/0x3d0 [ 36.920633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.921464] kthread+0x24c/0x2d0 [ 36.922082] ret_from_fork+0x10/0x20 [ 36.922647] [ 36.923035] Allocated by task 254: [ 36.923569] kasan_save_stack+0x3c/0x68 [ 36.924191] kasan_save_track+0x20/0x40 [ 36.924711] kasan_save_alloc_info+0x40/0x58 [ 36.925392] __kasan_kmalloc+0xd4/0xd8 [ 36.925962] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.926551] kasan_atomics+0xb8/0x2e8 [ 36.927189] kunit_try_run_case+0x14c/0x3d0 [ 36.927785] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.928471] kthread+0x24c/0x2d0 [ 36.929055] ret_from_fork+0x10/0x20 [ 36.929541] [ 36.930265] The buggy address belongs to the object at fff00000c591a100 [ 36.930265] which belongs to the cache kmalloc-64 of size 64 [ 36.931685] The buggy address is located 0 bytes to the right of [ 36.931685] allocated 48-byte region [fff00000c591a100, fff00000c591a130) [ 36.933588] [ 36.933978] The buggy address belongs to the physical page: [ 36.934572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10591a [ 36.935488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.936227] page_type: f5(slab) [ 36.936785] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.937627] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.938531] page dumped because: kasan: bad access detected [ 36.939263] [ 36.939633] Memory state around the buggy address: [ 36.940275] fff00000c591a000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.941068] fff00000c591a080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.941806] >fff00000c591a100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.942650] ^ [ 36.943269] fff00000c591a180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.944020] fff00000c591a200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.944823] ==================================================================
[ 36.417095] ================================================================== [ 36.418032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.418925] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.419830] [ 36.420221] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.421501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.421985] Hardware name: linux,dummy-virt (DT) [ 36.422677] Call trace: [ 36.423088] show_stack+0x20/0x38 (C) [ 36.423667] dump_stack_lvl+0x8c/0xd0 [ 36.424340] print_report+0x118/0x5e0 [ 36.424893] kasan_report+0xc8/0x118 [ 36.425544] kasan_check_range+0x100/0x1a8 [ 36.426138] __kasan_check_write+0x20/0x30 [ 36.426744] kasan_atomics_helper+0xa04/0x4858 [ 36.427468] kasan_atomics+0x198/0x2e8 [ 36.428082] kunit_try_run_case+0x14c/0x3d0 [ 36.428787] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.429600] kthread+0x24c/0x2d0 [ 36.430208] ret_from_fork+0x10/0x20 [ 36.430803] [ 36.431178] Allocated by task 254: [ 36.431742] kasan_save_stack+0x3c/0x68 [ 36.432317] kasan_save_track+0x20/0x40 [ 36.432862] kasan_save_alloc_info+0x40/0x58 [ 36.433561] __kasan_kmalloc+0xd4/0xd8 [ 36.434182] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.434749] kasan_atomics+0xb8/0x2e8 [ 36.435370] kunit_try_run_case+0x14c/0x3d0 [ 36.436305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.437011] kthread+0x24c/0x2d0 [ 36.437518] ret_from_fork+0x10/0x20 [ 36.438072] [ 36.438442] The buggy address belongs to the object at fff00000c5f10100 [ 36.438442] which belongs to the cache kmalloc-64 of size 64 [ 36.439621] The buggy address is located 0 bytes to the right of [ 36.439621] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.440970] [ 36.441356] The buggy address belongs to the physical page: [ 36.442010] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.442944] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.443744] page_type: f5(slab) [ 36.444333] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.445207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.446029] page dumped because: kasan: bad access detected [ 36.446770] [ 36.447140] Memory state around the buggy address: [ 36.447853] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.448667] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.449568] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.450253] ^ [ 36.450967] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.451767] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.452660] ================================================================== [ 37.575032] ================================================================== [ 37.575720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 37.576592] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.577512] [ 37.577984] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.579030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.579677] Hardware name: linux,dummy-virt (DT) [ 37.580207] Call trace: [ 37.580777] show_stack+0x20/0x38 (C) [ 37.581885] dump_stack_lvl+0x8c/0xd0 [ 37.582591] print_report+0x118/0x5e0 [ 37.583103] kasan_report+0xc8/0x118 [ 37.583769] kasan_check_range+0x100/0x1a8 [ 37.584376] __kasan_check_write+0x20/0x30 [ 37.585078] kasan_atomics_helper+0x1414/0x4858 [ 37.585738] kasan_atomics+0x198/0x2e8 [ 37.586374] kunit_try_run_case+0x14c/0x3d0 [ 37.586979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.587802] kthread+0x24c/0x2d0 [ 37.588408] ret_from_fork+0x10/0x20 [ 37.588995] [ 37.589351] Allocated by task 254: [ 37.589938] kasan_save_stack+0x3c/0x68 [ 37.590469] kasan_save_track+0x20/0x40 [ 37.591135] kasan_save_alloc_info+0x40/0x58 [ 37.591749] __kasan_kmalloc+0xd4/0xd8 [ 37.592251] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.592975] kasan_atomics+0xb8/0x2e8 [ 37.593486] kunit_try_run_case+0x14c/0x3d0 [ 37.594170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.594843] kthread+0x24c/0x2d0 [ 37.595419] ret_from_fork+0x10/0x20 [ 37.595979] [ 37.596360] The buggy address belongs to the object at fff00000c5f10100 [ 37.596360] which belongs to the cache kmalloc-64 of size 64 [ 37.597556] The buggy address is located 0 bytes to the right of [ 37.597556] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.598895] [ 37.599314] The buggy address belongs to the physical page: [ 37.600306] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.601146] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.601979] page_type: f5(slab) [ 37.602571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.603399] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.604286] page dumped because: kasan: bad access detected [ 37.605002] [ 37.605375] Memory state around the buggy address: [ 37.606037] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.606994] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.607741] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.608676] ^ [ 37.609295] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610131] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.610955] ================================================================== [ 36.301031] ================================================================== [ 36.303034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 36.303860] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.304687] [ 36.305087] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.306181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.306819] Hardware name: linux,dummy-virt (DT) [ 36.307418] Call trace: [ 36.307853] show_stack+0x20/0x38 (C) [ 36.308425] dump_stack_lvl+0x8c/0xd0 [ 36.309123] print_report+0x118/0x5e0 [ 36.309718] kasan_report+0xc8/0x118 [ 36.310238] __asan_report_load4_noabort+0x20/0x30 [ 36.311014] kasan_atomics_helper+0x42d8/0x4858 [ 36.311758] kasan_atomics+0x198/0x2e8 [ 36.312338] kunit_try_run_case+0x14c/0x3d0 [ 36.313053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.313847] kthread+0x24c/0x2d0 [ 36.314365] ret_from_fork+0x10/0x20 [ 36.315022] [ 36.315339] Allocated by task 254: [ 36.315918] kasan_save_stack+0x3c/0x68 [ 36.316591] kasan_save_track+0x20/0x40 [ 36.317095] kasan_save_alloc_info+0x40/0x58 [ 36.317794] __kasan_kmalloc+0xd4/0xd8 [ 36.318416] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.318960] kasan_atomics+0xb8/0x2e8 [ 36.319640] kunit_try_run_case+0x14c/0x3d0 [ 36.320331] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.320988] kthread+0x24c/0x2d0 [ 36.321597] ret_from_fork+0x10/0x20 [ 36.322212] [ 36.322608] The buggy address belongs to the object at fff00000c5f10100 [ 36.322608] which belongs to the cache kmalloc-64 of size 64 [ 36.323893] The buggy address is located 0 bytes to the right of [ 36.323893] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.325171] [ 36.325573] The buggy address belongs to the physical page: [ 36.326259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.327246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.328112] page_type: f5(slab) [ 36.328707] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.329619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.330461] page dumped because: kasan: bad access detected [ 36.331052] [ 36.331475] Memory state around the buggy address: [ 36.332147] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.332967] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.333832] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.334659] ^ [ 36.335256] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.336067] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.336932] ================================================================== [ 37.918835] ================================================================== [ 37.920195] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.921224] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.923002] [ 37.923504] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.924805] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.925339] Hardware name: linux,dummy-virt (DT) [ 37.925920] Call trace: [ 37.926329] show_stack+0x20/0x38 (C) [ 37.926892] dump_stack_lvl+0x8c/0xd0 [ 37.927399] print_report+0x118/0x5e0 [ 37.928138] kasan_report+0xc8/0x118 [ 37.928841] __asan_report_load8_noabort+0x20/0x30 [ 37.929769] kasan_atomics_helper+0x3e10/0x4858 [ 37.930586] kasan_atomics+0x198/0x2e8 [ 37.931272] kunit_try_run_case+0x14c/0x3d0 [ 37.931971] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.932841] kthread+0x24c/0x2d0 [ 37.933423] ret_from_fork+0x10/0x20 [ 37.934117] [ 37.934549] Allocated by task 254: [ 37.934985] kasan_save_stack+0x3c/0x68 [ 37.935686] kasan_save_track+0x20/0x40 [ 37.936300] kasan_save_alloc_info+0x40/0x58 [ 37.937059] __kasan_kmalloc+0xd4/0xd8 [ 37.937763] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.938429] kasan_atomics+0xb8/0x2e8 [ 37.939136] kunit_try_run_case+0x14c/0x3d0 [ 37.939874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.940628] kthread+0x24c/0x2d0 [ 37.941184] ret_from_fork+0x10/0x20 [ 37.941861] [ 37.942278] The buggy address belongs to the object at fff00000c5f10100 [ 37.942278] which belongs to the cache kmalloc-64 of size 64 [ 37.943590] The buggy address is located 0 bytes to the right of [ 37.943590] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.945001] [ 37.945424] The buggy address belongs to the physical page: [ 37.946100] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.947115] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.947998] page_type: f5(slab) [ 37.948514] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.949607] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.950455] page dumped because: kasan: bad access detected [ 37.951215] [ 37.951649] Memory state around the buggy address: [ 37.952362] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.953223] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.954199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.955018] ^ [ 37.955754] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.956591] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.957559] ================================================================== [ 35.822962] ================================================================== [ 35.823788] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 35.824566] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.825497] [ 35.825956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.826918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.827556] Hardware name: linux,dummy-virt (DT) [ 35.828236] Call trace: [ 35.828698] show_stack+0x20/0x38 (C) [ 35.829276] dump_stack_lvl+0x8c/0xd0 [ 35.829943] print_report+0x118/0x5e0 [ 35.830555] kasan_report+0xc8/0x118 [ 35.831193] kasan_check_range+0x100/0x1a8 [ 35.832181] __kasan_check_write+0x20/0x30 [ 35.832507] kasan_atomics_helper+0x3ac/0x4858 [ 35.832834] kasan_atomics+0x198/0x2e8 [ 35.833103] kunit_try_run_case+0x14c/0x3d0 [ 35.833385] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.834612] kthread+0x24c/0x2d0 [ 35.835725] ret_from_fork+0x10/0x20 [ 35.836475] [ 35.836882] Allocated by task 254: [ 35.837841] kasan_save_stack+0x3c/0x68 [ 35.838866] kasan_save_track+0x20/0x40 [ 35.839668] kasan_save_alloc_info+0x40/0x58 [ 35.840290] __kasan_kmalloc+0xd4/0xd8 [ 35.840965] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.841658] kasan_atomics+0xb8/0x2e8 [ 35.842173] kunit_try_run_case+0x14c/0x3d0 [ 35.842775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.843403] kthread+0x24c/0x2d0 [ 35.844013] ret_from_fork+0x10/0x20 [ 35.844669] [ 35.845043] The buggy address belongs to the object at fff00000c5f10100 [ 35.845043] which belongs to the cache kmalloc-64 of size 64 [ 35.846464] The buggy address is located 0 bytes to the right of [ 35.846464] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.847850] [ 35.848152] The buggy address belongs to the physical page: [ 35.848938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.849786] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.850637] page_type: f5(slab) [ 35.851108] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.852177] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.853183] page dumped because: kasan: bad access detected [ 35.853895] [ 35.854277] Memory state around the buggy address: [ 35.854889] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.855866] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.856771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.857726] ^ [ 35.858247] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.859209] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.860187] ================================================================== [ 36.966061] ================================================================== [ 36.966704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.967669] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.968679] [ 36.969079] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.970108] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.970784] Hardware name: linux,dummy-virt (DT) [ 36.971468] Call trace: [ 36.971964] show_stack+0x20/0x38 (C) [ 36.972637] dump_stack_lvl+0x8c/0xd0 [ 36.973271] print_report+0x118/0x5e0 [ 36.973809] kasan_report+0xc8/0x118 [ 36.974432] __asan_report_load8_noabort+0x20/0x30 [ 36.975128] kasan_atomics_helper+0x3f58/0x4858 [ 36.975738] kasan_atomics+0x198/0x2e8 [ 36.976397] kunit_try_run_case+0x14c/0x3d0 [ 36.976981] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.977717] kthread+0x24c/0x2d0 [ 36.978311] ret_from_fork+0x10/0x20 [ 36.978966] [ 36.979331] Allocated by task 254: [ 36.979917] kasan_save_stack+0x3c/0x68 [ 36.980583] kasan_save_track+0x20/0x40 [ 36.981219] kasan_save_alloc_info+0x40/0x58 [ 36.981880] __kasan_kmalloc+0xd4/0xd8 [ 36.982499] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.983181] kasan_atomics+0xb8/0x2e8 [ 36.983817] kunit_try_run_case+0x14c/0x3d0 [ 36.984388] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.985200] kthread+0x24c/0x2d0 [ 36.985809] ret_from_fork+0x10/0x20 [ 36.986316] [ 36.986708] The buggy address belongs to the object at fff00000c5f10100 [ 36.986708] which belongs to the cache kmalloc-64 of size 64 [ 36.987957] The buggy address is located 0 bytes to the right of [ 36.987957] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.989269] [ 36.989663] The buggy address belongs to the physical page: [ 36.990424] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.991235] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.992130] page_type: f5(slab) [ 36.992738] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.993611] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.994456] page dumped because: kasan: bad access detected [ 36.995247] [ 36.995652] Memory state around the buggy address: [ 36.996212] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.997150] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.997986] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.998834] ^ [ 36.999568] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.000413] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.001244] ================================================================== [ 38.036895] ================================================================== [ 38.038396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 38.039194] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 38.041174] [ 38.041566] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.042701] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.043319] Hardware name: linux,dummy-virt (DT) [ 38.043946] Call trace: [ 38.044370] show_stack+0x20/0x38 (C) [ 38.044990] dump_stack_lvl+0x8c/0xd0 [ 38.045616] print_report+0x118/0x5e0 [ 38.046264] kasan_report+0xc8/0x118 [ 38.046798] kasan_check_range+0x100/0x1a8 [ 38.047486] __kasan_check_write+0x20/0x30 [ 38.048113] kasan_atomics_helper+0x17ec/0x4858 [ 38.048886] kasan_atomics+0x198/0x2e8 [ 38.049559] kunit_try_run_case+0x14c/0x3d0 [ 38.050268] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.051003] kthread+0x24c/0x2d0 [ 38.051575] ret_from_fork+0x10/0x20 [ 38.052100] [ 38.052485] Allocated by task 254: [ 38.053066] kasan_save_stack+0x3c/0x68 [ 38.053720] kasan_save_track+0x20/0x40 [ 38.054283] kasan_save_alloc_info+0x40/0x58 [ 38.054842] __kasan_kmalloc+0xd4/0xd8 [ 38.055474] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.056103] kasan_atomics+0xb8/0x2e8 [ 38.056701] kunit_try_run_case+0x14c/0x3d0 [ 38.057366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.058168] kthread+0x24c/0x2d0 [ 38.058713] ret_from_fork+0x10/0x20 [ 38.059309] [ 38.059705] The buggy address belongs to the object at fff00000c5f10100 [ 38.059705] which belongs to the cache kmalloc-64 of size 64 [ 38.060994] The buggy address is located 0 bytes to the right of [ 38.060994] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 38.062251] [ 38.062653] The buggy address belongs to the physical page: [ 38.063336] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 38.064375] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.065061] page_type: f5(slab) [ 38.065573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.066581] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 38.067558] page dumped because: kasan: bad access detected [ 38.068292] [ 38.068682] Memory state around the buggy address: [ 38.069337] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.070167] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.071078] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.072020] ^ [ 38.072734] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.073551] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.074355] ================================================================== [ 37.880515] ================================================================== [ 37.881174] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.882778] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.883752] [ 37.884113] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.885095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.885746] Hardware name: linux,dummy-virt (DT) [ 37.886411] Call trace: [ 37.886903] show_stack+0x20/0x38 (C) [ 37.887572] dump_stack_lvl+0x8c/0xd0 [ 37.888145] print_report+0x118/0x5e0 [ 37.888789] kasan_report+0xc8/0x118 [ 37.889317] kasan_check_range+0x100/0x1a8 [ 37.890008] __kasan_check_write+0x20/0x30 [ 37.890734] kasan_atomics_helper+0x16d0/0x4858 [ 37.891452] kasan_atomics+0x198/0x2e8 [ 37.892049] kunit_try_run_case+0x14c/0x3d0 [ 37.892793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.893586] kthread+0x24c/0x2d0 [ 37.894189] ret_from_fork+0x10/0x20 [ 37.894864] [ 37.895191] Allocated by task 254: [ 37.895640] kasan_save_stack+0x3c/0x68 [ 37.896278] kasan_save_track+0x20/0x40 [ 37.896928] kasan_save_alloc_info+0x40/0x58 [ 37.897909] __kasan_kmalloc+0xd4/0xd8 [ 37.898543] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.899183] kasan_atomics+0xb8/0x2e8 [ 37.899730] kunit_try_run_case+0x14c/0x3d0 [ 37.900394] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.901128] kthread+0x24c/0x2d0 [ 37.901715] ret_from_fork+0x10/0x20 [ 37.902213] [ 37.902544] The buggy address belongs to the object at fff00000c5f10100 [ 37.902544] which belongs to the cache kmalloc-64 of size 64 [ 37.903979] The buggy address is located 0 bytes to the right of [ 37.903979] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.905110] [ 37.905486] The buggy address belongs to the physical page: [ 37.906254] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.907285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.907960] page_type: f5(slab) [ 37.908570] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.909496] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.910398] page dumped because: kasan: bad access detected [ 37.911126] [ 37.911501] Memory state around the buggy address: [ 37.912206] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.913054] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.913865] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.914663] ^ [ 37.915362] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.916172] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.917116] ================================================================== [ 36.454096] ================================================================== [ 36.454910] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.455767] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.456603] [ 36.456999] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.458138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.458774] Hardware name: linux,dummy-virt (DT) [ 36.459332] Call trace: [ 36.459828] show_stack+0x20/0x38 (C) [ 36.460495] dump_stack_lvl+0x8c/0xd0 [ 36.461043] print_report+0x118/0x5e0 [ 36.461708] kasan_report+0xc8/0x118 [ 36.462348] kasan_check_range+0x100/0x1a8 [ 36.463076] __kasan_check_write+0x20/0x30 [ 36.463709] kasan_atomics_helper+0xa6c/0x4858 [ 36.464365] kasan_atomics+0x198/0x2e8 [ 36.465041] kunit_try_run_case+0x14c/0x3d0 [ 36.465678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.466494] kthread+0x24c/0x2d0 [ 36.468249] ret_from_fork+0x10/0x20 [ 36.469156] [ 36.469870] Allocated by task 254: [ 36.470895] kasan_save_stack+0x3c/0x68 [ 36.472273] kasan_save_track+0x20/0x40 [ 36.473185] kasan_save_alloc_info+0x40/0x58 [ 36.474279] __kasan_kmalloc+0xd4/0xd8 [ 36.475293] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.476014] kasan_atomics+0xb8/0x2e8 [ 36.476665] kunit_try_run_case+0x14c/0x3d0 [ 36.477238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.477970] kthread+0x24c/0x2d0 [ 36.478505] ret_from_fork+0x10/0x20 [ 36.479144] [ 36.479513] The buggy address belongs to the object at fff00000c5f10100 [ 36.479513] which belongs to the cache kmalloc-64 of size 64 [ 36.480609] The buggy address is located 0 bytes to the right of [ 36.480609] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.482064] [ 36.482384] The buggy address belongs to the physical page: [ 36.483069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.484102] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.484967] page_type: f5(slab) [ 36.485413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.486383] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.487187] page dumped because: kasan: bad access detected [ 36.487916] [ 36.488220] Memory state around the buggy address: [ 36.488938] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.489883] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.490828] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.491715] ^ [ 36.492433] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.493305] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.494237] ================================================================== [ 35.699515] ================================================================== [ 35.700410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 35.701337] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.702833] [ 35.703149] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.703959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.704627] Hardware name: linux,dummy-virt (DT) [ 35.705230] Call trace: [ 35.706192] show_stack+0x20/0x38 (C) [ 35.706825] dump_stack_lvl+0x8c/0xd0 [ 35.707670] print_report+0x118/0x5e0 [ 35.708232] kasan_report+0xc8/0x118 [ 35.708850] __asan_report_load4_noabort+0x20/0x30 [ 35.709567] kasan_atomics_helper+0x40fc/0x4858 [ 35.710201] kasan_atomics+0x198/0x2e8 [ 35.711155] kunit_try_run_case+0x14c/0x3d0 [ 35.711870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.712582] kthread+0x24c/0x2d0 [ 35.713185] ret_from_fork+0x10/0x20 [ 35.714138] [ 35.714511] Allocated by task 254: [ 35.715026] kasan_save_stack+0x3c/0x68 [ 35.715518] kasan_save_track+0x20/0x40 [ 35.716178] kasan_save_alloc_info+0x40/0x58 [ 35.716841] __kasan_kmalloc+0xd4/0xd8 [ 35.717381] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.718361] kasan_atomics+0xb8/0x2e8 [ 35.719028] kunit_try_run_case+0x14c/0x3d0 [ 35.719667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.720380] kthread+0x24c/0x2d0 [ 35.720921] ret_from_fork+0x10/0x20 [ 35.721562] [ 35.722761] The buggy address belongs to the object at fff00000c5f10100 [ 35.722761] which belongs to the cache kmalloc-64 of size 64 [ 35.724313] The buggy address is located 0 bytes to the right of [ 35.724313] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.725625] [ 35.726008] The buggy address belongs to the physical page: [ 35.726732] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.727448] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.728761] page_type: f5(slab) [ 35.729299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.730591] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.731408] page dumped because: kasan: bad access detected [ 35.732111] [ 35.732490] Memory state around the buggy address: [ 35.733070] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.734313] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.735179] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.735947] ^ [ 35.736672] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.737493] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.738719] ================================================================== [ 37.233424] ================================================================== [ 37.234389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 37.235401] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.236335] [ 37.236757] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.237867] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.238334] Hardware name: linux,dummy-virt (DT) [ 37.239057] Call trace: [ 37.239432] show_stack+0x20/0x38 (C) [ 37.240108] dump_stack_lvl+0x8c/0xd0 [ 37.240714] print_report+0x118/0x5e0 [ 37.241359] kasan_report+0xc8/0x118 [ 37.241914] kasan_check_range+0x100/0x1a8 [ 37.242635] __kasan_check_write+0x20/0x30 [ 37.243206] kasan_atomics_helper+0x1058/0x4858 [ 37.243943] kasan_atomics+0x198/0x2e8 [ 37.244598] kunit_try_run_case+0x14c/0x3d0 [ 37.245288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.246055] kthread+0x24c/0x2d0 [ 37.246599] ret_from_fork+0x10/0x20 [ 37.247246] [ 37.247607] Allocated by task 254: [ 37.248174] kasan_save_stack+0x3c/0x68 [ 37.248781] kasan_save_track+0x20/0x40 [ 37.249359] kasan_save_alloc_info+0x40/0x58 [ 37.250052] __kasan_kmalloc+0xd4/0xd8 [ 37.250632] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.251198] kasan_atomics+0xb8/0x2e8 [ 37.251836] kunit_try_run_case+0x14c/0x3d0 [ 37.252516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.253331] kthread+0x24c/0x2d0 [ 37.253813] ret_from_fork+0x10/0x20 [ 37.254424] [ 37.254815] The buggy address belongs to the object at fff00000c5f10100 [ 37.254815] which belongs to the cache kmalloc-64 of size 64 [ 37.256020] The buggy address is located 0 bytes to the right of [ 37.256020] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.257210] [ 37.257618] The buggy address belongs to the physical page: [ 37.258370] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.259284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.260047] page_type: f5(slab) [ 37.260623] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.261547] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.262393] page dumped because: kasan: bad access detected [ 37.263064] [ 37.263432] Memory state around the buggy address: [ 37.264038] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.264980] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.266021] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.266848] ^ [ 37.267372] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.268137] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.268987] ================================================================== [ 37.308069] ================================================================== [ 37.308978] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 37.309830] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.310732] [ 37.311142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.312232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.312800] Hardware name: linux,dummy-virt (DT) [ 37.313424] Call trace: [ 37.313911] show_stack+0x20/0x38 (C) [ 37.314481] dump_stack_lvl+0x8c/0xd0 [ 37.315170] print_report+0x118/0x5e0 [ 37.315849] kasan_report+0xc8/0x118 [ 37.316425] kasan_check_range+0x100/0x1a8 [ 37.317135] __kasan_check_write+0x20/0x30 [ 37.317814] kasan_atomics_helper+0x1128/0x4858 [ 37.318464] kasan_atomics+0x198/0x2e8 [ 37.319088] kunit_try_run_case+0x14c/0x3d0 [ 37.319814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.320476] kthread+0x24c/0x2d0 [ 37.321099] ret_from_fork+0x10/0x20 [ 37.321679] [ 37.322055] Allocated by task 254: [ 37.322626] kasan_save_stack+0x3c/0x68 [ 37.323255] kasan_save_track+0x20/0x40 [ 37.323827] kasan_save_alloc_info+0x40/0x58 [ 37.324468] __kasan_kmalloc+0xd4/0xd8 [ 37.325119] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.325835] kasan_atomics+0xb8/0x2e8 [ 37.326382] kunit_try_run_case+0x14c/0x3d0 [ 37.327382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.328383] kthread+0x24c/0x2d0 [ 37.328914] ret_from_fork+0x10/0x20 [ 37.329469] [ 37.329864] The buggy address belongs to the object at fff00000c5f10100 [ 37.329864] which belongs to the cache kmalloc-64 of size 64 [ 37.331129] The buggy address is located 0 bytes to the right of [ 37.331129] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.332473] [ 37.332880] The buggy address belongs to the physical page: [ 37.333653] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.334476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.335339] page_type: f5(slab) [ 37.335933] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.336752] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.337679] page dumped because: kasan: bad access detected [ 37.338327] [ 37.338726] Memory state around the buggy address: [ 37.339398] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.340280] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.341138] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.341844] ^ [ 37.342565] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.343447] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.344302] ================================================================== [ 36.062479] ================================================================== [ 36.064194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 36.064977] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.066209] [ 36.066645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.068040] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.068804] Hardware name: linux,dummy-virt (DT) [ 36.069426] Call trace: [ 36.069855] show_stack+0x20/0x38 (C) [ 36.070451] dump_stack_lvl+0x8c/0xd0 [ 36.070997] print_report+0x118/0x5e0 [ 36.071711] kasan_report+0xc8/0x118 [ 36.072384] kasan_check_range+0x100/0x1a8 [ 36.073131] __kasan_check_write+0x20/0x30 [ 36.073900] kasan_atomics_helper+0x61c/0x4858 [ 36.074632] kasan_atomics+0x198/0x2e8 [ 36.075324] kunit_try_run_case+0x14c/0x3d0 [ 36.076010] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.076829] kthread+0x24c/0x2d0 [ 36.077480] ret_from_fork+0x10/0x20 [ 36.078111] [ 36.078551] Allocated by task 254: [ 36.079088] kasan_save_stack+0x3c/0x68 [ 36.079809] kasan_save_track+0x20/0x40 [ 36.080349] kasan_save_alloc_info+0x40/0x58 [ 36.081077] __kasan_kmalloc+0xd4/0xd8 [ 36.081719] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.082416] kasan_atomics+0xb8/0x2e8 [ 36.082982] kunit_try_run_case+0x14c/0x3d0 [ 36.083719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.084422] kthread+0x24c/0x2d0 [ 36.085061] ret_from_fork+0x10/0x20 [ 36.085703] [ 36.086041] The buggy address belongs to the object at fff00000c5f10100 [ 36.086041] which belongs to the cache kmalloc-64 of size 64 [ 36.087336] The buggy address is located 0 bytes to the right of [ 36.087336] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.088755] [ 36.089198] The buggy address belongs to the physical page: [ 36.089978] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.090988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.091809] page_type: f5(slab) [ 36.092429] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.093343] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.094328] page dumped because: kasan: bad access detected [ 36.095011] [ 36.095427] Memory state around the buggy address: [ 36.096102] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.096897] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.097813] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.098679] ^ [ 36.099344] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.100206] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.101119] ================================================================== [ 36.850087] ================================================================== [ 36.851674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.852505] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.853499] [ 36.854042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.855219] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.855832] Hardware name: linux,dummy-virt (DT) [ 36.856583] Call trace: [ 36.857042] show_stack+0x20/0x38 (C) [ 36.857684] dump_stack_lvl+0x8c/0xd0 [ 36.858386] print_report+0x118/0x5e0 [ 36.858976] kasan_report+0xc8/0x118 [ 36.859697] kasan_check_range+0x100/0x1a8 [ 36.860405] __kasan_check_write+0x20/0x30 [ 36.861150] kasan_atomics_helper+0xd3c/0x4858 [ 36.861855] kasan_atomics+0x198/0x2e8 [ 36.862568] kunit_try_run_case+0x14c/0x3d0 [ 36.863239] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.864089] kthread+0x24c/0x2d0 [ 36.864685] ret_from_fork+0x10/0x20 [ 36.865371] [ 36.865792] Allocated by task 254: [ 36.866216] kasan_save_stack+0x3c/0x68 [ 36.866910] kasan_save_track+0x20/0x40 [ 36.867493] kasan_save_alloc_info+0x40/0x58 [ 36.868210] __kasan_kmalloc+0xd4/0xd8 [ 36.868906] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.869599] kasan_atomics+0xb8/0x2e8 [ 36.870257] kunit_try_run_case+0x14c/0x3d0 [ 36.871040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.871898] kthread+0x24c/0x2d0 [ 36.872620] ret_from_fork+0x10/0x20 [ 36.873175] [ 36.873616] The buggy address belongs to the object at fff00000c5f10100 [ 36.873616] which belongs to the cache kmalloc-64 of size 64 [ 36.875214] The buggy address is located 0 bytes to the right of [ 36.875214] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.876098] [ 36.876291] The buggy address belongs to the physical page: [ 36.876672] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.877738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.878661] page_type: f5(slab) [ 36.879261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.880144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.880975] page dumped because: kasan: bad access detected [ 36.881699] [ 36.882069] Memory state around the buggy address: [ 36.882781] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.883664] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.884561] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.885466] ^ [ 36.886082] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.886911] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.887769] ================================================================== [ 36.928565] ================================================================== [ 36.929412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.930359] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.931095] [ 36.931507] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.932809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.933434] Hardware name: linux,dummy-virt (DT) [ 36.934401] Call trace: [ 36.934822] show_stack+0x20/0x38 (C) [ 36.935425] dump_stack_lvl+0x8c/0xd0 [ 36.936043] print_report+0x118/0x5e0 [ 36.936719] kasan_report+0xc8/0x118 [ 36.937282] kasan_check_range+0x100/0x1a8 [ 36.937982] __kasan_check_read+0x20/0x30 [ 36.938693] kasan_atomics_helper+0xdd4/0x4858 [ 36.939309] kasan_atomics+0x198/0x2e8 [ 36.939985] kunit_try_run_case+0x14c/0x3d0 [ 36.940633] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.941289] kthread+0x24c/0x2d0 [ 36.941925] ret_from_fork+0x10/0x20 [ 36.942552] [ 36.942929] Allocated by task 254: [ 36.943492] kasan_save_stack+0x3c/0x68 [ 36.944068] kasan_save_track+0x20/0x40 [ 36.944726] kasan_save_alloc_info+0x40/0x58 [ 36.945302] __kasan_kmalloc+0xd4/0xd8 [ 36.945954] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.946484] kasan_atomics+0xb8/0x2e8 [ 36.947120] kunit_try_run_case+0x14c/0x3d0 [ 36.947814] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.948508] kthread+0x24c/0x2d0 [ 36.949043] ret_from_fork+0x10/0x20 [ 36.949515] [ 36.949909] The buggy address belongs to the object at fff00000c5f10100 [ 36.949909] which belongs to the cache kmalloc-64 of size 64 [ 36.951342] The buggy address is located 0 bytes to the right of [ 36.951342] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.952742] [ 36.953124] The buggy address belongs to the physical page: [ 36.953682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.954710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.955392] page_type: f5(slab) [ 36.955982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.956892] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.957791] page dumped because: kasan: bad access detected [ 36.958490] [ 36.958859] Memory state around the buggy address: [ 36.959377] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.960332] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.961033] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.961964] ^ [ 36.962682] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.963476] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.964241] ================================================================== [ 37.612323] ================================================================== [ 37.613168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 37.614011] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.614868] [ 37.615270] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.616400] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.617040] Hardware name: linux,dummy-virt (DT) [ 37.617644] Call trace: [ 37.618038] show_stack+0x20/0x38 (C) [ 37.618717] dump_stack_lvl+0x8c/0xd0 [ 37.619413] print_report+0x118/0x5e0 [ 37.620079] kasan_report+0xc8/0x118 [ 37.620766] kasan_check_range+0x100/0x1a8 [ 37.621382] __kasan_check_write+0x20/0x30 [ 37.622050] kasan_atomics_helper+0x147c/0x4858 [ 37.622722] kasan_atomics+0x198/0x2e8 [ 37.623310] kunit_try_run_case+0x14c/0x3d0 [ 37.623905] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.624756] kthread+0x24c/0x2d0 [ 37.625361] ret_from_fork+0x10/0x20 [ 37.625956] [ 37.626262] Allocated by task 254: [ 37.626850] kasan_save_stack+0x3c/0x68 [ 37.627493] kasan_save_track+0x20/0x40 [ 37.628150] kasan_save_alloc_info+0x40/0x58 [ 37.628797] __kasan_kmalloc+0xd4/0xd8 [ 37.629340] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.630751] kasan_atomics+0xb8/0x2e8 [ 37.631363] kunit_try_run_case+0x14c/0x3d0 [ 37.631946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.632715] kthread+0x24c/0x2d0 [ 37.633234] ret_from_fork+0x10/0x20 [ 37.633794] [ 37.634130] The buggy address belongs to the object at fff00000c5f10100 [ 37.634130] which belongs to the cache kmalloc-64 of size 64 [ 37.635352] The buggy address is located 0 bytes to the right of [ 37.635352] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.636645] [ 37.637031] The buggy address belongs to the physical page: [ 37.637710] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.638712] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.639589] page_type: f5(slab) [ 37.640169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.641126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.641854] page dumped because: kasan: bad access detected [ 37.642623] [ 37.642998] Memory state around the buggy address: [ 37.643567] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.644453] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.645159] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.646099] ^ [ 37.646770] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.647726] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.648445] ================================================================== [ 36.698151] ================================================================== [ 36.699229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 36.700002] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.701693] [ 36.702066] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.703296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.703899] Hardware name: linux,dummy-virt (DT) [ 36.704670] Call trace: [ 36.705572] show_stack+0x20/0x38 (C) [ 36.706292] dump_stack_lvl+0x8c/0xd0 [ 36.706819] print_report+0x118/0x5e0 [ 36.707417] kasan_report+0xc8/0x118 [ 36.708026] kasan_check_range+0x100/0x1a8 [ 36.708676] __kasan_check_write+0x20/0x30 [ 36.709291] kasan_atomics_helper+0xc08/0x4858 [ 36.710032] kasan_atomics+0x198/0x2e8 [ 36.710650] kunit_try_run_case+0x14c/0x3d0 [ 36.711284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.711954] kthread+0x24c/0x2d0 [ 36.712583] ret_from_fork+0x10/0x20 [ 36.713233] [ 36.713573] Allocated by task 254: [ 36.714134] kasan_save_stack+0x3c/0x68 [ 36.714728] kasan_save_track+0x20/0x40 [ 36.715358] kasan_save_alloc_info+0x40/0x58 [ 36.716062] __kasan_kmalloc+0xd4/0xd8 [ 36.716647] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.717424] kasan_atomics+0xb8/0x2e8 [ 36.718002] kunit_try_run_case+0x14c/0x3d0 [ 36.718735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.719556] kthread+0x24c/0x2d0 [ 36.720139] ret_from_fork+0x10/0x20 [ 36.720748] [ 36.721060] The buggy address belongs to the object at fff00000c5f10100 [ 36.721060] which belongs to the cache kmalloc-64 of size 64 [ 36.722471] The buggy address is located 0 bytes to the right of [ 36.722471] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.723788] [ 36.724136] The buggy address belongs to the physical page: [ 36.724911] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.725897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.726719] page_type: f5(slab) [ 36.727286] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.728222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.729073] page dumped because: kasan: bad access detected [ 36.729844] [ 36.730187] Memory state around the buggy address: [ 36.730893] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.731700] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.732521] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.733343] ^ [ 36.734046] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.734852] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.735702] ================================================================== [ 36.495831] ================================================================== [ 36.496758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.497493] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.498830] [ 36.499785] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.501077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.501765] Hardware name: linux,dummy-virt (DT) [ 36.502309] Call trace: [ 36.502738] show_stack+0x20/0x38 (C) [ 36.503437] dump_stack_lvl+0x8c/0xd0 [ 36.504169] print_report+0x118/0x5e0 [ 36.504930] kasan_report+0xc8/0x118 [ 36.505624] kasan_check_range+0x100/0x1a8 [ 36.506287] __kasan_check_write+0x20/0x30 [ 36.507033] kasan_atomics_helper+0xad4/0x4858 [ 36.507752] kasan_atomics+0x198/0x2e8 [ 36.508341] kunit_try_run_case+0x14c/0x3d0 [ 36.509132] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.510159] kthread+0x24c/0x2d0 [ 36.510646] ret_from_fork+0x10/0x20 [ 36.511131] [ 36.511423] Allocated by task 254: [ 36.512558] kasan_save_stack+0x3c/0x68 [ 36.513196] kasan_save_track+0x20/0x40 [ 36.513867] kasan_save_alloc_info+0x40/0x58 [ 36.514561] __kasan_kmalloc+0xd4/0xd8 [ 36.515199] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.515914] kasan_atomics+0xb8/0x2e8 [ 36.516558] kunit_try_run_case+0x14c/0x3d0 [ 36.517229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.518027] kthread+0x24c/0x2d0 [ 36.518637] ret_from_fork+0x10/0x20 [ 36.519966] [ 36.520366] The buggy address belongs to the object at fff00000c5f10100 [ 36.520366] which belongs to the cache kmalloc-64 of size 64 [ 36.521354] The buggy address is located 0 bytes to the right of [ 36.521354] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.522869] [ 36.523248] The buggy address belongs to the physical page: [ 36.524038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.524978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.525752] page_type: f5(slab) [ 36.526320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.527205] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.527933] page dumped because: kasan: bad access detected [ 36.528886] [ 36.529341] Memory state around the buggy address: [ 36.529867] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.530809] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.531625] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.532486] ^ [ 36.533109] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.533937] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.534706] ================================================================== [ 36.102465] ================================================================== [ 36.103278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 36.104078] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.105092] [ 36.105497] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.106748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.107416] Hardware name: linux,dummy-virt (DT) [ 36.107956] Call trace: [ 36.108488] show_stack+0x20/0x38 (C) [ 36.109233] dump_stack_lvl+0x8c/0xd0 [ 36.109957] print_report+0x118/0x5e0 [ 36.110661] kasan_report+0xc8/0x118 [ 36.111316] kasan_check_range+0x100/0x1a8 [ 36.112073] __kasan_check_write+0x20/0x30 [ 36.112718] kasan_atomics_helper+0x684/0x4858 [ 36.113542] kasan_atomics+0x198/0x2e8 [ 36.114135] kunit_try_run_case+0x14c/0x3d0 [ 36.114869] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.115746] kthread+0x24c/0x2d0 [ 36.116320] ret_from_fork+0x10/0x20 [ 36.117026] [ 36.117405] Allocated by task 254: [ 36.117919] kasan_save_stack+0x3c/0x68 [ 36.118612] kasan_save_track+0x20/0x40 [ 36.119317] kasan_save_alloc_info+0x40/0x58 [ 36.119905] __kasan_kmalloc+0xd4/0xd8 [ 36.120592] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.121262] kasan_atomics+0xb8/0x2e8 [ 36.121941] kunit_try_run_case+0x14c/0x3d0 [ 36.122519] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.123352] kthread+0x24c/0x2d0 [ 36.123875] ret_from_fork+0x10/0x20 [ 36.124579] [ 36.124952] The buggy address belongs to the object at fff00000c5f10100 [ 36.124952] which belongs to the cache kmalloc-64 of size 64 [ 36.126061] The buggy address is located 0 bytes to the right of [ 36.126061] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.127378] [ 36.127805] The buggy address belongs to the physical page: [ 36.128514] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.129553] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.130364] page_type: f5(slab) [ 36.130993] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.131920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.132851] page dumped because: kasan: bad access detected [ 36.133572] [ 36.133921] Memory state around the buggy address: [ 36.134660] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.135556] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.136464] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.137310] ^ [ 36.137952] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.138866] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.139745] ================================================================== [ 36.737040] ================================================================== [ 36.738754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 36.739463] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.740413] [ 36.740799] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.741914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.742436] Hardware name: linux,dummy-virt (DT) [ 36.743001] Call trace: [ 36.743474] show_stack+0x20/0x38 (C) [ 36.744047] dump_stack_lvl+0x8c/0xd0 [ 36.744723] print_report+0x118/0x5e0 [ 36.745260] kasan_report+0xc8/0x118 [ 36.745905] __asan_report_load4_noabort+0x20/0x30 [ 36.746653] kasan_atomics_helper+0x3de4/0x4858 [ 36.747370] kasan_atomics+0x198/0x2e8 [ 36.748046] kunit_try_run_case+0x14c/0x3d0 [ 36.748651] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.749487] kthread+0x24c/0x2d0 [ 36.749997] ret_from_fork+0x10/0x20 [ 36.750659] [ 36.751033] Allocated by task 254: [ 36.751548] kasan_save_stack+0x3c/0x68 [ 36.752149] kasan_save_track+0x20/0x40 [ 36.752677] kasan_save_alloc_info+0x40/0x58 [ 36.753372] __kasan_kmalloc+0xd4/0xd8 [ 36.753939] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.754663] kasan_atomics+0xb8/0x2e8 [ 36.755262] kunit_try_run_case+0x14c/0x3d0 [ 36.755836] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.756663] kthread+0x24c/0x2d0 [ 36.757121] ret_from_fork+0x10/0x20 [ 36.757760] [ 36.758139] The buggy address belongs to the object at fff00000c5f10100 [ 36.758139] which belongs to the cache kmalloc-64 of size 64 [ 36.759386] The buggy address is located 0 bytes to the right of [ 36.759386] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.760709] [ 36.761077] The buggy address belongs to the physical page: [ 36.761853] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.762706] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.763617] page_type: f5(slab) [ 36.764079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.765109] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.765973] page dumped because: kasan: bad access detected [ 36.766692] [ 36.767056] Memory state around the buggy address: [ 36.767583] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.768518] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.769344] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.770184] ^ [ 36.770909] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.771719] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.772650] ================================================================== [ 37.194286] ================================================================== [ 37.195563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 37.196373] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.197061] [ 37.197477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.198739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.199245] Hardware name: linux,dummy-virt (DT) [ 37.199938] Call trace: [ 37.200423] show_stack+0x20/0x38 (C) [ 37.201031] dump_stack_lvl+0x8c/0xd0 [ 37.201714] print_report+0x118/0x5e0 [ 37.202248] kasan_report+0xc8/0x118 [ 37.202916] kasan_check_range+0x100/0x1a8 [ 37.203505] __kasan_check_write+0x20/0x30 [ 37.204218] kasan_atomics_helper+0xff0/0x4858 [ 37.204899] kasan_atomics+0x198/0x2e8 [ 37.205416] kunit_try_run_case+0x14c/0x3d0 [ 37.206131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.206964] kthread+0x24c/0x2d0 [ 37.207587] ret_from_fork+0x10/0x20 [ 37.208188] [ 37.208566] Allocated by task 254: [ 37.209072] kasan_save_stack+0x3c/0x68 [ 37.209724] kasan_save_track+0x20/0x40 [ 37.210242] kasan_save_alloc_info+0x40/0x58 [ 37.210938] __kasan_kmalloc+0xd4/0xd8 [ 37.211505] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.212096] kasan_atomics+0xb8/0x2e8 [ 37.212734] kunit_try_run_case+0x14c/0x3d0 [ 37.213351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.214144] kthread+0x24c/0x2d0 [ 37.214739] ret_from_fork+0x10/0x20 [ 37.215322] [ 37.215659] The buggy address belongs to the object at fff00000c5f10100 [ 37.215659] which belongs to the cache kmalloc-64 of size 64 [ 37.216935] The buggy address is located 0 bytes to the right of [ 37.216935] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.218198] [ 37.218603] The buggy address belongs to the physical page: [ 37.219374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.220277] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.221043] page_type: f5(slab) [ 37.221629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.222360] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.223342] page dumped because: kasan: bad access detected [ 37.224062] [ 37.224457] Memory state around the buggy address: [ 37.225101] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.225953] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.226819] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.227621] ^ [ 37.228328] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.229190] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.230112] ================================================================== [ 37.422147] ================================================================== [ 37.422918] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 37.423668] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.424639] [ 37.425025] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.426237] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.426746] Hardware name: linux,dummy-virt (DT) [ 37.427423] Call trace: [ 37.427909] show_stack+0x20/0x38 (C) [ 37.428590] dump_stack_lvl+0x8c/0xd0 [ 37.429289] print_report+0x118/0x5e0 [ 37.429886] kasan_report+0xc8/0x118 [ 37.430458] kasan_check_range+0x100/0x1a8 [ 37.431170] __kasan_check_write+0x20/0x30 [ 37.431836] kasan_atomics_helper+0x126c/0x4858 [ 37.432400] kasan_atomics+0x198/0x2e8 [ 37.433087] kunit_try_run_case+0x14c/0x3d0 [ 37.433732] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.434485] kthread+0x24c/0x2d0 [ 37.435120] ret_from_fork+0x10/0x20 [ 37.435653] [ 37.436026] Allocated by task 254: [ 37.436627] kasan_save_stack+0x3c/0x68 [ 37.437256] kasan_save_track+0x20/0x40 [ 37.437825] kasan_save_alloc_info+0x40/0x58 [ 37.438505] __kasan_kmalloc+0xd4/0xd8 [ 37.439161] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.439821] kasan_atomics+0xb8/0x2e8 [ 37.440361] kunit_try_run_case+0x14c/0x3d0 [ 37.441058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.441847] kthread+0x24c/0x2d0 [ 37.442419] ret_from_fork+0x10/0x20 [ 37.443037] [ 37.443382] The buggy address belongs to the object at fff00000c5f10100 [ 37.443382] which belongs to the cache kmalloc-64 of size 64 [ 37.444667] The buggy address is located 0 bytes to the right of [ 37.444667] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.446001] [ 37.446383] The buggy address belongs to the physical page: [ 37.447149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.447986] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.448883] page_type: f5(slab) [ 37.449463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.450385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.451394] page dumped because: kasan: bad access detected [ 37.452062] [ 37.452517] Memory state around the buggy address: [ 37.453235] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.454124] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.455054] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.455943] ^ [ 37.456664] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.457396] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.458293] ================================================================== [ 36.023629] ================================================================== [ 36.024276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 36.025496] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.027147] [ 36.027568] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.028708] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.029343] Hardware name: linux,dummy-virt (DT) [ 36.029983] Call trace: [ 36.030357] show_stack+0x20/0x38 (C) [ 36.031031] dump_stack_lvl+0x8c/0xd0 [ 36.031713] print_report+0x118/0x5e0 [ 36.032413] kasan_report+0xc8/0x118 [ 36.033011] kasan_check_range+0x100/0x1a8 [ 36.033717] __kasan_check_write+0x20/0x30 [ 36.034359] kasan_atomics_helper+0x5b4/0x4858 [ 36.035046] kasan_atomics+0x198/0x2e8 [ 36.035605] kunit_try_run_case+0x14c/0x3d0 [ 36.036321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.037099] kthread+0x24c/0x2d0 [ 36.037719] ret_from_fork+0x10/0x20 [ 36.038338] [ 36.038700] Allocated by task 254: [ 36.039234] kasan_save_stack+0x3c/0x68 [ 36.039890] kasan_save_track+0x20/0x40 [ 36.040455] kasan_save_alloc_info+0x40/0x58 [ 36.041151] __kasan_kmalloc+0xd4/0xd8 [ 36.041695] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.042387] kasan_atomics+0xb8/0x2e8 [ 36.043021] kunit_try_run_case+0x14c/0x3d0 [ 36.043708] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.044376] kthread+0x24c/0x2d0 [ 36.044974] ret_from_fork+0x10/0x20 [ 36.045548] [ 36.045920] The buggy address belongs to the object at fff00000c5f10100 [ 36.045920] which belongs to the cache kmalloc-64 of size 64 [ 36.047238] The buggy address is located 0 bytes to the right of [ 36.047238] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.048502] [ 36.048908] The buggy address belongs to the physical page: [ 36.049723] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.050615] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.051382] page_type: f5(slab) [ 36.051891] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.052840] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.053680] page dumped because: kasan: bad access detected [ 36.054431] [ 36.054793] Memory state around the buggy address: [ 36.055422] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.056274] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.057113] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.057905] ^ [ 36.058588] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.059406] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.060213] ================================================================== [ 37.536827] ================================================================== [ 37.537641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 37.538488] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.540204] [ 37.540624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.541505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.542147] Hardware name: linux,dummy-virt (DT) [ 37.542834] Call trace: [ 37.543310] show_stack+0x20/0x38 (C) [ 37.543900] dump_stack_lvl+0x8c/0xd0 [ 37.544584] print_report+0x118/0x5e0 [ 37.545144] kasan_report+0xc8/0x118 [ 37.545712] __asan_report_load8_noabort+0x20/0x30 [ 37.546454] kasan_atomics_helper+0x3f04/0x4858 [ 37.547041] kasan_atomics+0x198/0x2e8 [ 37.547710] kunit_try_run_case+0x14c/0x3d0 [ 37.548349] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.549029] kthread+0x24c/0x2d0 [ 37.549655] ret_from_fork+0x10/0x20 [ 37.550250] [ 37.550634] Allocated by task 254: [ 37.551208] kasan_save_stack+0x3c/0x68 [ 37.551724] kasan_save_track+0x20/0x40 [ 37.552380] kasan_save_alloc_info+0x40/0x58 [ 37.552987] __kasan_kmalloc+0xd4/0xd8 [ 37.553638] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.554284] kasan_atomics+0xb8/0x2e8 [ 37.554875] kunit_try_run_case+0x14c/0x3d0 [ 37.555565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.556201] kthread+0x24c/0x2d0 [ 37.556823] ret_from_fork+0x10/0x20 [ 37.557395] [ 37.557795] The buggy address belongs to the object at fff00000c5f10100 [ 37.557795] which belongs to the cache kmalloc-64 of size 64 [ 37.558988] The buggy address is located 0 bytes to the right of [ 37.558988] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.560456] [ 37.560856] The buggy address belongs to the physical page: [ 37.561520] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.562488] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.563397] page_type: f5(slab) [ 37.563976] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.564756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.565751] page dumped because: kasan: bad access detected [ 37.566514] [ 37.566914] Memory state around the buggy address: [ 37.567521] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.568369] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.569263] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.570091] ^ [ 37.570720] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.571668] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.572331] ================================================================== [ 37.498718] ================================================================== [ 37.500316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 37.501133] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.502079] [ 37.502496] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.503669] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.504299] Hardware name: linux,dummy-virt (DT) [ 37.504921] Call trace: [ 37.505381] show_stack+0x20/0x38 (C) [ 37.505959] dump_stack_lvl+0x8c/0xd0 [ 37.506517] print_report+0x118/0x5e0 [ 37.507188] kasan_report+0xc8/0x118 [ 37.507841] kasan_check_range+0x100/0x1a8 [ 37.508576] __kasan_check_write+0x20/0x30 [ 37.509296] kasan_atomics_helper+0x1384/0x4858 [ 37.509913] kasan_atomics+0x198/0x2e8 [ 37.510582] kunit_try_run_case+0x14c/0x3d0 [ 37.511189] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.511974] kthread+0x24c/0x2d0 [ 37.512610] ret_from_fork+0x10/0x20 [ 37.513231] [ 37.513573] Allocated by task 254: [ 37.514138] kasan_save_stack+0x3c/0x68 [ 37.514786] kasan_save_track+0x20/0x40 [ 37.515401] kasan_save_alloc_info+0x40/0x58 [ 37.515966] __kasan_kmalloc+0xd4/0xd8 [ 37.516620] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.517316] kasan_atomics+0xb8/0x2e8 [ 37.517827] kunit_try_run_case+0x14c/0x3d0 [ 37.518472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.519313] kthread+0x24c/0x2d0 [ 37.519847] ret_from_fork+0x10/0x20 [ 37.520470] [ 37.520864] The buggy address belongs to the object at fff00000c5f10100 [ 37.520864] which belongs to the cache kmalloc-64 of size 64 [ 37.522042] The buggy address is located 0 bytes to the right of [ 37.522042] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.523370] [ 37.523766] The buggy address belongs to the physical page: [ 37.524549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.525399] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.526210] page_type: f5(slab) [ 37.526700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.527676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.528615] page dumped because: kasan: bad access detected [ 37.529339] [ 37.529729] Memory state around the buggy address: [ 37.530297] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.531184] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.532036] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.532851] ^ [ 37.533441] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.534291] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.535134] ================================================================== [ 36.536926] ================================================================== [ 36.537797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.538955] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.539871] [ 36.540289] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.541564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.542067] Hardware name: linux,dummy-virt (DT) [ 36.543425] Call trace: [ 36.543814] show_stack+0x20/0x38 (C) [ 36.544385] dump_stack_lvl+0x8c/0xd0 [ 36.544964] print_report+0x118/0x5e0 [ 36.545620] kasan_report+0xc8/0x118 [ 36.546134] __asan_report_load4_noabort+0x20/0x30 [ 36.546895] kasan_atomics_helper+0x3dcc/0x4858 [ 36.547508] kasan_atomics+0x198/0x2e8 [ 36.548138] kunit_try_run_case+0x14c/0x3d0 [ 36.548782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.549559] kthread+0x24c/0x2d0 [ 36.550066] ret_from_fork+0x10/0x20 [ 36.550682] [ 36.551059] Allocated by task 254: [ 36.551570] kasan_save_stack+0x3c/0x68 [ 36.552218] kasan_save_track+0x20/0x40 [ 36.552798] kasan_save_alloc_info+0x40/0x58 [ 36.553488] __kasan_kmalloc+0xd4/0xd8 [ 36.554082] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.554801] kasan_atomics+0xb8/0x2e8 [ 36.555351] kunit_try_run_case+0x14c/0x3d0 [ 36.555915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.556731] kthread+0x24c/0x2d0 [ 36.557317] ret_from_fork+0x10/0x20 [ 36.557954] [ 36.558333] The buggy address belongs to the object at fff00000c5f10100 [ 36.558333] which belongs to the cache kmalloc-64 of size 64 [ 36.559580] The buggy address is located 0 bytes to the right of [ 36.559580] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.560983] [ 36.561361] The buggy address belongs to the physical page: [ 36.562042] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.562919] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.563720] page_type: f5(slab) [ 36.564301] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.565127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.565971] page dumped because: kasan: bad access detected [ 36.566736] [ 36.567113] Memory state around the buggy address: [ 36.567788] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.568614] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.569458] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.570287] ^ [ 36.570896] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.571755] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.572544] ================================================================== [ 37.999006] ================================================================== [ 38.000360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 38.001021] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 38.002129] [ 38.002511] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 38.003577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.004036] Hardware name: linux,dummy-virt (DT) [ 38.004733] Call trace: [ 38.005199] show_stack+0x20/0x38 (C) [ 38.005859] dump_stack_lvl+0x8c/0xd0 [ 38.006542] print_report+0x118/0x5e0 [ 38.007186] kasan_report+0xc8/0x118 [ 38.007838] __asan_report_load8_noabort+0x20/0x30 [ 38.008507] kasan_atomics_helper+0x3e20/0x4858 [ 38.009148] kasan_atomics+0x198/0x2e8 [ 38.009671] kunit_try_run_case+0x14c/0x3d0 [ 38.010371] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.011195] kthread+0x24c/0x2d0 [ 38.011821] ret_from_fork+0x10/0x20 [ 38.012471] [ 38.012872] Allocated by task 254: [ 38.013413] kasan_save_stack+0x3c/0x68 [ 38.014082] kasan_save_track+0x20/0x40 [ 38.014731] kasan_save_alloc_info+0x40/0x58 [ 38.015278] __kasan_kmalloc+0xd4/0xd8 [ 38.015929] __kmalloc_cache_noprof+0x15c/0x3c8 [ 38.016671] kasan_atomics+0xb8/0x2e8 [ 38.017233] kunit_try_run_case+0x14c/0x3d0 [ 38.017833] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.018641] kthread+0x24c/0x2d0 [ 38.019143] ret_from_fork+0x10/0x20 [ 38.019645] [ 38.020013] The buggy address belongs to the object at fff00000c5f10100 [ 38.020013] which belongs to the cache kmalloc-64 of size 64 [ 38.021448] The buggy address is located 0 bytes to the right of [ 38.021448] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 38.022808] [ 38.023188] The buggy address belongs to the physical page: [ 38.023884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 38.024937] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.025758] page_type: f5(slab) [ 38.026264] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.027265] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 38.028063] page dumped because: kasan: bad access detected [ 38.028797] [ 38.029150] Memory state around the buggy address: [ 38.030158] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.031218] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 38.031960] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.032846] ^ [ 38.033554] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.034314] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.035163] ================================================================== [ 36.262120] ================================================================== [ 36.263367] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 36.264359] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.265000] [ 36.265903] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.267067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.267751] Hardware name: linux,dummy-virt (DT) [ 36.268418] Call trace: [ 36.268942] show_stack+0x20/0x38 (C) [ 36.269622] dump_stack_lvl+0x8c/0xd0 [ 36.270323] print_report+0x118/0x5e0 [ 36.270954] kasan_report+0xc8/0x118 [ 36.271617] kasan_check_range+0x100/0x1a8 [ 36.272215] __kasan_check_write+0x20/0x30 [ 36.272976] kasan_atomics_helper+0x894/0x4858 [ 36.273626] kasan_atomics+0x198/0x2e8 [ 36.274314] kunit_try_run_case+0x14c/0x3d0 [ 36.275016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.275753] kthread+0x24c/0x2d0 [ 36.276364] ret_from_fork+0x10/0x20 [ 36.276988] [ 36.277412] Allocated by task 254: [ 36.277955] kasan_save_stack+0x3c/0x68 [ 36.278611] kasan_save_track+0x20/0x40 [ 36.279179] kasan_save_alloc_info+0x40/0x58 [ 36.279911] __kasan_kmalloc+0xd4/0xd8 [ 36.280506] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.281260] kasan_atomics+0xb8/0x2e8 [ 36.281861] kunit_try_run_case+0x14c/0x3d0 [ 36.282546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.283227] kthread+0x24c/0x2d0 [ 36.283851] ret_from_fork+0x10/0x20 [ 36.284544] [ 36.285008] The buggy address belongs to the object at fff00000c5f10100 [ 36.285008] which belongs to the cache kmalloc-64 of size 64 [ 36.286342] The buggy address is located 0 bytes to the right of [ 36.286342] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.287862] [ 36.288357] The buggy address belongs to the physical page: [ 36.289149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.290385] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.290979] page_type: f5(slab) [ 36.291237] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.291739] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.292721] page dumped because: kasan: bad access detected [ 36.293413] [ 36.293813] Memory state around the buggy address: [ 36.294396] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.295252] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.296206] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.296960] ^ [ 36.297684] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.298516] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.299467] ================================================================== [ 37.804729] ================================================================== [ 37.805561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 37.806753] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.808244] [ 37.808690] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.810303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.810844] Hardware name: linux,dummy-virt (DT) [ 37.811450] Call trace: [ 37.811967] show_stack+0x20/0x38 (C) [ 37.812621] dump_stack_lvl+0x8c/0xd0 [ 37.813323] print_report+0x118/0x5e0 [ 37.813958] kasan_report+0xc8/0x118 [ 37.814600] kasan_check_range+0x100/0x1a8 [ 37.815323] __kasan_check_write+0x20/0x30 [ 37.815978] kasan_atomics_helper+0x1644/0x4858 [ 37.816767] kasan_atomics+0x198/0x2e8 [ 37.817369] kunit_try_run_case+0x14c/0x3d0 [ 37.818135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.818936] kthread+0x24c/0x2d0 [ 37.819478] ret_from_fork+0x10/0x20 [ 37.820158] [ 37.820561] Allocated by task 254: [ 37.821117] kasan_save_stack+0x3c/0x68 [ 37.821716] kasan_save_track+0x20/0x40 [ 37.822199] kasan_save_alloc_info+0x40/0x58 [ 37.822880] __kasan_kmalloc+0xd4/0xd8 [ 37.823505] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.824169] kasan_atomics+0xb8/0x2e8 [ 37.824716] kunit_try_run_case+0x14c/0x3d0 [ 37.825390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.826196] kthread+0x24c/0x2d0 [ 37.826779] ret_from_fork+0x10/0x20 [ 37.827256] [ 37.827654] The buggy address belongs to the object at fff00000c5f10100 [ 37.827654] which belongs to the cache kmalloc-64 of size 64 [ 37.828930] The buggy address is located 0 bytes to the right of [ 37.828930] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.830441] [ 37.830795] The buggy address belongs to the physical page: [ 37.831466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.832506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.833268] page_type: f5(slab) [ 37.833856] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.834636] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.835508] page dumped because: kasan: bad access detected [ 37.836295] [ 37.836682] Memory state around the buggy address: [ 37.837383] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.838260] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.839090] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.839969] ^ [ 37.840704] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.841439] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.842264] ================================================================== [ 36.377250] ================================================================== [ 36.378078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 36.378894] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.379915] [ 36.380324] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.381260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.381913] Hardware name: linux,dummy-virt (DT) [ 36.382619] Call trace: [ 36.383085] show_stack+0x20/0x38 (C) [ 36.383626] dump_stack_lvl+0x8c/0xd0 [ 36.384326] print_report+0x118/0x5e0 [ 36.384960] kasan_report+0xc8/0x118 [ 36.385657] kasan_check_range+0x100/0x1a8 [ 36.386258] __kasan_check_write+0x20/0x30 [ 36.386988] kasan_atomics_helper+0x99c/0x4858 [ 36.388111] kasan_atomics+0x198/0x2e8 [ 36.388798] kunit_try_run_case+0x14c/0x3d0 [ 36.389559] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.390270] kthread+0x24c/0x2d0 [ 36.390872] ret_from_fork+0x10/0x20 [ 36.391542] [ 36.391911] Allocated by task 254: [ 36.392440] kasan_save_stack+0x3c/0x68 [ 36.392989] kasan_save_track+0x20/0x40 [ 36.393621] kasan_save_alloc_info+0x40/0x58 [ 36.394298] __kasan_kmalloc+0xd4/0xd8 [ 36.394955] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.395625] kasan_atomics+0xb8/0x2e8 [ 36.396170] kunit_try_run_case+0x14c/0x3d0 [ 36.396735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.397546] kthread+0x24c/0x2d0 [ 36.398132] ret_from_fork+0x10/0x20 [ 36.398744] [ 36.399153] The buggy address belongs to the object at fff00000c5f10100 [ 36.399153] which belongs to the cache kmalloc-64 of size 64 [ 36.400376] The buggy address is located 0 bytes to the right of [ 36.400376] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.401628] [ 36.402004] The buggy address belongs to the physical page: [ 36.402773] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.403663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.404470] page_type: f5(slab) [ 36.405438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.406472] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.407246] page dumped because: kasan: bad access detected [ 36.408010] [ 36.408340] Memory state around the buggy address: [ 36.409037] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.409838] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.410704] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.411508] ^ [ 36.412242] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.413114] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.414049] ================================================================== [ 37.155991] ================================================================== [ 37.156900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 37.157706] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.159230] [ 37.159603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.160812] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.161306] Hardware name: linux,dummy-virt (DT) [ 37.161997] Call trace: [ 37.162374] show_stack+0x20/0x38 (C) [ 37.163045] dump_stack_lvl+0x8c/0xd0 [ 37.163637] print_report+0x118/0x5e0 [ 37.164278] kasan_report+0xc8/0x118 [ 37.164933] kasan_check_range+0x100/0x1a8 [ 37.165576] __kasan_check_write+0x20/0x30 [ 37.166268] kasan_atomics_helper+0xf88/0x4858 [ 37.166963] kasan_atomics+0x198/0x2e8 [ 37.167463] kunit_try_run_case+0x14c/0x3d0 [ 37.168208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.168910] kthread+0x24c/0x2d0 [ 37.169516] ret_from_fork+0x10/0x20 [ 37.170113] [ 37.170421] Allocated by task 254: [ 37.170994] kasan_save_stack+0x3c/0x68 [ 37.171645] kasan_save_track+0x20/0x40 [ 37.172283] kasan_save_alloc_info+0x40/0x58 [ 37.172874] __kasan_kmalloc+0xd4/0xd8 [ 37.173502] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.174159] kasan_atomics+0xb8/0x2e8 [ 37.174793] kunit_try_run_case+0x14c/0x3d0 [ 37.175438] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.176099] kthread+0x24c/0x2d0 [ 37.176718] ret_from_fork+0x10/0x20 [ 37.177224] [ 37.177623] The buggy address belongs to the object at fff00000c5f10100 [ 37.177623] which belongs to the cache kmalloc-64 of size 64 [ 37.178835] The buggy address is located 0 bytes to the right of [ 37.178835] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.180142] [ 37.180558] The buggy address belongs to the physical page: [ 37.181114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.182148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.183216] page_type: f5(slab) [ 37.183832] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.184775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.185702] page dumped because: kasan: bad access detected [ 37.186437] [ 37.186735] Memory state around the buggy address: [ 37.187421] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.188202] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.189096] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.189929] ^ [ 37.190511] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.191470] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.192315] ================================================================== [ 36.889376] ================================================================== [ 36.890056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.891942] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.893667] [ 36.894085] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.895201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.895848] Hardware name: linux,dummy-virt (DT) [ 36.896589] Call trace: [ 36.896997] show_stack+0x20/0x38 (C) [ 36.897702] dump_stack_lvl+0x8c/0xd0 [ 36.898332] print_report+0x118/0x5e0 [ 36.898940] kasan_report+0xc8/0x118 [ 36.899632] __asan_report_load4_noabort+0x20/0x30 [ 36.900382] kasan_atomics_helper+0x3e04/0x4858 [ 36.901106] kasan_atomics+0x198/0x2e8 [ 36.901752] kunit_try_run_case+0x14c/0x3d0 [ 36.902489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.903572] kthread+0x24c/0x2d0 [ 36.904141] ret_from_fork+0x10/0x20 [ 36.905021] [ 36.905356] Allocated by task 254: [ 36.906209] kasan_save_stack+0x3c/0x68 [ 36.906821] kasan_save_track+0x20/0x40 [ 36.907276] kasan_save_alloc_info+0x40/0x58 [ 36.907981] __kasan_kmalloc+0xd4/0xd8 [ 36.908576] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.909238] kasan_atomics+0xb8/0x2e8 [ 36.909890] kunit_try_run_case+0x14c/0x3d0 [ 36.910569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.911258] kthread+0x24c/0x2d0 [ 36.911858] ret_from_fork+0x10/0x20 [ 36.912394] [ 36.912793] The buggy address belongs to the object at fff00000c5f10100 [ 36.912793] which belongs to the cache kmalloc-64 of size 64 [ 36.913967] The buggy address is located 0 bytes to the right of [ 36.913967] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.915432] [ 36.915803] The buggy address belongs to the physical page: [ 36.916572] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.917606] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.918474] page_type: f5(slab) [ 36.919076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.919946] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.920925] page dumped because: kasan: bad access detected [ 36.921515] [ 36.921915] Memory state around the buggy address: [ 36.922572] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.923357] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.924237] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.925048] ^ [ 36.925765] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.926544] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.927360] ================================================================== [ 37.118030] ================================================================== [ 37.119353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 37.120570] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.121602] [ 37.121932] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.123211] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.123697] Hardware name: linux,dummy-virt (DT) [ 37.124374] Call trace: [ 37.124797] show_stack+0x20/0x38 (C) [ 37.125439] dump_stack_lvl+0x8c/0xd0 [ 37.126109] print_report+0x118/0x5e0 [ 37.126727] kasan_report+0xc8/0x118 [ 37.127367] kasan_check_range+0x100/0x1a8 [ 37.128014] __kasan_check_write+0x20/0x30 [ 37.128738] kasan_atomics_helper+0xf20/0x4858 [ 37.129377] kasan_atomics+0x198/0x2e8 [ 37.130049] kunit_try_run_case+0x14c/0x3d0 [ 37.130673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.131471] kthread+0x24c/0x2d0 [ 37.132099] ret_from_fork+0x10/0x20 [ 37.132737] [ 37.133051] Allocated by task 254: [ 37.133584] kasan_save_stack+0x3c/0x68 [ 37.134151] kasan_save_track+0x20/0x40 [ 37.134724] kasan_save_alloc_info+0x40/0x58 [ 37.135233] __kasan_kmalloc+0xd4/0xd8 [ 37.135882] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.136600] kasan_atomics+0xb8/0x2e8 [ 37.137208] kunit_try_run_case+0x14c/0x3d0 [ 37.137802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.138610] kthread+0x24c/0x2d0 [ 37.139178] ret_from_fork+0x10/0x20 [ 37.139768] [ 37.140135] The buggy address belongs to the object at fff00000c5f10100 [ 37.140135] which belongs to the cache kmalloc-64 of size 64 [ 37.141339] The buggy address is located 0 bytes to the right of [ 37.141339] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.142653] [ 37.143042] The buggy address belongs to the physical page: [ 37.143707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.144668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.145450] page_type: f5(slab) [ 37.145940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.146953] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.147817] page dumped because: kasan: bad access detected [ 37.148603] [ 37.148924] Memory state around the buggy address: [ 37.149614] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.150629] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.151563] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.152347] ^ [ 37.153065] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.153896] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.154699] ================================================================== [ 37.270405] ================================================================== [ 37.271278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 37.272556] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.273262] [ 37.273710] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.274962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.275513] Hardware name: linux,dummy-virt (DT) [ 37.276203] Call trace: [ 37.276671] show_stack+0x20/0x38 (C) [ 37.277200] dump_stack_lvl+0x8c/0xd0 [ 37.277878] print_report+0x118/0x5e0 [ 37.278543] kasan_report+0xc8/0x118 [ 37.279228] kasan_check_range+0x100/0x1a8 [ 37.279814] __kasan_check_write+0x20/0x30 [ 37.280478] kasan_atomics_helper+0x10c0/0x4858 [ 37.281229] kasan_atomics+0x198/0x2e8 [ 37.281914] kunit_try_run_case+0x14c/0x3d0 [ 37.282621] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.283294] kthread+0x24c/0x2d0 [ 37.283912] ret_from_fork+0x10/0x20 [ 37.284466] [ 37.284866] Allocated by task 254: [ 37.285439] kasan_save_stack+0x3c/0x68 [ 37.286084] kasan_save_track+0x20/0x40 [ 37.286608] kasan_save_alloc_info+0x40/0x58 [ 37.287269] __kasan_kmalloc+0xd4/0xd8 [ 37.287909] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.288512] kasan_atomics+0xb8/0x2e8 [ 37.289180] kunit_try_run_case+0x14c/0x3d0 [ 37.289859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.290490] kthread+0x24c/0x2d0 [ 37.291090] ret_from_fork+0x10/0x20 [ 37.291711] [ 37.292086] The buggy address belongs to the object at fff00000c5f10100 [ 37.292086] which belongs to the cache kmalloc-64 of size 64 [ 37.293320] The buggy address is located 0 bytes to the right of [ 37.293320] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.294590] [ 37.294974] The buggy address belongs to the physical page: [ 37.295747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.296637] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.297394] page_type: f5(slab) [ 37.297989] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.298824] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.299730] page dumped because: kasan: bad access detected [ 37.300400] [ 37.300792] Memory state around the buggy address: [ 37.301375] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.302264] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.303207] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.304081] ^ [ 37.304768] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.305635] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.306494] ================================================================== [ 37.346383] ================================================================== [ 37.347100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 37.347958] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.348910] [ 37.349333] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.350315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.351615] Hardware name: linux,dummy-virt (DT) [ 37.352306] Call trace: [ 37.352723] show_stack+0x20/0x38 (C) [ 37.353381] dump_stack_lvl+0x8c/0xd0 [ 37.353951] print_report+0x118/0x5e0 [ 37.354621] kasan_report+0xc8/0x118 [ 37.355273] kasan_check_range+0x100/0x1a8 [ 37.355904] __kasan_check_write+0x20/0x30 [ 37.356548] kasan_atomics_helper+0x1190/0x4858 [ 37.357278] kasan_atomics+0x198/0x2e8 [ 37.358218] kunit_try_run_case+0x14c/0x3d0 [ 37.358876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.359820] kthread+0x24c/0x2d0 [ 37.360318] ret_from_fork+0x10/0x20 [ 37.360901] [ 37.361274] Allocated by task 254: [ 37.361793] kasan_save_stack+0x3c/0x68 [ 37.362351] kasan_save_track+0x20/0x40 [ 37.363003] kasan_save_alloc_info+0x40/0x58 [ 37.363627] __kasan_kmalloc+0xd4/0xd8 [ 37.364134] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.364858] kasan_atomics+0xb8/0x2e8 [ 37.365441] kunit_try_run_case+0x14c/0x3d0 [ 37.365989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.366796] kthread+0x24c/0x2d0 [ 37.367337] ret_from_fork+0x10/0x20 [ 37.367952] [ 37.368336] The buggy address belongs to the object at fff00000c5f10100 [ 37.368336] which belongs to the cache kmalloc-64 of size 64 [ 37.369595] The buggy address is located 0 bytes to the right of [ 37.369595] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.370876] [ 37.371199] The buggy address belongs to the physical page: [ 37.371969] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.372906] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.373803] page_type: f5(slab) [ 37.374369] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.375272] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.376190] page dumped because: kasan: bad access detected [ 37.376951] [ 37.377327] Memory state around the buggy address: [ 37.377988] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.378780] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.379688] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.380581] ^ [ 37.381277] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.382052] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.383000] ================================================================== [ 35.943178] ================================================================== [ 35.943960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.944946] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.947571] [ 35.947909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.949239] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.949949] Hardware name: linux,dummy-virt (DT) [ 35.950639] Call trace: [ 35.951126] show_stack+0x20/0x38 (C) [ 35.951879] dump_stack_lvl+0x8c/0xd0 [ 35.952905] print_report+0x118/0x5e0 [ 35.953596] kasan_report+0xc8/0x118 [ 35.954448] kasan_check_range+0x100/0x1a8 [ 35.955107] __kasan_check_write+0x20/0x30 [ 35.955961] kasan_atomics_helper+0x4e4/0x4858 [ 35.956622] kasan_atomics+0x198/0x2e8 [ 35.957160] kunit_try_run_case+0x14c/0x3d0 [ 35.957828] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.958793] kthread+0x24c/0x2d0 [ 35.959429] ret_from_fork+0x10/0x20 [ 35.960108] [ 35.960439] Allocated by task 254: [ 35.961023] kasan_save_stack+0x3c/0x68 [ 35.961885] kasan_save_track+0x20/0x40 [ 35.962549] kasan_save_alloc_info+0x40/0x58 [ 35.963200] __kasan_kmalloc+0xd4/0xd8 [ 35.963764] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.964410] kasan_atomics+0xb8/0x2e8 [ 35.965038] kunit_try_run_case+0x14c/0x3d0 [ 35.965883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.966647] kthread+0x24c/0x2d0 [ 35.967230] ret_from_fork+0x10/0x20 [ 35.968464] [ 35.968993] The buggy address belongs to the object at fff00000c5f10100 [ 35.968993] which belongs to the cache kmalloc-64 of size 64 [ 35.970711] The buggy address is located 0 bytes to the right of [ 35.970711] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.972153] [ 35.972574] The buggy address belongs to the physical page: [ 35.973359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.974440] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.975444] page_type: f5(slab) [ 35.975969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.976788] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.977680] page dumped because: kasan: bad access detected [ 35.978598] [ 35.978945] Memory state around the buggy address: [ 35.979610] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.980425] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.981152] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.982097] ^ [ 35.982735] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.983571] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.984370] ================================================================== [ 35.484035] ================================================================== [ 35.485410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 35.486564] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.487343] [ 35.487766] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.488781] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.489408] Hardware name: linux,dummy-virt (DT) [ 35.490337] Call trace: [ 35.490783] show_stack+0x20/0x38 (C) [ 35.491437] dump_stack_lvl+0x8c/0xd0 [ 35.492116] print_report+0x118/0x5e0 [ 35.492730] kasan_report+0xc8/0x118 [ 35.493345] __asan_report_load4_noabort+0x20/0x30 [ 35.494663] kasan_atomics_helper+0x40a8/0x4858 [ 35.495312] kasan_atomics+0x198/0x2e8 [ 35.495910] kunit_try_run_case+0x14c/0x3d0 [ 35.496567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.497271] kthread+0x24c/0x2d0 [ 35.498224] ret_from_fork+0x10/0x20 [ 35.498909] [ 35.499286] Allocated by task 254: [ 35.499753] kasan_save_stack+0x3c/0x68 [ 35.500399] kasan_save_track+0x20/0x40 [ 35.500978] kasan_save_alloc_info+0x40/0x58 [ 35.502016] __kasan_kmalloc+0xd4/0xd8 [ 35.502542] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.503236] kasan_atomics+0xb8/0x2e8 [ 35.503880] kunit_try_run_case+0x14c/0x3d0 [ 35.504476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.505127] kthread+0x24c/0x2d0 [ 35.505940] ret_from_fork+0x10/0x20 [ 35.506576] [ 35.506944] The buggy address belongs to the object at fff00000c5f10100 [ 35.506944] which belongs to the cache kmalloc-64 of size 64 [ 35.508652] The buggy address is located 0 bytes to the right of [ 35.508652] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.510586] [ 35.511139] The buggy address belongs to the physical page: [ 35.511970] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.513042] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.513984] page_type: f5(slab) [ 35.514765] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.515713] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.516494] page dumped because: kasan: bad access detected [ 35.517268] [ 35.517641] Memory state around the buggy address: [ 35.518162] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.519100] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.519866] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.520832] ^ [ 35.521545] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.522796] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.523584] ================================================================== [ 36.811448] ================================================================== [ 36.812293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.813169] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.814150] [ 36.814612] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.815591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.816279] Hardware name: linux,dummy-virt (DT) [ 36.817005] Call trace: [ 36.817480] show_stack+0x20/0x38 (C) [ 36.818152] dump_stack_lvl+0x8c/0xd0 [ 36.818744] print_report+0x118/0x5e0 [ 36.819457] kasan_report+0xc8/0x118 [ 36.820011] __asan_report_load4_noabort+0x20/0x30 [ 36.820829] kasan_atomics_helper+0x3dd8/0x4858 [ 36.821508] kasan_atomics+0x198/0x2e8 [ 36.822176] kunit_try_run_case+0x14c/0x3d0 [ 36.822918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.823622] kthread+0x24c/0x2d0 [ 36.824277] ret_from_fork+0x10/0x20 [ 36.824912] [ 36.825330] Allocated by task 254: [ 36.825917] kasan_save_stack+0x3c/0x68 [ 36.826555] kasan_save_track+0x20/0x40 [ 36.827235] kasan_save_alloc_info+0x40/0x58 [ 36.827934] __kasan_kmalloc+0xd4/0xd8 [ 36.828488] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.829302] kasan_atomics+0xb8/0x2e8 [ 36.829976] kunit_try_run_case+0x14c/0x3d0 [ 36.830751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.831414] kthread+0x24c/0x2d0 [ 36.832051] ret_from_fork+0x10/0x20 [ 36.832706] [ 36.833025] The buggy address belongs to the object at fff00000c5f10100 [ 36.833025] which belongs to the cache kmalloc-64 of size 64 [ 36.834374] The buggy address is located 0 bytes to the right of [ 36.834374] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.835765] [ 36.836158] The buggy address belongs to the physical page: [ 36.836880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.837882] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.838860] page_type: f5(slab) [ 36.839407] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.840422] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.841370] page dumped because: kasan: bad access detected [ 36.842202] [ 36.842615] Memory state around the buggy address: [ 36.843371] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.844327] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.845249] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.846177] ^ [ 36.846908] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.847833] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848690] ================================================================== [ 35.525495] ================================================================== [ 35.527080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 35.528326] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.529458] [ 35.529897] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.530970] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.531701] Hardware name: linux,dummy-virt (DT) [ 35.532365] Call trace: [ 35.532923] show_stack+0x20/0x38 (C) [ 35.533991] dump_stack_lvl+0x8c/0xd0 [ 35.534641] print_report+0x118/0x5e0 [ 35.535306] kasan_report+0xc8/0x118 [ 35.535973] __asan_report_store4_noabort+0x20/0x30 [ 35.536772] kasan_atomics_helper+0x3f7c/0x4858 [ 35.537501] kasan_atomics+0x198/0x2e8 [ 35.538440] kunit_try_run_case+0x14c/0x3d0 [ 35.539140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.539895] kthread+0x24c/0x2d0 [ 35.540572] ret_from_fork+0x10/0x20 [ 35.541178] [ 35.541511] Allocated by task 254: [ 35.542044] kasan_save_stack+0x3c/0x68 [ 35.542942] kasan_save_track+0x20/0x40 [ 35.543550] kasan_save_alloc_info+0x40/0x58 [ 35.544187] __kasan_kmalloc+0xd4/0xd8 [ 35.544891] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.546608] kasan_atomics+0xb8/0x2e8 [ 35.547114] kunit_try_run_case+0x14c/0x3d0 [ 35.547871] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.548716] kthread+0x24c/0x2d0 [ 35.549309] ret_from_fork+0x10/0x20 [ 35.550199] [ 35.550503] The buggy address belongs to the object at fff00000c5f10100 [ 35.550503] which belongs to the cache kmalloc-64 of size 64 [ 35.551668] The buggy address is located 0 bytes to the right of [ 35.551668] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.553100] [ 35.553544] The buggy address belongs to the physical page: [ 35.554580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.555417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.556342] page_type: f5(slab) [ 35.556818] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.557975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.559016] page dumped because: kasan: bad access detected [ 35.559720] [ 35.560084] Memory state around the buggy address: [ 35.560859] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.561906] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.562904] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.563766] ^ [ 35.564438] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.565338] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.566588] ================================================================== [ 36.221519] ================================================================== [ 36.222440] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 36.223663] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.224461] [ 36.224956] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.226301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.226982] Hardware name: linux,dummy-virt (DT) [ 36.227519] Call trace: [ 36.228008] show_stack+0x20/0x38 (C) [ 36.228771] dump_stack_lvl+0x8c/0xd0 [ 36.229371] print_report+0x118/0x5e0 [ 36.230081] kasan_report+0xc8/0x118 [ 36.230774] kasan_check_range+0x100/0x1a8 [ 36.231501] __kasan_check_write+0x20/0x30 [ 36.232195] kasan_atomics_helper+0x7cc/0x4858 [ 36.233000] kasan_atomics+0x198/0x2e8 [ 36.233711] kunit_try_run_case+0x14c/0x3d0 [ 36.234454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.235232] kthread+0x24c/0x2d0 [ 36.235910] ret_from_fork+0x10/0x20 [ 36.236625] [ 36.237037] Allocated by task 254: [ 36.237544] kasan_save_stack+0x3c/0x68 [ 36.238179] kasan_save_track+0x20/0x40 [ 36.238834] kasan_save_alloc_info+0x40/0x58 [ 36.239609] __kasan_kmalloc+0xd4/0xd8 [ 36.240217] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.240938] kasan_atomics+0xb8/0x2e8 [ 36.241551] kunit_try_run_case+0x14c/0x3d0 [ 36.242172] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.242997] kthread+0x24c/0x2d0 [ 36.243578] ret_from_fork+0x10/0x20 [ 36.244067] [ 36.244457] The buggy address belongs to the object at fff00000c5f10100 [ 36.244457] which belongs to the cache kmalloc-64 of size 64 [ 36.245765] The buggy address is located 0 bytes to the right of [ 36.245765] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.247138] [ 36.247509] The buggy address belongs to the physical page: [ 36.248299] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.249807] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.250484] page_type: f5(slab) [ 36.251152] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.252251] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.253344] page dumped because: kasan: bad access detected [ 36.254251] [ 36.254806] Memory state around the buggy address: [ 36.255482] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.256394] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.257297] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.258067] ^ [ 36.258696] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.259641] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.260395] ================================================================== [ 36.141219] ================================================================== [ 36.142034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 36.142965] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.143969] [ 36.144420] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.145627] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.146173] Hardware name: linux,dummy-virt (DT) [ 36.146907] Call trace: [ 36.147324] show_stack+0x20/0x38 (C) [ 36.148013] dump_stack_lvl+0x8c/0xd0 [ 36.148739] print_report+0x118/0x5e0 [ 36.149380] kasan_report+0xc8/0x118 [ 36.150021] kasan_check_range+0x100/0x1a8 [ 36.150703] __kasan_check_write+0x20/0x30 [ 36.151442] kasan_atomics_helper+0x6ec/0x4858 [ 36.152215] kasan_atomics+0x198/0x2e8 [ 36.152920] kunit_try_run_case+0x14c/0x3d0 [ 36.153682] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.154348] kthread+0x24c/0x2d0 [ 36.155019] ret_from_fork+0x10/0x20 [ 36.155744] [ 36.156059] Allocated by task 254: [ 36.156673] kasan_save_stack+0x3c/0x68 [ 36.157389] kasan_save_track+0x20/0x40 [ 36.158072] kasan_save_alloc_info+0x40/0x58 [ 36.158749] __kasan_kmalloc+0xd4/0xd8 [ 36.159397] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.160124] kasan_atomics+0xb8/0x2e8 [ 36.160788] kunit_try_run_case+0x14c/0x3d0 [ 36.161497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.162205] kthread+0x24c/0x2d0 [ 36.162841] ret_from_fork+0x10/0x20 [ 36.163430] [ 36.163833] The buggy address belongs to the object at fff00000c5f10100 [ 36.163833] which belongs to the cache kmalloc-64 of size 64 [ 36.165196] The buggy address is located 0 bytes to the right of [ 36.165196] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.166561] [ 36.166952] The buggy address belongs to the physical page: [ 36.167739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.168747] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.169614] page_type: f5(slab) [ 36.170212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.171146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.172079] page dumped because: kasan: bad access detected [ 36.172806] [ 36.173162] Memory state around the buggy address: [ 36.173873] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.174796] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.175680] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.176545] ^ [ 36.177194] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178096] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.178956] ================================================================== [ 37.080502] ================================================================== [ 37.081313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 37.082345] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.083226] [ 37.083687] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.084897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.085446] Hardware name: linux,dummy-virt (DT) [ 37.086128] Call trace: [ 37.086698] show_stack+0x20/0x38 (C) [ 37.087401] dump_stack_lvl+0x8c/0xd0 [ 37.088007] print_report+0x118/0x5e0 [ 37.088699] kasan_report+0xc8/0x118 [ 37.089284] kasan_check_range+0x100/0x1a8 [ 37.089915] __kasan_check_write+0x20/0x30 [ 37.090456] kasan_atomics_helper+0xeb8/0x4858 [ 37.091190] kasan_atomics+0x198/0x2e8 [ 37.091856] kunit_try_run_case+0x14c/0x3d0 [ 37.092598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.093412] kthread+0x24c/0x2d0 [ 37.094050] ret_from_fork+0x10/0x20 [ 37.094663] [ 37.095009] Allocated by task 254: [ 37.095435] kasan_save_stack+0x3c/0x68 [ 37.096093] kasan_save_track+0x20/0x40 [ 37.096756] kasan_save_alloc_info+0x40/0x58 [ 37.097427] __kasan_kmalloc+0xd4/0xd8 [ 37.098017] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.098724] kasan_atomics+0xb8/0x2e8 [ 37.099205] kunit_try_run_case+0x14c/0x3d0 [ 37.099894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.100545] kthread+0x24c/0x2d0 [ 37.101067] ret_from_fork+0x10/0x20 [ 37.101692] [ 37.102060] The buggy address belongs to the object at fff00000c5f10100 [ 37.102060] which belongs to the cache kmalloc-64 of size 64 [ 37.103371] The buggy address is located 0 bytes to the right of [ 37.103371] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.104672] [ 37.105063] The buggy address belongs to the physical page: [ 37.105684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.106707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.107608] page_type: f5(slab) [ 37.108193] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.109091] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.109945] page dumped because: kasan: bad access detected [ 37.110577] [ 37.110956] Memory state around the buggy address: [ 37.111669] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.112352] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.113289] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.114073] ^ [ 37.114671] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.115608] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.116450] ================================================================== [ 37.689468] ================================================================== [ 37.690702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 37.692393] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.693682] [ 37.694403] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.695635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.696304] Hardware name: linux,dummy-virt (DT) [ 37.696914] Call trace: [ 37.697424] show_stack+0x20/0x38 (C) [ 37.698127] dump_stack_lvl+0x8c/0xd0 [ 37.698719] print_report+0x118/0x5e0 [ 37.699400] kasan_report+0xc8/0x118 [ 37.700003] kasan_check_range+0x100/0x1a8 [ 37.700754] __kasan_check_write+0x20/0x30 [ 37.701352] kasan_atomics_helper+0x154c/0x4858 [ 37.702157] kasan_atomics+0x198/0x2e8 [ 37.702780] kunit_try_run_case+0x14c/0x3d0 [ 37.703542] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.704242] kthread+0x24c/0x2d0 [ 37.704920] ret_from_fork+0x10/0x20 [ 37.705513] [ 37.705944] Allocated by task 254: [ 37.706445] kasan_save_stack+0x3c/0x68 [ 37.707127] kasan_save_track+0x20/0x40 [ 37.707761] kasan_save_alloc_info+0x40/0x58 [ 37.708374] __kasan_kmalloc+0xd4/0xd8 [ 37.709042] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.709699] kasan_atomics+0xb8/0x2e8 [ 37.710311] kunit_try_run_case+0x14c/0x3d0 [ 37.711033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.711713] kthread+0x24c/0x2d0 [ 37.712337] ret_from_fork+0x10/0x20 [ 37.712937] [ 37.713333] The buggy address belongs to the object at fff00000c5f10100 [ 37.713333] which belongs to the cache kmalloc-64 of size 64 [ 37.714626] The buggy address is located 0 bytes to the right of [ 37.714626] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.716077] [ 37.716513] The buggy address belongs to the physical page: [ 37.717244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.718158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.718893] page_type: f5(slab) [ 37.719474] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.720414] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.721364] page dumped because: kasan: bad access detected [ 37.722019] [ 37.722434] Memory state around the buggy address: [ 37.723091] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.724058] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.724940] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.725805] ^ [ 37.726454] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.727346] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.728230] ================================================================== [ 35.740046] ================================================================== [ 35.740878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 35.742723] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.743407] [ 35.743840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.745103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.745839] Hardware name: linux,dummy-virt (DT) [ 35.746547] Call trace: [ 35.747003] show_stack+0x20/0x38 (C) [ 35.747751] dump_stack_lvl+0x8c/0xd0 [ 35.748302] print_report+0x118/0x5e0 [ 35.749012] kasan_report+0xc8/0x118 [ 35.749939] kasan_check_range+0x100/0x1a8 [ 35.750652] __kasan_check_write+0x20/0x30 [ 35.751234] kasan_atomics_helper+0x32c/0x4858 [ 35.751965] kasan_atomics+0x198/0x2e8 [ 35.752612] kunit_try_run_case+0x14c/0x3d0 [ 35.753245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.754278] kthread+0x24c/0x2d0 [ 35.754802] ret_from_fork+0x10/0x20 [ 35.755444] [ 35.755830] Allocated by task 254: [ 35.756323] kasan_save_stack+0x3c/0x68 [ 35.756956] kasan_save_track+0x20/0x40 [ 35.757436] kasan_save_alloc_info+0x40/0x58 [ 35.758396] __kasan_kmalloc+0xd4/0xd8 [ 35.759033] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.759734] kasan_atomics+0xb8/0x2e8 [ 35.760306] kunit_try_run_case+0x14c/0x3d0 [ 35.761042] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.762192] kthread+0x24c/0x2d0 [ 35.762671] ret_from_fork+0x10/0x20 [ 35.763136] [ 35.763728] The buggy address belongs to the object at fff00000c5f10100 [ 35.763728] which belongs to the cache kmalloc-64 of size 64 [ 35.765278] The buggy address is located 0 bytes to the right of [ 35.765278] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.767065] [ 35.767452] The buggy address belongs to the physical page: [ 35.768297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.769191] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.769903] page_type: f5(slab) [ 35.770544] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.771471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.772379] page dumped because: kasan: bad access detected [ 35.773041] [ 35.773454] Memory state around the buggy address: [ 35.774255] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.775345] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.776199] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.777088] ^ [ 35.777807] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.778831] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.779898] ================================================================== [ 37.729926] ================================================================== [ 37.730874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 37.731757] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.732600] [ 37.733046] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.734311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.734849] Hardware name: linux,dummy-virt (DT) [ 37.735578] Call trace: [ 37.736032] show_stack+0x20/0x38 (C) [ 37.736761] dump_stack_lvl+0x8c/0xd0 [ 37.737392] print_report+0x118/0x5e0 [ 37.738071] kasan_report+0xc8/0x118 [ 37.738775] kasan_check_range+0x100/0x1a8 [ 37.739514] __kasan_check_write+0x20/0x30 [ 37.740436] kasan_atomics_helper+0x15b4/0x4858 [ 37.741327] kasan_atomics+0x198/0x2e8 [ 37.741934] kunit_try_run_case+0x14c/0x3d0 [ 37.742968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.743690] kthread+0x24c/0x2d0 [ 37.744209] ret_from_fork+0x10/0x20 [ 37.744808] [ 37.745188] Allocated by task 254: [ 37.745654] kasan_save_stack+0x3c/0x68 [ 37.746290] kasan_save_track+0x20/0x40 [ 37.746934] kasan_save_alloc_info+0x40/0x58 [ 37.747633] __kasan_kmalloc+0xd4/0xd8 [ 37.748186] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.748917] kasan_atomics+0xb8/0x2e8 [ 37.749439] kunit_try_run_case+0x14c/0x3d0 [ 37.750167] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.750999] kthread+0x24c/0x2d0 [ 37.751612] ret_from_fork+0x10/0x20 [ 37.752249] [ 37.752674] The buggy address belongs to the object at fff00000c5f10100 [ 37.752674] which belongs to the cache kmalloc-64 of size 64 [ 37.753979] The buggy address is located 0 bytes to the right of [ 37.753979] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.755231] [ 37.755597] The buggy address belongs to the physical page: [ 37.756210] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.757176] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.757947] page_type: f5(slab) [ 37.758467] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.759390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.760263] page dumped because: kasan: bad access detected [ 37.760879] [ 37.761260] Memory state around the buggy address: [ 37.761970] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.762799] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.763514] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.764465] ^ [ 37.765038] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.765845] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.766636] ================================================================== [ 36.574003] ================================================================== [ 36.574729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 36.575520] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.576314] [ 36.576735] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.579769] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.580572] Hardware name: linux,dummy-virt (DT) [ 36.581126] Call trace: [ 36.581964] show_stack+0x20/0x38 (C) [ 36.582608] dump_stack_lvl+0x8c/0xd0 [ 36.583223] print_report+0x118/0x5e0 [ 36.583780] kasan_report+0xc8/0x118 [ 36.584335] kasan_check_range+0x100/0x1a8 [ 36.586274] __kasan_check_write+0x20/0x30 [ 36.588139] kasan_atomics_helper+0xb70/0x4858 [ 36.589785] kasan_atomics+0x198/0x2e8 [ 36.590678] kunit_try_run_case+0x14c/0x3d0 [ 36.592429] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.594094] kthread+0x24c/0x2d0 [ 36.595499] ret_from_fork+0x10/0x20 [ 36.597064] [ 36.598090] Allocated by task 254: [ 36.599518] kasan_save_stack+0x3c/0x68 [ 36.600926] kasan_save_track+0x20/0x40 [ 36.601426] kasan_save_alloc_info+0x40/0x58 [ 36.603470] __kasan_kmalloc+0xd4/0xd8 [ 36.605027] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.606558] kasan_atomics+0xb8/0x2e8 [ 36.608109] kunit_try_run_case+0x14c/0x3d0 [ 36.609721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.611489] kthread+0x24c/0x2d0 [ 36.612928] ret_from_fork+0x10/0x20 [ 36.613428] [ 36.613770] The buggy address belongs to the object at fff00000c5f10100 [ 36.613770] which belongs to the cache kmalloc-64 of size 64 [ 36.616588] The buggy address is located 0 bytes to the right of [ 36.616588] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.620036] [ 36.620888] The buggy address belongs to the physical page: [ 36.622834] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.624925] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.626949] page_type: f5(slab) [ 36.628415] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.630550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.632698] page dumped because: kasan: bad access detected [ 36.634519] [ 36.635450] Memory state around the buggy address: [ 36.635999] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.638472] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.640174] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.642213] ^ [ 36.643792] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.645772] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.647746] ================================================================== [ 36.651640] ================================================================== [ 36.654800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 36.655472] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.656191] [ 36.658635] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.660465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.661660] Hardware name: linux,dummy-virt (DT) [ 36.662176] Call trace: [ 36.663686] show_stack+0x20/0x38 (C) [ 36.665096] dump_stack_lvl+0x8c/0xd0 [ 36.666567] print_report+0x118/0x5e0 [ 36.667364] kasan_report+0xc8/0x118 [ 36.668222] __asan_report_load4_noabort+0x20/0x30 [ 36.669066] kasan_atomics_helper+0x3dbc/0x4858 [ 36.669758] kasan_atomics+0x198/0x2e8 [ 36.670410] kunit_try_run_case+0x14c/0x3d0 [ 36.671080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.671880] kthread+0x24c/0x2d0 [ 36.672389] ret_from_fork+0x10/0x20 [ 36.672923] [ 36.673228] Allocated by task 254: [ 36.673676] kasan_save_stack+0x3c/0x68 [ 36.674156] kasan_save_track+0x20/0x40 [ 36.674828] kasan_save_alloc_info+0x40/0x58 [ 36.675553] __kasan_kmalloc+0xd4/0xd8 [ 36.676178] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.676915] kasan_atomics+0xb8/0x2e8 [ 36.677575] kunit_try_run_case+0x14c/0x3d0 [ 36.678253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.678839] kthread+0x24c/0x2d0 [ 36.679438] ret_from_fork+0x10/0x20 [ 36.680066] [ 36.680470] The buggy address belongs to the object at fff00000c5f10100 [ 36.680470] which belongs to the cache kmalloc-64 of size 64 [ 36.681494] The buggy address is located 0 bytes to the right of [ 36.681494] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.683044] [ 36.683430] The buggy address belongs to the physical page: [ 36.684181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.684943] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.685834] page_type: f5(slab) [ 36.686414] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.687419] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.688810] page dumped because: kasan: bad access detected [ 36.690145] [ 36.690734] Memory state around the buggy address: [ 36.691564] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.692610] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.693406] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.694310] ^ [ 36.694950] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.695722] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.696573] ================================================================== [ 35.862695] ================================================================== [ 35.863967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 35.865377] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.866621] [ 35.867030] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.868294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.868865] Hardware name: linux,dummy-virt (DT) [ 35.869504] Call trace: [ 35.869997] show_stack+0x20/0x38 (C) [ 35.870620] dump_stack_lvl+0x8c/0xd0 [ 35.871152] print_report+0x118/0x5e0 [ 35.871823] kasan_report+0xc8/0x118 [ 35.872375] kasan_check_range+0x100/0x1a8 [ 35.873066] __kasan_check_write+0x20/0x30 [ 35.873780] kasan_atomics_helper+0x414/0x4858 [ 35.874496] kasan_atomics+0x198/0x2e8 [ 35.875056] kunit_try_run_case+0x14c/0x3d0 [ 35.875774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.876620] kthread+0x24c/0x2d0 [ 35.877209] ret_from_fork+0x10/0x20 [ 35.877882] [ 35.878255] Allocated by task 254: [ 35.878811] kasan_save_stack+0x3c/0x68 [ 35.879479] kasan_save_track+0x20/0x40 [ 35.880115] kasan_save_alloc_info+0x40/0x58 [ 35.880769] __kasan_kmalloc+0xd4/0xd8 [ 35.881388] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.882004] kasan_atomics+0xb8/0x2e8 [ 35.882655] kunit_try_run_case+0x14c/0x3d0 [ 35.883183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.884408] kthread+0x24c/0x2d0 [ 35.885141] ret_from_fork+0x10/0x20 [ 35.885849] [ 35.886262] The buggy address belongs to the object at fff00000c5f10100 [ 35.886262] which belongs to the cache kmalloc-64 of size 64 [ 35.887654] The buggy address is located 0 bytes to the right of [ 35.887654] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.889217] [ 35.889681] The buggy address belongs to the physical page: [ 35.890316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.891409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.892297] page_type: f5(slab) [ 35.892882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.893900] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.894862] page dumped because: kasan: bad access detected [ 35.895679] [ 35.896072] Memory state around the buggy address: [ 35.896870] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.897831] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.898764] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.899761] ^ [ 35.900474] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.901414] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.902358] ================================================================== [ 37.959057] ================================================================== [ 37.959974] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.961208] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.962271] [ 37.962704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.964081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.964726] Hardware name: linux,dummy-virt (DT) [ 37.965557] Call trace: [ 37.966194] show_stack+0x20/0x38 (C) [ 37.966959] dump_stack_lvl+0x8c/0xd0 [ 37.967752] print_report+0x118/0x5e0 [ 37.968385] kasan_report+0xc8/0x118 [ 37.969228] kasan_check_range+0x100/0x1a8 [ 37.969680] __kasan_check_write+0x20/0x30 [ 37.970367] kasan_atomics_helper+0x175c/0x4858 [ 37.971226] kasan_atomics+0x198/0x2e8 [ 37.971853] kunit_try_run_case+0x14c/0x3d0 [ 37.972613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.973406] kthread+0x24c/0x2d0 [ 37.974064] ret_from_fork+0x10/0x20 [ 37.974716] [ 37.975093] Allocated by task 254: [ 37.975729] kasan_save_stack+0x3c/0x68 [ 37.976304] kasan_save_track+0x20/0x40 [ 37.976997] kasan_save_alloc_info+0x40/0x58 [ 37.977737] __kasan_kmalloc+0xd4/0xd8 [ 37.978385] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.979174] kasan_atomics+0xb8/0x2e8 [ 37.979797] kunit_try_run_case+0x14c/0x3d0 [ 37.980409] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.981248] kthread+0x24c/0x2d0 [ 37.981834] ret_from_fork+0x10/0x20 [ 37.982481] [ 37.982880] The buggy address belongs to the object at fff00000c5f10100 [ 37.982880] which belongs to the cache kmalloc-64 of size 64 [ 37.984212] The buggy address is located 0 bytes to the right of [ 37.984212] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.985605] [ 37.986026] The buggy address belongs to the physical page: [ 37.986652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.987765] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.988486] page_type: f5(slab) [ 37.989111] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.989940] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.990996] page dumped because: kasan: bad access detected [ 37.991804] [ 37.992188] Memory state around the buggy address: [ 37.992721] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.993663] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.994448] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.995207] ^ [ 37.995933] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.996812] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.997698] ================================================================== [ 36.774802] ================================================================== [ 36.775747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 36.776463] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.777406] [ 36.777843] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.779014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.779658] Hardware name: linux,dummy-virt (DT) [ 36.780267] Call trace: [ 36.780664] show_stack+0x20/0x38 (C) [ 36.781313] dump_stack_lvl+0x8c/0xd0 [ 36.781985] print_report+0x118/0x5e0 [ 36.782483] kasan_report+0xc8/0x118 [ 36.783162] kasan_check_range+0x100/0x1a8 [ 36.783817] __kasan_check_write+0x20/0x30 [ 36.784499] kasan_atomics_helper+0xca0/0x4858 [ 36.785233] kasan_atomics+0x198/0x2e8 [ 36.785945] kunit_try_run_case+0x14c/0x3d0 [ 36.786518] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.787311] kthread+0x24c/0x2d0 [ 36.787903] ret_from_fork+0x10/0x20 [ 36.788493] [ 36.788888] Allocated by task 254: [ 36.789406] kasan_save_stack+0x3c/0x68 [ 36.789981] kasan_save_track+0x20/0x40 [ 36.790642] kasan_save_alloc_info+0x40/0x58 [ 36.791293] __kasan_kmalloc+0xd4/0xd8 [ 36.791942] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.792614] kasan_atomics+0xb8/0x2e8 [ 36.793172] kunit_try_run_case+0x14c/0x3d0 [ 36.793902] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.794631] kthread+0x24c/0x2d0 [ 36.795210] ret_from_fork+0x10/0x20 [ 36.795715] [ 36.796096] The buggy address belongs to the object at fff00000c5f10100 [ 36.796096] which belongs to the cache kmalloc-64 of size 64 [ 36.797287] The buggy address is located 0 bytes to the right of [ 36.797287] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.798645] [ 36.799024] The buggy address belongs to the physical page: [ 36.799778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.800645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.801437] page_type: f5(slab) [ 36.802031] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.803005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.803841] page dumped because: kasan: bad access detected [ 36.804614] [ 36.804993] Memory state around the buggy address: [ 36.805696] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.806494] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.807264] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.808190] ^ [ 36.808825] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.809358] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.810040] ================================================================== [ 35.655480] ================================================================== [ 35.656402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 35.657176] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.658996] [ 35.659404] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.660499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.661139] Hardware name: linux,dummy-virt (DT) [ 35.662204] Call trace: [ 35.662667] show_stack+0x20/0x38 (C) [ 35.663209] dump_stack_lvl+0x8c/0xd0 [ 35.663887] print_report+0x118/0x5e0 [ 35.664549] kasan_report+0xc8/0x118 [ 35.665082] kasan_check_range+0x100/0x1a8 [ 35.665785] __kasan_check_read+0x20/0x30 [ 35.666373] kasan_atomics_helper+0x2b0/0x4858 [ 35.667358] kasan_atomics+0x198/0x2e8 [ 35.667972] kunit_try_run_case+0x14c/0x3d0 [ 35.668626] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.669275] kthread+0x24c/0x2d0 [ 35.670184] ret_from_fork+0x10/0x20 [ 35.670858] [ 35.671214] Allocated by task 254: [ 35.671808] kasan_save_stack+0x3c/0x68 [ 35.672412] kasan_save_track+0x20/0x40 [ 35.672969] kasan_save_alloc_info+0x40/0x58 [ 35.674732] __kasan_kmalloc+0xd4/0xd8 [ 35.675323] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.675913] kasan_atomics+0xb8/0x2e8 [ 35.676867] kunit_try_run_case+0x14c/0x3d0 [ 35.677447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.678389] kthread+0x24c/0x2d0 [ 35.679170] ret_from_fork+0x10/0x20 [ 35.679917] [ 35.680341] The buggy address belongs to the object at fff00000c5f10100 [ 35.680341] which belongs to the cache kmalloc-64 of size 64 [ 35.681729] The buggy address is located 0 bytes to the right of [ 35.681729] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.683361] [ 35.683777] The buggy address belongs to the physical page: [ 35.684684] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.685962] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.686727] page_type: f5(slab) [ 35.687299] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.688127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.689156] page dumped because: kasan: bad access detected [ 35.690146] [ 35.690510] Memory state around the buggy address: [ 35.691116] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.692036] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.692840] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.693987] ^ [ 35.694713] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.695514] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.696840] ================================================================== [ 37.843561] ================================================================== [ 37.844353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.844990] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.845925] [ 37.846752] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.848031] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.848603] Hardware name: linux,dummy-virt (DT) [ 37.849271] Call trace: [ 37.849763] show_stack+0x20/0x38 (C) [ 37.850377] dump_stack_lvl+0x8c/0xd0 [ 37.851048] print_report+0x118/0x5e0 [ 37.851705] kasan_report+0xc8/0x118 [ 37.852265] __asan_report_load8_noabort+0x20/0x30 [ 37.853023] kasan_atomics_helper+0x3df4/0x4858 [ 37.853689] kasan_atomics+0x198/0x2e8 [ 37.854335] kunit_try_run_case+0x14c/0x3d0 [ 37.855037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.855679] kthread+0x24c/0x2d0 [ 37.856277] ret_from_fork+0x10/0x20 [ 37.856931] [ 37.857273] Allocated by task 254: [ 37.857855] kasan_save_stack+0x3c/0x68 [ 37.858492] kasan_save_track+0x20/0x40 [ 37.859093] kasan_save_alloc_info+0x40/0x58 [ 37.859796] __kasan_kmalloc+0xd4/0xd8 [ 37.860368] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.861091] kasan_atomics+0xb8/0x2e8 [ 37.861742] kunit_try_run_case+0x14c/0x3d0 [ 37.862298] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.863105] kthread+0x24c/0x2d0 [ 37.863715] ret_from_fork+0x10/0x20 [ 37.864243] [ 37.864603] The buggy address belongs to the object at fff00000c5f10100 [ 37.864603] which belongs to the cache kmalloc-64 of size 64 [ 37.865892] The buggy address is located 0 bytes to the right of [ 37.865892] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.867238] [ 37.867579] The buggy address belongs to the physical page: [ 37.868346] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.869319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.870059] page_type: f5(slab) [ 37.870650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.871497] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.872389] page dumped because: kasan: bad access detected [ 37.872974] [ 37.873345] Memory state around the buggy address: [ 37.874037] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.874935] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.875771] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.876619] ^ [ 37.877315] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.878129] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.878958] ================================================================== [ 37.043863] ================================================================== [ 37.045328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 37.046411] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.047102] [ 37.047515] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.048683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.049232] Hardware name: linux,dummy-virt (DT) [ 37.049745] Call trace: [ 37.050211] show_stack+0x20/0x38 (C) [ 37.050842] dump_stack_lvl+0x8c/0xd0 [ 37.051492] print_report+0x118/0x5e0 [ 37.052008] kasan_report+0xc8/0x118 [ 37.052663] __asan_report_store8_noabort+0x20/0x30 [ 37.053378] kasan_atomics_helper+0x3e5c/0x4858 [ 37.054119] kasan_atomics+0x198/0x2e8 [ 37.054779] kunit_try_run_case+0x14c/0x3d0 [ 37.055336] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.056162] kthread+0x24c/0x2d0 [ 37.056758] ret_from_fork+0x10/0x20 [ 37.057336] [ 37.057728] Allocated by task 254: [ 37.058285] kasan_save_stack+0x3c/0x68 [ 37.058802] kasan_save_track+0x20/0x40 [ 37.059431] kasan_save_alloc_info+0x40/0x58 [ 37.060140] __kasan_kmalloc+0xd4/0xd8 [ 37.060661] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.061369] kasan_atomics+0xb8/0x2e8 [ 37.062000] kunit_try_run_case+0x14c/0x3d0 [ 37.062628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.063362] kthread+0x24c/0x2d0 [ 37.063874] ret_from_fork+0x10/0x20 [ 37.064495] [ 37.064836] The buggy address belongs to the object at fff00000c5f10100 [ 37.064836] which belongs to the cache kmalloc-64 of size 64 [ 37.066175] The buggy address is located 0 bytes to the right of [ 37.066175] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.067425] [ 37.067833] The buggy address belongs to the physical page: [ 37.068582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.069482] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.070395] page_type: f5(slab) [ 37.070927] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.071763] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.072606] page dumped because: kasan: bad access detected [ 37.073338] [ 37.073732] Memory state around the buggy address: [ 37.074325] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.075200] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.076047] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.076919] ^ [ 37.077630] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.078414] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.079152] ================================================================== [ 37.002833] ================================================================== [ 37.003643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 37.004337] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.005387] [ 37.005821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.008012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.008869] Hardware name: linux,dummy-virt (DT) [ 37.009590] Call trace: [ 37.010040] show_stack+0x20/0x38 (C) [ 37.010940] dump_stack_lvl+0x8c/0xd0 [ 37.011562] print_report+0x118/0x5e0 [ 37.012210] kasan_report+0xc8/0x118 [ 37.012815] kasan_check_range+0x100/0x1a8 [ 37.013519] __kasan_check_write+0x20/0x30 [ 37.014602] kasan_atomics_helper+0xe44/0x4858 [ 37.015267] kasan_atomics+0x198/0x2e8 [ 37.015935] kunit_try_run_case+0x14c/0x3d0 [ 37.016645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.017382] kthread+0x24c/0x2d0 [ 37.017904] ret_from_fork+0x10/0x20 [ 37.018875] [ 37.019163] Allocated by task 254: [ 37.019782] kasan_save_stack+0x3c/0x68 [ 37.020434] kasan_save_track+0x20/0x40 [ 37.021060] kasan_save_alloc_info+0x40/0x58 [ 37.021595] __kasan_kmalloc+0xd4/0xd8 [ 37.022217] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.022803] kasan_atomics+0xb8/0x2e8 [ 37.023408] kunit_try_run_case+0x14c/0x3d0 [ 37.024085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.024760] kthread+0x24c/0x2d0 [ 37.025333] ret_from_fork+0x10/0x20 [ 37.026141] [ 37.027072] The buggy address belongs to the object at fff00000c5f10100 [ 37.027072] which belongs to the cache kmalloc-64 of size 64 [ 37.029186] The buggy address is located 0 bytes to the right of [ 37.029186] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.030743] [ 37.030991] The buggy address belongs to the physical page: [ 37.031708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.032753] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.033478] page_type: f5(slab) [ 37.034067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.034978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.035968] page dumped because: kasan: bad access detected [ 37.036625] [ 37.037006] Memory state around the buggy address: [ 37.037714] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.038491] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.039439] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.040211] ^ [ 37.040942] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.041889] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.042703] ================================================================== [ 35.904505] ================================================================== [ 35.905169] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 35.906121] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.907036] [ 35.907488] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.908621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.909311] Hardware name: linux,dummy-virt (DT) [ 35.910063] Call trace: [ 35.910491] show_stack+0x20/0x38 (C) [ 35.911165] dump_stack_lvl+0x8c/0xd0 [ 35.911865] print_report+0x118/0x5e0 [ 35.912490] kasan_report+0xc8/0x118 [ 35.913192] kasan_check_range+0x100/0x1a8 [ 35.913835] __kasan_check_write+0x20/0x30 [ 35.914588] kasan_atomics_helper+0x47c/0x4858 [ 35.915211] kasan_atomics+0x198/0x2e8 [ 35.915929] kunit_try_run_case+0x14c/0x3d0 [ 35.916579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.917388] kthread+0x24c/0x2d0 [ 35.918009] ret_from_fork+0x10/0x20 [ 35.918677] [ 35.919093] Allocated by task 254: [ 35.919607] kasan_save_stack+0x3c/0x68 [ 35.920288] kasan_save_track+0x20/0x40 [ 35.920884] kasan_save_alloc_info+0x40/0x58 [ 35.921558] __kasan_kmalloc+0xd4/0xd8 [ 35.922216] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.922831] kasan_atomics+0xb8/0x2e8 [ 35.923478] kunit_try_run_case+0x14c/0x3d0 [ 35.924140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.924938] kthread+0x24c/0x2d0 [ 35.925568] ret_from_fork+0x10/0x20 [ 35.926136] [ 35.926514] The buggy address belongs to the object at fff00000c5f10100 [ 35.926514] which belongs to the cache kmalloc-64 of size 64 [ 35.927802] The buggy address is located 0 bytes to the right of [ 35.927802] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.929237] [ 35.929674] The buggy address belongs to the physical page: [ 35.930393] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.931480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.932373] page_type: f5(slab) [ 35.933001] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.933978] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.934954] page dumped because: kasan: bad access detected [ 35.935641] [ 35.936061] Memory state around the buggy address: [ 35.936727] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.937557] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.938501] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.939331] ^ [ 35.940028] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.940907] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.941802] ================================================================== [ 37.768216] ================================================================== [ 37.769083] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 37.770791] Read of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.771666] [ 37.772142] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.773321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.773617] Hardware name: linux,dummy-virt (DT) [ 37.773886] Call trace: [ 37.774078] show_stack+0x20/0x38 (C) [ 37.774346] dump_stack_lvl+0x8c/0xd0 [ 37.774720] print_report+0x118/0x5e0 [ 37.775653] kasan_report+0xc8/0x118 [ 37.776313] __asan_report_load8_noabort+0x20/0x30 [ 37.776983] kasan_atomics_helper+0x3db0/0x4858 [ 37.777556] kasan_atomics+0x198/0x2e8 [ 37.778207] kunit_try_run_case+0x14c/0x3d0 [ 37.778922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.779753] kthread+0x24c/0x2d0 [ 37.780380] ret_from_fork+0x10/0x20 [ 37.781036] [ 37.781405] Allocated by task 254: [ 37.782000] kasan_save_stack+0x3c/0x68 [ 37.782648] kasan_save_track+0x20/0x40 [ 37.783179] kasan_save_alloc_info+0x40/0x58 [ 37.783797] __kasan_kmalloc+0xd4/0xd8 [ 37.784432] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.785155] kasan_atomics+0xb8/0x2e8 [ 37.785792] kunit_try_run_case+0x14c/0x3d0 [ 37.786358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.787162] kthread+0x24c/0x2d0 [ 37.787645] ret_from_fork+0x10/0x20 [ 37.788266] [ 37.788650] The buggy address belongs to the object at fff00000c5f10100 [ 37.788650] which belongs to the cache kmalloc-64 of size 64 [ 37.789889] The buggy address is located 0 bytes to the right of [ 37.789889] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.791077] [ 37.791463] The buggy address belongs to the physical page: [ 37.792244] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.793196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.794098] page_type: f5(slab) [ 37.794687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.795451] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.796435] page dumped because: kasan: bad access detected [ 37.797104] [ 37.797479] Memory state around the buggy address: [ 37.798014] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.798889] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.799760] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.800616] ^ [ 37.801273] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.802162] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.803008] ================================================================== [ 35.611308] ================================================================== [ 35.612244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 35.613170] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.614828] [ 35.615171] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.616889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.617548] Hardware name: linux,dummy-virt (DT) [ 35.618446] Call trace: [ 35.619040] show_stack+0x20/0x38 (C) [ 35.619735] dump_stack_lvl+0x8c/0xd0 [ 35.620437] print_report+0x118/0x5e0 [ 35.621114] kasan_report+0xc8/0x118 [ 35.621850] kasan_check_range+0x100/0x1a8 [ 35.622724] __kasan_check_write+0x20/0x30 [ 35.623380] kasan_atomics_helper+0x24c/0x4858 [ 35.624158] kasan_atomics+0x198/0x2e8 [ 35.624828] kunit_try_run_case+0x14c/0x3d0 [ 35.625883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.626713] kthread+0x24c/0x2d0 [ 35.627190] ret_from_fork+0x10/0x20 [ 35.627850] [ 35.628191] Allocated by task 254: [ 35.628781] kasan_save_stack+0x3c/0x68 [ 35.629385] kasan_save_track+0x20/0x40 [ 35.630021] kasan_save_alloc_info+0x40/0x58 [ 35.631098] __kasan_kmalloc+0xd4/0xd8 [ 35.631731] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.632449] kasan_atomics+0xb8/0x2e8 [ 35.633131] kunit_try_run_case+0x14c/0x3d0 [ 35.633471] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.634375] kthread+0x24c/0x2d0 [ 35.635839] ret_from_fork+0x10/0x20 [ 35.636428] [ 35.636830] The buggy address belongs to the object at fff00000c5f10100 [ 35.636830] which belongs to the cache kmalloc-64 of size 64 [ 35.638447] The buggy address is located 0 bytes to the right of [ 35.638447] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.639685] [ 35.640116] The buggy address belongs to the physical page: [ 35.640975] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.642294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.643214] page_type: f5(slab) [ 35.643604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.644802] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.645654] page dumped because: kasan: bad access detected [ 35.646224] [ 35.646861] Memory state around the buggy address: [ 35.647576] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.648391] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.649280] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.650458] ^ [ 35.651047] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.651918] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.652817] ================================================================== [ 35.985927] ================================================================== [ 35.986840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.987666] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.988485] [ 35.988898] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.990045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.990680] Hardware name: linux,dummy-virt (DT) [ 35.991190] Call trace: [ 35.991681] show_stack+0x20/0x38 (C) [ 35.992356] dump_stack_lvl+0x8c/0xd0 [ 35.992938] print_report+0x118/0x5e0 [ 35.993610] kasan_report+0xc8/0x118 [ 35.994246] kasan_check_range+0x100/0x1a8 [ 35.994807] __kasan_check_write+0x20/0x30 [ 35.995496] kasan_atomics_helper+0x54c/0x4858 [ 35.996243] kasan_atomics+0x198/0x2e8 [ 35.996803] kunit_try_run_case+0x14c/0x3d0 [ 35.997433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998274] kthread+0x24c/0x2d0 [ 35.998904] ret_from_fork+0x10/0x20 [ 35.999619] [ 35.999996] Allocated by task 254: [ 36.000463] kasan_save_stack+0x3c/0x68 [ 36.001708] kasan_save_track+0x20/0x40 [ 36.002350] kasan_save_alloc_info+0x40/0x58 [ 36.002941] __kasan_kmalloc+0xd4/0xd8 [ 36.003588] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.004152] kasan_atomics+0xb8/0x2e8 [ 36.004784] kunit_try_run_case+0x14c/0x3d0 [ 36.005446] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.006206] kthread+0x24c/0x2d0 [ 36.006803] ret_from_fork+0x10/0x20 [ 36.007368] [ 36.007763] The buggy address belongs to the object at fff00000c5f10100 [ 36.007763] which belongs to the cache kmalloc-64 of size 64 [ 36.009061] The buggy address is located 0 bytes to the right of [ 36.009061] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.010360] [ 36.010730] The buggy address belongs to the physical page: [ 36.011449] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.012481] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.013385] page_type: f5(slab) [ 36.013918] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.014806] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.015632] page dumped because: kasan: bad access detected [ 36.016396] [ 36.016786] Memory state around the buggy address: [ 36.017341] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.018233] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.018898] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.019863] ^ [ 36.020593] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.021344] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.022222] ================================================================== [ 36.181374] ================================================================== [ 36.182156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 36.183155] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.184140] [ 36.184514] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.185634] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.186265] Hardware name: linux,dummy-virt (DT) [ 36.187052] Call trace: [ 36.187546] show_stack+0x20/0x38 (C) [ 36.188212] dump_stack_lvl+0x8c/0xd0 [ 36.189099] print_report+0x118/0x5e0 [ 36.189785] kasan_report+0xc8/0x118 [ 36.190459] kasan_check_range+0x100/0x1a8 [ 36.191157] __kasan_check_write+0x20/0x30 [ 36.192017] kasan_atomics_helper+0x760/0x4858 [ 36.192848] kasan_atomics+0x198/0x2e8 [ 36.193870] kunit_try_run_case+0x14c/0x3d0 [ 36.194729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.195608] kthread+0x24c/0x2d0 [ 36.196132] ret_from_fork+0x10/0x20 [ 36.196974] [ 36.197291] Allocated by task 254: [ 36.197889] kasan_save_stack+0x3c/0x68 [ 36.198517] kasan_save_track+0x20/0x40 [ 36.199242] kasan_save_alloc_info+0x40/0x58 [ 36.199974] __kasan_kmalloc+0xd4/0xd8 [ 36.200618] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.201239] kasan_atomics+0xb8/0x2e8 [ 36.201899] kunit_try_run_case+0x14c/0x3d0 [ 36.202629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.203323] kthread+0x24c/0x2d0 [ 36.203948] ret_from_fork+0x10/0x20 [ 36.204596] [ 36.204976] The buggy address belongs to the object at fff00000c5f10100 [ 36.204976] which belongs to the cache kmalloc-64 of size 64 [ 36.206196] The buggy address is located 0 bytes to the right of [ 36.206196] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.207689] [ 36.208118] The buggy address belongs to the physical page: [ 36.208858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.209995] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.210859] page_type: f5(slab) [ 36.211416] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.212376] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.213275] page dumped because: kasan: bad access detected [ 36.213905] [ 36.214319] Memory state around the buggy address: [ 36.215058] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.215876] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.216793] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.217722] ^ [ 36.218304] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.219261] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.220104] ================================================================== [ 37.384627] ================================================================== [ 37.385394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 37.386272] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.387139] [ 37.387564] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.388678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.389310] Hardware name: linux,dummy-virt (DT) [ 37.389955] Call trace: [ 37.390427] show_stack+0x20/0x38 (C) [ 37.391099] dump_stack_lvl+0x8c/0xd0 [ 37.391776] print_report+0x118/0x5e0 [ 37.392308] kasan_report+0xc8/0x118 [ 37.392972] kasan_check_range+0x100/0x1a8 [ 37.393576] __kasan_check_write+0x20/0x30 [ 37.394278] kasan_atomics_helper+0x11f8/0x4858 [ 37.395023] kasan_atomics+0x198/0x2e8 [ 37.395705] kunit_try_run_case+0x14c/0x3d0 [ 37.396246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.397094] kthread+0x24c/0x2d0 [ 37.397736] ret_from_fork+0x10/0x20 [ 37.398296] [ 37.398695] Allocated by task 254: [ 37.399288] kasan_save_stack+0x3c/0x68 [ 37.399796] kasan_save_track+0x20/0x40 [ 37.400438] kasan_save_alloc_info+0x40/0x58 [ 37.401019] __kasan_kmalloc+0xd4/0xd8 [ 37.401669] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.402212] kasan_atomics+0xb8/0x2e8 [ 37.402850] kunit_try_run_case+0x14c/0x3d0 [ 37.403516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.404226] kthread+0x24c/0x2d0 [ 37.404833] ret_from_fork+0x10/0x20 [ 37.405398] [ 37.405788] The buggy address belongs to the object at fff00000c5f10100 [ 37.405788] which belongs to the cache kmalloc-64 of size 64 [ 37.407059] The buggy address is located 0 bytes to the right of [ 37.407059] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.408362] [ 37.408768] The buggy address belongs to the physical page: [ 37.409380] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.410318] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.411177] page_type: f5(slab) [ 37.411771] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.412643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.413496] page dumped because: kasan: bad access detected [ 37.414273] [ 37.414637] Memory state around the buggy address: [ 37.415163] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.416050] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.416958] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.417819] ^ [ 37.418507] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.419357] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.420322] ================================================================== [ 37.650170] ================================================================== [ 37.650850] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 37.651770] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.652577] [ 37.652973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.654154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.654793] Hardware name: linux,dummy-virt (DT) [ 37.655463] Call trace: [ 37.655953] show_stack+0x20/0x38 (C) [ 37.656496] dump_stack_lvl+0x8c/0xd0 [ 37.657177] print_report+0x118/0x5e0 [ 37.657750] kasan_report+0xc8/0x118 [ 37.658390] kasan_check_range+0x100/0x1a8 [ 37.659144] __kasan_check_write+0x20/0x30 [ 37.659716] kasan_atomics_helper+0x14e4/0x4858 [ 37.660471] kasan_atomics+0x198/0x2e8 [ 37.661942] kunit_try_run_case+0x14c/0x3d0 [ 37.662725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.663615] kthread+0x24c/0x2d0 [ 37.664199] ret_from_fork+0x10/0x20 [ 37.664860] [ 37.665266] Allocated by task 254: [ 37.665768] kasan_save_stack+0x3c/0x68 [ 37.666440] kasan_save_track+0x20/0x40 [ 37.667143] kasan_save_alloc_info+0x40/0x58 [ 37.667888] __kasan_kmalloc+0xd4/0xd8 [ 37.668478] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.669118] kasan_atomics+0xb8/0x2e8 [ 37.669673] kunit_try_run_case+0x14c/0x3d0 [ 37.670390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.671187] kthread+0x24c/0x2d0 [ 37.671830] ret_from_fork+0x10/0x20 [ 37.672398] [ 37.672795] The buggy address belongs to the object at fff00000c5f10100 [ 37.672795] which belongs to the cache kmalloc-64 of size 64 [ 37.674112] The buggy address is located 0 bytes to the right of [ 37.674112] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.675479] [ 37.675924] The buggy address belongs to the physical page: [ 37.676621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.677585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.678347] page_type: f5(slab) [ 37.678953] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.679823] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.680805] page dumped because: kasan: bad access detected [ 37.681486] [ 37.681920] Memory state around the buggy address: [ 37.682591] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.683575] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.684371] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.685288] ^ [ 37.685942] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.686846] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.687712] ================================================================== [ 36.338609] ================================================================== [ 36.339746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 36.340461] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 36.341960] [ 36.342332] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 36.343664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.344222] Hardware name: linux,dummy-virt (DT) [ 36.344890] Call trace: [ 36.345392] show_stack+0x20/0x38 (C) [ 36.346072] dump_stack_lvl+0x8c/0xd0 [ 36.346701] print_report+0x118/0x5e0 [ 36.347404] kasan_report+0xc8/0x118 [ 36.348048] kasan_check_range+0x100/0x1a8 [ 36.348797] __kasan_check_write+0x20/0x30 [ 36.349484] kasan_atomics_helper+0x934/0x4858 [ 36.350253] kasan_atomics+0x198/0x2e8 [ 36.350916] kunit_try_run_case+0x14c/0x3d0 [ 36.351444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.352330] kthread+0x24c/0x2d0 [ 36.352940] ret_from_fork+0x10/0x20 [ 36.353573] [ 36.353903] Allocated by task 254: [ 36.354405] kasan_save_stack+0x3c/0x68 [ 36.355011] kasan_save_track+0x20/0x40 [ 36.355584] kasan_save_alloc_info+0x40/0x58 [ 36.356174] __kasan_kmalloc+0xd4/0xd8 [ 36.356825] __kmalloc_cache_noprof+0x15c/0x3c8 [ 36.357353] kasan_atomics+0xb8/0x2e8 [ 36.357988] kunit_try_run_case+0x14c/0x3d0 [ 36.358683] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.359489] kthread+0x24c/0x2d0 [ 36.360081] ret_from_fork+0x10/0x20 [ 36.360649] [ 36.361030] The buggy address belongs to the object at fff00000c5f10100 [ 36.361030] which belongs to the cache kmalloc-64 of size 64 [ 36.362329] The buggy address is located 0 bytes to the right of [ 36.362329] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 36.363688] [ 36.364075] The buggy address belongs to the physical page: [ 36.364867] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 36.365759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.366650] page_type: f5(slab) [ 36.367195] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.368168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.368948] page dumped because: kasan: bad access detected [ 36.369770] [ 36.370147] Memory state around the buggy address: [ 36.370858] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.371707] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 36.372552] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.373357] ^ [ 36.374093] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.374910] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.375739] ================================================================== [ 35.568148] ================================================================== [ 35.569101] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 35.569926] Read of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.570948] [ 35.571398] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.572732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.573362] Hardware name: linux,dummy-virt (DT) [ 35.574331] Call trace: [ 35.574878] show_stack+0x20/0x38 (C) [ 35.575618] dump_stack_lvl+0x8c/0xd0 [ 35.576388] print_report+0x118/0x5e0 [ 35.577046] kasan_report+0xc8/0x118 [ 35.578160] kasan_check_range+0x100/0x1a8 [ 35.579009] __kasan_check_read+0x20/0x30 [ 35.579612] kasan_atomics_helper+0x1ec/0x4858 [ 35.580215] kasan_atomics+0x198/0x2e8 [ 35.580907] kunit_try_run_case+0x14c/0x3d0 [ 35.582003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.582864] kthread+0x24c/0x2d0 [ 35.583378] ret_from_fork+0x10/0x20 [ 35.584030] [ 35.584404] Allocated by task 254: [ 35.584986] kasan_save_stack+0x3c/0x68 [ 35.585554] kasan_save_track+0x20/0x40 [ 35.586618] kasan_save_alloc_info+0x40/0x58 [ 35.588008] __kasan_kmalloc+0xd4/0xd8 [ 35.588625] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.589457] kasan_atomics+0xb8/0x2e8 [ 35.590335] kunit_try_run_case+0x14c/0x3d0 [ 35.590989] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.591846] kthread+0x24c/0x2d0 [ 35.592432] ret_from_fork+0x10/0x20 [ 35.593095] [ 35.593521] The buggy address belongs to the object at fff00000c5f10100 [ 35.593521] which belongs to the cache kmalloc-64 of size 64 [ 35.595185] The buggy address is located 0 bytes to the right of [ 35.595185] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.596464] [ 35.597037] The buggy address belongs to the physical page: [ 35.598152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.599120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.600030] page_type: f5(slab) [ 35.600581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.601401] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.602490] page dumped because: kasan: bad access detected [ 35.603129] [ 35.603502] Memory state around the buggy address: [ 35.604191] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.605026] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.606548] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.607331] ^ [ 35.608115] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.609071] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.609948] ================================================================== [ 37.460519] ================================================================== [ 37.461263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 37.462209] Write of size 8 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 37.463056] [ 37.463465] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 37.464546] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.465218] Hardware name: linux,dummy-virt (DT) [ 37.466577] Call trace: [ 37.467016] show_stack+0x20/0x38 (C) [ 37.467592] dump_stack_lvl+0x8c/0xd0 [ 37.468262] print_report+0x118/0x5e0 [ 37.469221] kasan_report+0xc8/0x118 [ 37.469964] kasan_check_range+0x100/0x1a8 [ 37.470554] __kasan_check_write+0x20/0x30 [ 37.471202] kasan_atomics_helper+0x12d8/0x4858 [ 37.471919] kasan_atomics+0x198/0x2e8 [ 37.472643] kunit_try_run_case+0x14c/0x3d0 [ 37.473340] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.474128] kthread+0x24c/0x2d0 [ 37.474758] ret_from_fork+0x10/0x20 [ 37.475329] [ 37.475717] Allocated by task 254: [ 37.476293] kasan_save_stack+0x3c/0x68 [ 37.476874] kasan_save_track+0x20/0x40 [ 37.477419] kasan_save_alloc_info+0x40/0x58 [ 37.478118] __kasan_kmalloc+0xd4/0xd8 [ 37.478669] __kmalloc_cache_noprof+0x15c/0x3c8 [ 37.479397] kasan_atomics+0xb8/0x2e8 [ 37.479923] kunit_try_run_case+0x14c/0x3d0 [ 37.480613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.481306] kthread+0x24c/0x2d0 [ 37.481889] ret_from_fork+0x10/0x20 [ 37.482429] [ 37.482823] The buggy address belongs to the object at fff00000c5f10100 [ 37.482823] which belongs to the cache kmalloc-64 of size 64 [ 37.483952] The buggy address is located 0 bytes to the right of [ 37.483952] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 37.485342] [ 37.485746] The buggy address belongs to the physical page: [ 37.486358] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 37.487392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.488118] page_type: f5(slab) [ 37.488706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.489565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 37.490547] page dumped because: kasan: bad access detected [ 37.491200] [ 37.491587] Memory state around the buggy address: [ 37.492206] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.492986] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 37.493950] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.494851] ^ [ 37.495583] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.496434] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.497258] ================================================================== [ 35.781222] ================================================================== [ 35.782457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 35.784324] Write of size 4 at addr fff00000c5f10130 by task kunit_try_catch/254 [ 35.785392] [ 35.785894] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 35.787155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.787861] Hardware name: linux,dummy-virt (DT) [ 35.788477] Call trace: [ 35.789090] show_stack+0x20/0x38 (C) [ 35.789895] dump_stack_lvl+0x8c/0xd0 [ 35.790820] print_report+0x118/0x5e0 [ 35.791575] kasan_report+0xc8/0x118 [ 35.792307] __asan_report_store4_noabort+0x20/0x30 [ 35.793002] kasan_atomics_helper+0x3f94/0x4858 [ 35.793693] kasan_atomics+0x198/0x2e8 [ 35.794253] kunit_try_run_case+0x14c/0x3d0 [ 35.795159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.795838] kthread+0x24c/0x2d0 [ 35.796425] ret_from_fork+0x10/0x20 [ 35.797017] [ 35.797348] Allocated by task 254: [ 35.797941] kasan_save_stack+0x3c/0x68 [ 35.798455] kasan_save_track+0x20/0x40 [ 35.799150] kasan_save_alloc_info+0x40/0x58 [ 35.799773] __kasan_kmalloc+0xd4/0xd8 [ 35.800445] __kmalloc_cache_noprof+0x15c/0x3c8 [ 35.801485] kasan_atomics+0xb8/0x2e8 [ 35.802103] kunit_try_run_case+0x14c/0x3d0 [ 35.803134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.804319] kthread+0x24c/0x2d0 [ 35.804956] ret_from_fork+0x10/0x20 [ 35.805355] [ 35.805788] The buggy address belongs to the object at fff00000c5f10100 [ 35.805788] which belongs to the cache kmalloc-64 of size 64 [ 35.807223] The buggy address is located 0 bytes to the right of [ 35.807223] allocated 48-byte region [fff00000c5f10100, fff00000c5f10130) [ 35.808576] [ 35.808954] The buggy address belongs to the physical page: [ 35.809763] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105f10 [ 35.810972] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.811782] page_type: f5(slab) [ 35.812395] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.813439] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.814371] page dumped because: kasan: bad access detected [ 35.815193] [ 35.815618] Memory state around the buggy address: [ 35.816198] fff00000c5f10000: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.817169] fff00000c5f10080: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 35.817975] >fff00000c5f10100: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.818914] ^ [ 35.819682] fff00000c5f10180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.820500] fff00000c5f10200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.821405] ==================================================================
[ 31.908355] ================================================================== [ 31.908706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 31.910734] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.910734] [ 31.910734] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.910734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.910734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.910734] Call Trace: [ 31.910734] <TASK> [ 31.910734] dump_stack_lvl+0x73/0xb0 [ 31.910734] print_report+0xd1/0x640 [ 31.910734] ? __virt_addr_valid+0x1db/0x2d0 [ 31.910734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.910734] kasan_report+0x102/0x140 [ 31.910734] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.910734] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.910734] kasan_check_range+0x10c/0x1c0 [ 31.910734] __kasan_check_write+0x18/0x20 [ 31.910734] kasan_atomics_helper+0x1ce2/0x5450 [ 31.910734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.910734] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.910734] ? trace_hardirqs_on+0x37/0xe0 [ 31.910734] ? kasan_atomics+0x153/0x310 [ 31.910734] kasan_atomics+0x1dd/0x310 [ 31.910734] ? __pfx_kasan_atomics+0x10/0x10 [ 31.910734] ? __pfx_kasan_atomics+0x10/0x10 [ 31.910734] kunit_try_run_case+0x1b3/0x490 [ 31.910734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.910734] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.910734] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.910734] ? __kthread_parkme+0x82/0x160 [ 31.910734] ? preempt_count_sub+0x50/0x80 [ 31.910734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.910734] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.910734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.910734] kthread+0x257/0x310 [ 31.910734] ? __pfx_kthread+0x10/0x10 [ 31.910734] ret_from_fork+0x41/0x80 [ 31.910734] ? __pfx_kthread+0x10/0x10 [ 31.910734] ret_from_fork_asm+0x1a/0x30 [ 31.910734] </TASK> [ 31.910734] [ 31.910734] Allocated by task 274: [ 31.910734] kasan_save_stack+0x3d/0x60 [ 31.910734] kasan_save_track+0x18/0x40 [ 31.910734] kasan_save_alloc_info+0x3b/0x50 [ 31.910734] __kasan_kmalloc+0xb7/0xc0 [ 31.910734] __kmalloc_cache_noprof+0x184/0x410 [ 31.910734] kasan_atomics+0x96/0x310 [ 31.910734] kunit_try_run_case+0x1b3/0x490 [ 31.910734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.910734] kthread+0x257/0x310 [ 31.910734] ret_from_fork+0x41/0x80 [ 31.910734] ret_from_fork_asm+0x1a/0x30 [ 31.910734] [ 31.910734] The buggy address belongs to the object at ffff88810294b780 [ 31.910734] which belongs to the cache kmalloc-64 of size 64 [ 31.910734] The buggy address is located 0 bytes to the right of [ 31.910734] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.910734] [ 31.910734] The buggy address belongs to the physical page: [ 31.910734] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.910734] flags: 0x200000000000000(node=0|zone=2) [ 31.910734] page_type: f5(slab) [ 31.910734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.910734] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.910734] page dumped because: kasan: bad access detected [ 31.910734] [ 31.910734] Memory state around the buggy address: [ 31.910734] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.910734] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.910734] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.910734] ^ [ 31.910734] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.910734] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.910734] ================================================================== [ 30.395289] ================================================================== [ 30.395351] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 30.395351] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.395351] [ 30.395351] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.395351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.395351] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.395351] Call Trace: [ 30.395351] <TASK> [ 30.395351] dump_stack_lvl+0x73/0xb0 [ 30.395351] print_report+0xd1/0x640 [ 30.395351] ? __virt_addr_valid+0x1db/0x2d0 [ 30.395351] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.395351] kasan_report+0x102/0x140 [ 30.395351] ? kasan_atomics_helper+0xac8/0x5450 [ 30.395351] ? kasan_atomics_helper+0xac8/0x5450 [ 30.395351] kasan_check_range+0x10c/0x1c0 [ 30.395351] __kasan_check_write+0x18/0x20 [ 30.395351] kasan_atomics_helper+0xac8/0x5450 [ 30.395351] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.395351] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.395351] ? trace_hardirqs_on+0x37/0xe0 [ 30.395351] ? kasan_atomics+0x153/0x310 [ 30.395351] kasan_atomics+0x1dd/0x310 [ 30.395351] ? __pfx_kasan_atomics+0x10/0x10 [ 30.395351] ? __pfx_kasan_atomics+0x10/0x10 [ 30.395351] kunit_try_run_case+0x1b3/0x490 [ 30.395351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.395351] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.395351] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.395351] ? __kthread_parkme+0x82/0x160 [ 30.395351] ? preempt_count_sub+0x50/0x80 [ 30.395351] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.395351] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.395351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.395351] kthread+0x257/0x310 [ 30.395351] ? __pfx_kthread+0x10/0x10 [ 30.395351] ret_from_fork+0x41/0x80 [ 30.395351] ? __pfx_kthread+0x10/0x10 [ 30.395351] ret_from_fork_asm+0x1a/0x30 [ 30.395351] </TASK> [ 30.395351] [ 30.395351] Allocated by task 274: [ 30.395351] kasan_save_stack+0x3d/0x60 [ 30.395351] kasan_save_track+0x18/0x40 [ 30.395351] kasan_save_alloc_info+0x3b/0x50 [ 30.395351] __kasan_kmalloc+0xb7/0xc0 [ 30.395351] __kmalloc_cache_noprof+0x184/0x410 [ 30.395351] kasan_atomics+0x96/0x310 [ 30.395351] kunit_try_run_case+0x1b3/0x490 [ 30.395351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.395351] kthread+0x257/0x310 [ 30.395351] ret_from_fork+0x41/0x80 [ 30.395351] ret_from_fork_asm+0x1a/0x30 [ 30.395351] [ 30.395351] The buggy address belongs to the object at ffff88810294b780 [ 30.395351] which belongs to the cache kmalloc-64 of size 64 [ 30.395351] The buggy address is located 0 bytes to the right of [ 30.395351] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.395351] [ 30.395351] The buggy address belongs to the physical page: [ 30.395351] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.395351] flags: 0x200000000000000(node=0|zone=2) [ 30.395351] page_type: f5(slab) [ 30.395351] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.395351] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.395351] page dumped because: kasan: bad access detected [ 30.395351] [ 30.395351] Memory state around the buggy address: [ 30.395351] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.395351] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.395351] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.395351] ^ [ 30.395351] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.395351] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.395351] ================================================================== [ 31.831481] ================================================================== [ 31.832082] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 31.832337] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.832337] [ 31.832337] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.832337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.832337] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.832337] Call Trace: [ 31.832337] <TASK> [ 31.832337] dump_stack_lvl+0x73/0xb0 [ 31.832337] print_report+0xd1/0x640 [ 31.837287] ? __virt_addr_valid+0x1db/0x2d0 [ 31.837287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.837287] kasan_report+0x102/0x140 [ 31.837287] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.837287] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.837287] kasan_check_range+0x10c/0x1c0 [ 31.837287] __kasan_check_write+0x18/0x20 [ 31.837287] kasan_atomics_helper+0x1c19/0x5450 [ 31.837287] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.837287] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.837287] ? trace_hardirqs_on+0x37/0xe0 [ 31.837287] ? kasan_atomics+0x153/0x310 [ 31.837287] kasan_atomics+0x1dd/0x310 [ 31.837287] ? __pfx_kasan_atomics+0x10/0x10 [ 31.837287] ? __pfx_kasan_atomics+0x10/0x10 [ 31.837287] kunit_try_run_case+0x1b3/0x490 [ 31.837287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.837287] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.837287] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.837287] ? __kthread_parkme+0x82/0x160 [ 31.837287] ? preempt_count_sub+0x50/0x80 [ 31.837287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.837287] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.837287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.837287] kthread+0x257/0x310 [ 31.837287] ? __pfx_kthread+0x10/0x10 [ 31.837287] ret_from_fork+0x41/0x80 [ 31.837287] ? __pfx_kthread+0x10/0x10 [ 31.837287] ret_from_fork_asm+0x1a/0x30 [ 31.837287] </TASK> [ 31.837287] [ 31.837287] Allocated by task 274: [ 31.837287] kasan_save_stack+0x3d/0x60 [ 31.837287] kasan_save_track+0x18/0x40 [ 31.837287] kasan_save_alloc_info+0x3b/0x50 [ 31.837287] __kasan_kmalloc+0xb7/0xc0 [ 31.837287] __kmalloc_cache_noprof+0x184/0x410 [ 31.837287] kasan_atomics+0x96/0x310 [ 31.837287] kunit_try_run_case+0x1b3/0x490 [ 31.837287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.837287] kthread+0x257/0x310 [ 31.837287] ret_from_fork+0x41/0x80 [ 31.837287] ret_from_fork_asm+0x1a/0x30 [ 31.837287] [ 31.837287] The buggy address belongs to the object at ffff88810294b780 [ 31.837287] which belongs to the cache kmalloc-64 of size 64 [ 31.837287] The buggy address is located 0 bytes to the right of [ 31.837287] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.837287] [ 31.837287] The buggy address belongs to the physical page: [ 31.837287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.837287] flags: 0x200000000000000(node=0|zone=2) [ 31.837287] page_type: f5(slab) [ 31.837287] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.837287] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.837287] page dumped because: kasan: bad access detected [ 31.837287] [ 31.837287] Memory state around the buggy address: [ 31.837287] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.837287] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.837287] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.837287] ^ [ 31.837287] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.837287] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.837287] ================================================================== [ 31.870865] ================================================================== [ 31.871579] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 31.871579] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.871579] [ 31.871579] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.871579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.871579] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.871579] Call Trace: [ 31.871579] <TASK> [ 31.871579] dump_stack_lvl+0x73/0xb0 [ 31.871579] print_report+0xd1/0x640 [ 31.871579] ? __virt_addr_valid+0x1db/0x2d0 [ 31.871579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.871579] kasan_report+0x102/0x140 [ 31.871579] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.871579] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.871579] __asan_report_load8_noabort+0x18/0x20 [ 31.871579] kasan_atomics_helper+0x4f32/0x5450 [ 31.871579] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.871579] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.871579] ? trace_hardirqs_on+0x37/0xe0 [ 31.871579] ? kasan_atomics+0x153/0x310 [ 31.871579] kasan_atomics+0x1dd/0x310 [ 31.871579] ? __pfx_kasan_atomics+0x10/0x10 [ 31.871579] ? __pfx_kasan_atomics+0x10/0x10 [ 31.871579] kunit_try_run_case+0x1b3/0x490 [ 31.871579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.871579] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.871579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.871579] ? __kthread_parkme+0x82/0x160 [ 31.871579] ? preempt_count_sub+0x50/0x80 [ 31.871579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.871579] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.871579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.871579] kthread+0x257/0x310 [ 31.871579] ? __pfx_kthread+0x10/0x10 [ 31.871579] ret_from_fork+0x41/0x80 [ 31.871579] ? __pfx_kthread+0x10/0x10 [ 31.871579] ret_from_fork_asm+0x1a/0x30 [ 31.871579] </TASK> [ 31.871579] [ 31.871579] Allocated by task 274: [ 31.871579] kasan_save_stack+0x3d/0x60 [ 31.871579] kasan_save_track+0x18/0x40 [ 31.871579] kasan_save_alloc_info+0x3b/0x50 [ 31.871579] __kasan_kmalloc+0xb7/0xc0 [ 31.871579] __kmalloc_cache_noprof+0x184/0x410 [ 31.871579] kasan_atomics+0x96/0x310 [ 31.871579] kunit_try_run_case+0x1b3/0x490 [ 31.871579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.871579] kthread+0x257/0x310 [ 31.871579] ret_from_fork+0x41/0x80 [ 31.871579] ret_from_fork_asm+0x1a/0x30 [ 31.871579] [ 31.871579] The buggy address belongs to the object at ffff88810294b780 [ 31.871579] which belongs to the cache kmalloc-64 of size 64 [ 31.871579] The buggy address is located 0 bytes to the right of [ 31.871579] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.871579] [ 31.871579] The buggy address belongs to the physical page: [ 31.871579] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.871579] flags: 0x200000000000000(node=0|zone=2) [ 31.871579] page_type: f5(slab) [ 31.871579] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.871579] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.871579] page dumped because: kasan: bad access detected [ 31.871579] [ 31.871579] Memory state around the buggy address: [ 31.871579] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.871579] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.871579] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.871579] ^ [ 31.871579] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.871579] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.871579] ================================================================== [ 31.542010] ================================================================== [ 31.543477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 31.543477] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.543477] [ 31.543477] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.543477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.543477] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.543477] Call Trace: [ 31.543477] <TASK> [ 31.543477] dump_stack_lvl+0x73/0xb0 [ 31.543477] print_report+0xd1/0x640 [ 31.543477] ? __virt_addr_valid+0x1db/0x2d0 [ 31.543477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.543477] kasan_report+0x102/0x140 [ 31.543477] ? kasan_atomics_helper+0x1780/0x5450 [ 31.543477] ? kasan_atomics_helper+0x1780/0x5450 [ 31.543477] kasan_check_range+0x10c/0x1c0 [ 31.543477] __kasan_check_write+0x18/0x20 [ 31.543477] kasan_atomics_helper+0x1780/0x5450 [ 31.543477] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.543477] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.543477] ? trace_hardirqs_on+0x37/0xe0 [ 31.543477] ? kasan_atomics+0x153/0x310 [ 31.543477] kasan_atomics+0x1dd/0x310 [ 31.543477] ? __pfx_kasan_atomics+0x10/0x10 [ 31.543477] ? __pfx_kasan_atomics+0x10/0x10 [ 31.543477] kunit_try_run_case+0x1b3/0x490 [ 31.543477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.543477] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.543477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.543477] ? __kthread_parkme+0x82/0x160 [ 31.543477] ? preempt_count_sub+0x50/0x80 [ 31.543477] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.543477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.543477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.543477] kthread+0x257/0x310 [ 31.543477] ? __pfx_kthread+0x10/0x10 [ 31.543477] ret_from_fork+0x41/0x80 [ 31.543477] ? __pfx_kthread+0x10/0x10 [ 31.543477] ret_from_fork_asm+0x1a/0x30 [ 31.543477] </TASK> [ 31.543477] [ 31.543477] Allocated by task 274: [ 31.543477] kasan_save_stack+0x3d/0x60 [ 31.543477] kasan_save_track+0x18/0x40 [ 31.543477] kasan_save_alloc_info+0x3b/0x50 [ 31.543477] __kasan_kmalloc+0xb7/0xc0 [ 31.543477] __kmalloc_cache_noprof+0x184/0x410 [ 31.543477] kasan_atomics+0x96/0x310 [ 31.543477] kunit_try_run_case+0x1b3/0x490 [ 31.543477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.543477] kthread+0x257/0x310 [ 31.543477] ret_from_fork+0x41/0x80 [ 31.543477] ret_from_fork_asm+0x1a/0x30 [ 31.543477] [ 31.543477] The buggy address belongs to the object at ffff88810294b780 [ 31.543477] which belongs to the cache kmalloc-64 of size 64 [ 31.543477] The buggy address is located 0 bytes to the right of [ 31.543477] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.543477] [ 31.543477] The buggy address belongs to the physical page: [ 31.543477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.543477] flags: 0x200000000000000(node=0|zone=2) [ 31.543477] page_type: f5(slab) [ 31.543477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.543477] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.543477] page dumped because: kasan: bad access detected [ 31.543477] [ 31.543477] Memory state around the buggy address: [ 31.543477] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.543477] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.543477] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.543477] ^ [ 31.543477] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.543477] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.543477] ================================================================== [ 32.285995] ================================================================== [ 32.288408] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 32.288408] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.288408] [ 32.288408] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.288408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.288408] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.288408] Call Trace: [ 32.288408] <TASK> [ 32.288408] dump_stack_lvl+0x73/0xb0 [ 32.288408] print_report+0xd1/0x640 [ 32.288408] ? __virt_addr_valid+0x1db/0x2d0 [ 32.288408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.288408] kasan_report+0x102/0x140 [ 32.288408] ? kasan_atomics_helper+0x4fb4/0x5450 [ 32.288408] ? kasan_atomics_helper+0x4fb4/0x5450 [ 32.288408] __asan_report_load8_noabort+0x18/0x20 [ 32.288408] kasan_atomics_helper+0x4fb4/0x5450 [ 32.288408] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.288408] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.288408] ? trace_hardirqs_on+0x37/0xe0 [ 32.288408] ? kasan_atomics+0x153/0x310 [ 32.288408] kasan_atomics+0x1dd/0x310 [ 32.288408] ? __pfx_kasan_atomics+0x10/0x10 [ 32.288408] ? __pfx_kasan_atomics+0x10/0x10 [ 32.288408] kunit_try_run_case+0x1b3/0x490 [ 32.288408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.288408] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.288408] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.288408] ? __kthread_parkme+0x82/0x160 [ 32.288408] ? preempt_count_sub+0x50/0x80 [ 32.288408] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.288408] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.288408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.288408] kthread+0x257/0x310 [ 32.288408] ? __pfx_kthread+0x10/0x10 [ 32.288408] ret_from_fork+0x41/0x80 [ 32.288408] ? __pfx_kthread+0x10/0x10 [ 32.288408] ret_from_fork_asm+0x1a/0x30 [ 32.288408] </TASK> [ 32.288408] [ 32.288408] Allocated by task 274: [ 32.288408] kasan_save_stack+0x3d/0x60 [ 32.288408] kasan_save_track+0x18/0x40 [ 32.288408] kasan_save_alloc_info+0x3b/0x50 [ 32.288408] __kasan_kmalloc+0xb7/0xc0 [ 32.288408] __kmalloc_cache_noprof+0x184/0x410 [ 32.288408] kasan_atomics+0x96/0x310 [ 32.288408] kunit_try_run_case+0x1b3/0x490 [ 32.288408] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.288408] kthread+0x257/0x310 [ 32.288408] ret_from_fork+0x41/0x80 [ 32.288408] ret_from_fork_asm+0x1a/0x30 [ 32.288408] [ 32.288408] The buggy address belongs to the object at ffff88810294b780 [ 32.288408] which belongs to the cache kmalloc-64 of size 64 [ 32.288408] The buggy address is located 0 bytes to the right of [ 32.288408] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.288408] [ 32.288408] The buggy address belongs to the physical page: [ 32.288408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.288408] flags: 0x200000000000000(node=0|zone=2) [ 32.288408] page_type: f5(slab) [ 32.288408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.288408] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.288408] page dumped because: kasan: bad access detected [ 32.288408] [ 32.288408] Memory state around the buggy address: [ 32.288408] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.288408] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.288408] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.288408] ^ [ 32.288408] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.288408] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.288408] ================================================================== [ 31.093479] ================================================================== [ 31.093905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 31.094312] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.094312] [ 31.094312] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.094312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.094312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.094312] Call Trace: [ 31.094312] <TASK> [ 31.094312] dump_stack_lvl+0x73/0xb0 [ 31.094312] print_report+0xd1/0x640 [ 31.094312] ? __virt_addr_valid+0x1db/0x2d0 [ 31.094312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.094312] kasan_report+0x102/0x140 [ 31.094312] ? kasan_atomics_helper+0x12e7/0x5450 [ 31.094312] ? kasan_atomics_helper+0x12e7/0x5450 [ 31.094312] kasan_check_range+0x10c/0x1c0 [ 31.094312] __kasan_check_write+0x18/0x20 [ 31.094312] kasan_atomics_helper+0x12e7/0x5450 [ 31.094312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.094312] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.094312] ? trace_hardirqs_on+0x37/0xe0 [ 31.094312] ? kasan_atomics+0x153/0x310 [ 31.094312] kasan_atomics+0x1dd/0x310 [ 31.094312] ? __pfx_kasan_atomics+0x10/0x10 [ 31.094312] ? __pfx_kasan_atomics+0x10/0x10 [ 31.094312] kunit_try_run_case+0x1b3/0x490 [ 31.094312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.094312] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.094312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.094312] ? __kthread_parkme+0x82/0x160 [ 31.094312] ? preempt_count_sub+0x50/0x80 [ 31.094312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.094312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.094312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.094312] kthread+0x257/0x310 [ 31.094312] ? __pfx_kthread+0x10/0x10 [ 31.094312] ret_from_fork+0x41/0x80 [ 31.094312] ? __pfx_kthread+0x10/0x10 [ 31.094312] ret_from_fork_asm+0x1a/0x30 [ 31.094312] </TASK> [ 31.094312] [ 31.094312] Allocated by task 274: [ 31.094312] kasan_save_stack+0x3d/0x60 [ 31.094312] kasan_save_track+0x18/0x40 [ 31.094312] kasan_save_alloc_info+0x3b/0x50 [ 31.094312] __kasan_kmalloc+0xb7/0xc0 [ 31.094312] __kmalloc_cache_noprof+0x184/0x410 [ 31.094312] kasan_atomics+0x96/0x310 [ 31.094312] kunit_try_run_case+0x1b3/0x490 [ 31.094312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.094312] kthread+0x257/0x310 [ 31.094312] ret_from_fork+0x41/0x80 [ 31.094312] ret_from_fork_asm+0x1a/0x30 [ 31.094312] [ 31.094312] The buggy address belongs to the object at ffff88810294b780 [ 31.094312] which belongs to the cache kmalloc-64 of size 64 [ 31.094312] The buggy address is located 0 bytes to the right of [ 31.094312] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.094312] [ 31.094312] The buggy address belongs to the physical page: [ 31.094312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.094312] flags: 0x200000000000000(node=0|zone=2) [ 31.094312] page_type: f5(slab) [ 31.094312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.094312] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.094312] page dumped because: kasan: bad access detected [ 31.094312] [ 31.094312] Memory state around the buggy address: [ 31.094312] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.094312] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.094312] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.094312] ^ [ 31.094312] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.094312] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.094312] ================================================================== [ 29.842180] ================================================================== [ 29.842332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 29.842332] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.842332] [ 29.842332] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.842332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.842332] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.842332] Call Trace: [ 29.842332] <TASK> [ 29.842332] dump_stack_lvl+0x73/0xb0 [ 29.842332] print_report+0xd1/0x640 [ 29.842332] ? __virt_addr_valid+0x1db/0x2d0 [ 29.842332] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.842332] kasan_report+0x102/0x140 [ 29.842332] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.842332] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.842332] kasan_check_range+0x10c/0x1c0 [ 29.842332] __kasan_check_read+0x15/0x20 [ 29.842332] kasan_atomics_helper+0x3e0/0x5450 [ 29.842332] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.842332] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.842332] ? trace_hardirqs_on+0x37/0xe0 [ 29.842332] ? kasan_atomics+0x153/0x310 [ 29.842332] kasan_atomics+0x1dd/0x310 [ 29.842332] ? __pfx_kasan_atomics+0x10/0x10 [ 29.842332] ? __pfx_kasan_atomics+0x10/0x10 [ 29.842332] kunit_try_run_case+0x1b3/0x490 [ 29.842332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.842332] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.842332] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.842332] ? __kthread_parkme+0x82/0x160 [ 29.842332] ? preempt_count_sub+0x50/0x80 [ 29.842332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.842332] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.842332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.842332] kthread+0x257/0x310 [ 29.842332] ? __pfx_kthread+0x10/0x10 [ 29.842332] ret_from_fork+0x41/0x80 [ 29.842332] ? __pfx_kthread+0x10/0x10 [ 29.842332] ret_from_fork_asm+0x1a/0x30 [ 29.842332] </TASK> [ 29.842332] [ 29.842332] Allocated by task 274: [ 29.842332] kasan_save_stack+0x3d/0x60 [ 29.842332] kasan_save_track+0x18/0x40 [ 29.842332] kasan_save_alloc_info+0x3b/0x50 [ 29.842332] __kasan_kmalloc+0xb7/0xc0 [ 29.842332] __kmalloc_cache_noprof+0x184/0x410 [ 29.842332] kasan_atomics+0x96/0x310 [ 29.842332] kunit_try_run_case+0x1b3/0x490 [ 29.842332] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.842332] kthread+0x257/0x310 [ 29.842332] ret_from_fork+0x41/0x80 [ 29.842332] ret_from_fork_asm+0x1a/0x30 [ 29.842332] [ 29.842332] The buggy address belongs to the object at ffff88810294b780 [ 29.842332] which belongs to the cache kmalloc-64 of size 64 [ 29.842332] The buggy address is located 0 bytes to the right of [ 29.842332] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.842332] [ 29.842332] The buggy address belongs to the physical page: [ 29.842332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.842332] flags: 0x200000000000000(node=0|zone=2) [ 29.842332] page_type: f5(slab) [ 29.842332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.842332] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.842332] page dumped because: kasan: bad access detected [ 29.842332] [ 29.842332] Memory state around the buggy address: [ 29.842332] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.842332] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.842332] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.842332] ^ [ 29.842332] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.842332] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.842332] ================================================================== [ 31.133602] ================================================================== [ 31.134761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 31.134761] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.134761] [ 31.134761] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.134761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.134761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.134761] Call Trace: [ 31.134761] <TASK> [ 31.134761] dump_stack_lvl+0x73/0xb0 [ 31.134761] print_report+0xd1/0x640 [ 31.134761] ? __virt_addr_valid+0x1db/0x2d0 [ 31.134761] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.134761] kasan_report+0x102/0x140 [ 31.134761] ? kasan_atomics_helper+0x49d0/0x5450 [ 31.134761] ? kasan_atomics_helper+0x49d0/0x5450 [ 31.134761] __asan_report_load4_noabort+0x18/0x20 [ 31.134761] kasan_atomics_helper+0x49d0/0x5450 [ 31.134761] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.134761] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.134761] ? trace_hardirqs_on+0x37/0xe0 [ 31.134761] ? kasan_atomics+0x153/0x310 [ 31.134761] kasan_atomics+0x1dd/0x310 [ 31.134761] ? __pfx_kasan_atomics+0x10/0x10 [ 31.134761] ? __pfx_kasan_atomics+0x10/0x10 [ 31.134761] kunit_try_run_case+0x1b3/0x490 [ 31.134761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.134761] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.134761] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.134761] ? __kthread_parkme+0x82/0x160 [ 31.134761] ? preempt_count_sub+0x50/0x80 [ 31.134761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.134761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.134761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.134761] kthread+0x257/0x310 [ 31.134761] ? __pfx_kthread+0x10/0x10 [ 31.134761] ret_from_fork+0x41/0x80 [ 31.134761] ? __pfx_kthread+0x10/0x10 [ 31.134761] ret_from_fork_asm+0x1a/0x30 [ 31.134761] </TASK> [ 31.134761] [ 31.134761] Allocated by task 274: [ 31.134761] kasan_save_stack+0x3d/0x60 [ 31.134761] kasan_save_track+0x18/0x40 [ 31.134761] kasan_save_alloc_info+0x3b/0x50 [ 31.134761] __kasan_kmalloc+0xb7/0xc0 [ 31.134761] __kmalloc_cache_noprof+0x184/0x410 [ 31.134761] kasan_atomics+0x96/0x310 [ 31.134761] kunit_try_run_case+0x1b3/0x490 [ 31.134761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.134761] kthread+0x257/0x310 [ 31.134761] ret_from_fork+0x41/0x80 [ 31.134761] ret_from_fork_asm+0x1a/0x30 [ 31.134761] [ 31.134761] The buggy address belongs to the object at ffff88810294b780 [ 31.134761] which belongs to the cache kmalloc-64 of size 64 [ 31.134761] The buggy address is located 0 bytes to the right of [ 31.134761] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.134761] [ 31.134761] The buggy address belongs to the physical page: [ 31.134761] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.134761] flags: 0x200000000000000(node=0|zone=2) [ 31.134761] page_type: f5(slab) [ 31.134761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.134761] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.134761] page dumped because: kasan: bad access detected [ 31.134761] [ 31.134761] Memory state around the buggy address: [ 31.134761] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.134761] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.134761] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.134761] ^ [ 31.134761] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.134761] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.134761] ================================================================== [ 31.707881] ================================================================== [ 31.708148] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 31.708148] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.708148] [ 31.708148] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.708148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.708148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.708148] Call Trace: [ 31.708148] <TASK> [ 31.708148] dump_stack_lvl+0x73/0xb0 [ 31.708148] print_report+0xd1/0x640 [ 31.708148] ? __virt_addr_valid+0x1db/0x2d0 [ 31.708148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.708148] kasan_report+0x102/0x140 [ 31.708148] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.708148] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.708148] kasan_check_range+0x10c/0x1c0 [ 31.708148] __kasan_check_write+0x18/0x20 [ 31.708148] kasan_atomics_helper+0x19e4/0x5450 [ 31.708148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.708148] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.708148] ? trace_hardirqs_on+0x37/0xe0 [ 31.708148] ? kasan_atomics+0x153/0x310 [ 31.708148] kasan_atomics+0x1dd/0x310 [ 31.708148] ? __pfx_kasan_atomics+0x10/0x10 [ 31.708148] ? __pfx_kasan_atomics+0x10/0x10 [ 31.708148] kunit_try_run_case+0x1b3/0x490 [ 31.708148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.708148] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.708148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.708148] ? __kthread_parkme+0x82/0x160 [ 31.708148] ? preempt_count_sub+0x50/0x80 [ 31.708148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.708148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.708148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.708148] kthread+0x257/0x310 [ 31.708148] ? __pfx_kthread+0x10/0x10 [ 31.708148] ret_from_fork+0x41/0x80 [ 31.708148] ? __pfx_kthread+0x10/0x10 [ 31.708148] ret_from_fork_asm+0x1a/0x30 [ 31.708148] </TASK> [ 31.708148] [ 31.708148] Allocated by task 274: [ 31.708148] kasan_save_stack+0x3d/0x60 [ 31.708148] kasan_save_track+0x18/0x40 [ 31.708148] kasan_save_alloc_info+0x3b/0x50 [ 31.708148] __kasan_kmalloc+0xb7/0xc0 [ 31.708148] __kmalloc_cache_noprof+0x184/0x410 [ 31.708148] kasan_atomics+0x96/0x310 [ 31.708148] kunit_try_run_case+0x1b3/0x490 [ 31.708148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.708148] kthread+0x257/0x310 [ 31.708148] ret_from_fork+0x41/0x80 [ 31.708148] ret_from_fork_asm+0x1a/0x30 [ 31.708148] [ 31.708148] The buggy address belongs to the object at ffff88810294b780 [ 31.708148] which belongs to the cache kmalloc-64 of size 64 [ 31.708148] The buggy address is located 0 bytes to the right of [ 31.708148] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.708148] [ 31.708148] The buggy address belongs to the physical page: [ 31.708148] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.708148] flags: 0x200000000000000(node=0|zone=2) [ 31.708148] page_type: f5(slab) [ 31.708148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.708148] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.708148] page dumped because: kasan: bad access detected [ 31.708148] [ 31.708148] Memory state around the buggy address: [ 31.708148] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.708148] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.708148] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.708148] ^ [ 31.708148] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.708148] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.708148] ================================================================== [ 29.925675] ================================================================== [ 29.926214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 29.926214] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.926214] [ 29.926214] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.926214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.926214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.926214] Call Trace: [ 29.926214] <TASK> [ 29.926214] dump_stack_lvl+0x73/0xb0 [ 29.926214] print_report+0xd1/0x640 [ 29.926214] ? __virt_addr_valid+0x1db/0x2d0 [ 29.926214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.926214] kasan_report+0x102/0x140 [ 29.926214] ? kasan_atomics_helper+0x4a1/0x5450 [ 29.926214] ? kasan_atomics_helper+0x4a1/0x5450 [ 29.926214] kasan_check_range+0x10c/0x1c0 [ 29.926214] __kasan_check_write+0x18/0x20 [ 29.926214] kasan_atomics_helper+0x4a1/0x5450 [ 29.926214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.926214] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.926214] ? trace_hardirqs_on+0x37/0xe0 [ 29.926214] ? kasan_atomics+0x153/0x310 [ 29.926214] kasan_atomics+0x1dd/0x310 [ 29.926214] ? __pfx_kasan_atomics+0x10/0x10 [ 29.926214] ? __pfx_kasan_atomics+0x10/0x10 [ 29.926214] kunit_try_run_case+0x1b3/0x490 [ 29.926214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.926214] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.926214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.926214] ? __kthread_parkme+0x82/0x160 [ 29.926214] ? preempt_count_sub+0x50/0x80 [ 29.926214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.926214] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.926214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.926214] kthread+0x257/0x310 [ 29.926214] ? __pfx_kthread+0x10/0x10 [ 29.926214] ret_from_fork+0x41/0x80 [ 29.926214] ? __pfx_kthread+0x10/0x10 [ 29.926214] ret_from_fork_asm+0x1a/0x30 [ 29.926214] </TASK> [ 29.926214] [ 29.926214] Allocated by task 274: [ 29.926214] kasan_save_stack+0x3d/0x60 [ 29.926214] kasan_save_track+0x18/0x40 [ 29.926214] kasan_save_alloc_info+0x3b/0x50 [ 29.926214] __kasan_kmalloc+0xb7/0xc0 [ 29.926214] __kmalloc_cache_noprof+0x184/0x410 [ 29.926214] kasan_atomics+0x96/0x310 [ 29.926214] kunit_try_run_case+0x1b3/0x490 [ 29.926214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.926214] kthread+0x257/0x310 [ 29.926214] ret_from_fork+0x41/0x80 [ 29.926214] ret_from_fork_asm+0x1a/0x30 [ 29.926214] [ 29.926214] The buggy address belongs to the object at ffff88810294b780 [ 29.926214] which belongs to the cache kmalloc-64 of size 64 [ 29.926214] The buggy address is located 0 bytes to the right of [ 29.926214] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.926214] [ 29.926214] The buggy address belongs to the physical page: [ 29.926214] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.926214] flags: 0x200000000000000(node=0|zone=2) [ 29.926214] page_type: f5(slab) [ 29.926214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.926214] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.926214] page dumped because: kasan: bad access detected [ 29.926214] [ 29.926214] Memory state around the buggy address: [ 29.926214] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.926214] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.926214] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.926214] ^ [ 29.926214] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.926214] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.926214] ================================================================== [ 30.748121] ================================================================== [ 30.748601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 30.751229] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.751229] [ 30.751229] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.751229] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.751229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.751229] Call Trace: [ 30.751229] <TASK> [ 30.751229] dump_stack_lvl+0x73/0xb0 [ 30.751229] print_report+0xd1/0x640 [ 30.751229] ? __virt_addr_valid+0x1db/0x2d0 [ 30.751229] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.751229] kasan_report+0x102/0x140 [ 30.751229] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.751229] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.751229] kasan_check_range+0x10c/0x1c0 [ 30.751229] __kasan_check_write+0x18/0x20 [ 30.751229] kasan_atomics_helper+0xfaa/0x5450 [ 30.751229] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.751229] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.751229] ? trace_hardirqs_on+0x37/0xe0 [ 30.751229] ? kasan_atomics+0x153/0x310 [ 30.751229] kasan_atomics+0x1dd/0x310 [ 30.751229] ? __pfx_kasan_atomics+0x10/0x10 [ 30.751229] ? __pfx_kasan_atomics+0x10/0x10 [ 30.751229] kunit_try_run_case+0x1b3/0x490 [ 30.751229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.751229] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.751229] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.751229] ? __kthread_parkme+0x82/0x160 [ 30.751229] ? preempt_count_sub+0x50/0x80 [ 30.751229] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.751229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.751229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.751229] kthread+0x257/0x310 [ 30.751229] ? __pfx_kthread+0x10/0x10 [ 30.751229] ret_from_fork+0x41/0x80 [ 30.751229] ? __pfx_kthread+0x10/0x10 [ 30.751229] ret_from_fork_asm+0x1a/0x30 [ 30.751229] </TASK> [ 30.751229] [ 30.751229] Allocated by task 274: [ 30.751229] kasan_save_stack+0x3d/0x60 [ 30.751229] kasan_save_track+0x18/0x40 [ 30.751229] kasan_save_alloc_info+0x3b/0x50 [ 30.751229] __kasan_kmalloc+0xb7/0xc0 [ 30.751229] __kmalloc_cache_noprof+0x184/0x410 [ 30.751229] kasan_atomics+0x96/0x310 [ 30.751229] kunit_try_run_case+0x1b3/0x490 [ 30.751229] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.751229] kthread+0x257/0x310 [ 30.751229] ret_from_fork+0x41/0x80 [ 30.751229] ret_from_fork_asm+0x1a/0x30 [ 30.751229] [ 30.751229] The buggy address belongs to the object at ffff88810294b780 [ 30.751229] which belongs to the cache kmalloc-64 of size 64 [ 30.751229] The buggy address is located 0 bytes to the right of [ 30.751229] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.751229] [ 30.751229] The buggy address belongs to the physical page: [ 30.751229] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.751229] flags: 0x200000000000000(node=0|zone=2) [ 30.751229] page_type: f5(slab) [ 30.751229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.751229] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.751229] page dumped because: kasan: bad access detected [ 30.751229] [ 30.751229] Memory state around the buggy address: [ 30.751229] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.751229] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.751229] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.751229] ^ [ 30.751229] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.751229] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.751229] ================================================================== [ 29.879969] ================================================================== [ 29.880528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 29.880528] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.880528] [ 29.880528] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.880528] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.880528] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.880528] Call Trace: [ 29.880528] <TASK> [ 29.880528] dump_stack_lvl+0x73/0xb0 [ 29.880528] print_report+0xd1/0x640 [ 29.880528] ? __virt_addr_valid+0x1db/0x2d0 [ 29.880528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.880528] kasan_report+0x102/0x140 [ 29.880528] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.880528] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.880528] __asan_report_load4_noabort+0x18/0x20 [ 29.880528] kasan_atomics_helper+0x4b56/0x5450 [ 29.880528] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.880528] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.880528] ? trace_hardirqs_on+0x37/0xe0 [ 29.880528] ? kasan_atomics+0x153/0x310 [ 29.880528] kasan_atomics+0x1dd/0x310 [ 29.880528] ? __pfx_kasan_atomics+0x10/0x10 [ 29.880528] ? __pfx_kasan_atomics+0x10/0x10 [ 29.880528] kunit_try_run_case+0x1b3/0x490 [ 29.880528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.880528] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.880528] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.880528] ? __kthread_parkme+0x82/0x160 [ 29.880528] ? preempt_count_sub+0x50/0x80 [ 29.880528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.880528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.880528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.880528] kthread+0x257/0x310 [ 29.880528] ? __pfx_kthread+0x10/0x10 [ 29.880528] ret_from_fork+0x41/0x80 [ 29.880528] ? __pfx_kthread+0x10/0x10 [ 29.880528] ret_from_fork_asm+0x1a/0x30 [ 29.880528] </TASK> [ 29.880528] [ 29.880528] Allocated by task 274: [ 29.880528] kasan_save_stack+0x3d/0x60 [ 29.880528] kasan_save_track+0x18/0x40 [ 29.880528] kasan_save_alloc_info+0x3b/0x50 [ 29.880528] __kasan_kmalloc+0xb7/0xc0 [ 29.880528] __kmalloc_cache_noprof+0x184/0x410 [ 29.880528] kasan_atomics+0x96/0x310 [ 29.880528] kunit_try_run_case+0x1b3/0x490 [ 29.880528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.880528] kthread+0x257/0x310 [ 29.880528] ret_from_fork+0x41/0x80 [ 29.880528] ret_from_fork_asm+0x1a/0x30 [ 29.880528] [ 29.880528] The buggy address belongs to the object at ffff88810294b780 [ 29.880528] which belongs to the cache kmalloc-64 of size 64 [ 29.880528] The buggy address is located 0 bytes to the right of [ 29.880528] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.880528] [ 29.880528] The buggy address belongs to the physical page: [ 29.880528] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.880528] flags: 0x200000000000000(node=0|zone=2) [ 29.880528] page_type: f5(slab) [ 29.880528] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.880528] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.880528] page dumped because: kasan: bad access detected [ 29.880528] [ 29.880528] Memory state around the buggy address: [ 29.880528] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.880528] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.880528] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.880528] ^ [ 29.880528] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.880528] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.880528] ================================================================== [ 32.370541] ================================================================== [ 32.371146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 32.372364] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.372364] [ 32.372364] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.372364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.372364] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.372364] Call Trace: [ 32.372364] <TASK> [ 32.372364] dump_stack_lvl+0x73/0xb0 [ 32.372364] print_report+0xd1/0x640 [ 32.372364] ? __virt_addr_valid+0x1db/0x2d0 [ 32.372364] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.372364] kasan_report+0x102/0x140 [ 32.372364] ? kasan_atomics_helper+0x4fa7/0x5450 [ 32.372364] ? kasan_atomics_helper+0x4fa7/0x5450 [ 32.372364] __asan_report_load8_noabort+0x18/0x20 [ 32.372364] kasan_atomics_helper+0x4fa7/0x5450 [ 32.372364] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.372364] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.372364] ? trace_hardirqs_on+0x37/0xe0 [ 32.372364] ? kasan_atomics+0x153/0x310 [ 32.372364] kasan_atomics+0x1dd/0x310 [ 32.372364] ? __pfx_kasan_atomics+0x10/0x10 [ 32.372364] ? __pfx_kasan_atomics+0x10/0x10 [ 32.372364] kunit_try_run_case+0x1b3/0x490 [ 32.372364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.372364] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.372364] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.372364] ? __kthread_parkme+0x82/0x160 [ 32.372364] ? preempt_count_sub+0x50/0x80 [ 32.372364] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.372364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.372364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.372364] kthread+0x257/0x310 [ 32.372364] ? __pfx_kthread+0x10/0x10 [ 32.372364] ret_from_fork+0x41/0x80 [ 32.372364] ? __pfx_kthread+0x10/0x10 [ 32.372364] ret_from_fork_asm+0x1a/0x30 [ 32.372364] </TASK> [ 32.372364] [ 32.372364] Allocated by task 274: [ 32.372364] kasan_save_stack+0x3d/0x60 [ 32.372364] kasan_save_track+0x18/0x40 [ 32.372364] kasan_save_alloc_info+0x3b/0x50 [ 32.372364] __kasan_kmalloc+0xb7/0xc0 [ 32.372364] __kmalloc_cache_noprof+0x184/0x410 [ 32.372364] kasan_atomics+0x96/0x310 [ 32.372364] kunit_try_run_case+0x1b3/0x490 [ 32.372364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.372364] kthread+0x257/0x310 [ 32.372364] ret_from_fork+0x41/0x80 [ 32.372364] ret_from_fork_asm+0x1a/0x30 [ 32.372364] [ 32.372364] The buggy address belongs to the object at ffff88810294b780 [ 32.372364] which belongs to the cache kmalloc-64 of size 64 [ 32.372364] The buggy address is located 0 bytes to the right of [ 32.372364] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.372364] [ 32.372364] The buggy address belongs to the physical page: [ 32.372364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.372364] flags: 0x200000000000000(node=0|zone=2) [ 32.372364] page_type: f5(slab) [ 32.372364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.372364] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.372364] page dumped because: kasan: bad access detected [ 32.372364] [ 32.372364] Memory state around the buggy address: [ 32.372364] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.372364] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.372364] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.372364] ^ [ 32.372364] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.372364] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.372364] ================================================================== [ 30.263091] ================================================================== [ 30.263556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 30.263556] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.263556] [ 30.263556] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.263556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.263556] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.263556] Call Trace: [ 30.263556] <TASK> [ 30.263556] dump_stack_lvl+0x73/0xb0 [ 30.263556] print_report+0xd1/0x640 [ 30.263556] ? __virt_addr_valid+0x1db/0x2d0 [ 30.263556] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.263556] kasan_report+0x102/0x140 [ 30.263556] ? kasan_atomics_helper+0x8fa/0x5450 [ 30.263556] ? kasan_atomics_helper+0x8fa/0x5450 [ 30.263556] kasan_check_range+0x10c/0x1c0 [ 30.263556] __kasan_check_write+0x18/0x20 [ 30.263556] kasan_atomics_helper+0x8fa/0x5450 [ 30.263556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.263556] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.263556] ? trace_hardirqs_on+0x37/0xe0 [ 30.263556] ? kasan_atomics+0x153/0x310 [ 30.263556] kasan_atomics+0x1dd/0x310 [ 30.263556] ? __pfx_kasan_atomics+0x10/0x10 [ 30.263556] ? __pfx_kasan_atomics+0x10/0x10 [ 30.263556] kunit_try_run_case+0x1b3/0x490 [ 30.263556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.263556] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.263556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.263556] ? __kthread_parkme+0x82/0x160 [ 30.263556] ? preempt_count_sub+0x50/0x80 [ 30.263556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.263556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.263556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.263556] kthread+0x257/0x310 [ 30.263556] ? __pfx_kthread+0x10/0x10 [ 30.263556] ret_from_fork+0x41/0x80 [ 30.263556] ? __pfx_kthread+0x10/0x10 [ 30.263556] ret_from_fork_asm+0x1a/0x30 [ 30.263556] </TASK> [ 30.263556] [ 30.263556] Allocated by task 274: [ 30.263556] kasan_save_stack+0x3d/0x60 [ 30.263556] kasan_save_track+0x18/0x40 [ 30.263556] kasan_save_alloc_info+0x3b/0x50 [ 30.263556] __kasan_kmalloc+0xb7/0xc0 [ 30.263556] __kmalloc_cache_noprof+0x184/0x410 [ 30.263556] kasan_atomics+0x96/0x310 [ 30.263556] kunit_try_run_case+0x1b3/0x490 [ 30.263556] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.263556] kthread+0x257/0x310 [ 30.263556] ret_from_fork+0x41/0x80 [ 30.263556] ret_from_fork_asm+0x1a/0x30 [ 30.263556] [ 30.263556] The buggy address belongs to the object at ffff88810294b780 [ 30.263556] which belongs to the cache kmalloc-64 of size 64 [ 30.263556] The buggy address is located 0 bytes to the right of [ 30.263556] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.263556] [ 30.263556] The buggy address belongs to the physical page: [ 30.263556] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.263556] flags: 0x200000000000000(node=0|zone=2) [ 30.263556] page_type: f5(slab) [ 30.263556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.263556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.263556] page dumped because: kasan: bad access detected [ 30.263556] [ 30.263556] Memory state around the buggy address: [ 30.263556] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.263556] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.263556] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.263556] ^ [ 30.263556] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.263556] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.263556] ================================================================== [ 30.526565] ================================================================== [ 30.527294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 30.527294] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.527294] [ 30.527294] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.527294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.527294] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.527294] Call Trace: [ 30.527294] <TASK> [ 30.527294] dump_stack_lvl+0x73/0xb0 [ 30.527294] print_report+0xd1/0x640 [ 30.527294] ? __virt_addr_valid+0x1db/0x2d0 [ 30.527294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.527294] kasan_report+0x102/0x140 [ 30.527294] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.527294] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.527294] __asan_report_load4_noabort+0x18/0x20 [ 30.527294] kasan_atomics_helper+0x4a86/0x5450 [ 30.527294] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.527294] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.527294] ? trace_hardirqs_on+0x37/0xe0 [ 30.527294] ? kasan_atomics+0x153/0x310 [ 30.527294] kasan_atomics+0x1dd/0x310 [ 30.527294] ? __pfx_kasan_atomics+0x10/0x10 [ 30.527294] ? __pfx_kasan_atomics+0x10/0x10 [ 30.527294] kunit_try_run_case+0x1b3/0x490 [ 30.527294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.527294] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.527294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.527294] ? __kthread_parkme+0x82/0x160 [ 30.527294] ? preempt_count_sub+0x50/0x80 [ 30.527294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.527294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.527294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.527294] kthread+0x257/0x310 [ 30.527294] ? __pfx_kthread+0x10/0x10 [ 30.527294] ret_from_fork+0x41/0x80 [ 30.527294] ? __pfx_kthread+0x10/0x10 [ 30.527294] ret_from_fork_asm+0x1a/0x30 [ 30.527294] </TASK> [ 30.527294] [ 30.527294] Allocated by task 274: [ 30.527294] kasan_save_stack+0x3d/0x60 [ 30.527294] kasan_save_track+0x18/0x40 [ 30.527294] kasan_save_alloc_info+0x3b/0x50 [ 30.527294] __kasan_kmalloc+0xb7/0xc0 [ 30.527294] __kmalloc_cache_noprof+0x184/0x410 [ 30.527294] kasan_atomics+0x96/0x310 [ 30.527294] kunit_try_run_case+0x1b3/0x490 [ 30.527294] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.527294] kthread+0x257/0x310 [ 30.527294] ret_from_fork+0x41/0x80 [ 30.527294] ret_from_fork_asm+0x1a/0x30 [ 30.527294] [ 30.527294] The buggy address belongs to the object at ffff88810294b780 [ 30.527294] which belongs to the cache kmalloc-64 of size 64 [ 30.527294] The buggy address is located 0 bytes to the right of [ 30.527294] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.527294] [ 30.527294] The buggy address belongs to the physical page: [ 30.527294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.527294] flags: 0x200000000000000(node=0|zone=2) [ 30.527294] page_type: f5(slab) [ 30.527294] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.527294] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.527294] page dumped because: kasan: bad access detected [ 30.527294] [ 30.527294] Memory state around the buggy address: [ 30.527294] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.527294] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.527294] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.527294] ^ [ 30.527294] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.527294] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.527294] ================================================================== [ 29.717064] ================================================================== [ 29.717643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 29.717643] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.717643] [ 29.717643] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.717643] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.717643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.717643] Call Trace: [ 29.717643] <TASK> [ 29.717643] dump_stack_lvl+0x73/0xb0 [ 29.717643] print_report+0xd1/0x640 [ 29.717643] ? __virt_addr_valid+0x1db/0x2d0 [ 29.717643] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.717643] kasan_report+0x102/0x140 [ 29.717643] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.717643] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.717643] __asan_report_store4_noabort+0x1b/0x30 [ 29.717643] kasan_atomics_helper+0x4ba4/0x5450 [ 29.717643] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.717643] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.717643] ? trace_hardirqs_on+0x37/0xe0 [ 29.717643] ? kasan_atomics+0x153/0x310 [ 29.717643] kasan_atomics+0x1dd/0x310 [ 29.717643] ? __pfx_kasan_atomics+0x10/0x10 [ 29.717643] ? __pfx_kasan_atomics+0x10/0x10 [ 29.717643] kunit_try_run_case+0x1b3/0x490 [ 29.717643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.717643] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.717643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.717643] ? __kthread_parkme+0x82/0x160 [ 29.717643] ? preempt_count_sub+0x50/0x80 [ 29.717643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.717643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.717643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.717643] kthread+0x257/0x310 [ 29.717643] ? __pfx_kthread+0x10/0x10 [ 29.717643] ret_from_fork+0x41/0x80 [ 29.717643] ? __pfx_kthread+0x10/0x10 [ 29.717643] ret_from_fork_asm+0x1a/0x30 [ 29.717643] </TASK> [ 29.717643] [ 29.717643] Allocated by task 274: [ 29.717643] kasan_save_stack+0x3d/0x60 [ 29.717643] kasan_save_track+0x18/0x40 [ 29.717643] kasan_save_alloc_info+0x3b/0x50 [ 29.717643] __kasan_kmalloc+0xb7/0xc0 [ 29.717643] __kmalloc_cache_noprof+0x184/0x410 [ 29.717643] kasan_atomics+0x96/0x310 [ 29.717643] kunit_try_run_case+0x1b3/0x490 [ 29.717643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.717643] kthread+0x257/0x310 [ 29.717643] ret_from_fork+0x41/0x80 [ 29.717643] ret_from_fork_asm+0x1a/0x30 [ 29.717643] [ 29.717643] The buggy address belongs to the object at ffff88810294b780 [ 29.717643] which belongs to the cache kmalloc-64 of size 64 [ 29.717643] The buggy address is located 0 bytes to the right of [ 29.717643] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.717643] [ 29.717643] The buggy address belongs to the physical page: [ 29.717643] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.717643] flags: 0x200000000000000(node=0|zone=2) [ 29.717643] page_type: f5(slab) [ 29.717643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.717643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.717643] page dumped because: kasan: bad access detected [ 29.717643] [ 29.717643] Memory state around the buggy address: [ 29.717643] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.717643] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.717643] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.717643] ^ [ 29.717643] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.717643] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.717643] ================================================================== [ 30.656508] ================================================================== [ 30.657087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 30.657249] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.658143] [ 30.658143] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.658143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.658143] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.658143] Call Trace: [ 30.658143] <TASK> [ 30.658143] dump_stack_lvl+0x73/0xb0 [ 30.658143] print_report+0xd1/0x640 [ 30.658143] ? __virt_addr_valid+0x1db/0x2d0 [ 30.658143] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.658143] kasan_report+0x102/0x140 [ 30.658143] ? kasan_atomics_helper+0xe79/0x5450 [ 30.658143] ? kasan_atomics_helper+0xe79/0x5450 [ 30.658143] kasan_check_range+0x10c/0x1c0 [ 30.658143] __kasan_check_write+0x18/0x20 [ 30.658143] kasan_atomics_helper+0xe79/0x5450 [ 30.658143] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.658143] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.658143] ? trace_hardirqs_on+0x37/0xe0 [ 30.658143] ? kasan_atomics+0x153/0x310 [ 30.658143] kasan_atomics+0x1dd/0x310 [ 30.658143] ? __pfx_kasan_atomics+0x10/0x10 [ 30.658143] ? __pfx_kasan_atomics+0x10/0x10 [ 30.658143] kunit_try_run_case+0x1b3/0x490 [ 30.658143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.658143] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.658143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.658143] ? __kthread_parkme+0x82/0x160 [ 30.658143] ? preempt_count_sub+0x50/0x80 [ 30.658143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.658143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.658143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.658143] kthread+0x257/0x310 [ 30.658143] ? __pfx_kthread+0x10/0x10 [ 30.658143] ret_from_fork+0x41/0x80 [ 30.658143] ? __pfx_kthread+0x10/0x10 [ 30.658143] ret_from_fork_asm+0x1a/0x30 [ 30.658143] </TASK> [ 30.658143] [ 30.658143] Allocated by task 274: [ 30.658143] kasan_save_stack+0x3d/0x60 [ 30.658143] kasan_save_track+0x18/0x40 [ 30.658143] kasan_save_alloc_info+0x3b/0x50 [ 30.658143] __kasan_kmalloc+0xb7/0xc0 [ 30.658143] __kmalloc_cache_noprof+0x184/0x410 [ 30.658143] kasan_atomics+0x96/0x310 [ 30.658143] kunit_try_run_case+0x1b3/0x490 [ 30.658143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.658143] kthread+0x257/0x310 [ 30.658143] ret_from_fork+0x41/0x80 [ 30.658143] ret_from_fork_asm+0x1a/0x30 [ 30.658143] [ 30.658143] The buggy address belongs to the object at ffff88810294b780 [ 30.658143] which belongs to the cache kmalloc-64 of size 64 [ 30.658143] The buggy address is located 0 bytes to the right of [ 30.658143] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.658143] [ 30.658143] The buggy address belongs to the physical page: [ 30.658143] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.658143] flags: 0x200000000000000(node=0|zone=2) [ 30.658143] page_type: f5(slab) [ 30.658143] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.658143] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.658143] page dumped because: kasan: bad access detected [ 30.658143] [ 30.658143] Memory state around the buggy address: [ 30.658143] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.658143] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.658143] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.658143] ^ [ 30.658143] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.658143] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.658143] ================================================================== [ 31.789832] ================================================================== [ 31.790224] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 31.790224] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.791205] [ 31.794379] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.794379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.794379] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.794379] Call Trace: [ 31.794379] <TASK> [ 31.794379] dump_stack_lvl+0x73/0xb0 [ 31.794379] print_report+0xd1/0x640 [ 31.794379] ? __virt_addr_valid+0x1db/0x2d0 [ 31.794379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.794379] kasan_report+0x102/0x140 [ 31.794379] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.794379] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.794379] kasan_check_range+0x10c/0x1c0 [ 31.794379] __kasan_check_write+0x18/0x20 [ 31.794379] kasan_atomics_helper+0x1b23/0x5450 [ 31.794379] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.794379] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.794379] ? trace_hardirqs_on+0x37/0xe0 [ 31.794379] ? kasan_atomics+0x153/0x310 [ 31.794379] kasan_atomics+0x1dd/0x310 [ 31.794379] ? __pfx_kasan_atomics+0x10/0x10 [ 31.794379] ? __pfx_kasan_atomics+0x10/0x10 [ 31.794379] kunit_try_run_case+0x1b3/0x490 [ 31.794379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.794379] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.794379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.794379] ? __kthread_parkme+0x82/0x160 [ 31.794379] ? preempt_count_sub+0x50/0x80 [ 31.794379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.794379] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.794379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.794379] kthread+0x257/0x310 [ 31.794379] ? __pfx_kthread+0x10/0x10 [ 31.794379] ret_from_fork+0x41/0x80 [ 31.794379] ? __pfx_kthread+0x10/0x10 [ 31.794379] ret_from_fork_asm+0x1a/0x30 [ 31.794379] </TASK> [ 31.794379] [ 31.794379] Allocated by task 274: [ 31.794379] kasan_save_stack+0x3d/0x60 [ 31.794379] kasan_save_track+0x18/0x40 [ 31.794379] kasan_save_alloc_info+0x3b/0x50 [ 31.794379] __kasan_kmalloc+0xb7/0xc0 [ 31.794379] __kmalloc_cache_noprof+0x184/0x410 [ 31.794379] kasan_atomics+0x96/0x310 [ 31.794379] kunit_try_run_case+0x1b3/0x490 [ 31.794379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.794379] kthread+0x257/0x310 [ 31.794379] ret_from_fork+0x41/0x80 [ 31.794379] ret_from_fork_asm+0x1a/0x30 [ 31.794379] [ 31.794379] The buggy address belongs to the object at ffff88810294b780 [ 31.794379] which belongs to the cache kmalloc-64 of size 64 [ 31.794379] The buggy address is located 0 bytes to the right of [ 31.794379] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.794379] [ 31.794379] The buggy address belongs to the physical page: [ 31.794379] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.794379] flags: 0x200000000000000(node=0|zone=2) [ 31.794379] page_type: f5(slab) [ 31.794379] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.794379] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.794379] page dumped because: kasan: bad access detected [ 31.794379] [ 31.794379] Memory state around the buggy address: [ 31.794379] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.794379] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.794379] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.794379] ^ [ 31.794379] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.794379] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.794379] ================================================================== [ 30.176382] ================================================================== [ 30.176995] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 30.177186] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.177186] [ 30.177186] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.177186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.177186] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.177186] Call Trace: [ 30.177186] <TASK> [ 30.177186] dump_stack_lvl+0x73/0xb0 [ 30.177186] print_report+0xd1/0x640 [ 30.177186] ? __virt_addr_valid+0x1db/0x2d0 [ 30.177186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.177186] kasan_report+0x102/0x140 [ 30.177186] ? kasan_atomics_helper+0x7c8/0x5450 [ 30.177186] ? kasan_atomics_helper+0x7c8/0x5450 [ 30.177186] kasan_check_range+0x10c/0x1c0 [ 30.177186] __kasan_check_write+0x18/0x20 [ 30.177186] kasan_atomics_helper+0x7c8/0x5450 [ 30.177186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.177186] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.177186] ? trace_hardirqs_on+0x37/0xe0 [ 30.177186] ? kasan_atomics+0x153/0x310 [ 30.177186] kasan_atomics+0x1dd/0x310 [ 30.177186] ? __pfx_kasan_atomics+0x10/0x10 [ 30.177186] ? __pfx_kasan_atomics+0x10/0x10 [ 30.177186] kunit_try_run_case+0x1b3/0x490 [ 30.177186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.177186] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.177186] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.177186] ? __kthread_parkme+0x82/0x160 [ 30.177186] ? preempt_count_sub+0x50/0x80 [ 30.177186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.177186] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.177186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.177186] kthread+0x257/0x310 [ 30.177186] ? __pfx_kthread+0x10/0x10 [ 30.177186] ret_from_fork+0x41/0x80 [ 30.177186] ? __pfx_kthread+0x10/0x10 [ 30.177186] ret_from_fork_asm+0x1a/0x30 [ 30.177186] </TASK> [ 30.177186] [ 30.177186] Allocated by task 274: [ 30.177186] kasan_save_stack+0x3d/0x60 [ 30.177186] kasan_save_track+0x18/0x40 [ 30.177186] kasan_save_alloc_info+0x3b/0x50 [ 30.177186] __kasan_kmalloc+0xb7/0xc0 [ 30.177186] __kmalloc_cache_noprof+0x184/0x410 [ 30.177186] kasan_atomics+0x96/0x310 [ 30.177186] kunit_try_run_case+0x1b3/0x490 [ 30.177186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.177186] kthread+0x257/0x310 [ 30.177186] ret_from_fork+0x41/0x80 [ 30.177186] ret_from_fork_asm+0x1a/0x30 [ 30.177186] [ 30.177186] The buggy address belongs to the object at ffff88810294b780 [ 30.177186] which belongs to the cache kmalloc-64 of size 64 [ 30.177186] The buggy address is located 0 bytes to the right of [ 30.177186] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.177186] [ 30.177186] The buggy address belongs to the physical page: [ 30.177186] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.177186] flags: 0x200000000000000(node=0|zone=2) [ 30.177186] page_type: f5(slab) [ 30.177186] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.177186] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.177186] page dumped because: kasan: bad access detected [ 30.177186] [ 30.177186] Memory state around the buggy address: [ 30.177186] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.177186] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.177186] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.177186] ^ [ 30.177186] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177186] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.177186] ================================================================== [ 30.568015] ================================================================== [ 30.568302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 30.568302] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.568302] [ 30.568302] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.568302] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.568302] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.568302] Call Trace: [ 30.568302] <TASK> [ 30.568302] dump_stack_lvl+0x73/0xb0 [ 30.568302] print_report+0xd1/0x640 [ 30.568302] ? __virt_addr_valid+0x1db/0x2d0 [ 30.568302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.568302] kasan_report+0x102/0x140 [ 30.568302] ? kasan_atomics_helper+0xd48/0x5450 [ 30.568302] ? kasan_atomics_helper+0xd48/0x5450 [ 30.568302] kasan_check_range+0x10c/0x1c0 [ 30.568302] __kasan_check_write+0x18/0x20 [ 30.568302] kasan_atomics_helper+0xd48/0x5450 [ 30.568302] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.568302] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.568302] ? trace_hardirqs_on+0x37/0xe0 [ 30.568302] ? kasan_atomics+0x153/0x310 [ 30.568302] kasan_atomics+0x1dd/0x310 [ 30.568302] ? __pfx_kasan_atomics+0x10/0x10 [ 30.568302] ? __pfx_kasan_atomics+0x10/0x10 [ 30.568302] kunit_try_run_case+0x1b3/0x490 [ 30.568302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.568302] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.568302] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.568302] ? __kthread_parkme+0x82/0x160 [ 30.568302] ? preempt_count_sub+0x50/0x80 [ 30.568302] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.568302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.568302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.568302] kthread+0x257/0x310 [ 30.568302] ? __pfx_kthread+0x10/0x10 [ 30.568302] ret_from_fork+0x41/0x80 [ 30.568302] ? __pfx_kthread+0x10/0x10 [ 30.568302] ret_from_fork_asm+0x1a/0x30 [ 30.568302] </TASK> [ 30.568302] [ 30.568302] Allocated by task 274: [ 30.568302] kasan_save_stack+0x3d/0x60 [ 30.568302] kasan_save_track+0x18/0x40 [ 30.568302] kasan_save_alloc_info+0x3b/0x50 [ 30.568302] __kasan_kmalloc+0xb7/0xc0 [ 30.568302] __kmalloc_cache_noprof+0x184/0x410 [ 30.568302] kasan_atomics+0x96/0x310 [ 30.568302] kunit_try_run_case+0x1b3/0x490 [ 30.568302] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.568302] kthread+0x257/0x310 [ 30.568302] ret_from_fork+0x41/0x80 [ 30.568302] ret_from_fork_asm+0x1a/0x30 [ 30.568302] [ 30.568302] The buggy address belongs to the object at ffff88810294b780 [ 30.568302] which belongs to the cache kmalloc-64 of size 64 [ 30.568302] The buggy address is located 0 bytes to the right of [ 30.568302] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.568302] [ 30.568302] The buggy address belongs to the physical page: [ 30.568302] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.568302] flags: 0x200000000000000(node=0|zone=2) [ 30.568302] page_type: f5(slab) [ 30.568302] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.568302] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.568302] page dumped because: kasan: bad access detected [ 30.568302] [ 30.568302] Memory state around the buggy address: [ 30.568302] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.568302] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.568302] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.568302] ^ [ 30.568302] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.568302] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.568302] ================================================================== [ 31.956778] ================================================================== [ 31.957496] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 31.957496] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.957496] [ 31.957496] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.957496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.957496] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.957496] Call Trace: [ 31.957496] <TASK> [ 31.957496] dump_stack_lvl+0x73/0xb0 [ 31.957496] print_report+0xd1/0x640 [ 31.957496] ? __virt_addr_valid+0x1db/0x2d0 [ 31.957496] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.957496] kasan_report+0x102/0x140 [ 31.957496] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.957496] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.957496] kasan_check_range+0x10c/0x1c0 [ 31.957496] __kasan_check_write+0x18/0x20 [ 31.957496] kasan_atomics_helper+0x1d7b/0x5450 [ 31.957496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.957496] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.957496] ? trace_hardirqs_on+0x37/0xe0 [ 31.957496] ? kasan_atomics+0x153/0x310 [ 31.957496] kasan_atomics+0x1dd/0x310 [ 31.957496] ? __pfx_kasan_atomics+0x10/0x10 [ 31.957496] ? __pfx_kasan_atomics+0x10/0x10 [ 31.957496] kunit_try_run_case+0x1b3/0x490 [ 31.957496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.957496] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.957496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.957496] ? __kthread_parkme+0x82/0x160 [ 31.957496] ? preempt_count_sub+0x50/0x80 [ 31.957496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.957496] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.957496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.957496] kthread+0x257/0x310 [ 31.957496] ? __pfx_kthread+0x10/0x10 [ 31.957496] ret_from_fork+0x41/0x80 [ 31.957496] ? __pfx_kthread+0x10/0x10 [ 31.957496] ret_from_fork_asm+0x1a/0x30 [ 31.957496] </TASK> [ 31.957496] [ 31.957496] Allocated by task 274: [ 31.957496] kasan_save_stack+0x3d/0x60 [ 31.957496] kasan_save_track+0x18/0x40 [ 31.957496] kasan_save_alloc_info+0x3b/0x50 [ 31.957496] __kasan_kmalloc+0xb7/0xc0 [ 31.957496] __kmalloc_cache_noprof+0x184/0x410 [ 31.957496] kasan_atomics+0x96/0x310 [ 31.957496] kunit_try_run_case+0x1b3/0x490 [ 31.957496] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.957496] kthread+0x257/0x310 [ 31.957496] ret_from_fork+0x41/0x80 [ 31.957496] ret_from_fork_asm+0x1a/0x30 [ 31.957496] [ 31.957496] The buggy address belongs to the object at ffff88810294b780 [ 31.957496] which belongs to the cache kmalloc-64 of size 64 [ 31.957496] The buggy address is located 0 bytes to the right of [ 31.957496] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.957496] [ 31.957496] The buggy address belongs to the physical page: [ 31.957496] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.957496] flags: 0x200000000000000(node=0|zone=2) [ 31.957496] page_type: f5(slab) [ 31.957496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.957496] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.957496] page dumped because: kasan: bad access detected [ 31.957496] [ 31.957496] Memory state around the buggy address: [ 31.957496] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.957496] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.957496] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.957496] ^ [ 31.957496] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.957496] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.957496] ================================================================== [ 30.839600] ================================================================== [ 30.840243] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 30.840243] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.840243] [ 30.840243] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.840243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.840243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.840243] Call Trace: [ 30.840243] <TASK> [ 30.840243] dump_stack_lvl+0x73/0xb0 [ 30.840243] print_report+0xd1/0x640 [ 30.840243] ? __virt_addr_valid+0x1db/0x2d0 [ 30.840243] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.840243] kasan_report+0x102/0x140 [ 30.840243] ? kasan_atomics_helper+0x107a/0x5450 [ 30.840243] ? kasan_atomics_helper+0x107a/0x5450 [ 30.840243] kasan_check_range+0x10c/0x1c0 [ 30.840243] __kasan_check_write+0x18/0x20 [ 30.840243] kasan_atomics_helper+0x107a/0x5450 [ 30.840243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.840243] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.840243] ? trace_hardirqs_on+0x37/0xe0 [ 30.840243] ? kasan_atomics+0x153/0x310 [ 30.840243] kasan_atomics+0x1dd/0x310 [ 30.840243] ? __pfx_kasan_atomics+0x10/0x10 [ 30.840243] ? __pfx_kasan_atomics+0x10/0x10 [ 30.840243] kunit_try_run_case+0x1b3/0x490 [ 30.840243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.840243] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.840243] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.840243] ? __kthread_parkme+0x82/0x160 [ 30.840243] ? preempt_count_sub+0x50/0x80 [ 30.840243] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.840243] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.840243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.840243] kthread+0x257/0x310 [ 30.840243] ? __pfx_kthread+0x10/0x10 [ 30.840243] ret_from_fork+0x41/0x80 [ 30.840243] ? __pfx_kthread+0x10/0x10 [ 30.840243] ret_from_fork_asm+0x1a/0x30 [ 30.840243] </TASK> [ 30.840243] [ 30.840243] Allocated by task 274: [ 30.840243] kasan_save_stack+0x3d/0x60 [ 30.840243] kasan_save_track+0x18/0x40 [ 30.840243] kasan_save_alloc_info+0x3b/0x50 [ 30.840243] __kasan_kmalloc+0xb7/0xc0 [ 30.840243] __kmalloc_cache_noprof+0x184/0x410 [ 30.840243] kasan_atomics+0x96/0x310 [ 30.840243] kunit_try_run_case+0x1b3/0x490 [ 30.840243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.840243] kthread+0x257/0x310 [ 30.840243] ret_from_fork+0x41/0x80 [ 30.840243] ret_from_fork_asm+0x1a/0x30 [ 30.840243] [ 30.840243] The buggy address belongs to the object at ffff88810294b780 [ 30.840243] which belongs to the cache kmalloc-64 of size 64 [ 30.840243] The buggy address is located 0 bytes to the right of [ 30.840243] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.840243] [ 30.840243] The buggy address belongs to the physical page: [ 30.840243] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.840243] flags: 0x200000000000000(node=0|zone=2) [ 30.840243] page_type: f5(slab) [ 30.840243] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.840243] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.840243] page dumped because: kasan: bad access detected [ 30.840243] [ 30.840243] Memory state around the buggy address: [ 30.840243] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.840243] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.840243] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.840243] ^ [ 30.840243] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.840243] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.840243] ================================================================== [ 32.042176] ================================================================== [ 32.042603] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 32.042603] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.042603] [ 32.042603] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.042603] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.045312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.045312] Call Trace: [ 32.045312] <TASK> [ 32.045312] dump_stack_lvl+0x73/0xb0 [ 32.045312] print_report+0xd1/0x640 [ 32.045312] ? __virt_addr_valid+0x1db/0x2d0 [ 32.045312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.045312] kasan_report+0x102/0x140 [ 32.045312] ? kasan_atomics_helper+0x1eab/0x5450 [ 32.045312] ? kasan_atomics_helper+0x1eab/0x5450 [ 32.045312] kasan_check_range+0x10c/0x1c0 [ 32.045312] __kasan_check_write+0x18/0x20 [ 32.045312] kasan_atomics_helper+0x1eab/0x5450 [ 32.045312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.045312] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.045312] ? trace_hardirqs_on+0x37/0xe0 [ 32.045312] ? kasan_atomics+0x153/0x310 [ 32.045312] kasan_atomics+0x1dd/0x310 [ 32.045312] ? __pfx_kasan_atomics+0x10/0x10 [ 32.045312] ? __pfx_kasan_atomics+0x10/0x10 [ 32.045312] kunit_try_run_case+0x1b3/0x490 [ 32.045312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.045312] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.045312] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.045312] ? __kthread_parkme+0x82/0x160 [ 32.045312] ? preempt_count_sub+0x50/0x80 [ 32.045312] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.045312] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.045312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.045312] kthread+0x257/0x310 [ 32.045312] ? __pfx_kthread+0x10/0x10 [ 32.045312] ret_from_fork+0x41/0x80 [ 32.045312] ? __pfx_kthread+0x10/0x10 [ 32.045312] ret_from_fork_asm+0x1a/0x30 [ 32.045312] </TASK> [ 32.045312] [ 32.045312] Allocated by task 274: [ 32.045312] kasan_save_stack+0x3d/0x60 [ 32.045312] kasan_save_track+0x18/0x40 [ 32.045312] kasan_save_alloc_info+0x3b/0x50 [ 32.045312] __kasan_kmalloc+0xb7/0xc0 [ 32.045312] __kmalloc_cache_noprof+0x184/0x410 [ 32.045312] kasan_atomics+0x96/0x310 [ 32.045312] kunit_try_run_case+0x1b3/0x490 [ 32.045312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.045312] kthread+0x257/0x310 [ 32.045312] ret_from_fork+0x41/0x80 [ 32.045312] ret_from_fork_asm+0x1a/0x30 [ 32.045312] [ 32.045312] The buggy address belongs to the object at ffff88810294b780 [ 32.045312] which belongs to the cache kmalloc-64 of size 64 [ 32.045312] The buggy address is located 0 bytes to the right of [ 32.045312] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.045312] [ 32.045312] The buggy address belongs to the physical page: [ 32.045312] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.045312] flags: 0x200000000000000(node=0|zone=2) [ 32.045312] page_type: f5(slab) [ 32.045312] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.045312] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.045312] page dumped because: kasan: bad access detected [ 32.045312] [ 32.045312] Memory state around the buggy address: [ 32.045312] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.045312] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.045312] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.045312] ^ [ 32.045312] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.045312] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.045312] ================================================================== [ 32.079931] ================================================================== [ 32.080402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 32.080402] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.080402] [ 32.080402] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.080402] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.080402] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.080402] Call Trace: [ 32.080402] <TASK> [ 32.080402] dump_stack_lvl+0x73/0xb0 [ 32.080402] print_report+0xd1/0x640 [ 32.080402] ? __virt_addr_valid+0x1db/0x2d0 [ 32.080402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.080402] kasan_report+0x102/0x140 [ 32.080402] ? kasan_atomics_helper+0x1f44/0x5450 [ 32.080402] ? kasan_atomics_helper+0x1f44/0x5450 [ 32.080402] kasan_check_range+0x10c/0x1c0 [ 32.080402] __kasan_check_write+0x18/0x20 [ 32.080402] kasan_atomics_helper+0x1f44/0x5450 [ 32.080402] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.080402] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.080402] ? trace_hardirqs_on+0x37/0xe0 [ 32.080402] ? kasan_atomics+0x153/0x310 [ 32.080402] kasan_atomics+0x1dd/0x310 [ 32.080402] ? __pfx_kasan_atomics+0x10/0x10 [ 32.080402] ? __pfx_kasan_atomics+0x10/0x10 [ 32.080402] kunit_try_run_case+0x1b3/0x490 [ 32.080402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.080402] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.080402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.080402] ? __kthread_parkme+0x82/0x160 [ 32.080402] ? preempt_count_sub+0x50/0x80 [ 32.080402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.080402] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.080402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.080402] kthread+0x257/0x310 [ 32.080402] ? __pfx_kthread+0x10/0x10 [ 32.080402] ret_from_fork+0x41/0x80 [ 32.080402] ? __pfx_kthread+0x10/0x10 [ 32.080402] ret_from_fork_asm+0x1a/0x30 [ 32.080402] </TASK> [ 32.080402] [ 32.080402] Allocated by task 274: [ 32.080402] kasan_save_stack+0x3d/0x60 [ 32.080402] kasan_save_track+0x18/0x40 [ 32.080402] kasan_save_alloc_info+0x3b/0x50 [ 32.080402] __kasan_kmalloc+0xb7/0xc0 [ 32.080402] __kmalloc_cache_noprof+0x184/0x410 [ 32.080402] kasan_atomics+0x96/0x310 [ 32.080402] kunit_try_run_case+0x1b3/0x490 [ 32.080402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.080402] kthread+0x257/0x310 [ 32.080402] ret_from_fork+0x41/0x80 [ 32.080402] ret_from_fork_asm+0x1a/0x30 [ 32.080402] [ 32.080402] The buggy address belongs to the object at ffff88810294b780 [ 32.080402] which belongs to the cache kmalloc-64 of size 64 [ 32.080402] The buggy address is located 0 bytes to the right of [ 32.080402] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.080402] [ 32.080402] The buggy address belongs to the physical page: [ 32.080402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.080402] flags: 0x200000000000000(node=0|zone=2) [ 32.080402] page_type: f5(slab) [ 32.080402] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.080402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.080402] page dumped because: kasan: bad access detected [ 32.080402] [ 32.080402] Memory state around the buggy address: [ 32.080402] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.080402] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.080402] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.080402] ^ [ 32.080402] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.080402] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.080402] ================================================================== [ 31.454848] ================================================================== [ 31.455450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 31.455450] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.455450] [ 31.455450] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.455450] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.455450] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.455450] Call Trace: [ 31.455450] <TASK> [ 31.455450] dump_stack_lvl+0x73/0xb0 [ 31.455450] print_report+0xd1/0x640 [ 31.455450] ? __virt_addr_valid+0x1db/0x2d0 [ 31.455450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.455450] kasan_report+0x102/0x140 [ 31.455450] ? kasan_atomics_helper+0x1650/0x5450 [ 31.455450] ? kasan_atomics_helper+0x1650/0x5450 [ 31.455450] kasan_check_range+0x10c/0x1c0 [ 31.455450] __kasan_check_write+0x18/0x20 [ 31.455450] kasan_atomics_helper+0x1650/0x5450 [ 31.455450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.455450] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.455450] ? trace_hardirqs_on+0x37/0xe0 [ 31.455450] ? kasan_atomics+0x153/0x310 [ 31.455450] kasan_atomics+0x1dd/0x310 [ 31.455450] ? __pfx_kasan_atomics+0x10/0x10 [ 31.455450] ? __pfx_kasan_atomics+0x10/0x10 [ 31.455450] kunit_try_run_case+0x1b3/0x490 [ 31.455450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.455450] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.455450] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.455450] ? __kthread_parkme+0x82/0x160 [ 31.455450] ? preempt_count_sub+0x50/0x80 [ 31.455450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.455450] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.455450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.455450] kthread+0x257/0x310 [ 31.455450] ? __pfx_kthread+0x10/0x10 [ 31.455450] ret_from_fork+0x41/0x80 [ 31.455450] ? __pfx_kthread+0x10/0x10 [ 31.455450] ret_from_fork_asm+0x1a/0x30 [ 31.455450] </TASK> [ 31.455450] [ 31.455450] Allocated by task 274: [ 31.455450] kasan_save_stack+0x3d/0x60 [ 31.455450] kasan_save_track+0x18/0x40 [ 31.455450] kasan_save_alloc_info+0x3b/0x50 [ 31.455450] __kasan_kmalloc+0xb7/0xc0 [ 31.455450] __kmalloc_cache_noprof+0x184/0x410 [ 31.455450] kasan_atomics+0x96/0x310 [ 31.455450] kunit_try_run_case+0x1b3/0x490 [ 31.455450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.455450] kthread+0x257/0x310 [ 31.455450] ret_from_fork+0x41/0x80 [ 31.455450] ret_from_fork_asm+0x1a/0x30 [ 31.455450] [ 31.455450] The buggy address belongs to the object at ffff88810294b780 [ 31.455450] which belongs to the cache kmalloc-64 of size 64 [ 31.455450] The buggy address is located 0 bytes to the right of [ 31.455450] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.455450] [ 31.455450] The buggy address belongs to the physical page: [ 31.455450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.455450] flags: 0x200000000000000(node=0|zone=2) [ 31.455450] page_type: f5(slab) [ 31.455450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.455450] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.455450] page dumped because: kasan: bad access detected [ 31.455450] [ 31.455450] Memory state around the buggy address: [ 31.455450] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.455450] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.455450] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.455450] ^ [ 31.455450] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.455450] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.455450] ================================================================== [ 31.006460] ================================================================== [ 31.008005] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 31.008005] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.008005] [ 31.008005] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.008005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.008005] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.008005] Call Trace: [ 31.008005] <TASK> [ 31.008005] dump_stack_lvl+0x73/0xb0 [ 31.008005] print_report+0xd1/0x640 [ 31.008005] ? __virt_addr_valid+0x1db/0x2d0 [ 31.008005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.008005] kasan_report+0x102/0x140 [ 31.008005] ? kasan_atomics_helper+0x1218/0x5450 [ 31.008005] ? kasan_atomics_helper+0x1218/0x5450 [ 31.008005] kasan_check_range+0x10c/0x1c0 [ 31.008005] __kasan_check_write+0x18/0x20 [ 31.008005] kasan_atomics_helper+0x1218/0x5450 [ 31.008005] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.008005] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.008005] ? trace_hardirqs_on+0x37/0xe0 [ 31.008005] ? kasan_atomics+0x153/0x310 [ 31.008005] kasan_atomics+0x1dd/0x310 [ 31.008005] ? __pfx_kasan_atomics+0x10/0x10 [ 31.008005] ? __pfx_kasan_atomics+0x10/0x10 [ 31.008005] kunit_try_run_case+0x1b3/0x490 [ 31.008005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.008005] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.008005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.008005] ? __kthread_parkme+0x82/0x160 [ 31.008005] ? preempt_count_sub+0x50/0x80 [ 31.008005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.008005] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.008005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.008005] kthread+0x257/0x310 [ 31.008005] ? __pfx_kthread+0x10/0x10 [ 31.008005] ret_from_fork+0x41/0x80 [ 31.008005] ? __pfx_kthread+0x10/0x10 [ 31.008005] ret_from_fork_asm+0x1a/0x30 [ 31.008005] </TASK> [ 31.008005] [ 31.008005] Allocated by task 274: [ 31.008005] kasan_save_stack+0x3d/0x60 [ 31.008005] kasan_save_track+0x18/0x40 [ 31.008005] kasan_save_alloc_info+0x3b/0x50 [ 31.008005] __kasan_kmalloc+0xb7/0xc0 [ 31.008005] __kmalloc_cache_noprof+0x184/0x410 [ 31.008005] kasan_atomics+0x96/0x310 [ 31.008005] kunit_try_run_case+0x1b3/0x490 [ 31.008005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.008005] kthread+0x257/0x310 [ 31.008005] ret_from_fork+0x41/0x80 [ 31.008005] ret_from_fork_asm+0x1a/0x30 [ 31.008005] [ 31.008005] The buggy address belongs to the object at ffff88810294b780 [ 31.008005] which belongs to the cache kmalloc-64 of size 64 [ 31.008005] The buggy address is located 0 bytes to the right of [ 31.008005] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.008005] [ 31.008005] The buggy address belongs to the physical page: [ 31.008005] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.008005] flags: 0x200000000000000(node=0|zone=2) [ 31.008005] page_type: f5(slab) [ 31.008005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.008005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.008005] page dumped because: kasan: bad access detected [ 31.008005] [ 31.008005] Memory state around the buggy address: [ 31.008005] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.008005] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.008005] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.008005] ^ [ 31.008005] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.008005] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.008005] ================================================================== [ 29.757237] ================================================================== [ 29.757510] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 29.757510] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.757510] [ 29.757510] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.757510] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.757510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.757510] Call Trace: [ 29.757510] <TASK> [ 29.757510] dump_stack_lvl+0x73/0xb0 [ 29.757510] print_report+0xd1/0x640 [ 29.757510] ? __virt_addr_valid+0x1db/0x2d0 [ 29.757510] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.757510] kasan_report+0x102/0x140 [ 29.757510] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.757510] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.757510] __asan_report_load4_noabort+0x18/0x20 [ 29.757510] kasan_atomics_helper+0x4b8a/0x5450 [ 29.757510] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.757510] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.757510] ? trace_hardirqs_on+0x37/0xe0 [ 29.757510] ? kasan_atomics+0x153/0x310 [ 29.757510] kasan_atomics+0x1dd/0x310 [ 29.757510] ? __pfx_kasan_atomics+0x10/0x10 [ 29.757510] ? __pfx_kasan_atomics+0x10/0x10 [ 29.757510] kunit_try_run_case+0x1b3/0x490 [ 29.757510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.757510] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.757510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.757510] ? __kthread_parkme+0x82/0x160 [ 29.757510] ? preempt_count_sub+0x50/0x80 [ 29.757510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.757510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.757510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.757510] kthread+0x257/0x310 [ 29.757510] ? __pfx_kthread+0x10/0x10 [ 29.757510] ret_from_fork+0x41/0x80 [ 29.757510] ? __pfx_kthread+0x10/0x10 [ 29.757510] ret_from_fork_asm+0x1a/0x30 [ 29.757510] </TASK> [ 29.757510] [ 29.757510] Allocated by task 274: [ 29.757510] kasan_save_stack+0x3d/0x60 [ 29.757510] kasan_save_track+0x18/0x40 [ 29.757510] kasan_save_alloc_info+0x3b/0x50 [ 29.757510] __kasan_kmalloc+0xb7/0xc0 [ 29.757510] __kmalloc_cache_noprof+0x184/0x410 [ 29.757510] kasan_atomics+0x96/0x310 [ 29.757510] kunit_try_run_case+0x1b3/0x490 [ 29.757510] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.757510] kthread+0x257/0x310 [ 29.757510] ret_from_fork+0x41/0x80 [ 29.757510] ret_from_fork_asm+0x1a/0x30 [ 29.757510] [ 29.757510] The buggy address belongs to the object at ffff88810294b780 [ 29.757510] which belongs to the cache kmalloc-64 of size 64 [ 29.757510] The buggy address is located 0 bytes to the right of [ 29.757510] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.757510] [ 29.757510] The buggy address belongs to the physical page: [ 29.757510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.757510] flags: 0x200000000000000(node=0|zone=2) [ 29.757510] page_type: f5(slab) [ 29.757510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.757510] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.757510] page dumped because: kasan: bad access detected [ 29.757510] [ 29.757510] Memory state around the buggy address: [ 29.757510] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.757510] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.757510] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.757510] ^ [ 29.757510] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.757510] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.757510] ================================================================== [ 30.881816] ================================================================== [ 30.882348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 30.882352] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.882352] [ 30.882352] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.882352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.882352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.886021] Call Trace: [ 30.886021] <TASK> [ 30.886021] dump_stack_lvl+0x73/0xb0 [ 30.886021] print_report+0xd1/0x640 [ 30.886021] ? __virt_addr_valid+0x1db/0x2d0 [ 30.886021] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.886021] kasan_report+0x102/0x140 [ 30.886021] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.886021] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.886021] __asan_report_load4_noabort+0x18/0x20 [ 30.886021] kasan_atomics_helper+0x4a1e/0x5450 [ 30.886021] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.886021] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.886021] ? trace_hardirqs_on+0x37/0xe0 [ 30.886021] ? kasan_atomics+0x153/0x310 [ 30.886021] kasan_atomics+0x1dd/0x310 [ 30.886021] ? __pfx_kasan_atomics+0x10/0x10 [ 30.886021] ? __pfx_kasan_atomics+0x10/0x10 [ 30.886021] kunit_try_run_case+0x1b3/0x490 [ 30.886021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.886021] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.886021] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.886021] ? __kthread_parkme+0x82/0x160 [ 30.886021] ? preempt_count_sub+0x50/0x80 [ 30.886021] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.886021] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.886021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.886021] kthread+0x257/0x310 [ 30.886021] ? __pfx_kthread+0x10/0x10 [ 30.886021] ret_from_fork+0x41/0x80 [ 30.886021] ? __pfx_kthread+0x10/0x10 [ 30.886021] ret_from_fork_asm+0x1a/0x30 [ 30.886021] </TASK> [ 30.886021] [ 30.886021] Allocated by task 274: [ 30.886021] kasan_save_stack+0x3d/0x60 [ 30.886021] kasan_save_track+0x18/0x40 [ 30.886021] kasan_save_alloc_info+0x3b/0x50 [ 30.886021] __kasan_kmalloc+0xb7/0xc0 [ 30.886021] __kmalloc_cache_noprof+0x184/0x410 [ 30.886021] kasan_atomics+0x96/0x310 [ 30.886021] kunit_try_run_case+0x1b3/0x490 [ 30.886021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.886021] kthread+0x257/0x310 [ 30.886021] ret_from_fork+0x41/0x80 [ 30.886021] ret_from_fork_asm+0x1a/0x30 [ 30.886021] [ 30.886021] The buggy address belongs to the object at ffff88810294b780 [ 30.886021] which belongs to the cache kmalloc-64 of size 64 [ 30.886021] The buggy address is located 0 bytes to the right of [ 30.886021] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.886021] [ 30.886021] The buggy address belongs to the physical page: [ 30.886021] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.886021] flags: 0x200000000000000(node=0|zone=2) [ 30.886021] page_type: f5(slab) [ 30.886021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.886021] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.886021] page dumped because: kasan: bad access detected [ 30.886021] [ 30.886021] Memory state around the buggy address: [ 30.886021] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.886021] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.886021] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.886021] ^ [ 30.886021] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.886021] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.886021] ================================================================== [ 31.406968] ================================================================== [ 31.407501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 31.407711] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.407711] [ 31.407711] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.407711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.407711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.407711] Call Trace: [ 31.407711] <TASK> [ 31.407711] dump_stack_lvl+0x73/0xb0 [ 31.407711] print_report+0xd1/0x640 [ 31.407711] ? __virt_addr_valid+0x1db/0x2d0 [ 31.407711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.407711] kasan_report+0x102/0x140 [ 31.407711] ? kasan_atomics_helper+0x15b7/0x5450 [ 31.407711] ? kasan_atomics_helper+0x15b7/0x5450 [ 31.407711] kasan_check_range+0x10c/0x1c0 [ 31.407711] __kasan_check_write+0x18/0x20 [ 31.407711] kasan_atomics_helper+0x15b7/0x5450 [ 31.407711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.407711] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.407711] ? trace_hardirqs_on+0x37/0xe0 [ 31.407711] ? kasan_atomics+0x153/0x310 [ 31.407711] kasan_atomics+0x1dd/0x310 [ 31.407711] ? __pfx_kasan_atomics+0x10/0x10 [ 31.407711] ? __pfx_kasan_atomics+0x10/0x10 [ 31.407711] kunit_try_run_case+0x1b3/0x490 [ 31.407711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.407711] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.407711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.407711] ? __kthread_parkme+0x82/0x160 [ 31.407711] ? preempt_count_sub+0x50/0x80 [ 31.407711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.407711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.407711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.407711] kthread+0x257/0x310 [ 31.407711] ? __pfx_kthread+0x10/0x10 [ 31.407711] ret_from_fork+0x41/0x80 [ 31.407711] ? __pfx_kthread+0x10/0x10 [ 31.407711] ret_from_fork_asm+0x1a/0x30 [ 31.407711] </TASK> [ 31.407711] [ 31.407711] Allocated by task 274: [ 31.407711] kasan_save_stack+0x3d/0x60 [ 31.407711] kasan_save_track+0x18/0x40 [ 31.407711] kasan_save_alloc_info+0x3b/0x50 [ 31.407711] __kasan_kmalloc+0xb7/0xc0 [ 31.407711] __kmalloc_cache_noprof+0x184/0x410 [ 31.407711] kasan_atomics+0x96/0x310 [ 31.407711] kunit_try_run_case+0x1b3/0x490 [ 31.407711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.407711] kthread+0x257/0x310 [ 31.407711] ret_from_fork+0x41/0x80 [ 31.407711] ret_from_fork_asm+0x1a/0x30 [ 31.407711] [ 31.407711] The buggy address belongs to the object at ffff88810294b780 [ 31.407711] which belongs to the cache kmalloc-64 of size 64 [ 31.407711] The buggy address is located 0 bytes to the right of [ 31.407711] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.407711] [ 31.407711] The buggy address belongs to the physical page: [ 31.407711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.407711] flags: 0x200000000000000(node=0|zone=2) [ 31.407711] page_type: f5(slab) [ 31.407711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.407711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.407711] page dumped because: kasan: bad access detected [ 31.407711] [ 31.407711] Memory state around the buggy address: [ 31.407711] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.407711] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.407711] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.407711] ^ [ 31.407711] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.407711] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.407711] ================================================================== [ 31.312949] ================================================================== [ 31.313372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 31.313372] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.314565] [ 31.314565] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.314565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.314565] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.314565] Call Trace: [ 31.314565] <TASK> [ 31.314565] dump_stack_lvl+0x73/0xb0 [ 31.314565] print_report+0xd1/0x640 [ 31.314565] ? __virt_addr_valid+0x1db/0x2d0 [ 31.314565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.314565] kasan_report+0x102/0x140 [ 31.314565] ? kasan_atomics_helper+0x50d6/0x5450 [ 31.314565] ? kasan_atomics_helper+0x50d6/0x5450 [ 31.314565] __asan_report_store8_noabort+0x1b/0x30 [ 31.314565] kasan_atomics_helper+0x50d6/0x5450 [ 31.314565] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.314565] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.314565] ? trace_hardirqs_on+0x37/0xe0 [ 31.314565] ? kasan_atomics+0x153/0x310 [ 31.314565] kasan_atomics+0x1dd/0x310 [ 31.314565] ? __pfx_kasan_atomics+0x10/0x10 [ 31.314565] ? __pfx_kasan_atomics+0x10/0x10 [ 31.314565] kunit_try_run_case+0x1b3/0x490 [ 31.314565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.314565] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.314565] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.314565] ? __kthread_parkme+0x82/0x160 [ 31.314565] ? preempt_count_sub+0x50/0x80 [ 31.314565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.314565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.314565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.314565] kthread+0x257/0x310 [ 31.314565] ? __pfx_kthread+0x10/0x10 [ 31.314565] ret_from_fork+0x41/0x80 [ 31.314565] ? __pfx_kthread+0x10/0x10 [ 31.314565] ret_from_fork_asm+0x1a/0x30 [ 31.314565] </TASK> [ 31.314565] [ 31.314565] Allocated by task 274: [ 31.314565] kasan_save_stack+0x3d/0x60 [ 31.314565] kasan_save_track+0x18/0x40 [ 31.314565] kasan_save_alloc_info+0x3b/0x50 [ 31.314565] __kasan_kmalloc+0xb7/0xc0 [ 31.314565] __kmalloc_cache_noprof+0x184/0x410 [ 31.314565] kasan_atomics+0x96/0x310 [ 31.314565] kunit_try_run_case+0x1b3/0x490 [ 31.314565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.314565] kthread+0x257/0x310 [ 31.314565] ret_from_fork+0x41/0x80 [ 31.314565] ret_from_fork_asm+0x1a/0x30 [ 31.314565] [ 31.314565] The buggy address belongs to the object at ffff88810294b780 [ 31.314565] which belongs to the cache kmalloc-64 of size 64 [ 31.314565] The buggy address is located 0 bytes to the right of [ 31.314565] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.314565] [ 31.314565] The buggy address belongs to the physical page: [ 31.314565] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.314565] flags: 0x200000000000000(node=0|zone=2) [ 31.314565] page_type: f5(slab) [ 31.314565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.314565] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.314565] page dumped because: kasan: bad access detected [ 31.314565] [ 31.314565] Memory state around the buggy address: [ 31.314565] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.314565] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.314565] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.314565] ^ [ 31.314565] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.314565] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.314565] ================================================================== [ 30.007567] ================================================================== [ 30.008257] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 30.008257] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.008257] [ 30.008257] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.008257] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.008257] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.008257] Call Trace: [ 30.008257] <TASK> [ 30.008257] dump_stack_lvl+0x73/0xb0 [ 30.008257] print_report+0xd1/0x640 [ 30.008257] ? __virt_addr_valid+0x1db/0x2d0 [ 30.008257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.008257] kasan_report+0x102/0x140 [ 30.008257] ? kasan_atomics_helper+0x566/0x5450 [ 30.008257] ? kasan_atomics_helper+0x566/0x5450 [ 30.008257] kasan_check_range+0x10c/0x1c0 [ 30.008257] __kasan_check_write+0x18/0x20 [ 30.008257] kasan_atomics_helper+0x566/0x5450 [ 30.008257] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.008257] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.008257] ? trace_hardirqs_on+0x37/0xe0 [ 30.008257] ? kasan_atomics+0x153/0x310 [ 30.008257] kasan_atomics+0x1dd/0x310 [ 30.008257] ? __pfx_kasan_atomics+0x10/0x10 [ 30.008257] ? __pfx_kasan_atomics+0x10/0x10 [ 30.008257] kunit_try_run_case+0x1b3/0x490 [ 30.008257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.008257] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.008257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.008257] ? __kthread_parkme+0x82/0x160 [ 30.008257] ? preempt_count_sub+0x50/0x80 [ 30.008257] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.008257] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.008257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.008257] kthread+0x257/0x310 [ 30.008257] ? __pfx_kthread+0x10/0x10 [ 30.008257] ret_from_fork+0x41/0x80 [ 30.008257] ? __pfx_kthread+0x10/0x10 [ 30.008257] ret_from_fork_asm+0x1a/0x30 [ 30.008257] </TASK> [ 30.008257] [ 30.008257] Allocated by task 274: [ 30.008257] kasan_save_stack+0x3d/0x60 [ 30.008257] kasan_save_track+0x18/0x40 [ 30.008257] kasan_save_alloc_info+0x3b/0x50 [ 30.008257] __kasan_kmalloc+0xb7/0xc0 [ 30.008257] __kmalloc_cache_noprof+0x184/0x410 [ 30.008257] kasan_atomics+0x96/0x310 [ 30.008257] kunit_try_run_case+0x1b3/0x490 [ 30.008257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.008257] kthread+0x257/0x310 [ 30.008257] ret_from_fork+0x41/0x80 [ 30.008257] ret_from_fork_asm+0x1a/0x30 [ 30.008257] [ 30.008257] The buggy address belongs to the object at ffff88810294b780 [ 30.008257] which belongs to the cache kmalloc-64 of size 64 [ 30.008257] The buggy address is located 0 bytes to the right of [ 30.008257] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.008257] [ 30.008257] The buggy address belongs to the physical page: [ 30.008257] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.008257] flags: 0x200000000000000(node=0|zone=2) [ 30.008257] page_type: f5(slab) [ 30.008257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.008257] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.008257] page dumped because: kasan: bad access detected [ 30.008257] [ 30.008257] Memory state around the buggy address: [ 30.008257] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.008257] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.008257] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.008257] ^ [ 30.008257] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.008257] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.008257] ================================================================== [ 31.047960] ================================================================== [ 31.048660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 31.048711] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.048711] [ 31.048711] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.048711] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.048711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.048711] Call Trace: [ 31.048711] <TASK> [ 31.048711] dump_stack_lvl+0x73/0xb0 [ 31.048711] print_report+0xd1/0x640 [ 31.048711] ? __virt_addr_valid+0x1db/0x2d0 [ 31.048711] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.048711] kasan_report+0x102/0x140 [ 31.048711] ? kasan_atomics_helper+0x49ea/0x5450 [ 31.048711] ? kasan_atomics_helper+0x49ea/0x5450 [ 31.048711] __asan_report_load4_noabort+0x18/0x20 [ 31.048711] kasan_atomics_helper+0x49ea/0x5450 [ 31.048711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.048711] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.048711] ? trace_hardirqs_on+0x37/0xe0 [ 31.048711] ? kasan_atomics+0x153/0x310 [ 31.048711] kasan_atomics+0x1dd/0x310 [ 31.048711] ? __pfx_kasan_atomics+0x10/0x10 [ 31.048711] ? __pfx_kasan_atomics+0x10/0x10 [ 31.048711] kunit_try_run_case+0x1b3/0x490 [ 31.048711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.048711] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.048711] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.048711] ? __kthread_parkme+0x82/0x160 [ 31.048711] ? preempt_count_sub+0x50/0x80 [ 31.048711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.048711] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.048711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.048711] kthread+0x257/0x310 [ 31.048711] ? __pfx_kthread+0x10/0x10 [ 31.048711] ret_from_fork+0x41/0x80 [ 31.048711] ? __pfx_kthread+0x10/0x10 [ 31.048711] ret_from_fork_asm+0x1a/0x30 [ 31.048711] </TASK> [ 31.048711] [ 31.048711] Allocated by task 274: [ 31.048711] kasan_save_stack+0x3d/0x60 [ 31.048711] kasan_save_track+0x18/0x40 [ 31.048711] kasan_save_alloc_info+0x3b/0x50 [ 31.048711] __kasan_kmalloc+0xb7/0xc0 [ 31.048711] __kmalloc_cache_noprof+0x184/0x410 [ 31.048711] kasan_atomics+0x96/0x310 [ 31.048711] kunit_try_run_case+0x1b3/0x490 [ 31.048711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.048711] kthread+0x257/0x310 [ 31.048711] ret_from_fork+0x41/0x80 [ 31.048711] ret_from_fork_asm+0x1a/0x30 [ 31.048711] [ 31.048711] The buggy address belongs to the object at ffff88810294b780 [ 31.048711] which belongs to the cache kmalloc-64 of size 64 [ 31.048711] The buggy address is located 0 bytes to the right of [ 31.048711] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.048711] [ 31.048711] The buggy address belongs to the physical page: [ 31.048711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.048711] flags: 0x200000000000000(node=0|zone=2) [ 31.048711] page_type: f5(slab) [ 31.048711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.048711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.048711] page dumped because: kasan: bad access detected [ 31.048711] [ 31.048711] Memory state around the buggy address: [ 31.048711] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.048711] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.048711] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.048711] ^ [ 31.048711] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.048711] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.048711] ================================================================== [ 32.461913] ================================================================== [ 32.462528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 32.462637] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.463066] [ 32.463066] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.463066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.463066] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.463066] Call Trace: [ 32.463066] <TASK> [ 32.463066] dump_stack_lvl+0x73/0xb0 [ 32.463066] print_report+0xd1/0x640 [ 32.463066] ? __virt_addr_valid+0x1db/0x2d0 [ 32.463066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.463066] kasan_report+0x102/0x140 [ 32.463066] ? kasan_atomics_helper+0x5117/0x5450 [ 32.463066] ? kasan_atomics_helper+0x5117/0x5450 [ 32.463066] __asan_report_load8_noabort+0x18/0x20 [ 32.463066] kasan_atomics_helper+0x5117/0x5450 [ 32.463066] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.463066] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.463066] ? trace_hardirqs_on+0x37/0xe0 [ 32.463066] ? kasan_atomics+0x153/0x310 [ 32.463066] kasan_atomics+0x1dd/0x310 [ 32.463066] ? __pfx_kasan_atomics+0x10/0x10 [ 32.463066] ? __pfx_kasan_atomics+0x10/0x10 [ 32.463066] kunit_try_run_case+0x1b3/0x490 [ 32.463066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.463066] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.463066] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.463066] ? __kthread_parkme+0x82/0x160 [ 32.463066] ? preempt_count_sub+0x50/0x80 [ 32.463066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.463066] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.463066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.463066] kthread+0x257/0x310 [ 32.463066] ? __pfx_kthread+0x10/0x10 [ 32.463066] ret_from_fork+0x41/0x80 [ 32.463066] ? __pfx_kthread+0x10/0x10 [ 32.463066] ret_from_fork_asm+0x1a/0x30 [ 32.463066] </TASK> [ 32.463066] [ 32.463066] Allocated by task 274: [ 32.463066] kasan_save_stack+0x3d/0x60 [ 32.463066] kasan_save_track+0x18/0x40 [ 32.463066] kasan_save_alloc_info+0x3b/0x50 [ 32.463066] __kasan_kmalloc+0xb7/0xc0 [ 32.463066] __kmalloc_cache_noprof+0x184/0x410 [ 32.463066] kasan_atomics+0x96/0x310 [ 32.463066] kunit_try_run_case+0x1b3/0x490 [ 32.463066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.463066] kthread+0x257/0x310 [ 32.463066] ret_from_fork+0x41/0x80 [ 32.463066] ret_from_fork_asm+0x1a/0x30 [ 32.463066] [ 32.463066] The buggy address belongs to the object at ffff88810294b780 [ 32.463066] which belongs to the cache kmalloc-64 of size 64 [ 32.463066] The buggy address is located 0 bytes to the right of [ 32.463066] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.463066] [ 32.463066] The buggy address belongs to the physical page: [ 32.463066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.463066] flags: 0x200000000000000(node=0|zone=2) [ 32.463066] page_type: f5(slab) [ 32.463066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.463066] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.463066] page dumped because: kasan: bad access detected [ 32.463066] [ 32.463066] Memory state around the buggy address: [ 32.463066] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.463066] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.463066] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.463066] ^ [ 32.463066] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.463066] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.463066] ================================================================== [ 31.750500] ================================================================== [ 31.751133] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 31.751133] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.751133] [ 31.751133] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.751133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.751133] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.751133] Call Trace: [ 31.751133] <TASK> [ 31.751133] dump_stack_lvl+0x73/0xb0 [ 31.751133] print_report+0xd1/0x640 [ 31.751133] ? __virt_addr_valid+0x1db/0x2d0 [ 31.751133] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.751133] kasan_report+0x102/0x140 [ 31.751133] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.751133] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.751133] kasan_check_range+0x10c/0x1c0 [ 31.751133] __kasan_check_write+0x18/0x20 [ 31.751133] kasan_atomics_helper+0x1a80/0x5450 [ 31.751133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.751133] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.751133] ? trace_hardirqs_on+0x37/0xe0 [ 31.751133] ? kasan_atomics+0x153/0x310 [ 31.751133] kasan_atomics+0x1dd/0x310 [ 31.751133] ? __pfx_kasan_atomics+0x10/0x10 [ 31.751133] ? __pfx_kasan_atomics+0x10/0x10 [ 31.751133] kunit_try_run_case+0x1b3/0x490 [ 31.751133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.751133] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.751133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.751133] ? __kthread_parkme+0x82/0x160 [ 31.751133] ? preempt_count_sub+0x50/0x80 [ 31.751133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.751133] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.751133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.751133] kthread+0x257/0x310 [ 31.751133] ? __pfx_kthread+0x10/0x10 [ 31.751133] ret_from_fork+0x41/0x80 [ 31.751133] ? __pfx_kthread+0x10/0x10 [ 31.751133] ret_from_fork_asm+0x1a/0x30 [ 31.751133] </TASK> [ 31.751133] [ 31.751133] Allocated by task 274: [ 31.751133] kasan_save_stack+0x3d/0x60 [ 31.751133] kasan_save_track+0x18/0x40 [ 31.751133] kasan_save_alloc_info+0x3b/0x50 [ 31.751133] __kasan_kmalloc+0xb7/0xc0 [ 31.751133] __kmalloc_cache_noprof+0x184/0x410 [ 31.751133] kasan_atomics+0x96/0x310 [ 31.751133] kunit_try_run_case+0x1b3/0x490 [ 31.751133] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.751133] kthread+0x257/0x310 [ 31.751133] ret_from_fork+0x41/0x80 [ 31.751133] ret_from_fork_asm+0x1a/0x30 [ 31.751133] [ 31.751133] The buggy address belongs to the object at ffff88810294b780 [ 31.751133] which belongs to the cache kmalloc-64 of size 64 [ 31.751133] The buggy address is located 0 bytes to the right of [ 31.751133] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.751133] [ 31.751133] The buggy address belongs to the physical page: [ 31.751133] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.751133] flags: 0x200000000000000(node=0|zone=2) [ 31.751133] page_type: f5(slab) [ 31.751133] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.751133] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.751133] page dumped because: kasan: bad access detected [ 31.751133] [ 31.751133] Memory state around the buggy address: [ 31.751133] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.751133] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.751133] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.751133] ^ [ 31.751133] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.751133] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.751133] ================================================================== [ 32.333631] ================================================================== [ 32.334288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 32.334288] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.334288] [ 32.334288] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.334288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.334288] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.334288] Call Trace: [ 32.334288] <TASK> [ 32.334288] dump_stack_lvl+0x73/0xb0 [ 32.334288] print_report+0xd1/0x640 [ 32.334288] ? __virt_addr_valid+0x1db/0x2d0 [ 32.334288] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.334288] kasan_report+0x102/0x140 [ 32.334288] ? kasan_atomics_helper+0x218b/0x5450 [ 32.334288] ? kasan_atomics_helper+0x218b/0x5450 [ 32.334288] kasan_check_range+0x10c/0x1c0 [ 32.334288] __kasan_check_write+0x18/0x20 [ 32.334288] kasan_atomics_helper+0x218b/0x5450 [ 32.334288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.334288] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.334288] ? trace_hardirqs_on+0x37/0xe0 [ 32.334288] ? kasan_atomics+0x153/0x310 [ 32.334288] kasan_atomics+0x1dd/0x310 [ 32.334288] ? __pfx_kasan_atomics+0x10/0x10 [ 32.334288] ? __pfx_kasan_atomics+0x10/0x10 [ 32.334288] kunit_try_run_case+0x1b3/0x490 [ 32.334288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.334288] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.334288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.334288] ? __kthread_parkme+0x82/0x160 [ 32.334288] ? preempt_count_sub+0x50/0x80 [ 32.334288] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.334288] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.334288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.334288] kthread+0x257/0x310 [ 32.334288] ? __pfx_kthread+0x10/0x10 [ 32.334288] ret_from_fork+0x41/0x80 [ 32.334288] ? __pfx_kthread+0x10/0x10 [ 32.334288] ret_from_fork_asm+0x1a/0x30 [ 32.334288] </TASK> [ 32.334288] [ 32.334288] Allocated by task 274: [ 32.334288] kasan_save_stack+0x3d/0x60 [ 32.334288] kasan_save_track+0x18/0x40 [ 32.334288] kasan_save_alloc_info+0x3b/0x50 [ 32.334288] __kasan_kmalloc+0xb7/0xc0 [ 32.334288] __kmalloc_cache_noprof+0x184/0x410 [ 32.334288] kasan_atomics+0x96/0x310 [ 32.334288] kunit_try_run_case+0x1b3/0x490 [ 32.334288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.334288] kthread+0x257/0x310 [ 32.334288] ret_from_fork+0x41/0x80 [ 32.334288] ret_from_fork_asm+0x1a/0x30 [ 32.334288] [ 32.334288] The buggy address belongs to the object at ffff88810294b780 [ 32.334288] which belongs to the cache kmalloc-64 of size 64 [ 32.334288] The buggy address is located 0 bytes to the right of [ 32.334288] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.334288] [ 32.334288] The buggy address belongs to the physical page: [ 32.334288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.334288] flags: 0x200000000000000(node=0|zone=2) [ 32.334288] page_type: f5(slab) [ 32.334288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.334288] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.334288] page dumped because: kasan: bad access detected [ 32.334288] [ 32.334288] Memory state around the buggy address: [ 32.334288] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.334288] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.334288] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.334288] ^ [ 32.334288] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.334288] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.334288] ================================================================== [ 29.663618] ================================================================== [ 29.664179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 29.664179] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.664179] [ 29.664179] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.664179] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.664179] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.664179] Call Trace: [ 29.664179] <TASK> [ 29.664179] dump_stack_lvl+0x73/0xb0 [ 29.664179] print_report+0xd1/0x640 [ 29.664179] ? __virt_addr_valid+0x1db/0x2d0 [ 29.664179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.664179] kasan_report+0x102/0x140 [ 29.672485] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.672485] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.672485] __asan_report_load4_noabort+0x18/0x20 [ 29.672485] kasan_atomics_helper+0x4bbe/0x5450 [ 29.672485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.672485] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.672485] ? trace_hardirqs_on+0x37/0xe0 [ 29.672485] ? kasan_atomics+0x153/0x310 [ 29.672485] kasan_atomics+0x1dd/0x310 [ 29.672485] ? __pfx_kasan_atomics+0x10/0x10 [ 29.672485] ? __pfx_kasan_atomics+0x10/0x10 [ 29.672485] kunit_try_run_case+0x1b3/0x490 [ 29.672485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.672485] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.672485] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.672485] ? __kthread_parkme+0x82/0x160 [ 29.672485] ? preempt_count_sub+0x50/0x80 [ 29.672485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.672485] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.672485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.672485] kthread+0x257/0x310 [ 29.672485] ? __pfx_kthread+0x10/0x10 [ 29.672485] ret_from_fork+0x41/0x80 [ 29.672485] ? __pfx_kthread+0x10/0x10 [ 29.672485] ret_from_fork_asm+0x1a/0x30 [ 29.672485] </TASK> [ 29.672485] [ 29.672485] Allocated by task 274: [ 29.672485] kasan_save_stack+0x3d/0x60 [ 29.672485] kasan_save_track+0x18/0x40 [ 29.672485] kasan_save_alloc_info+0x3b/0x50 [ 29.672485] __kasan_kmalloc+0xb7/0xc0 [ 29.672485] __kmalloc_cache_noprof+0x184/0x410 [ 29.672485] kasan_atomics+0x96/0x310 [ 29.672485] kunit_try_run_case+0x1b3/0x490 [ 29.672485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.672485] kthread+0x257/0x310 [ 29.672485] ret_from_fork+0x41/0x80 [ 29.672485] ret_from_fork_asm+0x1a/0x30 [ 29.672485] [ 29.672485] The buggy address belongs to the object at ffff88810294b780 [ 29.672485] which belongs to the cache kmalloc-64 of size 64 [ 29.672485] The buggy address is located 0 bytes to the right of [ 29.672485] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.672485] [ 29.672485] The buggy address belongs to the physical page: [ 29.672485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.672485] flags: 0x200000000000000(node=0|zone=2) [ 29.672485] page_type: f5(slab) [ 29.672485] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.672485] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.672485] page dumped because: kasan: bad access detected [ 29.672485] [ 29.672485] Memory state around the buggy address: [ 29.672485] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672485] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672485] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.672485] ^ [ 29.672485] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672485] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672485] ================================================================== [ 30.356319] ================================================================== [ 30.356958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 30.358471] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.358471] [ 30.358471] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.358471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.358471] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.358471] Call Trace: [ 30.358471] <TASK> [ 30.358471] dump_stack_lvl+0x73/0xb0 [ 30.358471] print_report+0xd1/0x640 [ 30.358471] ? __virt_addr_valid+0x1db/0x2d0 [ 30.358471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.358471] kasan_report+0x102/0x140 [ 30.358471] ? kasan_atomics_helper+0xa2c/0x5450 [ 30.358471] ? kasan_atomics_helper+0xa2c/0x5450 [ 30.358471] kasan_check_range+0x10c/0x1c0 [ 30.358471] __kasan_check_write+0x18/0x20 [ 30.358471] kasan_atomics_helper+0xa2c/0x5450 [ 30.358471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.358471] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.358471] ? trace_hardirqs_on+0x37/0xe0 [ 30.358471] ? kasan_atomics+0x153/0x310 [ 30.358471] kasan_atomics+0x1dd/0x310 [ 30.358471] ? __pfx_kasan_atomics+0x10/0x10 [ 30.358471] ? __pfx_kasan_atomics+0x10/0x10 [ 30.358471] kunit_try_run_case+0x1b3/0x490 [ 30.358471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.358471] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.358471] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.358471] ? __kthread_parkme+0x82/0x160 [ 30.358471] ? preempt_count_sub+0x50/0x80 [ 30.358471] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.358471] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.358471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.358471] kthread+0x257/0x310 [ 30.358471] ? __pfx_kthread+0x10/0x10 [ 30.358471] ret_from_fork+0x41/0x80 [ 30.358471] ? __pfx_kthread+0x10/0x10 [ 30.358471] ret_from_fork_asm+0x1a/0x30 [ 30.358471] </TASK> [ 30.358471] [ 30.358471] Allocated by task 274: [ 30.358471] kasan_save_stack+0x3d/0x60 [ 30.358471] kasan_save_track+0x18/0x40 [ 30.358471] kasan_save_alloc_info+0x3b/0x50 [ 30.358471] __kasan_kmalloc+0xb7/0xc0 [ 30.358471] __kmalloc_cache_noprof+0x184/0x410 [ 30.358471] kasan_atomics+0x96/0x310 [ 30.358471] kunit_try_run_case+0x1b3/0x490 [ 30.358471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.358471] kthread+0x257/0x310 [ 30.358471] ret_from_fork+0x41/0x80 [ 30.358471] ret_from_fork_asm+0x1a/0x30 [ 30.358471] [ 30.358471] The buggy address belongs to the object at ffff88810294b780 [ 30.358471] which belongs to the cache kmalloc-64 of size 64 [ 30.358471] The buggy address is located 0 bytes to the right of [ 30.358471] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.358471] [ 30.358471] The buggy address belongs to the physical page: [ 30.358471] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.358471] flags: 0x200000000000000(node=0|zone=2) [ 30.358471] page_type: f5(slab) [ 30.358471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.358471] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.358471] page dumped because: kasan: bad access detected [ 30.358471] [ 30.358471] Memory state around the buggy address: [ 30.358471] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.358471] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.358471] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.358471] ^ [ 30.358471] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.358471] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.358471] ================================================================== [ 32.245948] ================================================================== [ 32.246329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 32.246728] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.246728] [ 32.246728] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.246728] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.246728] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.246728] Call Trace: [ 32.246728] <TASK> [ 32.246728] dump_stack_lvl+0x73/0xb0 [ 32.246728] print_report+0xd1/0x640 [ 32.246728] ? __virt_addr_valid+0x1db/0x2d0 [ 32.246728] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.246728] kasan_report+0x102/0x140 [ 32.246728] ? kasan_atomics_helper+0x20c9/0x5450 [ 32.246728] ? kasan_atomics_helper+0x20c9/0x5450 [ 32.246728] kasan_check_range+0x10c/0x1c0 [ 32.246728] __kasan_check_write+0x18/0x20 [ 32.246728] kasan_atomics_helper+0x20c9/0x5450 [ 32.246728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.246728] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.246728] ? trace_hardirqs_on+0x37/0xe0 [ 32.246728] ? kasan_atomics+0x153/0x310 [ 32.246728] kasan_atomics+0x1dd/0x310 [ 32.246728] ? __pfx_kasan_atomics+0x10/0x10 [ 32.246728] ? __pfx_kasan_atomics+0x10/0x10 [ 32.246728] kunit_try_run_case+0x1b3/0x490 [ 32.246728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.246728] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.246728] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.246728] ? __kthread_parkme+0x82/0x160 [ 32.246728] ? preempt_count_sub+0x50/0x80 [ 32.246728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.246728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.246728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.246728] kthread+0x257/0x310 [ 32.246728] ? __pfx_kthread+0x10/0x10 [ 32.246728] ret_from_fork+0x41/0x80 [ 32.246728] ? __pfx_kthread+0x10/0x10 [ 32.246728] ret_from_fork_asm+0x1a/0x30 [ 32.246728] </TASK> [ 32.246728] [ 32.246728] Allocated by task 274: [ 32.246728] kasan_save_stack+0x3d/0x60 [ 32.246728] kasan_save_track+0x18/0x40 [ 32.246728] kasan_save_alloc_info+0x3b/0x50 [ 32.246728] __kasan_kmalloc+0xb7/0xc0 [ 32.246728] __kmalloc_cache_noprof+0x184/0x410 [ 32.246728] kasan_atomics+0x96/0x310 [ 32.246728] kunit_try_run_case+0x1b3/0x490 [ 32.246728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.246728] kthread+0x257/0x310 [ 32.246728] ret_from_fork+0x41/0x80 [ 32.246728] ret_from_fork_asm+0x1a/0x30 [ 32.246728] [ 32.246728] The buggy address belongs to the object at ffff88810294b780 [ 32.246728] which belongs to the cache kmalloc-64 of size 64 [ 32.246728] The buggy address is located 0 bytes to the right of [ 32.246728] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.246728] [ 32.246728] The buggy address belongs to the physical page: [ 32.246728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.246728] flags: 0x200000000000000(node=0|zone=2) [ 32.246728] page_type: f5(slab) [ 32.246728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.246728] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.246728] page dumped because: kasan: bad access detected [ 32.246728] [ 32.246728] Memory state around the buggy address: [ 32.246728] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246728] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246728] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.246728] ^ [ 32.246728] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246728] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.246728] ================================================================== [ 31.670844] ================================================================== [ 31.671410] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 31.671599] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.671599] [ 31.671599] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.672965] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.672965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.672965] Call Trace: [ 31.672965] <TASK> [ 31.672965] dump_stack_lvl+0x73/0xb0 [ 31.672965] print_report+0xd1/0x640 [ 31.672965] ? __virt_addr_valid+0x1db/0x2d0 [ 31.672965] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.672965] kasan_report+0x102/0x140 [ 31.672965] ? kasan_atomics_helper+0x194b/0x5450 [ 31.672965] ? kasan_atomics_helper+0x194b/0x5450 [ 31.672965] kasan_check_range+0x10c/0x1c0 [ 31.672965] __kasan_check_write+0x18/0x20 [ 31.672965] kasan_atomics_helper+0x194b/0x5450 [ 31.672965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.672965] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.672965] ? trace_hardirqs_on+0x37/0xe0 [ 31.672965] ? kasan_atomics+0x153/0x310 [ 31.672965] kasan_atomics+0x1dd/0x310 [ 31.672965] ? __pfx_kasan_atomics+0x10/0x10 [ 31.672965] ? __pfx_kasan_atomics+0x10/0x10 [ 31.672965] kunit_try_run_case+0x1b3/0x490 [ 31.672965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.672965] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.672965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.672965] ? __kthread_parkme+0x82/0x160 [ 31.672965] ? preempt_count_sub+0x50/0x80 [ 31.672965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.672965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.672965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.672965] kthread+0x257/0x310 [ 31.672965] ? __pfx_kthread+0x10/0x10 [ 31.672965] ret_from_fork+0x41/0x80 [ 31.672965] ? __pfx_kthread+0x10/0x10 [ 31.672965] ret_from_fork_asm+0x1a/0x30 [ 31.672965] </TASK> [ 31.672965] [ 31.672965] Allocated by task 274: [ 31.672965] kasan_save_stack+0x3d/0x60 [ 31.672965] kasan_save_track+0x18/0x40 [ 31.672965] kasan_save_alloc_info+0x3b/0x50 [ 31.672965] __kasan_kmalloc+0xb7/0xc0 [ 31.672965] __kmalloc_cache_noprof+0x184/0x410 [ 31.672965] kasan_atomics+0x96/0x310 [ 31.672965] kunit_try_run_case+0x1b3/0x490 [ 31.672965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.672965] kthread+0x257/0x310 [ 31.672965] ret_from_fork+0x41/0x80 [ 31.672965] ret_from_fork_asm+0x1a/0x30 [ 31.672965] [ 31.672965] The buggy address belongs to the object at ffff88810294b780 [ 31.672965] which belongs to the cache kmalloc-64 of size 64 [ 31.672965] The buggy address is located 0 bytes to the right of [ 31.672965] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.672965] [ 31.672965] The buggy address belongs to the physical page: [ 31.672965] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.672965] flags: 0x200000000000000(node=0|zone=2) [ 31.672965] page_type: f5(slab) [ 31.672965] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.672965] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.672965] page dumped because: kasan: bad access detected [ 31.672965] [ 31.672965] Memory state around the buggy address: [ 31.672965] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.672965] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.672965] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.672965] ^ [ 31.672965] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.672965] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.672965] ================================================================== [ 30.137527] ================================================================== [ 30.138320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 30.138394] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.138394] [ 30.138394] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.138394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.138394] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.138394] Call Trace: [ 30.138394] <TASK> [ 30.138394] dump_stack_lvl+0x73/0xb0 [ 30.138394] print_report+0xd1/0x640 [ 30.138394] ? __virt_addr_valid+0x1db/0x2d0 [ 30.138394] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.138394] kasan_report+0x102/0x140 [ 30.138394] ? kasan_atomics_helper+0x730/0x5450 [ 30.138394] ? kasan_atomics_helper+0x730/0x5450 [ 30.138394] kasan_check_range+0x10c/0x1c0 [ 30.138394] __kasan_check_write+0x18/0x20 [ 30.138394] kasan_atomics_helper+0x730/0x5450 [ 30.138394] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.138394] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.138394] ? trace_hardirqs_on+0x37/0xe0 [ 30.138394] ? kasan_atomics+0x153/0x310 [ 30.138394] kasan_atomics+0x1dd/0x310 [ 30.138394] ? __pfx_kasan_atomics+0x10/0x10 [ 30.138394] ? __pfx_kasan_atomics+0x10/0x10 [ 30.138394] kunit_try_run_case+0x1b3/0x490 [ 30.138394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.138394] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.138394] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.138394] ? __kthread_parkme+0x82/0x160 [ 30.138394] ? preempt_count_sub+0x50/0x80 [ 30.138394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.138394] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.138394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.138394] kthread+0x257/0x310 [ 30.138394] ? __pfx_kthread+0x10/0x10 [ 30.138394] ret_from_fork+0x41/0x80 [ 30.138394] ? __pfx_kthread+0x10/0x10 [ 30.138394] ret_from_fork_asm+0x1a/0x30 [ 30.138394] </TASK> [ 30.138394] [ 30.138394] Allocated by task 274: [ 30.138394] kasan_save_stack+0x3d/0x60 [ 30.138394] kasan_save_track+0x18/0x40 [ 30.138394] kasan_save_alloc_info+0x3b/0x50 [ 30.138394] __kasan_kmalloc+0xb7/0xc0 [ 30.138394] __kmalloc_cache_noprof+0x184/0x410 [ 30.138394] kasan_atomics+0x96/0x310 [ 30.138394] kunit_try_run_case+0x1b3/0x490 [ 30.138394] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.138394] kthread+0x257/0x310 [ 30.138394] ret_from_fork+0x41/0x80 [ 30.138394] ret_from_fork_asm+0x1a/0x30 [ 30.138394] [ 30.138394] The buggy address belongs to the object at ffff88810294b780 [ 30.138394] which belongs to the cache kmalloc-64 of size 64 [ 30.138394] The buggy address is located 0 bytes to the right of [ 30.138394] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.138394] [ 30.138394] The buggy address belongs to the physical page: [ 30.138394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.138394] flags: 0x200000000000000(node=0|zone=2) [ 30.138394] page_type: f5(slab) [ 30.138394] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.138394] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.138394] page dumped because: kasan: bad access detected [ 30.138394] [ 30.138394] Memory state around the buggy address: [ 30.138394] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.138394] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.138394] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.138394] ^ [ 30.138394] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.138394] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.138394] ================================================================== [ 30.049634] ================================================================== [ 30.050307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 30.050376] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.050376] [ 30.050376] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.050376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.050376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.050376] Call Trace: [ 30.050376] <TASK> [ 30.050376] dump_stack_lvl+0x73/0xb0 [ 30.050376] print_report+0xd1/0x640 [ 30.050376] ? __virt_addr_valid+0x1db/0x2d0 [ 30.050376] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.050376] kasan_report+0x102/0x140 [ 30.050376] ? kasan_atomics_helper+0x5ff/0x5450 [ 30.050376] ? kasan_atomics_helper+0x5ff/0x5450 [ 30.050376] kasan_check_range+0x10c/0x1c0 [ 30.050376] __kasan_check_write+0x18/0x20 [ 30.050376] kasan_atomics_helper+0x5ff/0x5450 [ 30.050376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.050376] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.050376] ? trace_hardirqs_on+0x37/0xe0 [ 30.050376] ? kasan_atomics+0x153/0x310 [ 30.050376] kasan_atomics+0x1dd/0x310 [ 30.050376] ? __pfx_kasan_atomics+0x10/0x10 [ 30.050376] ? __pfx_kasan_atomics+0x10/0x10 [ 30.050376] kunit_try_run_case+0x1b3/0x490 [ 30.050376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.050376] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.050376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.050376] ? __kthread_parkme+0x82/0x160 [ 30.050376] ? preempt_count_sub+0x50/0x80 [ 30.050376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.050376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.050376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.050376] kthread+0x257/0x310 [ 30.050376] ? __pfx_kthread+0x10/0x10 [ 30.050376] ret_from_fork+0x41/0x80 [ 30.050376] ? __pfx_kthread+0x10/0x10 [ 30.050376] ret_from_fork_asm+0x1a/0x30 [ 30.050376] </TASK> [ 30.050376] [ 30.050376] Allocated by task 274: [ 30.050376] kasan_save_stack+0x3d/0x60 [ 30.050376] kasan_save_track+0x18/0x40 [ 30.050376] kasan_save_alloc_info+0x3b/0x50 [ 30.050376] __kasan_kmalloc+0xb7/0xc0 [ 30.050376] __kmalloc_cache_noprof+0x184/0x410 [ 30.050376] kasan_atomics+0x96/0x310 [ 30.050376] kunit_try_run_case+0x1b3/0x490 [ 30.050376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.050376] kthread+0x257/0x310 [ 30.050376] ret_from_fork+0x41/0x80 [ 30.050376] ret_from_fork_asm+0x1a/0x30 [ 30.050376] [ 30.050376] The buggy address belongs to the object at ffff88810294b780 [ 30.050376] which belongs to the cache kmalloc-64 of size 64 [ 30.050376] The buggy address is located 0 bytes to the right of [ 30.050376] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.050376] [ 30.050376] The buggy address belongs to the physical page: [ 30.050376] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.050376] flags: 0x200000000000000(node=0|zone=2) [ 30.050376] page_type: f5(slab) [ 30.050376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.050376] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.050376] page dumped because: kasan: bad access detected [ 30.050376] [ 30.050376] Memory state around the buggy address: [ 30.050376] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.050376] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.050376] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.050376] ^ [ 30.050376] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050376] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.050376] ================================================================== [ 32.163994] ================================================================== [ 32.164152] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 32.164152] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.164152] [ 32.164152] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.164152] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.164152] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.164152] Call Trace: [ 32.164152] <TASK> [ 32.164152] dump_stack_lvl+0x73/0xb0 [ 32.164152] print_report+0xd1/0x640 [ 32.170011] ? __virt_addr_valid+0x1db/0x2d0 [ 32.170011] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.170011] kasan_report+0x102/0x140 [ 32.170011] ? kasan_atomics_helper+0x2007/0x5450 [ 32.170011] ? kasan_atomics_helper+0x2007/0x5450 [ 32.170011] kasan_check_range+0x10c/0x1c0 [ 32.170011] __kasan_check_write+0x18/0x20 [ 32.170011] kasan_atomics_helper+0x2007/0x5450 [ 32.170011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.170011] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.170011] ? trace_hardirqs_on+0x37/0xe0 [ 32.170011] ? kasan_atomics+0x153/0x310 [ 32.170011] kasan_atomics+0x1dd/0x310 [ 32.170011] ? __pfx_kasan_atomics+0x10/0x10 [ 32.170011] ? __pfx_kasan_atomics+0x10/0x10 [ 32.170011] kunit_try_run_case+0x1b3/0x490 [ 32.170011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.170011] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.170011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.170011] ? __kthread_parkme+0x82/0x160 [ 32.170011] ? preempt_count_sub+0x50/0x80 [ 32.170011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.170011] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.170011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.170011] kthread+0x257/0x310 [ 32.170011] ? __pfx_kthread+0x10/0x10 [ 32.170011] ret_from_fork+0x41/0x80 [ 32.170011] ? __pfx_kthread+0x10/0x10 [ 32.170011] ret_from_fork_asm+0x1a/0x30 [ 32.170011] </TASK> [ 32.170011] [ 32.170011] Allocated by task 274: [ 32.170011] kasan_save_stack+0x3d/0x60 [ 32.170011] kasan_save_track+0x18/0x40 [ 32.170011] kasan_save_alloc_info+0x3b/0x50 [ 32.170011] __kasan_kmalloc+0xb7/0xc0 [ 32.170011] __kmalloc_cache_noprof+0x184/0x410 [ 32.170011] kasan_atomics+0x96/0x310 [ 32.170011] kunit_try_run_case+0x1b3/0x490 [ 32.170011] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.170011] kthread+0x257/0x310 [ 32.170011] ret_from_fork+0x41/0x80 [ 32.170011] ret_from_fork_asm+0x1a/0x30 [ 32.170011] [ 32.170011] The buggy address belongs to the object at ffff88810294b780 [ 32.170011] which belongs to the cache kmalloc-64 of size 64 [ 32.170011] The buggy address is located 0 bytes to the right of [ 32.170011] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.170011] [ 32.170011] The buggy address belongs to the physical page: [ 32.170011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.170011] flags: 0x200000000000000(node=0|zone=2) [ 32.170011] page_type: f5(slab) [ 32.170011] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.170011] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.170011] page dumped because: kasan: bad access detected [ 32.170011] [ 32.170011] Memory state around the buggy address: [ 32.170011] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.170011] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.170011] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.170011] ^ [ 32.170011] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.170011] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.170011] ================================================================== [ 32.001355] ================================================================== [ 32.002056] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 32.002240] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.002240] [ 32.002240] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.002240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.002240] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.002240] Call Trace: [ 32.002240] <TASK> [ 32.002240] dump_stack_lvl+0x73/0xb0 [ 32.002240] print_report+0xd1/0x640 [ 32.002240] ? __virt_addr_valid+0x1db/0x2d0 [ 32.002240] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.002240] kasan_report+0x102/0x140 [ 32.002240] ? kasan_atomics_helper+0x1e13/0x5450 [ 32.002240] ? kasan_atomics_helper+0x1e13/0x5450 [ 32.002240] kasan_check_range+0x10c/0x1c0 [ 32.002240] __kasan_check_write+0x18/0x20 [ 32.002240] kasan_atomics_helper+0x1e13/0x5450 [ 32.002240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.002240] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.002240] ? trace_hardirqs_on+0x37/0xe0 [ 32.002240] ? kasan_atomics+0x153/0x310 [ 32.002240] kasan_atomics+0x1dd/0x310 [ 32.002240] ? __pfx_kasan_atomics+0x10/0x10 [ 32.002240] ? __pfx_kasan_atomics+0x10/0x10 [ 32.002240] kunit_try_run_case+0x1b3/0x490 [ 32.002240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.002240] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.002240] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.002240] ? __kthread_parkme+0x82/0x160 [ 32.002240] ? preempt_count_sub+0x50/0x80 [ 32.002240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.002240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.002240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.002240] kthread+0x257/0x310 [ 32.002240] ? __pfx_kthread+0x10/0x10 [ 32.002240] ret_from_fork+0x41/0x80 [ 32.002240] ? __pfx_kthread+0x10/0x10 [ 32.002240] ret_from_fork_asm+0x1a/0x30 [ 32.002240] </TASK> [ 32.002240] [ 32.002240] Allocated by task 274: [ 32.002240] kasan_save_stack+0x3d/0x60 [ 32.002240] kasan_save_track+0x18/0x40 [ 32.002240] kasan_save_alloc_info+0x3b/0x50 [ 32.002240] __kasan_kmalloc+0xb7/0xc0 [ 32.002240] __kmalloc_cache_noprof+0x184/0x410 [ 32.002240] kasan_atomics+0x96/0x310 [ 32.002240] kunit_try_run_case+0x1b3/0x490 [ 32.002240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.002240] kthread+0x257/0x310 [ 32.002240] ret_from_fork+0x41/0x80 [ 32.002240] ret_from_fork_asm+0x1a/0x30 [ 32.002240] [ 32.002240] The buggy address belongs to the object at ffff88810294b780 [ 32.002240] which belongs to the cache kmalloc-64 of size 64 [ 32.002240] The buggy address is located 0 bytes to the right of [ 32.002240] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.002240] [ 32.002240] The buggy address belongs to the physical page: [ 32.002240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.002240] flags: 0x200000000000000(node=0|zone=2) [ 32.002240] page_type: f5(slab) [ 32.002240] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.002240] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.002240] page dumped because: kasan: bad access detected [ 32.002240] [ 32.002240] Memory state around the buggy address: [ 32.002240] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.002240] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.002240] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.002240] ^ [ 32.002240] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.002240] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.002240] ================================================================== [ 30.220468] ================================================================== [ 30.221171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 30.222430] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.222430] [ 30.222430] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.222430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.222430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.222430] Call Trace: [ 30.222430] <TASK> [ 30.222430] dump_stack_lvl+0x73/0xb0 [ 30.222430] print_report+0xd1/0x640 [ 30.222430] ? __virt_addr_valid+0x1db/0x2d0 [ 30.222430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.222430] kasan_report+0x102/0x140 [ 30.222430] ? kasan_atomics_helper+0x861/0x5450 [ 30.222430] ? kasan_atomics_helper+0x861/0x5450 [ 30.222430] kasan_check_range+0x10c/0x1c0 [ 30.222430] __kasan_check_write+0x18/0x20 [ 30.222430] kasan_atomics_helper+0x861/0x5450 [ 30.222430] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.222430] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.222430] ? trace_hardirqs_on+0x37/0xe0 [ 30.222430] ? kasan_atomics+0x153/0x310 [ 30.222430] kasan_atomics+0x1dd/0x310 [ 30.222430] ? __pfx_kasan_atomics+0x10/0x10 [ 30.222430] ? __pfx_kasan_atomics+0x10/0x10 [ 30.222430] kunit_try_run_case+0x1b3/0x490 [ 30.222430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.222430] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.222430] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.222430] ? __kthread_parkme+0x82/0x160 [ 30.222430] ? preempt_count_sub+0x50/0x80 [ 30.222430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.222430] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.222430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.222430] kthread+0x257/0x310 [ 30.222430] ? __pfx_kthread+0x10/0x10 [ 30.222430] ret_from_fork+0x41/0x80 [ 30.222430] ? __pfx_kthread+0x10/0x10 [ 30.222430] ret_from_fork_asm+0x1a/0x30 [ 30.222430] </TASK> [ 30.222430] [ 30.222430] Allocated by task 274: [ 30.222430] kasan_save_stack+0x3d/0x60 [ 30.222430] kasan_save_track+0x18/0x40 [ 30.222430] kasan_save_alloc_info+0x3b/0x50 [ 30.222430] __kasan_kmalloc+0xb7/0xc0 [ 30.222430] __kmalloc_cache_noprof+0x184/0x410 [ 30.222430] kasan_atomics+0x96/0x310 [ 30.222430] kunit_try_run_case+0x1b3/0x490 [ 30.222430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.222430] kthread+0x257/0x310 [ 30.222430] ret_from_fork+0x41/0x80 [ 30.222430] ret_from_fork_asm+0x1a/0x30 [ 30.222430] [ 30.222430] The buggy address belongs to the object at ffff88810294b780 [ 30.222430] which belongs to the cache kmalloc-64 of size 64 [ 30.222430] The buggy address is located 0 bytes to the right of [ 30.222430] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.222430] [ 30.222430] The buggy address belongs to the physical page: [ 30.222430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.222430] flags: 0x200000000000000(node=0|zone=2) [ 30.222430] page_type: f5(slab) [ 30.222430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.222430] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.222430] page dumped because: kasan: bad access detected [ 30.222430] [ 30.222430] Memory state around the buggy address: [ 30.222430] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.222430] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.222430] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.222430] ^ [ 30.222430] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222430] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.222430] ================================================================== [ 31.264019] ================================================================== [ 31.264416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 31.264655] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.264655] [ 31.264655] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.264655] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.264655] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.264655] Call Trace: [ 31.264655] <TASK> [ 31.264655] dump_stack_lvl+0x73/0xb0 [ 31.264655] print_report+0xd1/0x640 [ 31.264655] ? __virt_addr_valid+0x1db/0x2d0 [ 31.264655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.264655] kasan_report+0x102/0x140 [ 31.264655] ? kasan_atomics_helper+0x1468/0x5450 [ 31.264655] ? kasan_atomics_helper+0x1468/0x5450 [ 31.264655] kasan_check_range+0x10c/0x1c0 [ 31.264655] __kasan_check_write+0x18/0x20 [ 31.264655] kasan_atomics_helper+0x1468/0x5450 [ 31.264655] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.264655] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.264655] ? trace_hardirqs_on+0x37/0xe0 [ 31.264655] ? kasan_atomics+0x153/0x310 [ 31.264655] kasan_atomics+0x1dd/0x310 [ 31.264655] ? __pfx_kasan_atomics+0x10/0x10 [ 31.264655] ? __pfx_kasan_atomics+0x10/0x10 [ 31.264655] kunit_try_run_case+0x1b3/0x490 [ 31.264655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.264655] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.264655] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.264655] ? __kthread_parkme+0x82/0x160 [ 31.264655] ? preempt_count_sub+0x50/0x80 [ 31.264655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.264655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.264655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.264655] kthread+0x257/0x310 [ 31.264655] ? __pfx_kthread+0x10/0x10 [ 31.264655] ret_from_fork+0x41/0x80 [ 31.264655] ? __pfx_kthread+0x10/0x10 [ 31.264655] ret_from_fork_asm+0x1a/0x30 [ 31.264655] </TASK> [ 31.264655] [ 31.264655] Allocated by task 274: [ 31.264655] kasan_save_stack+0x3d/0x60 [ 31.264655] kasan_save_track+0x18/0x40 [ 31.264655] kasan_save_alloc_info+0x3b/0x50 [ 31.264655] __kasan_kmalloc+0xb7/0xc0 [ 31.264655] __kmalloc_cache_noprof+0x184/0x410 [ 31.264655] kasan_atomics+0x96/0x310 [ 31.264655] kunit_try_run_case+0x1b3/0x490 [ 31.264655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.264655] kthread+0x257/0x310 [ 31.264655] ret_from_fork+0x41/0x80 [ 31.264655] ret_from_fork_asm+0x1a/0x30 [ 31.264655] [ 31.264655] The buggy address belongs to the object at ffff88810294b780 [ 31.264655] which belongs to the cache kmalloc-64 of size 64 [ 31.264655] The buggy address is located 0 bytes to the right of [ 31.264655] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.264655] [ 31.264655] The buggy address belongs to the physical page: [ 31.264655] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.264655] flags: 0x200000000000000(node=0|zone=2) [ 31.264655] page_type: f5(slab) [ 31.264655] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.264655] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.264655] page dumped because: kasan: bad access detected [ 31.264655] [ 31.264655] Memory state around the buggy address: [ 31.264655] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.264655] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.264655] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.264655] ^ [ 31.264655] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264655] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.264655] ================================================================== [ 30.437166] ================================================================== [ 30.437589] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 30.438255] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.438255] [ 30.438255] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.438255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.438255] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.438255] Call Trace: [ 30.438255] <TASK> [ 30.438255] dump_stack_lvl+0x73/0xb0 [ 30.438255] print_report+0xd1/0x640 [ 30.438255] ? __virt_addr_valid+0x1db/0x2d0 [ 30.438255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.438255] kasan_report+0x102/0x140 [ 30.438255] ? kasan_atomics_helper+0xb6b/0x5450 [ 30.438255] ? kasan_atomics_helper+0xb6b/0x5450 [ 30.438255] kasan_check_range+0x10c/0x1c0 [ 30.438255] __kasan_check_write+0x18/0x20 [ 30.438255] kasan_atomics_helper+0xb6b/0x5450 [ 30.438255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.438255] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.438255] ? trace_hardirqs_on+0x37/0xe0 [ 30.438255] ? kasan_atomics+0x153/0x310 [ 30.438255] kasan_atomics+0x1dd/0x310 [ 30.438255] ? __pfx_kasan_atomics+0x10/0x10 [ 30.438255] ? __pfx_kasan_atomics+0x10/0x10 [ 30.438255] kunit_try_run_case+0x1b3/0x490 [ 30.438255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.438255] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.438255] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.438255] ? __kthread_parkme+0x82/0x160 [ 30.438255] ? preempt_count_sub+0x50/0x80 [ 30.438255] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.438255] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.438255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.438255] kthread+0x257/0x310 [ 30.438255] ? __pfx_kthread+0x10/0x10 [ 30.438255] ret_from_fork+0x41/0x80 [ 30.438255] ? __pfx_kthread+0x10/0x10 [ 30.438255] ret_from_fork_asm+0x1a/0x30 [ 30.438255] </TASK> [ 30.438255] [ 30.438255] Allocated by task 274: [ 30.438255] kasan_save_stack+0x3d/0x60 [ 30.438255] kasan_save_track+0x18/0x40 [ 30.438255] kasan_save_alloc_info+0x3b/0x50 [ 30.438255] __kasan_kmalloc+0xb7/0xc0 [ 30.438255] __kmalloc_cache_noprof+0x184/0x410 [ 30.438255] kasan_atomics+0x96/0x310 [ 30.438255] kunit_try_run_case+0x1b3/0x490 [ 30.438255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.438255] kthread+0x257/0x310 [ 30.438255] ret_from_fork+0x41/0x80 [ 30.438255] ret_from_fork_asm+0x1a/0x30 [ 30.438255] [ 30.438255] The buggy address belongs to the object at ffff88810294b780 [ 30.438255] which belongs to the cache kmalloc-64 of size 64 [ 30.438255] The buggy address is located 0 bytes to the right of [ 30.438255] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.438255] [ 30.438255] The buggy address belongs to the physical page: [ 30.438255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.438255] flags: 0x200000000000000(node=0|zone=2) [ 30.438255] page_type: f5(slab) [ 30.438255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.438255] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.438255] page dumped because: kasan: bad access detected [ 30.438255] [ 30.438255] Memory state around the buggy address: [ 30.438255] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.438255] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.438255] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.438255] ^ [ 30.438255] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.438255] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.438255] ================================================================== [ 31.223754] ================================================================== [ 31.224335] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 31.224335] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.224335] [ 31.224335] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.224335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.224335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.224335] Call Trace: [ 31.224335] <TASK> [ 31.224335] dump_stack_lvl+0x73/0xb0 [ 31.224335] print_report+0xd1/0x640 [ 31.224335] ? __virt_addr_valid+0x1db/0x2d0 [ 31.224335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.224335] kasan_report+0x102/0x140 [ 31.224335] ? kasan_atomics_helper+0x4eb0/0x5450 [ 31.224335] ? kasan_atomics_helper+0x4eb0/0x5450 [ 31.224335] __asan_report_load8_noabort+0x18/0x20 [ 31.224335] kasan_atomics_helper+0x4eb0/0x5450 [ 31.224335] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.224335] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.224335] ? trace_hardirqs_on+0x37/0xe0 [ 31.224335] ? kasan_atomics+0x153/0x310 [ 31.224335] kasan_atomics+0x1dd/0x310 [ 31.224335] ? __pfx_kasan_atomics+0x10/0x10 [ 31.224335] ? __pfx_kasan_atomics+0x10/0x10 [ 31.224335] kunit_try_run_case+0x1b3/0x490 [ 31.224335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.224335] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.224335] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.224335] ? __kthread_parkme+0x82/0x160 [ 31.224335] ? preempt_count_sub+0x50/0x80 [ 31.224335] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.224335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.224335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.224335] kthread+0x257/0x310 [ 31.224335] ? __pfx_kthread+0x10/0x10 [ 31.224335] ret_from_fork+0x41/0x80 [ 31.224335] ? __pfx_kthread+0x10/0x10 [ 31.224335] ret_from_fork_asm+0x1a/0x30 [ 31.224335] </TASK> [ 31.224335] [ 31.224335] Allocated by task 274: [ 31.224335] kasan_save_stack+0x3d/0x60 [ 31.224335] kasan_save_track+0x18/0x40 [ 31.224335] kasan_save_alloc_info+0x3b/0x50 [ 31.224335] __kasan_kmalloc+0xb7/0xc0 [ 31.224335] __kmalloc_cache_noprof+0x184/0x410 [ 31.224335] kasan_atomics+0x96/0x310 [ 31.224335] kunit_try_run_case+0x1b3/0x490 [ 31.224335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.224335] kthread+0x257/0x310 [ 31.224335] ret_from_fork+0x41/0x80 [ 31.224335] ret_from_fork_asm+0x1a/0x30 [ 31.224335] [ 31.224335] The buggy address belongs to the object at ffff88810294b780 [ 31.224335] which belongs to the cache kmalloc-64 of size 64 [ 31.224335] The buggy address is located 0 bytes to the right of [ 31.224335] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.224335] [ 31.224335] The buggy address belongs to the physical page: [ 31.224335] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.224335] flags: 0x200000000000000(node=0|zone=2) [ 31.224335] page_type: f5(slab) [ 31.224335] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.224335] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.224335] page dumped because: kasan: bad access detected [ 31.224335] [ 31.224335] Memory state around the buggy address: [ 31.224335] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.224335] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.224335] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.224335] ^ [ 31.224335] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.224335] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.224335] ================================================================== [ 32.208036] ================================================================== [ 32.208766] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 32.208766] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.209150] [ 32.209150] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.209150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.209150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.209150] Call Trace: [ 32.209150] <TASK> [ 32.209150] dump_stack_lvl+0x73/0xb0 [ 32.209150] print_report+0xd1/0x640 [ 32.209150] ? __virt_addr_valid+0x1db/0x2d0 [ 32.209150] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.209150] kasan_report+0x102/0x140 [ 32.209150] ? kasan_atomics_helper+0x4f9a/0x5450 [ 32.209150] ? kasan_atomics_helper+0x4f9a/0x5450 [ 32.209150] __asan_report_load8_noabort+0x18/0x20 [ 32.209150] kasan_atomics_helper+0x4f9a/0x5450 [ 32.209150] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.209150] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.209150] ? trace_hardirqs_on+0x37/0xe0 [ 32.209150] ? kasan_atomics+0x153/0x310 [ 32.209150] kasan_atomics+0x1dd/0x310 [ 32.209150] ? __pfx_kasan_atomics+0x10/0x10 [ 32.209150] ? __pfx_kasan_atomics+0x10/0x10 [ 32.209150] kunit_try_run_case+0x1b3/0x490 [ 32.209150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.209150] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.209150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.209150] ? __kthread_parkme+0x82/0x160 [ 32.209150] ? preempt_count_sub+0x50/0x80 [ 32.209150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.209150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.209150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.209150] kthread+0x257/0x310 [ 32.209150] ? __pfx_kthread+0x10/0x10 [ 32.209150] ret_from_fork+0x41/0x80 [ 32.209150] ? __pfx_kthread+0x10/0x10 [ 32.209150] ret_from_fork_asm+0x1a/0x30 [ 32.209150] </TASK> [ 32.209150] [ 32.209150] Allocated by task 274: [ 32.209150] kasan_save_stack+0x3d/0x60 [ 32.209150] kasan_save_track+0x18/0x40 [ 32.209150] kasan_save_alloc_info+0x3b/0x50 [ 32.209150] __kasan_kmalloc+0xb7/0xc0 [ 32.209150] __kmalloc_cache_noprof+0x184/0x410 [ 32.209150] kasan_atomics+0x96/0x310 [ 32.209150] kunit_try_run_case+0x1b3/0x490 [ 32.209150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.209150] kthread+0x257/0x310 [ 32.209150] ret_from_fork+0x41/0x80 [ 32.209150] ret_from_fork_asm+0x1a/0x30 [ 32.209150] [ 32.209150] The buggy address belongs to the object at ffff88810294b780 [ 32.209150] which belongs to the cache kmalloc-64 of size 64 [ 32.209150] The buggy address is located 0 bytes to the right of [ 32.209150] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.209150] [ 32.209150] The buggy address belongs to the physical page: [ 32.209150] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.209150] flags: 0x200000000000000(node=0|zone=2) [ 32.209150] page_type: f5(slab) [ 32.209150] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.209150] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.209150] page dumped because: kasan: bad access detected [ 32.209150] [ 32.209150] Memory state around the buggy address: [ 32.209150] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.209150] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.209150] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.209150] ^ [ 32.209150] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.209150] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.209150] ================================================================== [ 30.309875] ================================================================== [ 30.310922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 30.310922] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.310922] [ 30.310922] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.310922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.310922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.310922] Call Trace: [ 30.310922] <TASK> [ 30.310922] dump_stack_lvl+0x73/0xb0 [ 30.310922] print_report+0xd1/0x640 [ 30.310922] ? __virt_addr_valid+0x1db/0x2d0 [ 30.310922] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.310922] kasan_report+0x102/0x140 [ 30.310922] ? kasan_atomics_helper+0x993/0x5450 [ 30.310922] ? kasan_atomics_helper+0x993/0x5450 [ 30.310922] kasan_check_range+0x10c/0x1c0 [ 30.310922] __kasan_check_write+0x18/0x20 [ 30.310922] kasan_atomics_helper+0x993/0x5450 [ 30.310922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.310922] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.310922] ? trace_hardirqs_on+0x37/0xe0 [ 30.310922] ? kasan_atomics+0x153/0x310 [ 30.310922] kasan_atomics+0x1dd/0x310 [ 30.310922] ? __pfx_kasan_atomics+0x10/0x10 [ 30.310922] ? __pfx_kasan_atomics+0x10/0x10 [ 30.310922] kunit_try_run_case+0x1b3/0x490 [ 30.310922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.310922] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.310922] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.310922] ? __kthread_parkme+0x82/0x160 [ 30.310922] ? preempt_count_sub+0x50/0x80 [ 30.310922] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.310922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.310922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.310922] kthread+0x257/0x310 [ 30.310922] ? __pfx_kthread+0x10/0x10 [ 30.310922] ret_from_fork+0x41/0x80 [ 30.310922] ? __pfx_kthread+0x10/0x10 [ 30.310922] ret_from_fork_asm+0x1a/0x30 [ 30.310922] </TASK> [ 30.310922] [ 30.310922] Allocated by task 274: [ 30.310922] kasan_save_stack+0x3d/0x60 [ 30.310922] kasan_save_track+0x18/0x40 [ 30.310922] kasan_save_alloc_info+0x3b/0x50 [ 30.310922] __kasan_kmalloc+0xb7/0xc0 [ 30.310922] __kmalloc_cache_noprof+0x184/0x410 [ 30.310922] kasan_atomics+0x96/0x310 [ 30.310922] kunit_try_run_case+0x1b3/0x490 [ 30.310922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.310922] kthread+0x257/0x310 [ 30.310922] ret_from_fork+0x41/0x80 [ 30.310922] ret_from_fork_asm+0x1a/0x30 [ 30.310922] [ 30.310922] The buggy address belongs to the object at ffff88810294b780 [ 30.310922] which belongs to the cache kmalloc-64 of size 64 [ 30.310922] The buggy address is located 0 bytes to the right of [ 30.310922] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.310922] [ 30.310922] The buggy address belongs to the physical page: [ 30.310922] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.310922] flags: 0x200000000000000(node=0|zone=2) [ 30.310922] page_type: f5(slab) [ 30.310922] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.310922] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.310922] page dumped because: kasan: bad access detected [ 30.310922] [ 30.310922] Memory state around the buggy address: [ 30.310922] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.310922] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.310922] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.310922] ^ [ 30.310922] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.310922] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.310922] ================================================================== [ 30.485080] ================================================================== [ 30.485353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 30.485353] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.485353] [ 30.485353] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.485353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.485353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.485353] Call Trace: [ 30.485353] <TASK> [ 30.485353] dump_stack_lvl+0x73/0xb0 [ 30.485353] print_report+0xd1/0x640 [ 30.485353] ? __virt_addr_valid+0x1db/0x2d0 [ 30.485353] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.485353] kasan_report+0x102/0x140 [ 30.485353] ? kasan_atomics_helper+0xc71/0x5450 [ 30.485353] ? kasan_atomics_helper+0xc71/0x5450 [ 30.485353] kasan_check_range+0x10c/0x1c0 [ 30.485353] __kasan_check_write+0x18/0x20 [ 30.485353] kasan_atomics_helper+0xc71/0x5450 [ 30.485353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.485353] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.485353] ? trace_hardirqs_on+0x37/0xe0 [ 30.485353] ? kasan_atomics+0x153/0x310 [ 30.485353] kasan_atomics+0x1dd/0x310 [ 30.485353] ? __pfx_kasan_atomics+0x10/0x10 [ 30.485353] ? __pfx_kasan_atomics+0x10/0x10 [ 30.485353] kunit_try_run_case+0x1b3/0x490 [ 30.485353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.485353] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.485353] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.485353] ? __kthread_parkme+0x82/0x160 [ 30.485353] ? preempt_count_sub+0x50/0x80 [ 30.485353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.485353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.485353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.485353] kthread+0x257/0x310 [ 30.485353] ? __pfx_kthread+0x10/0x10 [ 30.485353] ret_from_fork+0x41/0x80 [ 30.485353] ? __pfx_kthread+0x10/0x10 [ 30.485353] ret_from_fork_asm+0x1a/0x30 [ 30.485353] </TASK> [ 30.485353] [ 30.485353] Allocated by task 274: [ 30.485353] kasan_save_stack+0x3d/0x60 [ 30.485353] kasan_save_track+0x18/0x40 [ 30.485353] kasan_save_alloc_info+0x3b/0x50 [ 30.485353] __kasan_kmalloc+0xb7/0xc0 [ 30.485353] __kmalloc_cache_noprof+0x184/0x410 [ 30.485353] kasan_atomics+0x96/0x310 [ 30.485353] kunit_try_run_case+0x1b3/0x490 [ 30.485353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.485353] kthread+0x257/0x310 [ 30.485353] ret_from_fork+0x41/0x80 [ 30.485353] ret_from_fork_asm+0x1a/0x30 [ 30.485353] [ 30.485353] The buggy address belongs to the object at ffff88810294b780 [ 30.485353] which belongs to the cache kmalloc-64 of size 64 [ 30.485353] The buggy address is located 0 bytes to the right of [ 30.485353] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.485353] [ 30.485353] The buggy address belongs to the physical page: [ 30.485353] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.485353] flags: 0x200000000000000(node=0|zone=2) [ 30.485353] page_type: f5(slab) [ 30.485353] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.485353] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.485353] page dumped because: kasan: bad access detected [ 30.485353] [ 30.485353] Memory state around the buggy address: [ 30.485353] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.485353] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.485353] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.485353] ^ [ 30.485353] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485353] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.485353] ================================================================== [ 30.797411] ================================================================== [ 30.797762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 30.797762] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.797762] [ 30.797762] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.797762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.800366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.800366] Call Trace: [ 30.800366] <TASK> [ 30.800366] dump_stack_lvl+0x73/0xb0 [ 30.800366] print_report+0xd1/0x640 [ 30.800366] ? __virt_addr_valid+0x1db/0x2d0 [ 30.800366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.800366] kasan_report+0x102/0x140 [ 30.800366] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.800366] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.800366] __asan_report_load4_noabort+0x18/0x20 [ 30.800366] kasan_atomics_helper+0x4a38/0x5450 [ 30.800366] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.800366] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.800366] ? trace_hardirqs_on+0x37/0xe0 [ 30.800366] ? kasan_atomics+0x153/0x310 [ 30.800366] kasan_atomics+0x1dd/0x310 [ 30.800366] ? __pfx_kasan_atomics+0x10/0x10 [ 30.800366] ? __pfx_kasan_atomics+0x10/0x10 [ 30.800366] kunit_try_run_case+0x1b3/0x490 [ 30.800366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.800366] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.800366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.800366] ? __kthread_parkme+0x82/0x160 [ 30.800366] ? preempt_count_sub+0x50/0x80 [ 30.800366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.800366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.800366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.800366] kthread+0x257/0x310 [ 30.800366] ? __pfx_kthread+0x10/0x10 [ 30.800366] ret_from_fork+0x41/0x80 [ 30.800366] ? __pfx_kthread+0x10/0x10 [ 30.800366] ret_from_fork_asm+0x1a/0x30 [ 30.800366] </TASK> [ 30.800366] [ 30.800366] Allocated by task 274: [ 30.800366] kasan_save_stack+0x3d/0x60 [ 30.800366] kasan_save_track+0x18/0x40 [ 30.800366] kasan_save_alloc_info+0x3b/0x50 [ 30.800366] __kasan_kmalloc+0xb7/0xc0 [ 30.800366] __kmalloc_cache_noprof+0x184/0x410 [ 30.800366] kasan_atomics+0x96/0x310 [ 30.800366] kunit_try_run_case+0x1b3/0x490 [ 30.800366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.800366] kthread+0x257/0x310 [ 30.800366] ret_from_fork+0x41/0x80 [ 30.800366] ret_from_fork_asm+0x1a/0x30 [ 30.800366] [ 30.800366] The buggy address belongs to the object at ffff88810294b780 [ 30.800366] which belongs to the cache kmalloc-64 of size 64 [ 30.800366] The buggy address is located 0 bytes to the right of [ 30.800366] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.800366] [ 30.800366] The buggy address belongs to the physical page: [ 30.800366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.800366] flags: 0x200000000000000(node=0|zone=2) [ 30.800366] page_type: f5(slab) [ 30.800366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.800366] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.800366] page dumped because: kasan: bad access detected [ 30.800366] [ 30.800366] Memory state around the buggy address: [ 30.800366] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.800366] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.800366] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.800366] ^ [ 30.800366] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.800366] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.800366] ================================================================== [ 30.090349] ================================================================== [ 30.091390] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 30.091390] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.091390] [ 30.091390] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.091390] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.091390] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.091390] Call Trace: [ 30.091390] <TASK> [ 30.091390] dump_stack_lvl+0x73/0xb0 [ 30.091390] print_report+0xd1/0x640 [ 30.091390] ? __virt_addr_valid+0x1db/0x2d0 [ 30.091390] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.091390] kasan_report+0x102/0x140 [ 30.091390] ? kasan_atomics_helper+0x698/0x5450 [ 30.091390] ? kasan_atomics_helper+0x698/0x5450 [ 30.091390] kasan_check_range+0x10c/0x1c0 [ 30.091390] __kasan_check_write+0x18/0x20 [ 30.091390] kasan_atomics_helper+0x698/0x5450 [ 30.091390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.091390] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.091390] ? trace_hardirqs_on+0x37/0xe0 [ 30.091390] ? kasan_atomics+0x153/0x310 [ 30.091390] kasan_atomics+0x1dd/0x310 [ 30.091390] ? __pfx_kasan_atomics+0x10/0x10 [ 30.091390] ? __pfx_kasan_atomics+0x10/0x10 [ 30.091390] kunit_try_run_case+0x1b3/0x490 [ 30.091390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.091390] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.091390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.091390] ? __kthread_parkme+0x82/0x160 [ 30.091390] ? preempt_count_sub+0x50/0x80 [ 30.091390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.091390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.091390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.091390] kthread+0x257/0x310 [ 30.091390] ? __pfx_kthread+0x10/0x10 [ 30.091390] ret_from_fork+0x41/0x80 [ 30.091390] ? __pfx_kthread+0x10/0x10 [ 30.091390] ret_from_fork_asm+0x1a/0x30 [ 30.091390] </TASK> [ 30.091390] [ 30.091390] Allocated by task 274: [ 30.091390] kasan_save_stack+0x3d/0x60 [ 30.091390] kasan_save_track+0x18/0x40 [ 30.091390] kasan_save_alloc_info+0x3b/0x50 [ 30.091390] __kasan_kmalloc+0xb7/0xc0 [ 30.091390] __kmalloc_cache_noprof+0x184/0x410 [ 30.091390] kasan_atomics+0x96/0x310 [ 30.091390] kunit_try_run_case+0x1b3/0x490 [ 30.091390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.091390] kthread+0x257/0x310 [ 30.091390] ret_from_fork+0x41/0x80 [ 30.091390] ret_from_fork_asm+0x1a/0x30 [ 30.091390] [ 30.091390] The buggy address belongs to the object at ffff88810294b780 [ 30.091390] which belongs to the cache kmalloc-64 of size 64 [ 30.091390] The buggy address is located 0 bytes to the right of [ 30.091390] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.091390] [ 30.091390] The buggy address belongs to the physical page: [ 30.091390] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.091390] flags: 0x200000000000000(node=0|zone=2) [ 30.091390] page_type: f5(slab) [ 30.091390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.091390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.091390] page dumped because: kasan: bad access detected [ 30.091390] [ 30.091390] Memory state around the buggy address: [ 30.091390] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.091390] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.091390] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.091390] ^ [ 30.091390] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.091390] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.091390] ================================================================== [ 31.625963] ================================================================== [ 31.626897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 31.626897] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.626897] [ 31.626897] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.626897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.626897] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.626897] Call Trace: [ 31.626897] <TASK> [ 31.626897] dump_stack_lvl+0x73/0xb0 [ 31.626897] print_report+0xd1/0x640 [ 31.626897] ? __virt_addr_valid+0x1db/0x2d0 [ 31.626897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.626897] kasan_report+0x102/0x140 [ 31.626897] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.626897] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.626897] kasan_check_range+0x10c/0x1c0 [ 31.626897] __kasan_check_write+0x18/0x20 [ 31.626897] kasan_atomics_helper+0x18b2/0x5450 [ 31.626897] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.626897] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.626897] ? trace_hardirqs_on+0x37/0xe0 [ 31.626897] ? kasan_atomics+0x153/0x310 [ 31.626897] kasan_atomics+0x1dd/0x310 [ 31.626897] ? __pfx_kasan_atomics+0x10/0x10 [ 31.626897] ? __pfx_kasan_atomics+0x10/0x10 [ 31.626897] kunit_try_run_case+0x1b3/0x490 [ 31.626897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.626897] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.626897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.626897] ? __kthread_parkme+0x82/0x160 [ 31.626897] ? preempt_count_sub+0x50/0x80 [ 31.626897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.626897] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.626897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.626897] kthread+0x257/0x310 [ 31.626897] ? __pfx_kthread+0x10/0x10 [ 31.626897] ret_from_fork+0x41/0x80 [ 31.626897] ? __pfx_kthread+0x10/0x10 [ 31.626897] ret_from_fork_asm+0x1a/0x30 [ 31.626897] </TASK> [ 31.626897] [ 31.626897] Allocated by task 274: [ 31.626897] kasan_save_stack+0x3d/0x60 [ 31.626897] kasan_save_track+0x18/0x40 [ 31.626897] kasan_save_alloc_info+0x3b/0x50 [ 31.626897] __kasan_kmalloc+0xb7/0xc0 [ 31.626897] __kmalloc_cache_noprof+0x184/0x410 [ 31.626897] kasan_atomics+0x96/0x310 [ 31.626897] kunit_try_run_case+0x1b3/0x490 [ 31.626897] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.626897] kthread+0x257/0x310 [ 31.626897] ret_from_fork+0x41/0x80 [ 31.626897] ret_from_fork_asm+0x1a/0x30 [ 31.626897] [ 31.626897] The buggy address belongs to the object at ffff88810294b780 [ 31.626897] which belongs to the cache kmalloc-64 of size 64 [ 31.626897] The buggy address is located 0 bytes to the right of [ 31.626897] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.626897] [ 31.626897] The buggy address belongs to the physical page: [ 31.626897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.626897] flags: 0x200000000000000(node=0|zone=2) [ 31.626897] page_type: f5(slab) [ 31.626897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.626897] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.626897] page dumped because: kasan: bad access detected [ 31.626897] [ 31.626897] Memory state around the buggy address: [ 31.626897] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.626897] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.626897] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.626897] ^ [ 31.626897] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.626897] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.626897] ================================================================== [ 30.614897] ================================================================== [ 30.615267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 30.616592] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.616592] [ 30.616592] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.616592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.616592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.616592] Call Trace: [ 30.616592] <TASK> [ 30.616592] dump_stack_lvl+0x73/0xb0 [ 30.616592] print_report+0xd1/0x640 [ 30.616592] ? __virt_addr_valid+0x1db/0x2d0 [ 30.616592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.616592] kasan_report+0x102/0x140 [ 30.616592] ? kasan_atomics_helper+0xde1/0x5450 [ 30.616592] ? kasan_atomics_helper+0xde1/0x5450 [ 30.616592] kasan_check_range+0x10c/0x1c0 [ 30.616592] __kasan_check_write+0x18/0x20 [ 30.616592] kasan_atomics_helper+0xde1/0x5450 [ 30.616592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.616592] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.616592] ? trace_hardirqs_on+0x37/0xe0 [ 30.616592] ? kasan_atomics+0x153/0x310 [ 30.616592] kasan_atomics+0x1dd/0x310 [ 30.616592] ? __pfx_kasan_atomics+0x10/0x10 [ 30.616592] ? __pfx_kasan_atomics+0x10/0x10 [ 30.616592] kunit_try_run_case+0x1b3/0x490 [ 30.616592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.616592] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.616592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.616592] ? __kthread_parkme+0x82/0x160 [ 30.616592] ? preempt_count_sub+0x50/0x80 [ 30.616592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.616592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.616592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.616592] kthread+0x257/0x310 [ 30.616592] ? __pfx_kthread+0x10/0x10 [ 30.616592] ret_from_fork+0x41/0x80 [ 30.616592] ? __pfx_kthread+0x10/0x10 [ 30.616592] ret_from_fork_asm+0x1a/0x30 [ 30.616592] </TASK> [ 30.616592] [ 30.616592] Allocated by task 274: [ 30.616592] kasan_save_stack+0x3d/0x60 [ 30.616592] kasan_save_track+0x18/0x40 [ 30.616592] kasan_save_alloc_info+0x3b/0x50 [ 30.616592] __kasan_kmalloc+0xb7/0xc0 [ 30.616592] __kmalloc_cache_noprof+0x184/0x410 [ 30.616592] kasan_atomics+0x96/0x310 [ 30.616592] kunit_try_run_case+0x1b3/0x490 [ 30.616592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.616592] kthread+0x257/0x310 [ 30.616592] ret_from_fork+0x41/0x80 [ 30.616592] ret_from_fork_asm+0x1a/0x30 [ 30.616592] [ 30.616592] The buggy address belongs to the object at ffff88810294b780 [ 30.616592] which belongs to the cache kmalloc-64 of size 64 [ 30.616592] The buggy address is located 0 bytes to the right of [ 30.616592] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.616592] [ 30.616592] The buggy address belongs to the physical page: [ 30.616592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.616592] flags: 0x200000000000000(node=0|zone=2) [ 30.616592] page_type: f5(slab) [ 30.616592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.616592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.616592] page dumped because: kasan: bad access detected [ 30.616592] [ 30.616592] Memory state around the buggy address: [ 30.616592] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.616592] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.616592] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.616592] ^ [ 30.616592] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.616592] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.616592] ================================================================== [ 30.922651] ================================================================== [ 30.923173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 30.923366] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.923366] [ 30.923366] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.923366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.923366] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.923366] Call Trace: [ 30.923366] <TASK> [ 30.923366] dump_stack_lvl+0x73/0xb0 [ 30.923366] print_report+0xd1/0x640 [ 30.923366] ? __virt_addr_valid+0x1db/0x2d0 [ 30.923366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.923366] kasan_report+0x102/0x140 [ 30.923366] ? kasan_atomics_helper+0x1149/0x5450 [ 30.923366] ? kasan_atomics_helper+0x1149/0x5450 [ 30.923366] kasan_check_range+0x10c/0x1c0 [ 30.923366] __kasan_check_write+0x18/0x20 [ 30.923366] kasan_atomics_helper+0x1149/0x5450 [ 30.923366] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.923366] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.923366] ? trace_hardirqs_on+0x37/0xe0 [ 30.923366] ? kasan_atomics+0x153/0x310 [ 30.923366] kasan_atomics+0x1dd/0x310 [ 30.923366] ? __pfx_kasan_atomics+0x10/0x10 [ 30.923366] ? __pfx_kasan_atomics+0x10/0x10 [ 30.923366] kunit_try_run_case+0x1b3/0x490 [ 30.923366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.923366] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.923366] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.923366] ? __kthread_parkme+0x82/0x160 [ 30.923366] ? preempt_count_sub+0x50/0x80 [ 30.923366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.923366] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.923366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.923366] kthread+0x257/0x310 [ 30.923366] ? __pfx_kthread+0x10/0x10 [ 30.923366] ret_from_fork+0x41/0x80 [ 30.923366] ? __pfx_kthread+0x10/0x10 [ 30.923366] ret_from_fork_asm+0x1a/0x30 [ 30.923366] </TASK> [ 30.923366] [ 30.923366] Allocated by task 274: [ 30.923366] kasan_save_stack+0x3d/0x60 [ 30.923366] kasan_save_track+0x18/0x40 [ 30.923366] kasan_save_alloc_info+0x3b/0x50 [ 30.923366] __kasan_kmalloc+0xb7/0xc0 [ 30.923366] __kmalloc_cache_noprof+0x184/0x410 [ 30.923366] kasan_atomics+0x96/0x310 [ 30.923366] kunit_try_run_case+0x1b3/0x490 [ 30.923366] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.923366] kthread+0x257/0x310 [ 30.923366] ret_from_fork+0x41/0x80 [ 30.923366] ret_from_fork_asm+0x1a/0x30 [ 30.923366] [ 30.923366] The buggy address belongs to the object at ffff88810294b780 [ 30.923366] which belongs to the cache kmalloc-64 of size 64 [ 30.923366] The buggy address is located 0 bytes to the right of [ 30.923366] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.923366] [ 30.923366] The buggy address belongs to the physical page: [ 30.923366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.923366] flags: 0x200000000000000(node=0|zone=2) [ 30.923366] page_type: f5(slab) [ 30.923366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.923366] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.923366] page dumped because: kasan: bad access detected [ 30.923366] [ 30.923366] Memory state around the buggy address: [ 30.923366] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.923366] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.923366] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.923366] ^ [ 30.923366] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.923366] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.923366] ================================================================== [ 30.964771] ================================================================== [ 30.965405] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 30.965507] Read of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.965507] [ 30.965507] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.965507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.965507] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.965507] Call Trace: [ 30.965507] <TASK> [ 30.965507] dump_stack_lvl+0x73/0xb0 [ 30.965507] print_report+0xd1/0x640 [ 30.965507] ? __virt_addr_valid+0x1db/0x2d0 [ 30.965507] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.965507] kasan_report+0x102/0x140 [ 30.965507] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.965507] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.965507] __asan_report_load4_noabort+0x18/0x20 [ 30.965507] kasan_atomics_helper+0x4a04/0x5450 [ 30.965507] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.965507] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.965507] ? trace_hardirqs_on+0x37/0xe0 [ 30.965507] ? kasan_atomics+0x153/0x310 [ 30.965507] kasan_atomics+0x1dd/0x310 [ 30.965507] ? __pfx_kasan_atomics+0x10/0x10 [ 30.965507] ? __pfx_kasan_atomics+0x10/0x10 [ 30.965507] kunit_try_run_case+0x1b3/0x490 [ 30.965507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.965507] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.965507] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.965507] ? __kthread_parkme+0x82/0x160 [ 30.965507] ? preempt_count_sub+0x50/0x80 [ 30.965507] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.965507] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.965507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.965507] kthread+0x257/0x310 [ 30.965507] ? __pfx_kthread+0x10/0x10 [ 30.965507] ret_from_fork+0x41/0x80 [ 30.965507] ? __pfx_kthread+0x10/0x10 [ 30.965507] ret_from_fork_asm+0x1a/0x30 [ 30.965507] </TASK> [ 30.965507] [ 30.965507] Allocated by task 274: [ 30.965507] kasan_save_stack+0x3d/0x60 [ 30.965507] kasan_save_track+0x18/0x40 [ 30.965507] kasan_save_alloc_info+0x3b/0x50 [ 30.965507] __kasan_kmalloc+0xb7/0xc0 [ 30.965507] __kmalloc_cache_noprof+0x184/0x410 [ 30.965507] kasan_atomics+0x96/0x310 [ 30.965507] kunit_try_run_case+0x1b3/0x490 [ 30.965507] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.965507] kthread+0x257/0x310 [ 30.965507] ret_from_fork+0x41/0x80 [ 30.965507] ret_from_fork_asm+0x1a/0x30 [ 30.965507] [ 30.965507] The buggy address belongs to the object at ffff88810294b780 [ 30.965507] which belongs to the cache kmalloc-64 of size 64 [ 30.965507] The buggy address is located 0 bytes to the right of [ 30.965507] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.965507] [ 30.965507] The buggy address belongs to the physical page: [ 30.965507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.965507] flags: 0x200000000000000(node=0|zone=2) [ 30.965507] page_type: f5(slab) [ 30.965507] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.965507] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.965507] page dumped because: kasan: bad access detected [ 30.965507] [ 30.965507] Memory state around the buggy address: [ 30.965507] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.965507] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.965507] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.965507] ^ [ 30.965507] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.965507] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.965507] ================================================================== [ 31.179501] ================================================================== [ 31.180604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 31.180604] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.180604] [ 31.180604] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.180604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.180604] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.180604] Call Trace: [ 31.180604] <TASK> [ 31.180604] dump_stack_lvl+0x73/0xb0 [ 31.180604] print_report+0xd1/0x640 [ 31.180604] ? __virt_addr_valid+0x1db/0x2d0 [ 31.180604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.180604] kasan_report+0x102/0x140 [ 31.180604] ? kasan_atomics_helper+0x13b6/0x5450 [ 31.180604] ? kasan_atomics_helper+0x13b6/0x5450 [ 31.180604] kasan_check_range+0x10c/0x1c0 [ 31.180604] __kasan_check_read+0x15/0x20 [ 31.180604] kasan_atomics_helper+0x13b6/0x5450 [ 31.180604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.180604] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.180604] ? trace_hardirqs_on+0x37/0xe0 [ 31.180604] ? kasan_atomics+0x153/0x310 [ 31.180604] kasan_atomics+0x1dd/0x310 [ 31.180604] ? __pfx_kasan_atomics+0x10/0x10 [ 31.180604] ? __pfx_kasan_atomics+0x10/0x10 [ 31.180604] kunit_try_run_case+0x1b3/0x490 [ 31.180604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.180604] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.180604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.180604] ? __kthread_parkme+0x82/0x160 [ 31.180604] ? preempt_count_sub+0x50/0x80 [ 31.180604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.180604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.180604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.180604] kthread+0x257/0x310 [ 31.180604] ? __pfx_kthread+0x10/0x10 [ 31.180604] ret_from_fork+0x41/0x80 [ 31.180604] ? __pfx_kthread+0x10/0x10 [ 31.180604] ret_from_fork_asm+0x1a/0x30 [ 31.180604] </TASK> [ 31.180604] [ 31.180604] Allocated by task 274: [ 31.180604] kasan_save_stack+0x3d/0x60 [ 31.180604] kasan_save_track+0x18/0x40 [ 31.180604] kasan_save_alloc_info+0x3b/0x50 [ 31.180604] __kasan_kmalloc+0xb7/0xc0 [ 31.180604] __kmalloc_cache_noprof+0x184/0x410 [ 31.180604] kasan_atomics+0x96/0x310 [ 31.180604] kunit_try_run_case+0x1b3/0x490 [ 31.180604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.180604] kthread+0x257/0x310 [ 31.180604] ret_from_fork+0x41/0x80 [ 31.180604] ret_from_fork_asm+0x1a/0x30 [ 31.180604] [ 31.180604] The buggy address belongs to the object at ffff88810294b780 [ 31.180604] which belongs to the cache kmalloc-64 of size 64 [ 31.180604] The buggy address is located 0 bytes to the right of [ 31.180604] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.180604] [ 31.180604] The buggy address belongs to the physical page: [ 31.180604] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.180604] flags: 0x200000000000000(node=0|zone=2) [ 31.180604] page_type: f5(slab) [ 31.180604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.180604] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.180604] page dumped because: kasan: bad access detected [ 31.180604] [ 31.180604] Memory state around the buggy address: [ 31.180604] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.180604] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.180604] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.180604] ^ [ 31.180604] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180604] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.180604] ================================================================== [ 29.800827] ================================================================== [ 29.801511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 29.801511] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.801511] [ 29.801511] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.801511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.801511] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.801511] Call Trace: [ 29.801511] <TASK> [ 29.801511] dump_stack_lvl+0x73/0xb0 [ 29.801511] print_report+0xd1/0x640 [ 29.801511] ? __virt_addr_valid+0x1db/0x2d0 [ 29.801511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.801511] kasan_report+0x102/0x140 [ 29.801511] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.801511] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.801511] __asan_report_store4_noabort+0x1b/0x30 [ 29.801511] kasan_atomics_helper+0x4b70/0x5450 [ 29.801511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.801511] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.801511] ? trace_hardirqs_on+0x37/0xe0 [ 29.801511] ? kasan_atomics+0x153/0x310 [ 29.801511] kasan_atomics+0x1dd/0x310 [ 29.801511] ? __pfx_kasan_atomics+0x10/0x10 [ 29.801511] ? __pfx_kasan_atomics+0x10/0x10 [ 29.801511] kunit_try_run_case+0x1b3/0x490 [ 29.801511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.801511] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.801511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.801511] ? __kthread_parkme+0x82/0x160 [ 29.801511] ? preempt_count_sub+0x50/0x80 [ 29.801511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.801511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.801511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.801511] kthread+0x257/0x310 [ 29.801511] ? __pfx_kthread+0x10/0x10 [ 29.801511] ret_from_fork+0x41/0x80 [ 29.801511] ? __pfx_kthread+0x10/0x10 [ 29.801511] ret_from_fork_asm+0x1a/0x30 [ 29.801511] </TASK> [ 29.801511] [ 29.801511] Allocated by task 274: [ 29.801511] kasan_save_stack+0x3d/0x60 [ 29.801511] kasan_save_track+0x18/0x40 [ 29.801511] kasan_save_alloc_info+0x3b/0x50 [ 29.801511] __kasan_kmalloc+0xb7/0xc0 [ 29.801511] __kmalloc_cache_noprof+0x184/0x410 [ 29.801511] kasan_atomics+0x96/0x310 [ 29.801511] kunit_try_run_case+0x1b3/0x490 [ 29.801511] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.801511] kthread+0x257/0x310 [ 29.801511] ret_from_fork+0x41/0x80 [ 29.801511] ret_from_fork_asm+0x1a/0x30 [ 29.801511] [ 29.801511] The buggy address belongs to the object at ffff88810294b780 [ 29.801511] which belongs to the cache kmalloc-64 of size 64 [ 29.801511] The buggy address is located 0 bytes to the right of [ 29.801511] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.801511] [ 29.801511] The buggy address belongs to the physical page: [ 29.801511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.801511] flags: 0x200000000000000(node=0|zone=2) [ 29.801511] page_type: f5(slab) [ 29.801511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.801511] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.801511] page dumped because: kasan: bad access detected [ 29.801511] [ 29.801511] Memory state around the buggy address: [ 29.801511] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.801511] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.801511] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.801511] ^ [ 29.801511] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801511] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801511] ================================================================== [ 31.581715] ================================================================== [ 31.582234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 31.583592] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.583592] [ 31.583592] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.583592] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.583592] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.583592] Call Trace: [ 31.583592] <TASK> [ 31.583592] dump_stack_lvl+0x73/0xb0 [ 31.583592] print_report+0xd1/0x640 [ 31.583592] ? __virt_addr_valid+0x1db/0x2d0 [ 31.583592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.583592] kasan_report+0x102/0x140 [ 31.583592] ? kasan_atomics_helper+0x1819/0x5450 [ 31.583592] ? kasan_atomics_helper+0x1819/0x5450 [ 31.583592] kasan_check_range+0x10c/0x1c0 [ 31.583592] __kasan_check_write+0x18/0x20 [ 31.583592] kasan_atomics_helper+0x1819/0x5450 [ 31.583592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.583592] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.583592] ? trace_hardirqs_on+0x37/0xe0 [ 31.583592] ? kasan_atomics+0x153/0x310 [ 31.583592] kasan_atomics+0x1dd/0x310 [ 31.583592] ? __pfx_kasan_atomics+0x10/0x10 [ 31.583592] ? __pfx_kasan_atomics+0x10/0x10 [ 31.583592] kunit_try_run_case+0x1b3/0x490 [ 31.583592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.583592] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.583592] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.583592] ? __kthread_parkme+0x82/0x160 [ 31.583592] ? preempt_count_sub+0x50/0x80 [ 31.583592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.583592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.583592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.583592] kthread+0x257/0x310 [ 31.583592] ? __pfx_kthread+0x10/0x10 [ 31.583592] ret_from_fork+0x41/0x80 [ 31.583592] ? __pfx_kthread+0x10/0x10 [ 31.583592] ret_from_fork_asm+0x1a/0x30 [ 31.583592] </TASK> [ 31.583592] [ 31.583592] Allocated by task 274: [ 31.583592] kasan_save_stack+0x3d/0x60 [ 31.583592] kasan_save_track+0x18/0x40 [ 31.583592] kasan_save_alloc_info+0x3b/0x50 [ 31.583592] __kasan_kmalloc+0xb7/0xc0 [ 31.583592] __kmalloc_cache_noprof+0x184/0x410 [ 31.583592] kasan_atomics+0x96/0x310 [ 31.583592] kunit_try_run_case+0x1b3/0x490 [ 31.583592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.583592] kthread+0x257/0x310 [ 31.583592] ret_from_fork+0x41/0x80 [ 31.583592] ret_from_fork_asm+0x1a/0x30 [ 31.583592] [ 31.583592] The buggy address belongs to the object at ffff88810294b780 [ 31.583592] which belongs to the cache kmalloc-64 of size 64 [ 31.583592] The buggy address is located 0 bytes to the right of [ 31.583592] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.583592] [ 31.583592] The buggy address belongs to the physical page: [ 31.583592] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.583592] flags: 0x200000000000000(node=0|zone=2) [ 31.583592] page_type: f5(slab) [ 31.583592] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.583592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.583592] page dumped because: kasan: bad access detected [ 31.583592] [ 31.583592] Memory state around the buggy address: [ 31.583592] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.583592] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.583592] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.583592] ^ [ 31.583592] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.583592] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.583592] ================================================================== [ 30.705525] ================================================================== [ 30.706098] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 30.706248] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 30.706248] [ 30.706248] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 30.706248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.706248] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.706248] Call Trace: [ 30.706248] <TASK> [ 30.706248] dump_stack_lvl+0x73/0xb0 [ 30.706248] print_report+0xd1/0x640 [ 30.706248] ? __virt_addr_valid+0x1db/0x2d0 [ 30.706248] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.706248] kasan_report+0x102/0x140 [ 30.706248] ? kasan_atomics_helper+0xf11/0x5450 [ 30.706248] ? kasan_atomics_helper+0xf11/0x5450 [ 30.706248] kasan_check_range+0x10c/0x1c0 [ 30.706248] __kasan_check_write+0x18/0x20 [ 30.706248] kasan_atomics_helper+0xf11/0x5450 [ 30.706248] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.706248] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.706248] ? trace_hardirqs_on+0x37/0xe0 [ 30.706248] ? kasan_atomics+0x153/0x310 [ 30.706248] kasan_atomics+0x1dd/0x310 [ 30.706248] ? __pfx_kasan_atomics+0x10/0x10 [ 30.706248] ? __pfx_kasan_atomics+0x10/0x10 [ 30.706248] kunit_try_run_case+0x1b3/0x490 [ 30.706248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.706248] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.706248] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.706248] ? __kthread_parkme+0x82/0x160 [ 30.706248] ? preempt_count_sub+0x50/0x80 [ 30.706248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.706248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.706248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.706248] kthread+0x257/0x310 [ 30.706248] ? __pfx_kthread+0x10/0x10 [ 30.706248] ret_from_fork+0x41/0x80 [ 30.706248] ? __pfx_kthread+0x10/0x10 [ 30.706248] ret_from_fork_asm+0x1a/0x30 [ 30.706248] </TASK> [ 30.706248] [ 30.706248] Allocated by task 274: [ 30.706248] kasan_save_stack+0x3d/0x60 [ 30.706248] kasan_save_track+0x18/0x40 [ 30.706248] kasan_save_alloc_info+0x3b/0x50 [ 30.706248] __kasan_kmalloc+0xb7/0xc0 [ 30.706248] __kmalloc_cache_noprof+0x184/0x410 [ 30.706248] kasan_atomics+0x96/0x310 [ 30.706248] kunit_try_run_case+0x1b3/0x490 [ 30.706248] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.706248] kthread+0x257/0x310 [ 30.706248] ret_from_fork+0x41/0x80 [ 30.706248] ret_from_fork_asm+0x1a/0x30 [ 30.706248] [ 30.706248] The buggy address belongs to the object at ffff88810294b780 [ 30.706248] which belongs to the cache kmalloc-64 of size 64 [ 30.706248] The buggy address is located 0 bytes to the right of [ 30.706248] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 30.706248] [ 30.706248] The buggy address belongs to the physical page: [ 30.706248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 30.706248] flags: 0x200000000000000(node=0|zone=2) [ 30.706248] page_type: f5(slab) [ 30.706248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.706248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.706248] page dumped because: kasan: bad access detected [ 30.706248] [ 30.706248] Memory state around the buggy address: [ 30.706248] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.706248] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.706248] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.706248] ^ [ 30.706248] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.706248] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.706248] ================================================================== [ 29.966924] ================================================================== [ 29.967422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 29.967422] Write of size 4 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 29.967422] [ 29.967422] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 29.967422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.971297] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.971297] Call Trace: [ 29.971297] <TASK> [ 29.971297] dump_stack_lvl+0x73/0xb0 [ 29.971297] print_report+0xd1/0x640 [ 29.971297] ? __virt_addr_valid+0x1db/0x2d0 [ 29.971297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.971297] kasan_report+0x102/0x140 [ 29.971297] ? kasan_atomics_helper+0x4b3c/0x5450 [ 29.971297] ? kasan_atomics_helper+0x4b3c/0x5450 [ 29.971297] __asan_report_store4_noabort+0x1b/0x30 [ 29.971297] kasan_atomics_helper+0x4b3c/0x5450 [ 29.971297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.971297] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.971297] ? trace_hardirqs_on+0x37/0xe0 [ 29.971297] ? kasan_atomics+0x153/0x310 [ 29.971297] kasan_atomics+0x1dd/0x310 [ 29.971297] ? __pfx_kasan_atomics+0x10/0x10 [ 29.971297] ? __pfx_kasan_atomics+0x10/0x10 [ 29.971297] kunit_try_run_case+0x1b3/0x490 [ 29.971297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.971297] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.971297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.971297] ? __kthread_parkme+0x82/0x160 [ 29.971297] ? preempt_count_sub+0x50/0x80 [ 29.971297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.971297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.971297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.971297] kthread+0x257/0x310 [ 29.971297] ? __pfx_kthread+0x10/0x10 [ 29.971297] ret_from_fork+0x41/0x80 [ 29.971297] ? __pfx_kthread+0x10/0x10 [ 29.971297] ret_from_fork_asm+0x1a/0x30 [ 29.971297] </TASK> [ 29.971297] [ 29.971297] Allocated by task 274: [ 29.971297] kasan_save_stack+0x3d/0x60 [ 29.971297] kasan_save_track+0x18/0x40 [ 29.971297] kasan_save_alloc_info+0x3b/0x50 [ 29.971297] __kasan_kmalloc+0xb7/0xc0 [ 29.971297] __kmalloc_cache_noprof+0x184/0x410 [ 29.971297] kasan_atomics+0x96/0x310 [ 29.971297] kunit_try_run_case+0x1b3/0x490 [ 29.971297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.971297] kthread+0x257/0x310 [ 29.971297] ret_from_fork+0x41/0x80 [ 29.971297] ret_from_fork_asm+0x1a/0x30 [ 29.971297] [ 29.971297] The buggy address belongs to the object at ffff88810294b780 [ 29.971297] which belongs to the cache kmalloc-64 of size 64 [ 29.971297] The buggy address is located 0 bytes to the right of [ 29.971297] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 29.971297] [ 29.971297] The buggy address belongs to the physical page: [ 29.971297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 29.971297] flags: 0x200000000000000(node=0|zone=2) [ 29.971297] page_type: f5(slab) [ 29.971297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.971297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.971297] page dumped because: kasan: bad access detected [ 29.971297] [ 29.971297] Memory state around the buggy address: [ 29.971297] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.971297] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.971297] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.971297] ^ [ 29.971297] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.971297] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.971297] ================================================================== [ 32.417187] ================================================================== [ 32.417531] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 32.417531] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.417531] [ 32.417531] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.417531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.417905] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.422203] Call Trace: [ 32.422203] <TASK> [ 32.422203] dump_stack_lvl+0x73/0xb0 [ 32.422203] print_report+0xd1/0x640 [ 32.422203] ? __virt_addr_valid+0x1db/0x2d0 [ 32.422203] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.422203] kasan_report+0x102/0x140 [ 32.422203] ? kasan_atomics_helper+0x224d/0x5450 [ 32.422203] ? kasan_atomics_helper+0x224d/0x5450 [ 32.422203] kasan_check_range+0x10c/0x1c0 [ 32.422203] __kasan_check_write+0x18/0x20 [ 32.422203] kasan_atomics_helper+0x224d/0x5450 [ 32.422203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.422203] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.422203] ? trace_hardirqs_on+0x37/0xe0 [ 32.422203] ? kasan_atomics+0x153/0x310 [ 32.422203] kasan_atomics+0x1dd/0x310 [ 32.422203] ? __pfx_kasan_atomics+0x10/0x10 [ 32.422203] ? __pfx_kasan_atomics+0x10/0x10 [ 32.422203] kunit_try_run_case+0x1b3/0x490 [ 32.422203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.422203] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.422203] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.422203] ? __kthread_parkme+0x82/0x160 [ 32.422203] ? preempt_count_sub+0x50/0x80 [ 32.422203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.422203] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.422203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.422203] kthread+0x257/0x310 [ 32.422203] ? __pfx_kthread+0x10/0x10 [ 32.422203] ret_from_fork+0x41/0x80 [ 32.422203] ? __pfx_kthread+0x10/0x10 [ 32.422203] ret_from_fork_asm+0x1a/0x30 [ 32.422203] </TASK> [ 32.422203] [ 32.422203] Allocated by task 274: [ 32.422203] kasan_save_stack+0x3d/0x60 [ 32.422203] kasan_save_track+0x18/0x40 [ 32.422203] kasan_save_alloc_info+0x3b/0x50 [ 32.422203] __kasan_kmalloc+0xb7/0xc0 [ 32.422203] __kmalloc_cache_noprof+0x184/0x410 [ 32.422203] kasan_atomics+0x96/0x310 [ 32.422203] kunit_try_run_case+0x1b3/0x490 [ 32.422203] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.422203] kthread+0x257/0x310 [ 32.422203] ret_from_fork+0x41/0x80 [ 32.422203] ret_from_fork_asm+0x1a/0x30 [ 32.422203] [ 32.422203] The buggy address belongs to the object at ffff88810294b780 [ 32.422203] which belongs to the cache kmalloc-64 of size 64 [ 32.422203] The buggy address is located 0 bytes to the right of [ 32.422203] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.422203] [ 32.422203] The buggy address belongs to the physical page: [ 32.422203] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.422203] flags: 0x200000000000000(node=0|zone=2) [ 32.422203] page_type: f5(slab) [ 32.422203] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.422203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.422203] page dumped because: kasan: bad access detected [ 32.422203] [ 32.422203] Memory state around the buggy address: [ 32.422203] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.422203] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.422203] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.422203] ^ [ 32.422203] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.422203] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.422203] ================================================================== [ 32.125358] ================================================================== [ 32.125808] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 32.126193] Read of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 32.126193] [ 32.126193] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 32.126193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.126193] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.126193] Call Trace: [ 32.126193] <TASK> [ 32.126193] dump_stack_lvl+0x73/0xb0 [ 32.126193] print_report+0xd1/0x640 [ 32.126193] ? __virt_addr_valid+0x1db/0x2d0 [ 32.126193] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.126193] kasan_report+0x102/0x140 [ 32.126193] ? kasan_atomics_helper+0x4f73/0x5450 [ 32.126193] ? kasan_atomics_helper+0x4f73/0x5450 [ 32.126193] __asan_report_load8_noabort+0x18/0x20 [ 32.126193] kasan_atomics_helper+0x4f73/0x5450 [ 32.126193] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.126193] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.126193] ? trace_hardirqs_on+0x37/0xe0 [ 32.126193] ? kasan_atomics+0x153/0x310 [ 32.126193] kasan_atomics+0x1dd/0x310 [ 32.126193] ? __pfx_kasan_atomics+0x10/0x10 [ 32.126193] ? __pfx_kasan_atomics+0x10/0x10 [ 32.126193] kunit_try_run_case+0x1b3/0x490 [ 32.126193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.126193] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.126193] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.126193] ? __kthread_parkme+0x82/0x160 [ 32.126193] ? preempt_count_sub+0x50/0x80 [ 32.126193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.126193] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.126193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.126193] kthread+0x257/0x310 [ 32.126193] ? __pfx_kthread+0x10/0x10 [ 32.126193] ret_from_fork+0x41/0x80 [ 32.126193] ? __pfx_kthread+0x10/0x10 [ 32.126193] ret_from_fork_asm+0x1a/0x30 [ 32.126193] </TASK> [ 32.126193] [ 32.126193] Allocated by task 274: [ 32.126193] kasan_save_stack+0x3d/0x60 [ 32.126193] kasan_save_track+0x18/0x40 [ 32.126193] kasan_save_alloc_info+0x3b/0x50 [ 32.126193] __kasan_kmalloc+0xb7/0xc0 [ 32.126193] __kmalloc_cache_noprof+0x184/0x410 [ 32.126193] kasan_atomics+0x96/0x310 [ 32.126193] kunit_try_run_case+0x1b3/0x490 [ 32.126193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.126193] kthread+0x257/0x310 [ 32.126193] ret_from_fork+0x41/0x80 [ 32.126193] ret_from_fork_asm+0x1a/0x30 [ 32.126193] [ 32.126193] The buggy address belongs to the object at ffff88810294b780 [ 32.126193] which belongs to the cache kmalloc-64 of size 64 [ 32.126193] The buggy address is located 0 bytes to the right of [ 32.126193] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 32.126193] [ 32.126193] The buggy address belongs to the physical page: [ 32.126193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 32.126193] flags: 0x200000000000000(node=0|zone=2) [ 32.126193] page_type: f5(slab) [ 32.126193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.126193] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.126193] page dumped because: kasan: bad access detected [ 32.126193] [ 32.126193] Memory state around the buggy address: [ 32.126193] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.126193] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.126193] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.126193] ^ [ 32.126193] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.126193] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.126193] ================================================================== [ 31.494787] ================================================================== [ 31.495230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 31.495230] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.495230] [ 31.495230] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.495230] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.495230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.495230] Call Trace: [ 31.495230] <TASK> [ 31.495230] dump_stack_lvl+0x73/0xb0 [ 31.495230] print_report+0xd1/0x640 [ 31.495230] ? __virt_addr_valid+0x1db/0x2d0 [ 31.495230] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.495230] kasan_report+0x102/0x140 [ 31.495230] ? kasan_atomics_helper+0x16e8/0x5450 [ 31.495230] ? kasan_atomics_helper+0x16e8/0x5450 [ 31.495230] kasan_check_range+0x10c/0x1c0 [ 31.495230] __kasan_check_write+0x18/0x20 [ 31.495230] kasan_atomics_helper+0x16e8/0x5450 [ 31.495230] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.495230] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.495230] ? trace_hardirqs_on+0x37/0xe0 [ 31.495230] ? kasan_atomics+0x153/0x310 [ 31.495230] kasan_atomics+0x1dd/0x310 [ 31.495230] ? __pfx_kasan_atomics+0x10/0x10 [ 31.495230] ? __pfx_kasan_atomics+0x10/0x10 [ 31.495230] kunit_try_run_case+0x1b3/0x490 [ 31.495230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.495230] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.495230] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.495230] ? __kthread_parkme+0x82/0x160 [ 31.495230] ? preempt_count_sub+0x50/0x80 [ 31.495230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.495230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.495230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.495230] kthread+0x257/0x310 [ 31.495230] ? __pfx_kthread+0x10/0x10 [ 31.495230] ret_from_fork+0x41/0x80 [ 31.495230] ? __pfx_kthread+0x10/0x10 [ 31.495230] ret_from_fork_asm+0x1a/0x30 [ 31.495230] </TASK> [ 31.495230] [ 31.495230] Allocated by task 274: [ 31.495230] kasan_save_stack+0x3d/0x60 [ 31.495230] kasan_save_track+0x18/0x40 [ 31.495230] kasan_save_alloc_info+0x3b/0x50 [ 31.495230] __kasan_kmalloc+0xb7/0xc0 [ 31.495230] __kmalloc_cache_noprof+0x184/0x410 [ 31.495230] kasan_atomics+0x96/0x310 [ 31.495230] kunit_try_run_case+0x1b3/0x490 [ 31.495230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.495230] kthread+0x257/0x310 [ 31.495230] ret_from_fork+0x41/0x80 [ 31.495230] ret_from_fork_asm+0x1a/0x30 [ 31.495230] [ 31.495230] The buggy address belongs to the object at ffff88810294b780 [ 31.495230] which belongs to the cache kmalloc-64 of size 64 [ 31.495230] The buggy address is located 0 bytes to the right of [ 31.495230] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.495230] [ 31.495230] The buggy address belongs to the physical page: [ 31.495230] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.495230] flags: 0x200000000000000(node=0|zone=2) [ 31.495230] page_type: f5(slab) [ 31.495230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.495230] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.495230] page dumped because: kasan: bad access detected [ 31.495230] [ 31.495230] Memory state around the buggy address: [ 31.495230] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.495230] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.495230] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.495230] ^ [ 31.495230] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.495230] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.495230] ================================================================== [ 31.357449] ================================================================== [ 31.358218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 31.358218] Write of size 8 at addr ffff88810294b7b0 by task kunit_try_catch/274 [ 31.358218] [ 31.358218] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 31.358218] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.358218] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.358218] Call Trace: [ 31.358218] <TASK> [ 31.358218] dump_stack_lvl+0x73/0xb0 [ 31.358218] print_report+0xd1/0x640 [ 31.358218] ? __virt_addr_valid+0x1db/0x2d0 [ 31.358218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.358218] kasan_report+0x102/0x140 [ 31.358218] ? kasan_atomics_helper+0x151e/0x5450 [ 31.358218] ? kasan_atomics_helper+0x151e/0x5450 [ 31.358218] kasan_check_range+0x10c/0x1c0 [ 31.358218] __kasan_check_write+0x18/0x20 [ 31.358218] kasan_atomics_helper+0x151e/0x5450 [ 31.358218] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.358218] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.358218] ? trace_hardirqs_on+0x37/0xe0 [ 31.358218] ? kasan_atomics+0x153/0x310 [ 31.358218] kasan_atomics+0x1dd/0x310 [ 31.358218] ? __pfx_kasan_atomics+0x10/0x10 [ 31.358218] ? __pfx_kasan_atomics+0x10/0x10 [ 31.358218] kunit_try_run_case+0x1b3/0x490 [ 31.358218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.358218] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.358218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.358218] ? __kthread_parkme+0x82/0x160 [ 31.358218] ? preempt_count_sub+0x50/0x80 [ 31.358218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.358218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.358218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.358218] kthread+0x257/0x310 [ 31.358218] ? __pfx_kthread+0x10/0x10 [ 31.358218] ret_from_fork+0x41/0x80 [ 31.358218] ? __pfx_kthread+0x10/0x10 [ 31.358218] ret_from_fork_asm+0x1a/0x30 [ 31.358218] </TASK> [ 31.358218] [ 31.358218] Allocated by task 274: [ 31.358218] kasan_save_stack+0x3d/0x60 [ 31.358218] kasan_save_track+0x18/0x40 [ 31.358218] kasan_save_alloc_info+0x3b/0x50 [ 31.358218] __kasan_kmalloc+0xb7/0xc0 [ 31.358218] __kmalloc_cache_noprof+0x184/0x410 [ 31.358218] kasan_atomics+0x96/0x310 [ 31.358218] kunit_try_run_case+0x1b3/0x490 [ 31.358218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.358218] kthread+0x257/0x310 [ 31.358218] ret_from_fork+0x41/0x80 [ 31.358218] ret_from_fork_asm+0x1a/0x30 [ 31.358218] [ 31.358218] The buggy address belongs to the object at ffff88810294b780 [ 31.358218] which belongs to the cache kmalloc-64 of size 64 [ 31.358218] The buggy address is located 0 bytes to the right of [ 31.358218] allocated 48-byte region [ffff88810294b780, ffff88810294b7b0) [ 31.358218] [ 31.358218] The buggy address belongs to the physical page: [ 31.358218] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10294b [ 31.358218] flags: 0x200000000000000(node=0|zone=2) [ 31.358218] page_type: f5(slab) [ 31.358218] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.358218] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.358218] page dumped because: kasan: bad access detected [ 31.358218] [ 31.358218] Memory state around the buggy address: [ 31.358218] ffff88810294b680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.358218] ffff88810294b700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.358218] >ffff88810294b780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.358218] ^ [ 31.358218] ffff88810294b800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.358218] ffff88810294b880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.358218] ==================================================================
[ 26.473282] ================================================================== [ 26.473951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 26.474410] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.475207] [ 26.475631] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.476691] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.477154] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.478136] Call Trace: [ 26.478543] <TASK> [ 26.478949] dump_stack_lvl+0x73/0xb0 [ 26.479461] print_report+0xd1/0x640 [ 26.480023] ? __virt_addr_valid+0x1db/0x2d0 [ 26.480642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.481290] kasan_report+0x102/0x140 [ 26.481722] ? kasan_atomics_helper+0x1a80/0x5450 [ 26.482251] ? kasan_atomics_helper+0x1a80/0x5450 [ 26.482787] kasan_check_range+0x10c/0x1c0 [ 26.483310] __kasan_check_write+0x18/0x20 [ 26.483823] kasan_atomics_helper+0x1a80/0x5450 [ 26.484320] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.484920] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.485508] ? trace_hardirqs_on+0x37/0xe0 [ 26.486124] ? kasan_atomics+0x153/0x310 [ 26.486715] kasan_atomics+0x1dd/0x310 [ 26.487185] ? __pfx_kasan_atomics+0x10/0x10 [ 26.487751] ? __pfx_kasan_atomics+0x10/0x10 [ 26.488138] kunit_try_run_case+0x1b3/0x490 [ 26.488510] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.488965] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.489454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.490973] ? __kthread_parkme+0x82/0x160 [ 26.491352] ? preempt_count_sub+0x50/0x80 [ 26.491806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.492272] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.492777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.493211] kthread+0x257/0x310 [ 26.494187] ? __pfx_kthread+0x10/0x10 [ 26.494441] ret_from_fork+0x41/0x80 [ 26.494904] ? __pfx_kthread+0x10/0x10 [ 26.495845] ret_from_fork_asm+0x1a/0x30 [ 26.496232] </TASK> [ 26.496541] [ 26.497288] Allocated by task 272: [ 26.497560] kasan_save_stack+0x3d/0x60 [ 26.498093] kasan_save_track+0x18/0x40 [ 26.498443] kasan_save_alloc_info+0x3b/0x50 [ 26.499116] __kasan_kmalloc+0xb7/0xc0 [ 26.499592] __kmalloc_cache_noprof+0x184/0x410 [ 26.500039] kasan_atomics+0x96/0x310 [ 26.500610] kunit_try_run_case+0x1b3/0x490 [ 26.501275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.502148] kthread+0x257/0x310 [ 26.502613] ret_from_fork+0x41/0x80 [ 26.502998] ret_from_fork_asm+0x1a/0x30 [ 26.503422] [ 26.504245] The buggy address belongs to the object at ffff8881028c7700 [ 26.504245] which belongs to the cache kmalloc-64 of size 64 [ 26.505295] The buggy address is located 0 bytes to the right of [ 26.505295] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.506277] [ 26.506544] The buggy address belongs to the physical page: [ 26.507054] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.507899] flags: 0x200000000000000(node=0|zone=2) [ 26.508775] page_type: f5(slab) [ 26.509187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.510254] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.510837] page dumped because: kasan: bad access detected [ 26.511503] [ 26.511726] Memory state around the buggy address: [ 26.512194] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.513143] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.513999] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.514635] ^ [ 26.514986] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.515739] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.516223] ================================================================== [ 24.820014] ================================================================== [ 24.820690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 24.822160] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.824243] [ 24.825051] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.825723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.826395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.827427] Call Trace: [ 24.827854] <TASK> [ 24.828120] dump_stack_lvl+0x73/0xb0 [ 24.828562] print_report+0xd1/0x640 [ 24.829081] ? __virt_addr_valid+0x1db/0x2d0 [ 24.830178] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.830666] kasan_report+0x102/0x140 [ 24.831340] ? kasan_atomics_helper+0x5ff/0x5450 [ 24.832016] ? kasan_atomics_helper+0x5ff/0x5450 [ 24.832554] kasan_check_range+0x10c/0x1c0 [ 24.833112] __kasan_check_write+0x18/0x20 [ 24.833545] kasan_atomics_helper+0x5ff/0x5450 [ 24.833859] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.834465] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.834944] ? trace_hardirqs_on+0x37/0xe0 [ 24.835328] ? kasan_atomics+0x153/0x310 [ 24.835959] kasan_atomics+0x1dd/0x310 [ 24.836480] ? __pfx_kasan_atomics+0x10/0x10 [ 24.836896] ? __pfx_kasan_atomics+0x10/0x10 [ 24.837223] kunit_try_run_case+0x1b3/0x490 [ 24.837762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.838559] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.839182] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.839551] ? __kthread_parkme+0x82/0x160 [ 24.840087] ? preempt_count_sub+0x50/0x80 [ 24.840576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.840903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.841261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.842014] kthread+0x257/0x310 [ 24.842502] ? __pfx_kthread+0x10/0x10 [ 24.843045] ret_from_fork+0x41/0x80 [ 24.843470] ? __pfx_kthread+0x10/0x10 [ 24.844995] ret_from_fork_asm+0x1a/0x30 [ 24.845342] </TASK> [ 24.845852] [ 24.846034] Allocated by task 272: [ 24.846415] kasan_save_stack+0x3d/0x60 [ 24.847308] kasan_save_track+0x18/0x40 [ 24.847882] kasan_save_alloc_info+0x3b/0x50 [ 24.848692] __kasan_kmalloc+0xb7/0xc0 [ 24.849242] __kmalloc_cache_noprof+0x184/0x410 [ 24.849745] kasan_atomics+0x96/0x310 [ 24.850150] kunit_try_run_case+0x1b3/0x490 [ 24.850518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.851755] kthread+0x257/0x310 [ 24.852083] ret_from_fork+0x41/0x80 [ 24.852735] ret_from_fork_asm+0x1a/0x30 [ 24.853146] [ 24.853317] The buggy address belongs to the object at ffff8881028c7700 [ 24.853317] which belongs to the cache kmalloc-64 of size 64 [ 24.854603] The buggy address is located 0 bytes to the right of [ 24.854603] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.855833] [ 24.856414] The buggy address belongs to the physical page: [ 24.857090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.857972] flags: 0x200000000000000(node=0|zone=2) [ 24.858640] page_type: f5(slab) [ 24.858967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.859472] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.860073] page dumped because: kasan: bad access detected [ 24.860603] [ 24.860780] Memory state around the buggy address: [ 24.861365] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.861887] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.862472] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.863076] ^ [ 24.863555] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.863988] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.864653] ================================================================== [ 25.284243] ================================================================== [ 25.284843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 25.285334] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.286028] [ 25.286303] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.287241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.287783] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.288782] Call Trace: [ 25.289065] <TASK> [ 25.289341] dump_stack_lvl+0x73/0xb0 [ 25.289700] print_report+0xd1/0x640 [ 25.289990] ? __virt_addr_valid+0x1db/0x2d0 [ 25.290450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.291172] kasan_report+0x102/0x140 [ 25.291638] ? kasan_atomics_helper+0x4a86/0x5450 [ 25.291984] ? kasan_atomics_helper+0x4a86/0x5450 [ 25.292313] __asan_report_load4_noabort+0x18/0x20 [ 25.292865] kasan_atomics_helper+0x4a86/0x5450 [ 25.293378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.294097] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.294831] ? trace_hardirqs_on+0x37/0xe0 [ 25.295135] ? kasan_atomics+0x153/0x310 [ 25.295476] kasan_atomics+0x1dd/0x310 [ 25.296018] ? __pfx_kasan_atomics+0x10/0x10 [ 25.296543] ? __pfx_kasan_atomics+0x10/0x10 [ 25.297103] kunit_try_run_case+0x1b3/0x490 [ 25.297681] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.298240] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.298841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.299389] ? __kthread_parkme+0x82/0x160 [ 25.299937] ? preempt_count_sub+0x50/0x80 [ 25.300432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.301031] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.301730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.302345] kthread+0x257/0x310 [ 25.302832] ? __pfx_kthread+0x10/0x10 [ 25.303307] ret_from_fork+0x41/0x80 [ 25.303827] ? __pfx_kthread+0x10/0x10 [ 25.304295] ret_from_fork_asm+0x1a/0x30 [ 25.304863] </TASK> [ 25.305178] [ 25.305470] Allocated by task 272: [ 25.305940] kasan_save_stack+0x3d/0x60 [ 25.306422] kasan_save_track+0x18/0x40 [ 25.306945] kasan_save_alloc_info+0x3b/0x50 [ 25.307447] __kasan_kmalloc+0xb7/0xc0 [ 25.307946] __kmalloc_cache_noprof+0x184/0x410 [ 25.308452] kasan_atomics+0x96/0x310 [ 25.308931] kunit_try_run_case+0x1b3/0x490 [ 25.309213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.309812] kthread+0x257/0x310 [ 25.310203] ret_from_fork+0x41/0x80 [ 25.310544] ret_from_fork_asm+0x1a/0x30 [ 25.310956] [ 25.311174] The buggy address belongs to the object at ffff8881028c7700 [ 25.311174] which belongs to the cache kmalloc-64 of size 64 [ 25.311967] The buggy address is located 0 bytes to the right of [ 25.311967] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.312665] [ 25.312902] The buggy address belongs to the physical page: [ 25.313369] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.313966] flags: 0x200000000000000(node=0|zone=2) [ 25.314373] page_type: f5(slab) [ 25.314773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.315379] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.316017] page dumped because: kasan: bad access detected [ 25.316329] [ 25.316517] Memory state around the buggy address: [ 25.317030] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.317738] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.318364] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.318884] ^ [ 25.319179] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.319860] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.320502] ================================================================== [ 26.349731] ================================================================== [ 26.350774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 26.351309] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.351779] [ 26.352040] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.352963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.353381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.354113] Call Trace: [ 26.354342] <TASK> [ 26.354615] dump_stack_lvl+0x73/0xb0 [ 26.355053] print_report+0xd1/0x640 [ 26.355546] ? __virt_addr_valid+0x1db/0x2d0 [ 26.356005] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.356359] kasan_report+0x102/0x140 [ 26.356858] ? kasan_atomics_helper+0x18b2/0x5450 [ 26.357355] ? kasan_atomics_helper+0x18b2/0x5450 [ 26.357936] kasan_check_range+0x10c/0x1c0 [ 26.358350] __kasan_check_write+0x18/0x20 [ 26.358774] kasan_atomics_helper+0x18b2/0x5450 [ 26.359213] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.359556] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.359919] ? trace_hardirqs_on+0x37/0xe0 [ 26.360215] ? kasan_atomics+0x153/0x310 [ 26.360541] kasan_atomics+0x1dd/0x310 [ 26.361037] ? __pfx_kasan_atomics+0x10/0x10 [ 26.361534] ? __pfx_kasan_atomics+0x10/0x10 [ 26.362076] kunit_try_run_case+0x1b3/0x490 [ 26.362610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.363117] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.363654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.364167] ? __kthread_parkme+0x82/0x160 [ 26.364688] ? preempt_count_sub+0x50/0x80 [ 26.365142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.365730] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.366220] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.366670] kthread+0x257/0x310 [ 26.367063] ? __pfx_kthread+0x10/0x10 [ 26.367497] ret_from_fork+0x41/0x80 [ 26.367965] ? __pfx_kthread+0x10/0x10 [ 26.368312] ret_from_fork_asm+0x1a/0x30 [ 26.370564] </TASK> [ 26.370802] [ 26.370963] Allocated by task 272: [ 26.371199] kasan_save_stack+0x3d/0x60 [ 26.371530] kasan_save_track+0x18/0x40 [ 26.371982] kasan_save_alloc_info+0x3b/0x50 [ 26.372443] __kasan_kmalloc+0xb7/0xc0 [ 26.372884] __kmalloc_cache_noprof+0x184/0x410 [ 26.373346] kasan_atomics+0x96/0x310 [ 26.373857] kunit_try_run_case+0x1b3/0x490 [ 26.374322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.374918] kthread+0x257/0x310 [ 26.375319] ret_from_fork+0x41/0x80 [ 26.375662] ret_from_fork_asm+0x1a/0x30 [ 26.375949] [ 26.376114] The buggy address belongs to the object at ffff8881028c7700 [ 26.376114] which belongs to the cache kmalloc-64 of size 64 [ 26.377177] The buggy address is located 0 bytes to the right of [ 26.377177] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.378296] [ 26.378553] The buggy address belongs to the physical page: [ 26.379038] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.379704] flags: 0x200000000000000(node=0|zone=2) [ 26.380186] page_type: f5(slab) [ 26.380436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.380909] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.381631] page dumped because: kasan: bad access detected [ 26.382158] [ 26.382385] Memory state around the buggy address: [ 26.382910] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.383543] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.384077] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.384511] ^ [ 26.385015] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.385645] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.386308] ================================================================== [ 25.563709] ================================================================== [ 25.564658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 25.565131] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.566468] [ 25.566689] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.567593] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.568003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.568616] Call Trace: [ 25.568931] <TASK> [ 25.569250] dump_stack_lvl+0x73/0xb0 [ 25.569739] print_report+0xd1/0x640 [ 25.570110] ? __virt_addr_valid+0x1db/0x2d0 [ 25.570669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.571159] kasan_report+0x102/0x140 [ 25.571619] ? kasan_atomics_helper+0x107a/0x5450 [ 25.572025] ? kasan_atomics_helper+0x107a/0x5450 [ 25.572365] kasan_check_range+0x10c/0x1c0 [ 25.572707] __kasan_check_write+0x18/0x20 [ 25.573203] kasan_atomics_helper+0x107a/0x5450 [ 25.573728] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.574398] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.575035] ? trace_hardirqs_on+0x37/0xe0 [ 25.575539] ? kasan_atomics+0x153/0x310 [ 25.576241] kasan_atomics+0x1dd/0x310 [ 25.576584] ? __pfx_kasan_atomics+0x10/0x10 [ 25.577775] ? __pfx_kasan_atomics+0x10/0x10 [ 25.578318] kunit_try_run_case+0x1b3/0x490 [ 25.578850] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.579359] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.579802] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.580331] ? __kthread_parkme+0x82/0x160 [ 25.580675] ? preempt_count_sub+0x50/0x80 [ 25.581127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.581563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.584061] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.584419] kthread+0x257/0x310 [ 25.586183] ? __pfx_kthread+0x10/0x10 [ 25.586657] ret_from_fork+0x41/0x80 [ 25.587094] ? __pfx_kthread+0x10/0x10 [ 25.587549] ret_from_fork_asm+0x1a/0x30 [ 25.587956] </TASK> [ 25.588266] [ 25.588551] Allocated by task 272: [ 25.588887] kasan_save_stack+0x3d/0x60 [ 25.589172] kasan_save_track+0x18/0x40 [ 25.589649] kasan_save_alloc_info+0x3b/0x50 [ 25.590128] __kasan_kmalloc+0xb7/0xc0 [ 25.590594] __kmalloc_cache_noprof+0x184/0x410 [ 25.591067] kasan_atomics+0x96/0x310 [ 25.591520] kunit_try_run_case+0x1b3/0x490 [ 25.591974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.592322] kthread+0x257/0x310 [ 25.592673] ret_from_fork+0x41/0x80 [ 25.593179] ret_from_fork_asm+0x1a/0x30 [ 25.593651] [ 25.594686] The buggy address belongs to the object at ffff8881028c7700 [ 25.594686] which belongs to the cache kmalloc-64 of size 64 [ 25.595376] The buggy address is located 0 bytes to the right of [ 25.595376] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.596246] [ 25.596539] The buggy address belongs to the physical page: [ 25.597175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.598106] flags: 0x200000000000000(node=0|zone=2) [ 25.598652] page_type: f5(slab) [ 25.599063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.599554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.600249] page dumped because: kasan: bad access detected [ 25.600714] [ 25.600960] Memory state around the buggy address: [ 25.601433] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.602171] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.602681] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.603436] ^ [ 25.603824] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.604576] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.605051] ================================================================== [ 27.100197] ================================================================== [ 27.101187] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 27.101676] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 27.102184] [ 27.102434] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.103351] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.103829] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.104393] Call Trace: [ 27.104779] <TASK> [ 27.105008] dump_stack_lvl+0x73/0xb0 [ 27.105377] print_report+0xd1/0x640 [ 27.105879] ? __virt_addr_valid+0x1db/0x2d0 [ 27.106295] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.106831] kasan_report+0x102/0x140 [ 27.107134] ? kasan_atomics_helper+0x4fa7/0x5450 [ 27.107661] ? kasan_atomics_helper+0x4fa7/0x5450 [ 27.108178] __asan_report_load8_noabort+0x18/0x20 [ 27.108531] kasan_atomics_helper+0x4fa7/0x5450 [ 27.109037] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.109562] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.110098] ? trace_hardirqs_on+0x37/0xe0 [ 27.110417] ? kasan_atomics+0x153/0x310 [ 27.110801] kasan_atomics+0x1dd/0x310 [ 27.111230] ? __pfx_kasan_atomics+0x10/0x10 [ 27.111747] ? __pfx_kasan_atomics+0x10/0x10 [ 27.112221] kunit_try_run_case+0x1b3/0x490 [ 27.112741] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.113213] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.113765] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.114132] ? __kthread_parkme+0x82/0x160 [ 27.114637] ? preempt_count_sub+0x50/0x80 [ 27.114975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.115650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.116148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.117104] kthread+0x257/0x310 [ 27.117386] ? __pfx_kthread+0x10/0x10 [ 27.117753] ret_from_fork+0x41/0x80 [ 27.118037] ? __pfx_kthread+0x10/0x10 [ 27.118342] ret_from_fork_asm+0x1a/0x30 [ 27.119867] </TASK> [ 27.120161] [ 27.120380] Allocated by task 272: [ 27.120779] kasan_save_stack+0x3d/0x60 [ 27.121200] kasan_save_track+0x18/0x40 [ 27.122215] kasan_save_alloc_info+0x3b/0x50 [ 27.122875] __kasan_kmalloc+0xb7/0xc0 [ 27.123338] __kmalloc_cache_noprof+0x184/0x410 [ 27.123904] kasan_atomics+0x96/0x310 [ 27.125002] kunit_try_run_case+0x1b3/0x490 [ 27.125514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.126699] kthread+0x257/0x310 [ 27.127080] ret_from_fork+0x41/0x80 [ 27.127468] ret_from_fork_asm+0x1a/0x30 [ 27.128285] [ 27.128545] The buggy address belongs to the object at ffff8881028c7700 [ 27.128545] which belongs to the cache kmalloc-64 of size 64 [ 27.129856] The buggy address is located 0 bytes to the right of [ 27.129856] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 27.130661] [ 27.130894] The buggy address belongs to the physical page: [ 27.131291] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 27.131978] flags: 0x200000000000000(node=0|zone=2) [ 27.132416] page_type: f5(slab) [ 27.132725] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.133395] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.134033] page dumped because: kasan: bad access detected [ 27.134535] [ 27.134800] Memory state around the buggy address: [ 27.135218] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.135825] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.136232] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.136756] ^ [ 27.137221] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.137923] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.138450] ================================================================== [ 25.247636] ================================================================== [ 25.248455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 25.249162] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.249820] [ 25.250067] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.251976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.252236] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.252683] Call Trace: [ 25.252873] <TASK> [ 25.253054] dump_stack_lvl+0x73/0xb0 [ 25.253554] print_report+0xd1/0x640 [ 25.253997] ? __virt_addr_valid+0x1db/0x2d0 [ 25.254402] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.254822] kasan_report+0x102/0x140 [ 25.255112] ? kasan_atomics_helper+0xc71/0x5450 [ 25.255506] ? kasan_atomics_helper+0xc71/0x5450 [ 25.256077] kasan_check_range+0x10c/0x1c0 [ 25.256539] __kasan_check_write+0x18/0x20 [ 25.257026] kasan_atomics_helper+0xc71/0x5450 [ 25.257539] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.258113] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.258666] ? trace_hardirqs_on+0x37/0xe0 [ 25.259123] ? kasan_atomics+0x153/0x310 [ 25.259634] kasan_atomics+0x1dd/0x310 [ 25.259967] ? __pfx_kasan_atomics+0x10/0x10 [ 25.260281] ? __pfx_kasan_atomics+0x10/0x10 [ 25.260821] kunit_try_run_case+0x1b3/0x490 [ 25.261293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.261852] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.262309] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.262759] ? __kthread_parkme+0x82/0x160 [ 25.263204] ? preempt_count_sub+0x50/0x80 [ 25.263724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.264132] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.264652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.265122] kthread+0x257/0x310 [ 25.265620] ? __pfx_kthread+0x10/0x10 [ 25.266073] ret_from_fork+0x41/0x80 [ 25.266505] ? __pfx_kthread+0x10/0x10 [ 25.266836] ret_from_fork_asm+0x1a/0x30 [ 25.267154] </TASK> [ 25.267352] [ 25.267535] Allocated by task 272: [ 25.267957] kasan_save_stack+0x3d/0x60 [ 25.268381] kasan_save_track+0x18/0x40 [ 25.268862] kasan_save_alloc_info+0x3b/0x50 [ 25.269328] __kasan_kmalloc+0xb7/0xc0 [ 25.269801] __kmalloc_cache_noprof+0x184/0x410 [ 25.270283] kasan_atomics+0x96/0x310 [ 25.270753] kunit_try_run_case+0x1b3/0x490 [ 25.271191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.271702] kthread+0x257/0x310 [ 25.272085] ret_from_fork+0x41/0x80 [ 25.272383] ret_from_fork_asm+0x1a/0x30 [ 25.272875] [ 25.273068] The buggy address belongs to the object at ffff8881028c7700 [ 25.273068] which belongs to the cache kmalloc-64 of size 64 [ 25.273842] The buggy address is located 0 bytes to the right of [ 25.273842] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.274444] [ 25.274757] The buggy address belongs to the physical page: [ 25.275316] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.276063] flags: 0x200000000000000(node=0|zone=2) [ 25.276611] page_type: f5(slab) [ 25.276984] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.277731] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.278299] page dumped because: kasan: bad access detected [ 25.278856] [ 25.279032] Memory state around the buggy address: [ 25.279467] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.280016] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.280806] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.281221] ^ [ 25.281760] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.282272] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.282895] ================================================================== [ 26.006993] ================================================================== [ 26.007794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 26.008206] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.008865] [ 26.009061] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.010714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.011232] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.012064] Call Trace: [ 26.012334] <TASK> [ 26.012623] dump_stack_lvl+0x73/0xb0 [ 26.012996] print_report+0xd1/0x640 [ 26.013359] ? __virt_addr_valid+0x1db/0x2d0 [ 26.014409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.015161] kasan_report+0x102/0x140 [ 26.015792] ? kasan_atomics_helper+0x1468/0x5450 [ 26.016409] ? kasan_atomics_helper+0x1468/0x5450 [ 26.017111] kasan_check_range+0x10c/0x1c0 [ 26.017727] __kasan_check_write+0x18/0x20 [ 26.018330] kasan_atomics_helper+0x1468/0x5450 [ 26.018872] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.019283] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.019738] ? trace_hardirqs_on+0x37/0xe0 [ 26.020149] ? kasan_atomics+0x153/0x310 [ 26.021192] kasan_atomics+0x1dd/0x310 [ 26.021570] ? __pfx_kasan_atomics+0x10/0x10 [ 26.022201] ? __pfx_kasan_atomics+0x10/0x10 [ 26.022891] kunit_try_run_case+0x1b3/0x490 [ 26.023506] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.024202] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.024807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.025512] ? __kthread_parkme+0x82/0x160 [ 26.025856] ? preempt_count_sub+0x50/0x80 [ 26.026281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.027148] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.027844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.028523] kthread+0x257/0x310 [ 26.029129] ? __pfx_kthread+0x10/0x10 [ 26.029517] ret_from_fork+0x41/0x80 [ 26.030194] ? __pfx_kthread+0x10/0x10 [ 26.030912] ret_from_fork_asm+0x1a/0x30 [ 26.031354] </TASK> [ 26.031593] [ 26.031810] Allocated by task 272: [ 26.032109] kasan_save_stack+0x3d/0x60 [ 26.033195] kasan_save_track+0x18/0x40 [ 26.033579] kasan_save_alloc_info+0x3b/0x50 [ 26.034318] __kasan_kmalloc+0xb7/0xc0 [ 26.034646] __kmalloc_cache_noprof+0x184/0x410 [ 26.035120] kasan_atomics+0x96/0x310 [ 26.036048] kunit_try_run_case+0x1b3/0x490 [ 26.036443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.037111] kthread+0x257/0x310 [ 26.037663] ret_from_fork+0x41/0x80 [ 26.037941] ret_from_fork_asm+0x1a/0x30 [ 26.038475] [ 26.038719] The buggy address belongs to the object at ffff8881028c7700 [ 26.038719] which belongs to the cache kmalloc-64 of size 64 [ 26.039723] The buggy address is located 0 bytes to the right of [ 26.039723] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.041304] [ 26.041452] The buggy address belongs to the physical page: [ 26.042146] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.043608] flags: 0x200000000000000(node=0|zone=2) [ 26.044176] page_type: f5(slab) [ 26.044544] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.045455] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.046006] page dumped because: kasan: bad access detected [ 26.046250] [ 26.046341] Memory state around the buggy address: [ 26.046539] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.046913] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.047625] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.048426] ^ [ 26.049192] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.050010] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.050600] ================================================================== [ 25.441720] ================================================================== [ 25.442446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 25.444208] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.445414] [ 25.445740] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.446653] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.447075] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.447854] Call Trace: [ 25.448083] <TASK> [ 25.448373] dump_stack_lvl+0x73/0xb0 [ 25.448740] print_report+0xd1/0x640 [ 25.449148] ? __virt_addr_valid+0x1db/0x2d0 [ 25.449646] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.450115] kasan_report+0x102/0x140 [ 25.450559] ? kasan_atomics_helper+0xf11/0x5450 [ 25.451069] ? kasan_atomics_helper+0xf11/0x5450 [ 25.451422] kasan_check_range+0x10c/0x1c0 [ 25.451948] __kasan_check_write+0x18/0x20 [ 25.452311] kasan_atomics_helper+0xf11/0x5450 [ 25.452820] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.453308] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.453718] ? trace_hardirqs_on+0x37/0xe0 [ 25.454157] ? kasan_atomics+0x153/0x310 [ 25.454672] kasan_atomics+0x1dd/0x310 [ 25.455039] ? __pfx_kasan_atomics+0x10/0x10 [ 25.455391] ? __pfx_kasan_atomics+0x10/0x10 [ 25.455782] kunit_try_run_case+0x1b3/0x490 [ 25.456100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.456421] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.456980] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.457522] ? __kthread_parkme+0x82/0x160 [ 25.458019] ? preempt_count_sub+0x50/0x80 [ 25.458512] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.459052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.459711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.460253] kthread+0x257/0x310 [ 25.460700] ? __pfx_kthread+0x10/0x10 [ 25.461136] ret_from_fork+0x41/0x80 [ 25.461569] ? __pfx_kthread+0x10/0x10 [ 25.462050] ret_from_fork_asm+0x1a/0x30 [ 25.462523] </TASK> [ 25.462850] [ 25.463077] Allocated by task 272: [ 25.463327] kasan_save_stack+0x3d/0x60 [ 25.463688] kasan_save_track+0x18/0x40 [ 25.464092] kasan_save_alloc_info+0x3b/0x50 [ 25.464609] __kasan_kmalloc+0xb7/0xc0 [ 25.465023] __kmalloc_cache_noprof+0x184/0x410 [ 25.465547] kasan_atomics+0x96/0x310 [ 25.466001] kunit_try_run_case+0x1b3/0x490 [ 25.466461] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.466939] kthread+0x257/0x310 [ 25.467308] ret_from_fork+0x41/0x80 [ 25.467646] ret_from_fork_asm+0x1a/0x30 [ 25.467940] [ 25.468104] The buggy address belongs to the object at ffff8881028c7700 [ 25.468104] which belongs to the cache kmalloc-64 of size 64 [ 25.468855] The buggy address is located 0 bytes to the right of [ 25.468855] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.469967] [ 25.470215] The buggy address belongs to the physical page: [ 25.470797] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.471471] flags: 0x200000000000000(node=0|zone=2) [ 25.472013] page_type: f5(slab) [ 25.472325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.472974] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.473417] page dumped because: kasan: bad access detected [ 25.473960] [ 25.474138] Memory state around the buggy address: [ 25.474418] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.475117] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.475842] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.476387] ^ [ 25.476759] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.477136] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.477658] ================================================================== [ 24.948340] ================================================================== [ 24.949104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 24.949788] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.950194] [ 24.950444] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.951350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.951887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.952271] Call Trace: [ 24.952780] <TASK> [ 24.953039] dump_stack_lvl+0x73/0xb0 [ 24.953414] print_report+0xd1/0x640 [ 24.953784] ? __virt_addr_valid+0x1db/0x2d0 [ 24.954169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.954778] kasan_report+0x102/0x140 [ 24.955205] ? kasan_atomics_helper+0x7c8/0x5450 [ 24.955759] ? kasan_atomics_helper+0x7c8/0x5450 [ 24.956267] kasan_check_range+0x10c/0x1c0 [ 24.956772] __kasan_check_write+0x18/0x20 [ 24.957108] kasan_atomics_helper+0x7c8/0x5450 [ 24.957568] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.957952] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.958296] ? trace_hardirqs_on+0x37/0xe0 [ 24.958730] ? kasan_atomics+0x153/0x310 [ 24.959179] kasan_atomics+0x1dd/0x310 [ 24.959691] ? __pfx_kasan_atomics+0x10/0x10 [ 24.960171] ? __pfx_kasan_atomics+0x10/0x10 [ 24.960721] kunit_try_run_case+0x1b3/0x490 [ 24.961193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.961537] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.961992] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.962543] ? __kthread_parkme+0x82/0x160 [ 24.963035] ? preempt_count_sub+0x50/0x80 [ 24.963520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.964053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.964419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.965037] kthread+0x257/0x310 [ 24.965473] ? __pfx_kthread+0x10/0x10 [ 24.965966] ret_from_fork+0x41/0x80 [ 24.966382] ? __pfx_kthread+0x10/0x10 [ 24.966819] ret_from_fork_asm+0x1a/0x30 [ 24.967149] </TASK> [ 24.967342] [ 24.967569] Allocated by task 272: [ 24.967970] kasan_save_stack+0x3d/0x60 [ 24.968398] kasan_save_track+0x18/0x40 [ 24.968888] kasan_save_alloc_info+0x3b/0x50 [ 24.969268] __kasan_kmalloc+0xb7/0xc0 [ 24.969567] __kmalloc_cache_noprof+0x184/0x410 [ 24.970100] kasan_atomics+0x96/0x310 [ 24.970526] kunit_try_run_case+0x1b3/0x490 [ 24.971026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.971472] kthread+0x257/0x310 [ 24.971800] ret_from_fork+0x41/0x80 [ 24.972077] ret_from_fork_asm+0x1a/0x30 [ 24.972359] [ 24.972932] The buggy address belongs to the object at ffff8881028c7700 [ 24.972932] which belongs to the cache kmalloc-64 of size 64 [ 24.974643] The buggy address is located 0 bytes to the right of [ 24.974643] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.976899] [ 24.977785] The buggy address belongs to the physical page: [ 24.978937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.980384] flags: 0x200000000000000(node=0|zone=2) [ 24.981319] page_type: f5(slab) [ 24.982104] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.982533] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.983986] page dumped because: kasan: bad access detected [ 24.984476] [ 24.984641] Memory state around the buggy address: [ 24.985040] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.985752] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.986348] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.986914] ^ [ 24.987421] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.987924] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.988597] ================================================================== [ 25.205905] ================================================================== [ 25.206677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 25.207175] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.207930] [ 25.208129] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.209214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.209561] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.210251] Call Trace: [ 25.210531] <TASK> [ 25.210872] dump_stack_lvl+0x73/0xb0 [ 25.211288] print_report+0xd1/0x640 [ 25.211667] ? __virt_addr_valid+0x1db/0x2d0 [ 25.211991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.212557] kasan_report+0x102/0x140 [ 25.213132] ? kasan_atomics_helper+0xb6b/0x5450 [ 25.216027] ? kasan_atomics_helper+0xb6b/0x5450 [ 25.216529] kasan_check_range+0x10c/0x1c0 [ 25.216845] __kasan_check_write+0x18/0x20 [ 25.217135] kasan_atomics_helper+0xb6b/0x5450 [ 25.217439] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.218030] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.218560] ? trace_hardirqs_on+0x37/0xe0 [ 25.220202] ? kasan_atomics+0x153/0x310 [ 25.221071] kasan_atomics+0x1dd/0x310 [ 25.221541] ? __pfx_kasan_atomics+0x10/0x10 [ 25.222798] ? __pfx_kasan_atomics+0x10/0x10 [ 25.223658] kunit_try_run_case+0x1b3/0x490 [ 25.224226] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.224793] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.225337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.225871] ? __kthread_parkme+0x82/0x160 [ 25.226187] ? preempt_count_sub+0x50/0x80 [ 25.226707] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.227202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.227819] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.228168] kthread+0x257/0x310 [ 25.228902] ? __pfx_kthread+0x10/0x10 [ 25.229343] ret_from_fork+0x41/0x80 [ 25.229828] ? __pfx_kthread+0x10/0x10 [ 25.230270] ret_from_fork_asm+0x1a/0x30 [ 25.230657] </TASK> [ 25.230960] [ 25.231184] Allocated by task 272: [ 25.231460] kasan_save_stack+0x3d/0x60 [ 25.231817] kasan_save_track+0x18/0x40 [ 25.232246] kasan_save_alloc_info+0x3b/0x50 [ 25.232758] __kasan_kmalloc+0xb7/0xc0 [ 25.233182] __kmalloc_cache_noprof+0x184/0x410 [ 25.233699] kasan_atomics+0x96/0x310 [ 25.234037] kunit_try_run_case+0x1b3/0x490 [ 25.234518] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.235042] kthread+0x257/0x310 [ 25.235466] ret_from_fork+0x41/0x80 [ 25.235845] ret_from_fork_asm+0x1a/0x30 [ 25.236281] [ 25.236473] The buggy address belongs to the object at ffff8881028c7700 [ 25.236473] which belongs to the cache kmalloc-64 of size 64 [ 25.237095] The buggy address is located 0 bytes to the right of [ 25.237095] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.238123] [ 25.238360] The buggy address belongs to the physical page: [ 25.238938] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.239704] flags: 0x200000000000000(node=0|zone=2) [ 25.240115] page_type: f5(slab) [ 25.240433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.241063] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.241447] page dumped because: kasan: bad access detected [ 25.242003] [ 25.242243] Memory state around the buggy address: [ 25.242779] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.243362] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.243817] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.244191] ^ [ 25.244643] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.245324] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.246028] ================================================================== [ 24.991391] ================================================================== [ 24.992564] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 24.993529] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.994034] [ 24.994302] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.995324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.996335] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.996979] Call Trace: [ 24.997318] <TASK> [ 24.997644] dump_stack_lvl+0x73/0xb0 [ 24.998050] print_report+0xd1/0x640 [ 24.998505] ? __virt_addr_valid+0x1db/0x2d0 [ 24.998986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.999582] kasan_report+0x102/0x140 [ 24.999879] ? kasan_atomics_helper+0x861/0x5450 [ 25.000401] ? kasan_atomics_helper+0x861/0x5450 [ 25.001246] kasan_check_range+0x10c/0x1c0 [ 25.001779] __kasan_check_write+0x18/0x20 [ 25.002101] kasan_atomics_helper+0x861/0x5450 [ 25.003268] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.003621] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.004502] ? trace_hardirqs_on+0x37/0xe0 [ 25.005098] ? kasan_atomics+0x153/0x310 [ 25.005780] kasan_atomics+0x1dd/0x310 [ 25.006163] ? __pfx_kasan_atomics+0x10/0x10 [ 25.006563] ? __pfx_kasan_atomics+0x10/0x10 [ 25.006968] kunit_try_run_case+0x1b3/0x490 [ 25.007342] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.007886] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.008274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.008938] ? __kthread_parkme+0x82/0x160 [ 25.009316] ? preempt_count_sub+0x50/0x80 [ 25.009892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.010411] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.010860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.011628] kthread+0x257/0x310 [ 25.012116] ? __pfx_kthread+0x10/0x10 [ 25.012571] ret_from_fork+0x41/0x80 [ 25.013118] ? __pfx_kthread+0x10/0x10 [ 25.013633] ret_from_fork_asm+0x1a/0x30 [ 25.014209] </TASK> [ 25.014523] [ 25.014798] Allocated by task 272: [ 25.015068] kasan_save_stack+0x3d/0x60 [ 25.015637] kasan_save_track+0x18/0x40 [ 25.016144] kasan_save_alloc_info+0x3b/0x50 [ 25.016691] __kasan_kmalloc+0xb7/0xc0 [ 25.017142] __kmalloc_cache_noprof+0x184/0x410 [ 25.017606] kasan_atomics+0x96/0x310 [ 25.018123] kunit_try_run_case+0x1b3/0x490 [ 25.018669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.019176] kthread+0x257/0x310 [ 25.019548] ret_from_fork+0x41/0x80 [ 25.020090] ret_from_fork_asm+0x1a/0x30 [ 25.020562] [ 25.020889] The buggy address belongs to the object at ffff8881028c7700 [ 25.020889] which belongs to the cache kmalloc-64 of size 64 [ 25.021699] The buggy address is located 0 bytes to the right of [ 25.021699] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.022734] [ 25.022976] The buggy address belongs to the physical page: [ 25.023511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.024235] flags: 0x200000000000000(node=0|zone=2) [ 25.024864] page_type: f5(slab) [ 25.025276] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.025977] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.026811] page dumped because: kasan: bad access detected [ 25.027318] [ 25.027878] Memory state around the buggy address: [ 25.028983] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.029526] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.030114] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.030560] ^ [ 25.030901] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.031592] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.032403] ================================================================== [ 25.403356] ================================================================== [ 25.404160] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 25.405508] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.406392] [ 25.406718] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.407468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.407954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.408649] Call Trace: [ 25.408953] <TASK> [ 25.409219] dump_stack_lvl+0x73/0xb0 [ 25.409665] print_report+0xd1/0x640 [ 25.410105] ? __virt_addr_valid+0x1db/0x2d0 [ 25.410638] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.411188] kasan_report+0x102/0x140 [ 25.411674] ? kasan_atomics_helper+0xe79/0x5450 [ 25.412174] ? kasan_atomics_helper+0xe79/0x5450 [ 25.412768] kasan_check_range+0x10c/0x1c0 [ 25.413281] __kasan_check_write+0x18/0x20 [ 25.413810] kasan_atomics_helper+0xe79/0x5450 [ 25.414361] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.414975] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.415522] ? trace_hardirqs_on+0x37/0xe0 [ 25.415872] ? kasan_atomics+0x153/0x310 [ 25.416175] kasan_atomics+0x1dd/0x310 [ 25.416510] ? __pfx_kasan_atomics+0x10/0x10 [ 25.416842] ? __pfx_kasan_atomics+0x10/0x10 [ 25.417164] kunit_try_run_case+0x1b3/0x490 [ 25.417560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.418101] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.418645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.419171] ? __kthread_parkme+0x82/0x160 [ 25.419668] ? preempt_count_sub+0x50/0x80 [ 25.420031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.420530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.420973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.421328] kthread+0x257/0x310 [ 25.421743] ? __pfx_kthread+0x10/0x10 [ 25.422164] ret_from_fork+0x41/0x80 [ 25.422643] ? __pfx_kthread+0x10/0x10 [ 25.423073] ret_from_fork_asm+0x1a/0x30 [ 25.423560] </TASK> [ 25.423817] [ 25.423979] Allocated by task 272: [ 25.424215] kasan_save_stack+0x3d/0x60 [ 25.424709] kasan_save_track+0x18/0x40 [ 25.425121] kasan_save_alloc_info+0x3b/0x50 [ 25.425658] __kasan_kmalloc+0xb7/0xc0 [ 25.426098] __kmalloc_cache_noprof+0x184/0x410 [ 25.426618] kasan_atomics+0x96/0x310 [ 25.427028] kunit_try_run_case+0x1b3/0x490 [ 25.427333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.427892] kthread+0x257/0x310 [ 25.428262] ret_from_fork+0x41/0x80 [ 25.428739] ret_from_fork_asm+0x1a/0x30 [ 25.429044] [ 25.429214] The buggy address belongs to the object at ffff8881028c7700 [ 25.429214] which belongs to the cache kmalloc-64 of size 64 [ 25.429848] The buggy address is located 0 bytes to the right of [ 25.429848] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.430450] [ 25.430756] The buggy address belongs to the physical page: [ 25.431274] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.432022] flags: 0x200000000000000(node=0|zone=2) [ 25.432515] page_type: f5(slab) [ 25.432928] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.433657] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.434241] page dumped because: kasan: bad access detected [ 25.434738] [ 25.434969] Memory state around the buggy address: [ 25.435348] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.437864] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.438264] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.438661] ^ [ 25.438957] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.439332] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.439984] ================================================================== [ 24.905564] ================================================================== [ 24.907235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 24.908282] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.909104] [ 24.909304] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.913133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.913639] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.914537] Call Trace: [ 24.914948] <TASK> [ 24.915306] dump_stack_lvl+0x73/0xb0 [ 24.915850] print_report+0xd1/0x640 [ 24.916316] ? __virt_addr_valid+0x1db/0x2d0 [ 24.916897] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.917371] kasan_report+0x102/0x140 [ 24.917821] ? kasan_atomics_helper+0x730/0x5450 [ 24.918402] ? kasan_atomics_helper+0x730/0x5450 [ 24.919065] kasan_check_range+0x10c/0x1c0 [ 24.919659] __kasan_check_write+0x18/0x20 [ 24.920198] kasan_atomics_helper+0x730/0x5450 [ 24.920807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.921375] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.921983] ? trace_hardirqs_on+0x37/0xe0 [ 24.922343] ? kasan_atomics+0x153/0x310 [ 24.922694] kasan_atomics+0x1dd/0x310 [ 24.923041] ? __pfx_kasan_atomics+0x10/0x10 [ 24.923560] ? __pfx_kasan_atomics+0x10/0x10 [ 24.924020] kunit_try_run_case+0x1b3/0x490 [ 24.924337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.924809] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.925395] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.926023] ? __kthread_parkme+0x82/0x160 [ 24.926546] ? preempt_count_sub+0x50/0x80 [ 24.927091] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.927695] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.928348] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.929013] kthread+0x257/0x310 [ 24.929455] ? __pfx_kthread+0x10/0x10 [ 24.929978] ret_from_fork+0x41/0x80 [ 24.930440] ? __pfx_kthread+0x10/0x10 [ 24.930965] ret_from_fork_asm+0x1a/0x30 [ 24.931474] </TASK> [ 24.931856] [ 24.932096] Allocated by task 272: [ 24.932515] kasan_save_stack+0x3d/0x60 [ 24.933019] kasan_save_track+0x18/0x40 [ 24.933478] kasan_save_alloc_info+0x3b/0x50 [ 24.934031] __kasan_kmalloc+0xb7/0xc0 [ 24.934520] __kmalloc_cache_noprof+0x184/0x410 [ 24.934913] kasan_atomics+0x96/0x310 [ 24.935188] kunit_try_run_case+0x1b3/0x490 [ 24.935587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.936026] kthread+0x257/0x310 [ 24.936386] ret_from_fork+0x41/0x80 [ 24.936718] ret_from_fork_asm+0x1a/0x30 [ 24.937003] [ 24.937226] The buggy address belongs to the object at ffff8881028c7700 [ 24.937226] which belongs to the cache kmalloc-64 of size 64 [ 24.938183] The buggy address is located 0 bytes to the right of [ 24.938183] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.939116] [ 24.939294] The buggy address belongs to the physical page: [ 24.939870] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.940322] flags: 0x200000000000000(node=0|zone=2) [ 24.940873] page_type: f5(slab) [ 24.941236] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.941715] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.942388] page dumped because: kasan: bad access detected [ 24.942960] [ 24.943180] Memory state around the buggy address: [ 24.943612] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.944060] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.944677] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.945247] ^ [ 24.945622] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.946255] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.946956] ================================================================== [ 26.555922] ================================================================== [ 26.556663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 26.557349] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.557933] [ 26.558212] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.559048] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.559312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.560140] Call Trace: [ 26.560572] <TASK> [ 26.561041] dump_stack_lvl+0x73/0xb0 [ 26.561441] print_report+0xd1/0x640 [ 26.561776] ? __virt_addr_valid+0x1db/0x2d0 [ 26.562263] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.562897] kasan_report+0x102/0x140 [ 26.563235] ? kasan_atomics_helper+0x1c19/0x5450 [ 26.563624] ? kasan_atomics_helper+0x1c19/0x5450 [ 26.564061] kasan_check_range+0x10c/0x1c0 [ 26.564560] __kasan_check_write+0x18/0x20 [ 26.565058] kasan_atomics_helper+0x1c19/0x5450 [ 26.565653] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.566216] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.566784] ? trace_hardirqs_on+0x37/0xe0 [ 26.567193] ? kasan_atomics+0x153/0x310 [ 26.567746] kasan_atomics+0x1dd/0x310 [ 26.568184] ? __pfx_kasan_atomics+0x10/0x10 [ 26.568727] ? __pfx_kasan_atomics+0x10/0x10 [ 26.569138] kunit_try_run_case+0x1b3/0x490 [ 26.569701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.570058] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.570654] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.571099] ? __kthread_parkme+0x82/0x160 [ 26.571558] ? preempt_count_sub+0x50/0x80 [ 26.572063] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.572476] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.572925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.573282] kthread+0x257/0x310 [ 26.573622] ? __pfx_kthread+0x10/0x10 [ 26.574118] ret_from_fork+0x41/0x80 [ 26.574561] ? __pfx_kthread+0x10/0x10 [ 26.575039] ret_from_fork_asm+0x1a/0x30 [ 26.575565] </TASK> [ 26.575912] [ 26.576189] Allocated by task 272: [ 26.576648] kasan_save_stack+0x3d/0x60 [ 26.577102] kasan_save_track+0x18/0x40 [ 26.577652] kasan_save_alloc_info+0x3b/0x50 [ 26.578138] __kasan_kmalloc+0xb7/0xc0 [ 26.578416] __kmalloc_cache_noprof+0x184/0x410 [ 26.578976] kasan_atomics+0x96/0x310 [ 26.579439] kunit_try_run_case+0x1b3/0x490 [ 26.579955] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.580291] kthread+0x257/0x310 [ 26.580628] ret_from_fork+0x41/0x80 [ 26.581073] ret_from_fork_asm+0x1a/0x30 [ 26.581521] [ 26.581831] The buggy address belongs to the object at ffff8881028c7700 [ 26.581831] which belongs to the cache kmalloc-64 of size 64 [ 26.582876] The buggy address is located 0 bytes to the right of [ 26.582876] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.583474] [ 26.583780] The buggy address belongs to the physical page: [ 26.584297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.585088] flags: 0x200000000000000(node=0|zone=2) [ 26.585659] page_type: f5(slab) [ 26.586026] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.586749] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.587317] page dumped because: kasan: bad access detected [ 26.587828] [ 26.587993] Memory state around the buggy address: [ 26.588271] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.588867] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.589638] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.590332] ^ [ 26.590906] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.591471] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.591982] ================================================================== [ 25.685926] ================================================================== [ 25.686294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 25.687216] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.689957] [ 25.690263] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.691459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.692280] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.694152] Call Trace: [ 25.694499] <TASK> [ 25.694814] dump_stack_lvl+0x73/0xb0 [ 25.695291] print_report+0xd1/0x640 [ 25.696866] ? __virt_addr_valid+0x1db/0x2d0 [ 25.698141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.698866] kasan_report+0x102/0x140 [ 25.699319] ? kasan_atomics_helper+0x4a04/0x5450 [ 25.699867] ? kasan_atomics_helper+0x4a04/0x5450 [ 25.700559] __asan_report_load4_noabort+0x18/0x20 [ 25.701156] kasan_atomics_helper+0x4a04/0x5450 [ 25.701746] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.702581] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.702946] ? trace_hardirqs_on+0x37/0xe0 [ 25.703126] ? kasan_atomics+0x153/0x310 [ 25.703291] kasan_atomics+0x1dd/0x310 [ 25.703445] ? __pfx_kasan_atomics+0x10/0x10 [ 25.703877] ? __pfx_kasan_atomics+0x10/0x10 [ 25.704912] kunit_try_run_case+0x1b3/0x490 [ 25.705567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.706151] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.706799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.707401] ? __kthread_parkme+0x82/0x160 [ 25.708003] ? preempt_count_sub+0x50/0x80 [ 25.708523] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.708826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.709407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.710392] kthread+0x257/0x310 [ 25.711048] ? __pfx_kthread+0x10/0x10 [ 25.711724] ret_from_fork+0x41/0x80 [ 25.712115] ? __pfx_kthread+0x10/0x10 [ 25.712751] ret_from_fork_asm+0x1a/0x30 [ 25.713042] </TASK> [ 25.713638] [ 25.713875] Allocated by task 272: [ 25.714428] kasan_save_stack+0x3d/0x60 [ 25.715263] kasan_save_track+0x18/0x40 [ 25.715560] kasan_save_alloc_info+0x3b/0x50 [ 25.716583] __kasan_kmalloc+0xb7/0xc0 [ 25.717118] __kmalloc_cache_noprof+0x184/0x410 [ 25.717562] kasan_atomics+0x96/0x310 [ 25.717941] kunit_try_run_case+0x1b3/0x490 [ 25.718336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.719474] kthread+0x257/0x310 [ 25.720339] ret_from_fork+0x41/0x80 [ 25.720922] ret_from_fork_asm+0x1a/0x30 [ 25.721759] [ 25.721956] The buggy address belongs to the object at ffff8881028c7700 [ 25.721956] which belongs to the cache kmalloc-64 of size 64 [ 25.723067] The buggy address is located 0 bytes to the right of [ 25.723067] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.724299] [ 25.724560] The buggy address belongs to the physical page: [ 25.725474] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.726441] flags: 0x200000000000000(node=0|zone=2) [ 25.726880] page_type: f5(slab) [ 25.727257] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.727859] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.728811] page dumped because: kasan: bad access detected [ 25.729243] [ 25.729407] Memory state around the buggy address: [ 25.729773] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.730403] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.731072] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.732302] ^ [ 25.732643] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.733274] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.733929] ================================================================== [ 25.033777] ================================================================== [ 25.034826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 25.036110] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.036870] [ 25.037076] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.037623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.038082] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.038978] Call Trace: [ 25.039253] <TASK> [ 25.039547] dump_stack_lvl+0x73/0xb0 [ 25.040036] print_report+0xd1/0x640 [ 25.040474] ? __virt_addr_valid+0x1db/0x2d0 [ 25.040991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.041436] kasan_report+0x102/0x140 [ 25.041923] ? kasan_atomics_helper+0x8fa/0x5450 [ 25.042422] ? kasan_atomics_helper+0x8fa/0x5450 [ 25.043069] kasan_check_range+0x10c/0x1c0 [ 25.043625] __kasan_check_write+0x18/0x20 [ 25.043943] kasan_atomics_helper+0x8fa/0x5450 [ 25.044260] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.044912] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.045457] ? trace_hardirqs_on+0x37/0xe0 [ 25.045983] ? kasan_atomics+0x153/0x310 [ 25.047217] kasan_atomics+0x1dd/0x310 [ 25.047904] ? __pfx_kasan_atomics+0x10/0x10 [ 25.048221] ? __pfx_kasan_atomics+0x10/0x10 [ 25.048567] kunit_try_run_case+0x1b3/0x490 [ 25.049184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.049873] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.050514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.051125] ? __kthread_parkme+0x82/0x160 [ 25.051826] ? preempt_count_sub+0x50/0x80 [ 25.052429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.053106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.053808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.054368] kthread+0x257/0x310 [ 25.054847] ? __pfx_kthread+0x10/0x10 [ 25.055297] ret_from_fork+0x41/0x80 [ 25.055789] ? __pfx_kthread+0x10/0x10 [ 25.056157] ret_from_fork_asm+0x1a/0x30 [ 25.056645] </TASK> [ 25.056960] [ 25.057224] Allocated by task 272: [ 25.057531] kasan_save_stack+0x3d/0x60 [ 25.057986] kasan_save_track+0x18/0x40 [ 25.058460] kasan_save_alloc_info+0x3b/0x50 [ 25.059318] __kasan_kmalloc+0xb7/0xc0 [ 25.060316] __kmalloc_cache_noprof+0x184/0x410 [ 25.060858] kasan_atomics+0x96/0x310 [ 25.061153] kunit_try_run_case+0x1b3/0x490 [ 25.061447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.061804] kthread+0x257/0x310 [ 25.062187] ret_from_fork+0x41/0x80 [ 25.062727] ret_from_fork_asm+0x1a/0x30 [ 25.063327] [ 25.063804] The buggy address belongs to the object at ffff8881028c7700 [ 25.063804] which belongs to the cache kmalloc-64 of size 64 [ 25.065736] The buggy address is located 0 bytes to the right of [ 25.065736] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.066967] [ 25.067211] The buggy address belongs to the physical page: [ 25.067692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.068566] flags: 0x200000000000000(node=0|zone=2) [ 25.069198] page_type: f5(slab) [ 25.069712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.070554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.071028] page dumped because: kasan: bad access detected [ 25.071522] [ 25.071845] Memory state around the buggy address: [ 25.072162] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.072942] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.073380] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.074258] ^ [ 25.074696] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.075149] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.076203] ================================================================== [ 25.736524] ================================================================== [ 25.736939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 25.738680] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.739694] [ 25.740172] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.741156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.741445] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.742338] Call Trace: [ 25.743283] <TASK> [ 25.743602] dump_stack_lvl+0x73/0xb0 [ 25.744043] print_report+0xd1/0x640 [ 25.744440] ? __virt_addr_valid+0x1db/0x2d0 [ 25.744808] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.745160] kasan_report+0x102/0x140 [ 25.746325] ? kasan_atomics_helper+0x1218/0x5450 [ 25.746826] ? kasan_atomics_helper+0x1218/0x5450 [ 25.747274] kasan_check_range+0x10c/0x1c0 [ 25.748696] __kasan_check_write+0x18/0x20 [ 25.749266] kasan_atomics_helper+0x1218/0x5450 [ 25.749704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.750187] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.750659] ? trace_hardirqs_on+0x37/0xe0 [ 25.751080] ? kasan_atomics+0x153/0x310 [ 25.751467] kasan_atomics+0x1dd/0x310 [ 25.752417] ? __pfx_kasan_atomics+0x10/0x10 [ 25.752920] ? __pfx_kasan_atomics+0x10/0x10 [ 25.753576] kunit_try_run_case+0x1b3/0x490 [ 25.754097] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.754551] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.755443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.755890] ? __kthread_parkme+0x82/0x160 [ 25.756347] ? preempt_count_sub+0x50/0x80 [ 25.756844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.757174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.757803] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.758633] kthread+0x257/0x310 [ 25.759070] ? __pfx_kthread+0x10/0x10 [ 25.759513] ret_from_fork+0x41/0x80 [ 25.759929] ? __pfx_kthread+0x10/0x10 [ 25.760296] ret_from_fork_asm+0x1a/0x30 [ 25.761582] </TASK> [ 25.761979] [ 25.762576] Allocated by task 272: [ 25.762834] kasan_save_stack+0x3d/0x60 [ 25.763265] kasan_save_track+0x18/0x40 [ 25.763699] kasan_save_alloc_info+0x3b/0x50 [ 25.764194] __kasan_kmalloc+0xb7/0xc0 [ 25.764551] __kmalloc_cache_noprof+0x184/0x410 [ 25.765064] kasan_atomics+0x96/0x310 [ 25.765395] kunit_try_run_case+0x1b3/0x490 [ 25.766127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.766616] kthread+0x257/0x310 [ 25.767002] ret_from_fork+0x41/0x80 [ 25.767357] ret_from_fork_asm+0x1a/0x30 [ 25.768756] [ 25.768925] The buggy address belongs to the object at ffff8881028c7700 [ 25.768925] which belongs to the cache kmalloc-64 of size 64 [ 25.770367] The buggy address is located 0 bytes to the right of [ 25.770367] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.771426] [ 25.771861] The buggy address belongs to the physical page: [ 25.772359] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.773430] flags: 0x200000000000000(node=0|zone=2) [ 25.774231] page_type: f5(slab) [ 25.774572] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.775248] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.776606] page dumped because: kasan: bad access detected [ 25.777291] [ 25.777478] Memory state around the buggy address: [ 25.778396] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.779411] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.780209] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.780855] ^ [ 25.781260] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.781902] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.782843] ================================================================== [ 25.784765] ================================================================== [ 25.785637] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 25.786340] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.786987] [ 25.787194] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.789185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.790566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.791222] Call Trace: [ 25.791790] <TASK> [ 25.791979] dump_stack_lvl+0x73/0xb0 [ 25.792745] print_report+0xd1/0x640 [ 25.793250] ? __virt_addr_valid+0x1db/0x2d0 [ 25.793868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.794441] kasan_report+0x102/0x140 [ 25.794748] ? kasan_atomics_helper+0x49ea/0x5450 [ 25.795252] ? kasan_atomics_helper+0x49ea/0x5450 [ 25.795789] __asan_report_load4_noabort+0x18/0x20 [ 25.796820] kasan_atomics_helper+0x49ea/0x5450 [ 25.798008] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.798437] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.798874] ? trace_hardirqs_on+0x37/0xe0 [ 25.799344] ? kasan_atomics+0x153/0x310 [ 25.800234] kasan_atomics+0x1dd/0x310 [ 25.800908] ? __pfx_kasan_atomics+0x10/0x10 [ 25.801224] ? __pfx_kasan_atomics+0x10/0x10 [ 25.801974] kunit_try_run_case+0x1b3/0x490 [ 25.802642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.803263] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.803962] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.804664] ? __kthread_parkme+0x82/0x160 [ 25.805259] ? preempt_count_sub+0x50/0x80 [ 25.805757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.806477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.806824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.807718] kthread+0x257/0x310 [ 25.808317] ? __pfx_kthread+0x10/0x10 [ 25.808854] ret_from_fork+0x41/0x80 [ 25.809229] ? __pfx_kthread+0x10/0x10 [ 25.810122] ret_from_fork_asm+0x1a/0x30 [ 25.810524] </TASK> [ 25.810791] [ 25.811291] Allocated by task 272: [ 25.811688] kasan_save_stack+0x3d/0x60 [ 25.812056] kasan_save_track+0x18/0x40 [ 25.812504] kasan_save_alloc_info+0x3b/0x50 [ 25.813469] __kasan_kmalloc+0xb7/0xc0 [ 25.813921] __kmalloc_cache_noprof+0x184/0x410 [ 25.814790] kasan_atomics+0x96/0x310 [ 25.815453] kunit_try_run_case+0x1b3/0x490 [ 25.815948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.816540] kthread+0x257/0x310 [ 25.816988] ret_from_fork+0x41/0x80 [ 25.817690] ret_from_fork_asm+0x1a/0x30 [ 25.818017] [ 25.818712] The buggy address belongs to the object at ffff8881028c7700 [ 25.818712] which belongs to the cache kmalloc-64 of size 64 [ 25.819559] The buggy address is located 0 bytes to the right of [ 25.819559] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.820331] [ 25.821179] The buggy address belongs to the physical page: [ 25.821893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.822835] flags: 0x200000000000000(node=0|zone=2) [ 25.823028] page_type: f5(slab) [ 25.823165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.823391] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.823716] page dumped because: kasan: bad access detected [ 25.824025] [ 25.825050] Memory state around the buggy address: [ 25.825566] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.826216] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.827580] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.828097] ^ [ 25.828676] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.829263] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.830050] ================================================================== [ 26.722587] ================================================================== [ 26.722994] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 26.723394] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.724074] [ 26.724356] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.725614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.725887] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.726570] Call Trace: [ 26.726863] <TASK> [ 26.727179] dump_stack_lvl+0x73/0xb0 [ 26.727660] print_report+0xd1/0x640 [ 26.727991] ? __virt_addr_valid+0x1db/0x2d0 [ 26.728352] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.728909] kasan_report+0x102/0x140 [ 26.729445] ? kasan_atomics_helper+0x1e13/0x5450 [ 26.730061] ? kasan_atomics_helper+0x1e13/0x5450 [ 26.730601] kasan_check_range+0x10c/0x1c0 [ 26.730929] __kasan_check_write+0x18/0x20 [ 26.731504] kasan_atomics_helper+0x1e13/0x5450 [ 26.732022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.732422] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.733019] ? trace_hardirqs_on+0x37/0xe0 [ 26.733344] ? kasan_atomics+0x153/0x310 [ 26.733677] kasan_atomics+0x1dd/0x310 [ 26.734128] ? __pfx_kasan_atomics+0x10/0x10 [ 26.734716] ? __pfx_kasan_atomics+0x10/0x10 [ 26.735203] kunit_try_run_case+0x1b3/0x490 [ 26.735688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.736049] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.736375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.736907] ? __kthread_parkme+0x82/0x160 [ 26.737360] ? preempt_count_sub+0x50/0x80 [ 26.739518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.740025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.740648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.741002] kthread+0x257/0x310 [ 26.741265] ? __pfx_kthread+0x10/0x10 [ 26.742770] ret_from_fork+0x41/0x80 [ 26.743208] ? __pfx_kthread+0x10/0x10 [ 26.743855] ret_from_fork_asm+0x1a/0x30 [ 26.744910] </TASK> [ 26.745169] [ 26.745336] Allocated by task 272: [ 26.745587] kasan_save_stack+0x3d/0x60 [ 26.746158] kasan_save_track+0x18/0x40 [ 26.747187] kasan_save_alloc_info+0x3b/0x50 [ 26.747522] __kasan_kmalloc+0xb7/0xc0 [ 26.748384] __kmalloc_cache_noprof+0x184/0x410 [ 26.748900] kasan_atomics+0x96/0x310 [ 26.749542] kunit_try_run_case+0x1b3/0x490 [ 26.750364] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.751108] kthread+0x257/0x310 [ 26.752131] ret_from_fork+0x41/0x80 [ 26.752498] ret_from_fork_asm+0x1a/0x30 [ 26.753105] [ 26.753330] The buggy address belongs to the object at ffff8881028c7700 [ 26.753330] which belongs to the cache kmalloc-64 of size 64 [ 26.754894] The buggy address is located 0 bytes to the right of [ 26.754894] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.755755] [ 26.756425] The buggy address belongs to the physical page: [ 26.756860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.757863] flags: 0x200000000000000(node=0|zone=2) [ 26.758591] page_type: f5(slab) [ 26.759055] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.759724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.760273] page dumped because: kasan: bad access detected [ 26.761261] [ 26.761454] Memory state around the buggy address: [ 26.761956] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.762964] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.763647] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.764453] ^ [ 26.765070] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.765905] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.766620] ================================================================== [ 25.479192] ================================================================== [ 25.480042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 25.480743] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.481306] [ 25.482184] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.482834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.483102] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.483566] Call Trace: [ 25.483924] <TASK> [ 25.484216] dump_stack_lvl+0x73/0xb0 [ 25.484719] print_report+0xd1/0x640 [ 25.485154] ? __virt_addr_valid+0x1db/0x2d0 [ 25.485736] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.486302] kasan_report+0x102/0x140 [ 25.486792] ? kasan_atomics_helper+0xfaa/0x5450 [ 25.487290] ? kasan_atomics_helper+0xfaa/0x5450 [ 25.487751] kasan_check_range+0x10c/0x1c0 [ 25.488061] __kasan_check_write+0x18/0x20 [ 25.488352] kasan_atomics_helper+0xfaa/0x5450 [ 25.488861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.489381] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.489928] ? trace_hardirqs_on+0x37/0xe0 [ 25.490387] ? kasan_atomics+0x153/0x310 [ 25.490917] kasan_atomics+0x1dd/0x310 [ 25.491358] ? __pfx_kasan_atomics+0x10/0x10 [ 25.491898] ? __pfx_kasan_atomics+0x10/0x10 [ 25.492345] kunit_try_run_case+0x1b3/0x490 [ 25.492735] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.493060] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.493377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.493957] ? __kthread_parkme+0x82/0x160 [ 25.494421] ? preempt_count_sub+0x50/0x80 [ 25.494952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.495506] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.496141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.496788] kthread+0x257/0x310 [ 25.497176] ? __pfx_kthread+0x10/0x10 [ 25.497564] ret_from_fork+0x41/0x80 [ 25.498031] ? __pfx_kthread+0x10/0x10 [ 25.498381] ret_from_fork_asm+0x1a/0x30 [ 25.498922] </TASK> [ 25.499135] [ 25.499357] Allocated by task 272: [ 25.499767] kasan_save_stack+0x3d/0x60 [ 25.500049] kasan_save_track+0x18/0x40 [ 25.500317] kasan_save_alloc_info+0x3b/0x50 [ 25.500687] __kasan_kmalloc+0xb7/0xc0 [ 25.500958] __kmalloc_cache_noprof+0x184/0x410 [ 25.501451] kasan_atomics+0x96/0x310 [ 25.501936] kunit_try_run_case+0x1b3/0x490 [ 25.502387] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.502981] kthread+0x257/0x310 [ 25.503363] ret_from_fork+0x41/0x80 [ 25.503836] ret_from_fork_asm+0x1a/0x30 [ 25.504269] [ 25.504510] The buggy address belongs to the object at ffff8881028c7700 [ 25.504510] which belongs to the cache kmalloc-64 of size 64 [ 25.505630] The buggy address is located 0 bytes to the right of [ 25.505630] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.506431] [ 25.506747] The buggy address belongs to the physical page: [ 25.507259] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.507855] flags: 0x200000000000000(node=0|zone=2) [ 25.508165] page_type: f5(slab) [ 25.508526] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.510070] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.510567] page dumped because: kasan: bad access detected [ 25.510893] [ 25.511049] Memory state around the buggy address: [ 25.511327] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.512318] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.513012] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.513690] ^ [ 25.514155] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.514842] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.515314] ================================================================== [ 24.608646] ================================================================== [ 24.609141] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 24.610519] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.611250] [ 24.611563] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.613558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.614166] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.614983] Call Trace: [ 24.615358] <TASK> [ 24.615754] dump_stack_lvl+0x73/0xb0 [ 24.616200] print_report+0xd1/0x640 [ 24.616741] ? __virt_addr_valid+0x1db/0x2d0 [ 24.617235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.618621] kasan_report+0x102/0x140 [ 24.618911] ? kasan_atomics_helper+0x3e0/0x5450 [ 24.619222] ? kasan_atomics_helper+0x3e0/0x5450 [ 24.619569] kasan_check_range+0x10c/0x1c0 [ 24.619991] __kasan_check_read+0x15/0x20 [ 24.620439] kasan_atomics_helper+0x3e0/0x5450 [ 24.622231] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.622992] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.623898] ? trace_hardirqs_on+0x37/0xe0 [ 24.624295] ? kasan_atomics+0x153/0x310 [ 24.625077] kasan_atomics+0x1dd/0x310 [ 24.625993] ? __pfx_kasan_atomics+0x10/0x10 [ 24.626200] ? __pfx_kasan_atomics+0x10/0x10 [ 24.626373] kunit_try_run_case+0x1b3/0x490 [ 24.626630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.626938] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.627638] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.628202] ? __kthread_parkme+0x82/0x160 [ 24.629223] ? preempt_count_sub+0x50/0x80 [ 24.629687] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.630174] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.630961] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.631599] kthread+0x257/0x310 [ 24.632066] ? __pfx_kthread+0x10/0x10 [ 24.632548] ret_from_fork+0x41/0x80 [ 24.633036] ? __pfx_kthread+0x10/0x10 [ 24.633522] ret_from_fork_asm+0x1a/0x30 [ 24.634073] </TASK> [ 24.634386] [ 24.634690] Allocated by task 272: [ 24.635099] kasan_save_stack+0x3d/0x60 [ 24.635670] kasan_save_track+0x18/0x40 [ 24.636127] kasan_save_alloc_info+0x3b/0x50 [ 24.636667] __kasan_kmalloc+0xb7/0xc0 [ 24.637148] __kmalloc_cache_noprof+0x184/0x410 [ 24.637713] kasan_atomics+0x96/0x310 [ 24.638167] kunit_try_run_case+0x1b3/0x490 [ 24.638712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.639290] kthread+0x257/0x310 [ 24.639756] ret_from_fork+0x41/0x80 [ 24.640202] ret_from_fork_asm+0x1a/0x30 [ 24.640719] [ 24.640964] The buggy address belongs to the object at ffff8881028c7700 [ 24.640964] which belongs to the cache kmalloc-64 of size 64 [ 24.642101] The buggy address is located 0 bytes to the right of [ 24.642101] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.642892] [ 24.643122] The buggy address belongs to the physical page: [ 24.643567] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.644073] flags: 0x200000000000000(node=0|zone=2) [ 24.644553] page_type: f5(slab) [ 24.644927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.645619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.646185] page dumped because: kasan: bad access detected [ 24.646730] [ 24.646948] Memory state around the buggy address: [ 24.647319] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.647930] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.648457] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.649058] ^ [ 24.649347] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.650001] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.650708] ================================================================== [ 24.483088] ================================================================== [ 24.484339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 24.485057] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.486073] [ 24.486332] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.487184] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.487703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.488376] Call Trace: [ 24.488742] <TASK> [ 24.489077] dump_stack_lvl+0x73/0xb0 [ 24.489436] print_report+0xd1/0x640 [ 24.489932] ? __virt_addr_valid+0x1db/0x2d0 [ 24.490310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.490958] kasan_report+0x102/0x140 [ 24.491284] ? kasan_atomics_helper+0x4ba4/0x5450 [ 24.492008] ? kasan_atomics_helper+0x4ba4/0x5450 [ 24.492626] __asan_report_store4_noabort+0x1b/0x30 [ 24.493171] kasan_atomics_helper+0x4ba4/0x5450 [ 24.493685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.494136] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.494696] ? trace_hardirqs_on+0x37/0xe0 [ 24.495092] ? kasan_atomics+0x153/0x310 [ 24.495735] kasan_atomics+0x1dd/0x310 [ 24.496110] ? __pfx_kasan_atomics+0x10/0x10 [ 24.496676] ? __pfx_kasan_atomics+0x10/0x10 [ 24.497095] kunit_try_run_case+0x1b3/0x490 [ 24.497665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.498007] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.498516] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.499099] ? __kthread_parkme+0x82/0x160 [ 24.499571] ? preempt_count_sub+0x50/0x80 [ 24.500043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.500620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.501113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.501776] kthread+0x257/0x310 [ 24.502200] ? __pfx_kthread+0x10/0x10 [ 24.503436] ret_from_fork+0x41/0x80 [ 24.503820] ? __pfx_kthread+0x10/0x10 [ 24.504176] ret_from_fork_asm+0x1a/0x30 [ 24.504660] </TASK> [ 24.504934] [ 24.505153] Allocated by task 272: [ 24.505470] kasan_save_stack+0x3d/0x60 [ 24.506830] kasan_save_track+0x18/0x40 [ 24.507123] kasan_save_alloc_info+0x3b/0x50 [ 24.507415] __kasan_kmalloc+0xb7/0xc0 [ 24.507993] __kmalloc_cache_noprof+0x184/0x410 [ 24.508609] kasan_atomics+0x96/0x310 [ 24.509149] kunit_try_run_case+0x1b3/0x490 [ 24.510278] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.510915] kthread+0x257/0x310 [ 24.511361] ret_from_fork+0x41/0x80 [ 24.512233] ret_from_fork_asm+0x1a/0x30 [ 24.513164] [ 24.513419] The buggy address belongs to the object at ffff8881028c7700 [ 24.513419] which belongs to the cache kmalloc-64 of size 64 [ 24.514376] The buggy address is located 0 bytes to the right of [ 24.514376] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.515362] [ 24.515562] The buggy address belongs to the physical page: [ 24.516059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.517392] flags: 0x200000000000000(node=0|zone=2) [ 24.518189] page_type: f5(slab) [ 24.518541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.519100] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.520267] page dumped because: kasan: bad access detected [ 24.520637] [ 24.520826] Memory state around the buggy address: [ 24.521247] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.521881] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.522548] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.522914] ^ [ 24.523202] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.524520] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.525143] ================================================================== [ 26.677716] ================================================================== [ 26.678691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 26.679267] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.680871] [ 26.681107] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.681958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.682241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.682752] Call Trace: [ 26.683073] <TASK> [ 26.683686] dump_stack_lvl+0x73/0xb0 [ 26.684143] print_report+0xd1/0x640 [ 26.684678] ? __virt_addr_valid+0x1db/0x2d0 [ 26.685170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.685795] kasan_report+0x102/0x140 [ 26.686213] ? kasan_atomics_helper+0x1d7b/0x5450 [ 26.686807] ? kasan_atomics_helper+0x1d7b/0x5450 [ 26.687221] kasan_check_range+0x10c/0x1c0 [ 26.687560] __kasan_check_write+0x18/0x20 [ 26.687963] kasan_atomics_helper+0x1d7b/0x5450 [ 26.688513] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.689332] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.690880] ? trace_hardirqs_on+0x37/0xe0 [ 26.691884] ? kasan_atomics+0x153/0x310 [ 26.693000] kasan_atomics+0x1dd/0x310 [ 26.693957] ? __pfx_kasan_atomics+0x10/0x10 [ 26.694428] ? __pfx_kasan_atomics+0x10/0x10 [ 26.694943] kunit_try_run_case+0x1b3/0x490 [ 26.695234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.696013] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.696849] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.697516] ? __kthread_parkme+0x82/0x160 [ 26.698098] ? preempt_count_sub+0x50/0x80 [ 26.698478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.699381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.700521] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.701141] kthread+0x257/0x310 [ 26.701563] ? __pfx_kthread+0x10/0x10 [ 26.701856] ret_from_fork+0x41/0x80 [ 26.702282] ? __pfx_kthread+0x10/0x10 [ 26.702759] ret_from_fork_asm+0x1a/0x30 [ 26.703151] </TASK> [ 26.703382] [ 26.703662] Allocated by task 272: [ 26.703909] kasan_save_stack+0x3d/0x60 [ 26.704346] kasan_save_track+0x18/0x40 [ 26.704798] kasan_save_alloc_info+0x3b/0x50 [ 26.705902] __kasan_kmalloc+0xb7/0xc0 [ 26.706870] __kmalloc_cache_noprof+0x184/0x410 [ 26.707389] kasan_atomics+0x96/0x310 [ 26.707710] kunit_try_run_case+0x1b3/0x490 [ 26.708163] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.708872] kthread+0x257/0x310 [ 26.709285] ret_from_fork+0x41/0x80 [ 26.709831] ret_from_fork_asm+0x1a/0x30 [ 26.710225] [ 26.710430] The buggy address belongs to the object at ffff8881028c7700 [ 26.710430] which belongs to the cache kmalloc-64 of size 64 [ 26.711607] The buggy address is located 0 bytes to the right of [ 26.711607] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.712931] [ 26.713184] The buggy address belongs to the physical page: [ 26.713822] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.714324] flags: 0x200000000000000(node=0|zone=2) [ 26.715060] page_type: f5(slab) [ 26.716646] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.717146] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.717624] page dumped because: kasan: bad access detected [ 26.718145] [ 26.718438] Memory state around the buggy address: [ 26.718805] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.719253] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.719703] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.720072] ^ [ 26.720361] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.720792] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.721165] ================================================================== [ 25.165646] ================================================================== [ 25.167057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 25.167757] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.168703] [ 25.169029] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.169571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.170086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.171043] Call Trace: [ 25.171438] <TASK> [ 25.171902] dump_stack_lvl+0x73/0xb0 [ 25.172430] print_report+0xd1/0x640 [ 25.173015] ? __virt_addr_valid+0x1db/0x2d0 [ 25.173592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.174275] kasan_report+0x102/0x140 [ 25.174878] ? kasan_atomics_helper+0xac8/0x5450 [ 25.175530] ? kasan_atomics_helper+0xac8/0x5450 [ 25.176225] kasan_check_range+0x10c/0x1c0 [ 25.176833] __kasan_check_write+0x18/0x20 [ 25.177386] kasan_atomics_helper+0xac8/0x5450 [ 25.178015] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.178698] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.179226] ? trace_hardirqs_on+0x37/0xe0 [ 25.179556] ? kasan_atomics+0x153/0x310 [ 25.180104] kasan_atomics+0x1dd/0x310 [ 25.180515] ? __pfx_kasan_atomics+0x10/0x10 [ 25.181015] ? __pfx_kasan_atomics+0x10/0x10 [ 25.181466] kunit_try_run_case+0x1b3/0x490 [ 25.181925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.182323] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.182726] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.183160] ? __kthread_parkme+0x82/0x160 [ 25.183693] ? preempt_count_sub+0x50/0x80 [ 25.184149] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.184728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.185354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.185793] kthread+0x257/0x310 [ 25.186192] ? __pfx_kthread+0x10/0x10 [ 25.186668] ret_from_fork+0x41/0x80 [ 25.187086] ? __pfx_kthread+0x10/0x10 [ 25.187548] ret_from_fork_asm+0x1a/0x30 [ 25.188688] </TASK> [ 25.188940] [ 25.189123] Allocated by task 272: [ 25.189418] kasan_save_stack+0x3d/0x60 [ 25.189881] kasan_save_track+0x18/0x40 [ 25.190264] kasan_save_alloc_info+0x3b/0x50 [ 25.191197] __kasan_kmalloc+0xb7/0xc0 [ 25.191605] __kmalloc_cache_noprof+0x184/0x410 [ 25.192066] kasan_atomics+0x96/0x310 [ 25.192478] kunit_try_run_case+0x1b3/0x490 [ 25.192908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.193238] kthread+0x257/0x310 [ 25.193513] ret_from_fork+0x41/0x80 [ 25.193968] ret_from_fork_asm+0x1a/0x30 [ 25.194405] [ 25.194696] The buggy address belongs to the object at ffff8881028c7700 [ 25.194696] which belongs to the cache kmalloc-64 of size 64 [ 25.195822] The buggy address is located 0 bytes to the right of [ 25.195822] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.196465] [ 25.196776] The buggy address belongs to the physical page: [ 25.197283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.197998] flags: 0x200000000000000(node=0|zone=2) [ 25.198333] page_type: f5(slab) [ 25.198643] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.199291] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.200011] page dumped because: kasan: bad access detected [ 25.200527] [ 25.200807] Memory state around the buggy address: [ 25.201271] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.201781] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.202321] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.202766] ^ [ 25.203224] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.203921] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.204460] ================================================================== [ 26.428439] ================================================================== [ 26.429267] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 26.430111] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.430438] [ 26.430758] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.431835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.432268] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.432975] Call Trace: [ 26.433334] <TASK> [ 26.433687] dump_stack_lvl+0x73/0xb0 [ 26.434081] print_report+0xd1/0x640 [ 26.434373] ? __virt_addr_valid+0x1db/0x2d0 [ 26.435035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.435697] kasan_report+0x102/0x140 [ 26.436199] ? kasan_atomics_helper+0x19e4/0x5450 [ 26.436780] ? kasan_atomics_helper+0x19e4/0x5450 [ 26.437350] kasan_check_range+0x10c/0x1c0 [ 26.437888] __kasan_check_write+0x18/0x20 [ 26.438207] kasan_atomics_helper+0x19e4/0x5450 [ 26.438731] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.439317] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.439953] ? trace_hardirqs_on+0x37/0xe0 [ 26.440424] ? kasan_atomics+0x153/0x310 [ 26.441017] kasan_atomics+0x1dd/0x310 [ 26.441442] ? __pfx_kasan_atomics+0x10/0x10 [ 26.441998] ? __pfx_kasan_atomics+0x10/0x10 [ 26.442730] kunit_try_run_case+0x1b3/0x490 [ 26.443227] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.443618] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.444191] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.444833] ? __kthread_parkme+0x82/0x160 [ 26.445302] ? preempt_count_sub+0x50/0x80 [ 26.445948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.446513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.447172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.447808] kthread+0x257/0x310 [ 26.448224] ? __pfx_kthread+0x10/0x10 [ 26.448659] ret_from_fork+0x41/0x80 [ 26.449084] ? __pfx_kthread+0x10/0x10 [ 26.449436] ret_from_fork_asm+0x1a/0x30 [ 26.450035] </TASK> [ 26.450415] [ 26.450712] Allocated by task 272: [ 26.451042] kasan_save_stack+0x3d/0x60 [ 26.451567] kasan_save_track+0x18/0x40 [ 26.452074] kasan_save_alloc_info+0x3b/0x50 [ 26.452674] __kasan_kmalloc+0xb7/0xc0 [ 26.452989] __kmalloc_cache_noprof+0x184/0x410 [ 26.453519] kasan_atomics+0x96/0x310 [ 26.454060] kunit_try_run_case+0x1b3/0x490 [ 26.454519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.455137] kthread+0x257/0x310 [ 26.455566] ret_from_fork+0x41/0x80 [ 26.456021] ret_from_fork_asm+0x1a/0x30 [ 26.456420] [ 26.456724] The buggy address belongs to the object at ffff8881028c7700 [ 26.456724] which belongs to the cache kmalloc-64 of size 64 [ 26.457815] The buggy address is located 0 bytes to the right of [ 26.457815] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.458848] [ 26.459041] The buggy address belongs to the physical page: [ 26.459532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.460874] flags: 0x200000000000000(node=0|zone=2) [ 26.461186] page_type: f5(slab) [ 26.461433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.463196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.463987] page dumped because: kasan: bad access detected [ 26.465202] [ 26.466224] Memory state around the buggy address: [ 26.467425] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.468631] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.469389] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.470243] ^ [ 26.470734] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.471656] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.472282] ================================================================== [ 27.022272] ================================================================== [ 27.023878] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 27.024559] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 27.025214] [ 27.025437] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.026308] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.027099] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.027591] Call Trace: [ 27.027808] <TASK> [ 27.028010] dump_stack_lvl+0x73/0xb0 [ 27.028446] print_report+0xd1/0x640 [ 27.028968] ? __virt_addr_valid+0x1db/0x2d0 [ 27.029447] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.030057] kasan_report+0x102/0x140 [ 27.030507] ? kasan_atomics_helper+0x4fb4/0x5450 [ 27.031044] ? kasan_atomics_helper+0x4fb4/0x5450 [ 27.031413] __asan_report_load8_noabort+0x18/0x20 [ 27.031990] kasan_atomics_helper+0x4fb4/0x5450 [ 27.032456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.032859] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.033182] ? trace_hardirqs_on+0x37/0xe0 [ 27.033691] ? kasan_atomics+0x153/0x310 [ 27.034172] kasan_atomics+0x1dd/0x310 [ 27.034665] ? __pfx_kasan_atomics+0x10/0x10 [ 27.035145] ? __pfx_kasan_atomics+0x10/0x10 [ 27.035660] kunit_try_run_case+0x1b3/0x490 [ 27.036137] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.036527] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.036898] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.037225] ? __kthread_parkme+0x82/0x160 [ 27.037533] ? preempt_count_sub+0x50/0x80 [ 27.038037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.038569] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.039196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.039799] kthread+0x257/0x310 [ 27.040199] ? __pfx_kthread+0x10/0x10 [ 27.040696] ret_from_fork+0x41/0x80 [ 27.041103] ? __pfx_kthread+0x10/0x10 [ 27.041529] ret_from_fork_asm+0x1a/0x30 [ 27.041907] </TASK> [ 27.042202] [ 27.042424] Allocated by task 272: [ 27.042766] kasan_save_stack+0x3d/0x60 [ 27.043181] kasan_save_track+0x18/0x40 [ 27.043517] kasan_save_alloc_info+0x3b/0x50 [ 27.044013] __kasan_kmalloc+0xb7/0xc0 [ 27.044320] __kmalloc_cache_noprof+0x184/0x410 [ 27.044691] kasan_atomics+0x96/0x310 [ 27.044963] kunit_try_run_case+0x1b3/0x490 [ 27.045274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.045760] kthread+0x257/0x310 [ 27.046159] ret_from_fork+0x41/0x80 [ 27.046630] ret_from_fork_asm+0x1a/0x30 [ 27.047076] [ 27.047297] The buggy address belongs to the object at ffff8881028c7700 [ 27.047297] which belongs to the cache kmalloc-64 of size 64 [ 27.048350] The buggy address is located 0 bytes to the right of [ 27.048350] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 27.049447] [ 27.049697] The buggy address belongs to the physical page: [ 27.050004] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 27.050426] flags: 0x200000000000000(node=0|zone=2) [ 27.050844] page_type: f5(slab) [ 27.051201] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.051939] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.052645] page dumped because: kasan: bad access detected [ 27.053164] [ 27.053384] Memory state around the buggy address: [ 27.054412] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.055106] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.055663] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.056037] ^ [ 27.056328] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.059003] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.059724] ================================================================== [ 26.904361] ================================================================== [ 26.905421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 26.906067] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.906756] [ 26.906969] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.907992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.909197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.909870] Call Trace: [ 26.910106] <TASK> [ 26.910299] dump_stack_lvl+0x73/0xb0 [ 26.910720] print_report+0xd1/0x640 [ 26.911155] ? __virt_addr_valid+0x1db/0x2d0 [ 26.912034] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.912401] kasan_report+0x102/0x140 [ 26.912740] ? kasan_atomics_helper+0x2007/0x5450 [ 26.913184] ? kasan_atomics_helper+0x2007/0x5450 [ 26.913691] kasan_check_range+0x10c/0x1c0 [ 26.914174] __kasan_check_write+0x18/0x20 [ 26.914619] kasan_atomics_helper+0x2007/0x5450 [ 26.915085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.915417] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.915981] ? trace_hardirqs_on+0x37/0xe0 [ 26.916440] ? kasan_atomics+0x153/0x310 [ 26.916966] kasan_atomics+0x1dd/0x310 [ 26.917334] ? __pfx_kasan_atomics+0x10/0x10 [ 26.917862] ? __pfx_kasan_atomics+0x10/0x10 [ 26.918223] kunit_try_run_case+0x1b3/0x490 [ 26.918757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.919171] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.919635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.920006] ? __kthread_parkme+0x82/0x160 [ 26.920435] ? preempt_count_sub+0x50/0x80 [ 26.920892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.921264] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.921900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.922405] kthread+0x257/0x310 [ 26.922797] ? __pfx_kthread+0x10/0x10 [ 26.923088] ret_from_fork+0x41/0x80 [ 26.923521] ? __pfx_kthread+0x10/0x10 [ 26.923991] ret_from_fork_asm+0x1a/0x30 [ 26.924463] </TASK> [ 26.924746] [ 26.924974] Allocated by task 272: [ 26.925221] kasan_save_stack+0x3d/0x60 [ 26.925703] kasan_save_track+0x18/0x40 [ 26.926008] kasan_save_alloc_info+0x3b/0x50 [ 26.926412] __kasan_kmalloc+0xb7/0xc0 [ 26.926909] __kmalloc_cache_noprof+0x184/0x410 [ 26.928127] kasan_atomics+0x96/0x310 [ 26.928514] kunit_try_run_case+0x1b3/0x490 [ 26.928916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.929450] kthread+0x257/0x310 [ 26.930617] ret_from_fork+0x41/0x80 [ 26.931532] ret_from_fork_asm+0x1a/0x30 [ 26.932048] [ 26.932226] The buggy address belongs to the object at ffff8881028c7700 [ 26.932226] which belongs to the cache kmalloc-64 of size 64 [ 26.933191] The buggy address is located 0 bytes to the right of [ 26.933191] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.934388] [ 26.934716] The buggy address belongs to the physical page: [ 26.935298] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.936084] flags: 0x200000000000000(node=0|zone=2) [ 26.936817] page_type: f5(slab) [ 26.937063] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.937644] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.938256] page dumped because: kasan: bad access detected [ 26.938632] [ 26.938864] Memory state around the buggy address: [ 26.939317] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.939786] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.940388] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.940914] ^ [ 26.941388] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.941953] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.942627] ================================================================== [ 25.321768] ================================================================== [ 25.322240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 25.322837] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.323425] [ 25.323672] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.324434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.324840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.325327] Call Trace: [ 25.325565] <TASK> [ 25.325991] dump_stack_lvl+0x73/0xb0 [ 25.326466] print_report+0xd1/0x640 [ 25.326958] ? __virt_addr_valid+0x1db/0x2d0 [ 25.327425] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.328028] kasan_report+0x102/0x140 [ 25.328463] ? kasan_atomics_helper+0xd48/0x5450 [ 25.328871] ? kasan_atomics_helper+0xd48/0x5450 [ 25.329205] kasan_check_range+0x10c/0x1c0 [ 25.329733] __kasan_check_write+0x18/0x20 [ 25.330188] kasan_atomics_helper+0xd48/0x5450 [ 25.330723] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.331241] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.331628] ? trace_hardirqs_on+0x37/0xe0 [ 25.332001] ? kasan_atomics+0x153/0x310 [ 25.332438] kasan_atomics+0x1dd/0x310 [ 25.332932] ? __pfx_kasan_atomics+0x10/0x10 [ 25.333403] ? __pfx_kasan_atomics+0x10/0x10 [ 25.333831] kunit_try_run_case+0x1b3/0x490 [ 25.334295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.334746] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.335266] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.335844] ? __kthread_parkme+0x82/0x160 [ 25.336159] ? preempt_count_sub+0x50/0x80 [ 25.336675] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.337092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.337566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.338125] kthread+0x257/0x310 [ 25.338542] ? __pfx_kthread+0x10/0x10 [ 25.338953] ret_from_fork+0x41/0x80 [ 25.339310] ? __pfx_kthread+0x10/0x10 [ 25.339661] ret_from_fork_asm+0x1a/0x30 [ 25.339988] </TASK> [ 25.340184] [ 25.340341] Allocated by task 272: [ 25.340704] kasan_save_stack+0x3d/0x60 [ 25.341129] kasan_save_track+0x18/0x40 [ 25.341610] kasan_save_alloc_info+0x3b/0x50 [ 25.342090] __kasan_kmalloc+0xb7/0xc0 [ 25.342538] __kmalloc_cache_noprof+0x184/0x410 [ 25.343055] kasan_atomics+0x96/0x310 [ 25.343468] kunit_try_run_case+0x1b3/0x490 [ 25.345873] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.346228] kthread+0x257/0x310 [ 25.346477] ret_from_fork+0x41/0x80 [ 25.347459] ret_from_fork_asm+0x1a/0x30 [ 25.348964] [ 25.349200] The buggy address belongs to the object at ffff8881028c7700 [ 25.349200] which belongs to the cache kmalloc-64 of size 64 [ 25.350259] The buggy address is located 0 bytes to the right of [ 25.350259] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.351350] [ 25.351638] The buggy address belongs to the physical page: [ 25.352106] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.352675] flags: 0x200000000000000(node=0|zone=2) [ 25.352987] page_type: f5(slab) [ 25.353234] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.353800] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.354500] page dumped because: kasan: bad access detected [ 25.355046] [ 25.355310] Memory state around the buggy address: [ 25.355825] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.356467] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.357139] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.357694] ^ [ 25.358073] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.358690] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.359060] ================================================================== [ 24.687730] ================================================================== [ 24.688392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 24.689408] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.689989] [ 24.690256] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.691933] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.692191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.692987] Call Trace: [ 24.693289] <TASK> [ 24.693632] dump_stack_lvl+0x73/0xb0 [ 24.694082] print_report+0xd1/0x640 [ 24.694454] ? __virt_addr_valid+0x1db/0x2d0 [ 24.694942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.695340] kasan_report+0x102/0x140 [ 24.695694] ? kasan_atomics_helper+0x4a1/0x5450 [ 24.696006] ? kasan_atomics_helper+0x4a1/0x5450 [ 24.696520] kasan_check_range+0x10c/0x1c0 [ 24.697859] __kasan_check_write+0x18/0x20 [ 24.698319] kasan_atomics_helper+0x4a1/0x5450 [ 24.698870] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.699374] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.699930] ? trace_hardirqs_on+0x37/0xe0 [ 24.700375] ? kasan_atomics+0x153/0x310 [ 24.700896] kasan_atomics+0x1dd/0x310 [ 24.701331] ? __pfx_kasan_atomics+0x10/0x10 [ 24.701719] ? __pfx_kasan_atomics+0x10/0x10 [ 24.702038] kunit_try_run_case+0x1b3/0x490 [ 24.702356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.703207] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.703773] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.704366] ? __kthread_parkme+0x82/0x160 [ 24.704885] ? preempt_count_sub+0x50/0x80 [ 24.705397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.705799] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.706189] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.706561] kthread+0x257/0x310 [ 24.706881] ? __pfx_kthread+0x10/0x10 [ 24.707277] ret_from_fork+0x41/0x80 [ 24.707760] ? __pfx_kthread+0x10/0x10 [ 24.708196] ret_from_fork_asm+0x1a/0x30 [ 24.708729] </TASK> [ 24.709009] [ 24.709224] Allocated by task 272: [ 24.709656] kasan_save_stack+0x3d/0x60 [ 24.710105] kasan_save_track+0x18/0x40 [ 24.710537] kasan_save_alloc_info+0x3b/0x50 [ 24.711039] __kasan_kmalloc+0xb7/0xc0 [ 24.711458] __kmalloc_cache_noprof+0x184/0x410 [ 24.711992] kasan_atomics+0x96/0x310 [ 24.712364] kunit_try_run_case+0x1b3/0x490 [ 24.712868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.713312] kthread+0x257/0x310 [ 24.713630] ret_from_fork+0x41/0x80 [ 24.713906] ret_from_fork_asm+0x1a/0x30 [ 24.714351] [ 24.714629] The buggy address belongs to the object at ffff8881028c7700 [ 24.714629] which belongs to the cache kmalloc-64 of size 64 [ 24.715620] The buggy address is located 0 bytes to the right of [ 24.715620] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.716215] [ 24.716383] The buggy address belongs to the physical page: [ 24.716757] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.717177] flags: 0x200000000000000(node=0|zone=2) [ 24.717507] page_type: f5(slab) [ 24.717930] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.718676] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.719350] page dumped because: kasan: bad access detected [ 24.719905] [ 24.720137] Memory state around the buggy address: [ 24.720635] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.721275] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.721931] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.724617] ^ [ 24.725105] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.727093] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.727801] ================================================================== [ 25.958502] ================================================================== [ 25.960556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 25.961127] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.961882] [ 25.962751] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.963776] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.964092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.964998] Call Trace: [ 25.965780] <TASK> [ 25.966049] dump_stack_lvl+0x73/0xb0 [ 25.966417] print_report+0xd1/0x640 [ 25.966835] ? __virt_addr_valid+0x1db/0x2d0 [ 25.967891] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.968387] kasan_report+0x102/0x140 [ 25.969070] ? kasan_atomics_helper+0x4eb0/0x5450 [ 25.969718] ? kasan_atomics_helper+0x4eb0/0x5450 [ 25.970432] __asan_report_load8_noabort+0x18/0x20 [ 25.971071] kasan_atomics_helper+0x4eb0/0x5450 [ 25.971571] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.972409] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.972913] ? trace_hardirqs_on+0x37/0xe0 [ 25.973297] ? kasan_atomics+0x153/0x310 [ 25.974227] kasan_atomics+0x1dd/0x310 [ 25.974761] ? __pfx_kasan_atomics+0x10/0x10 [ 25.975335] ? __pfx_kasan_atomics+0x10/0x10 [ 25.975810] kunit_try_run_case+0x1b3/0x490 [ 25.976193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.976722] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.977155] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.978175] ? __kthread_parkme+0x82/0x160 [ 25.978464] ? preempt_count_sub+0x50/0x80 [ 25.979340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.979715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.980554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.981292] kthread+0x257/0x310 [ 25.981949] ? __pfx_kthread+0x10/0x10 [ 25.982519] ret_from_fork+0x41/0x80 [ 25.983232] ? __pfx_kthread+0x10/0x10 [ 25.983644] ret_from_fork_asm+0x1a/0x30 [ 25.984545] </TASK> [ 25.984965] [ 25.985204] Allocated by task 272: [ 25.985581] kasan_save_stack+0x3d/0x60 [ 25.986017] kasan_save_track+0x18/0x40 [ 25.986400] kasan_save_alloc_info+0x3b/0x50 [ 25.987521] __kasan_kmalloc+0xb7/0xc0 [ 25.988131] __kmalloc_cache_noprof+0x184/0x410 [ 25.988556] kasan_atomics+0x96/0x310 [ 25.988974] kunit_try_run_case+0x1b3/0x490 [ 25.989357] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.989913] kthread+0x257/0x310 [ 25.990341] ret_from_fork+0x41/0x80 [ 25.990897] ret_from_fork_asm+0x1a/0x30 [ 25.991225] [ 25.991472] The buggy address belongs to the object at ffff8881028c7700 [ 25.991472] which belongs to the cache kmalloc-64 of size 64 [ 25.992145] The buggy address is located 0 bytes to the right of [ 25.992145] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.994294] [ 25.994838] The buggy address belongs to the physical page: [ 25.995168] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.996062] flags: 0x200000000000000(node=0|zone=2) [ 25.996404] page_type: f5(slab) [ 25.996968] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.997852] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.998527] page dumped because: kasan: bad access detected [ 25.999163] [ 25.999389] Memory state around the buggy address: [ 26.000477] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.001142] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.001778] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.002273] ^ [ 26.003246] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.003746] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.004579] ================================================================== [ 26.090868] ================================================================== [ 26.091311] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 26.091743] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.092341] [ 26.092642] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.093617] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.094178] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.094665] Call Trace: [ 26.094980] <TASK> [ 26.095297] dump_stack_lvl+0x73/0xb0 [ 26.095755] print_report+0xd1/0x640 [ 26.097343] ? __virt_addr_valid+0x1db/0x2d0 [ 26.097826] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.100070] kasan_report+0x102/0x140 [ 26.100374] ? kasan_atomics_helper+0x151e/0x5450 [ 26.100886] ? kasan_atomics_helper+0x151e/0x5450 [ 26.101400] kasan_check_range+0x10c/0x1c0 [ 26.101857] __kasan_check_write+0x18/0x20 [ 26.102213] kasan_atomics_helper+0x151e/0x5450 [ 26.102584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.103169] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.103694] ? trace_hardirqs_on+0x37/0xe0 [ 26.104564] ? kasan_atomics+0x153/0x310 [ 26.104938] kasan_atomics+0x1dd/0x310 [ 26.105281] ? __pfx_kasan_atomics+0x10/0x10 [ 26.105805] ? __pfx_kasan_atomics+0x10/0x10 [ 26.106303] kunit_try_run_case+0x1b3/0x490 [ 26.107370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.108417] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.109077] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.109761] ? __kthread_parkme+0x82/0x160 [ 26.110249] ? preempt_count_sub+0x50/0x80 [ 26.110860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.111477] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.112238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.112952] kthread+0x257/0x310 [ 26.113419] ? __pfx_kthread+0x10/0x10 [ 26.114001] ret_from_fork+0x41/0x80 [ 26.114540] ? __pfx_kthread+0x10/0x10 [ 26.115033] ret_from_fork_asm+0x1a/0x30 [ 26.115406] </TASK> [ 26.115755] [ 26.115929] Allocated by task 272: [ 26.116184] kasan_save_stack+0x3d/0x60 [ 26.116693] kasan_save_track+0x18/0x40 [ 26.117019] kasan_save_alloc_info+0x3b/0x50 [ 26.117548] __kasan_kmalloc+0xb7/0xc0 [ 26.117896] __kmalloc_cache_noprof+0x184/0x410 [ 26.118444] kasan_atomics+0x96/0x310 [ 26.118808] kunit_try_run_case+0x1b3/0x490 [ 26.119103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.119727] kthread+0x257/0x310 [ 26.120117] ret_from_fork+0x41/0x80 [ 26.120617] ret_from_fork_asm+0x1a/0x30 [ 26.121081] [ 26.121314] The buggy address belongs to the object at ffff8881028c7700 [ 26.121314] which belongs to the cache kmalloc-64 of size 64 [ 26.122005] The buggy address is located 0 bytes to the right of [ 26.122005] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.123164] [ 26.123402] The buggy address belongs to the physical page: [ 26.123964] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.124519] flags: 0x200000000000000(node=0|zone=2) [ 26.125085] page_type: f5(slab) [ 26.125361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.126023] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.126424] page dumped because: kasan: bad access detected [ 26.126810] [ 26.127043] Memory state around the buggy address: [ 26.127604] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.128251] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.128856] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.129439] ^ [ 26.129885] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.130428] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.130871] ================================================================== [ 26.051865] ================================================================== [ 26.052306] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 26.053097] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.053428] [ 26.053618] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.054378] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.054825] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.055651] Call Trace: [ 26.056061] <TASK> [ 26.056375] dump_stack_lvl+0x73/0xb0 [ 26.056754] print_report+0xd1/0x640 [ 26.057222] ? __virt_addr_valid+0x1db/0x2d0 [ 26.057735] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.058219] kasan_report+0x102/0x140 [ 26.058828] ? kasan_atomics_helper+0x50d6/0x5450 [ 26.059207] ? kasan_atomics_helper+0x50d6/0x5450 [ 26.059574] __asan_report_store8_noabort+0x1b/0x30 [ 26.059907] kasan_atomics_helper+0x50d6/0x5450 [ 26.060226] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.060731] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.061196] ? trace_hardirqs_on+0x37/0xe0 [ 26.061771] ? kasan_atomics+0x153/0x310 [ 26.062272] kasan_atomics+0x1dd/0x310 [ 26.062634] ? __pfx_kasan_atomics+0x10/0x10 [ 26.063119] ? __pfx_kasan_atomics+0x10/0x10 [ 26.063525] kunit_try_run_case+0x1b3/0x490 [ 26.064041] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.064582] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.065121] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.065535] ? __kthread_parkme+0x82/0x160 [ 26.066073] ? preempt_count_sub+0x50/0x80 [ 26.066586] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.067074] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.067533] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.068132] kthread+0x257/0x310 [ 26.068456] ? __pfx_kthread+0x10/0x10 [ 26.069069] ret_from_fork+0x41/0x80 [ 26.069526] ? __pfx_kthread+0x10/0x10 [ 26.069957] ret_from_fork_asm+0x1a/0x30 [ 26.070326] </TASK> [ 26.070556] [ 26.070724] Allocated by task 272: [ 26.070963] kasan_save_stack+0x3d/0x60 [ 26.071446] kasan_save_track+0x18/0x40 [ 26.071909] kasan_save_alloc_info+0x3b/0x50 [ 26.072376] __kasan_kmalloc+0xb7/0xc0 [ 26.072810] __kmalloc_cache_noprof+0x184/0x410 [ 26.073423] kasan_atomics+0x96/0x310 [ 26.075123] kunit_try_run_case+0x1b3/0x490 [ 26.075530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.076064] kthread+0x257/0x310 [ 26.076451] ret_from_fork+0x41/0x80 [ 26.078868] ret_from_fork_asm+0x1a/0x30 [ 26.079187] [ 26.079347] The buggy address belongs to the object at ffff8881028c7700 [ 26.079347] which belongs to the cache kmalloc-64 of size 64 [ 26.080585] The buggy address is located 0 bytes to the right of [ 26.080585] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.081375] [ 26.081657] The buggy address belongs to the physical page: [ 26.082122] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.082630] flags: 0x200000000000000(node=0|zone=2) [ 26.083152] page_type: f5(slab) [ 26.083505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.083992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.084382] page dumped because: kasan: bad access detected [ 26.084916] [ 26.085174] Memory state around the buggy address: [ 26.085814] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.086467] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.087364] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.088021] ^ [ 26.088557] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.088941] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.089589] ================================================================== [ 26.632542] ================================================================== [ 26.633232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 26.633963] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.634761] [ 26.635027] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.635985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.636407] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.637182] Call Trace: [ 26.637524] <TASK> [ 26.637868] dump_stack_lvl+0x73/0xb0 [ 26.638447] print_report+0xd1/0x640 [ 26.638969] ? __virt_addr_valid+0x1db/0x2d0 [ 26.639452] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.639962] kasan_report+0x102/0x140 [ 26.640539] ? kasan_atomics_helper+0x1ce2/0x5450 [ 26.641161] ? kasan_atomics_helper+0x1ce2/0x5450 [ 26.641823] kasan_check_range+0x10c/0x1c0 [ 26.642315] __kasan_check_write+0x18/0x20 [ 26.642688] kasan_atomics_helper+0x1ce2/0x5450 [ 26.643258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.643957] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.644441] ? trace_hardirqs_on+0x37/0xe0 [ 26.645020] ? kasan_atomics+0x153/0x310 [ 26.645620] kasan_atomics+0x1dd/0x310 [ 26.645976] ? __pfx_kasan_atomics+0x10/0x10 [ 26.646303] ? __pfx_kasan_atomics+0x10/0x10 [ 26.646877] kunit_try_run_case+0x1b3/0x490 [ 26.647391] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.648103] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.648769] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.649451] ? __kthread_parkme+0x82/0x160 [ 26.650082] ? preempt_count_sub+0x50/0x80 [ 26.650773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.651374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.652272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.653048] kthread+0x257/0x310 [ 26.653615] ? __pfx_kthread+0x10/0x10 [ 26.654230] ret_from_fork+0x41/0x80 [ 26.654821] ? __pfx_kthread+0x10/0x10 [ 26.655449] ret_from_fork_asm+0x1a/0x30 [ 26.656064] </TASK> [ 26.656273] [ 26.656433] Allocated by task 272: [ 26.656950] kasan_save_stack+0x3d/0x60 [ 26.657426] kasan_save_track+0x18/0x40 [ 26.658126] kasan_save_alloc_info+0x3b/0x50 [ 26.658853] __kasan_kmalloc+0xb7/0xc0 [ 26.659314] __kmalloc_cache_noprof+0x184/0x410 [ 26.659945] kasan_atomics+0x96/0x310 [ 26.660460] kunit_try_run_case+0x1b3/0x490 [ 26.661144] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.661896] kthread+0x257/0x310 [ 26.662380] ret_from_fork+0x41/0x80 [ 26.662963] ret_from_fork_asm+0x1a/0x30 [ 26.663626] [ 26.663956] The buggy address belongs to the object at ffff8881028c7700 [ 26.663956] which belongs to the cache kmalloc-64 of size 64 [ 26.665052] The buggy address is located 0 bytes to the right of [ 26.665052] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.665922] [ 26.666188] The buggy address belongs to the physical page: [ 26.666871] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.667805] flags: 0x200000000000000(node=0|zone=2) [ 26.668477] page_type: f5(slab) [ 26.669072] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.669996] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.670904] page dumped because: kasan: bad access detected [ 26.671637] [ 26.671970] Memory state around the buggy address: [ 26.672568] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.673458] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.674280] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.674771] ^ [ 26.675059] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.675563] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.676236] ================================================================== [ 27.139446] ================================================================== [ 27.140415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 27.141066] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 27.141465] [ 27.141791] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.142518] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.142954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.143413] Call Trace: [ 27.143710] <TASK> [ 27.144011] dump_stack_lvl+0x73/0xb0 [ 27.144450] print_report+0xd1/0x640 [ 27.144949] ? __virt_addr_valid+0x1db/0x2d0 [ 27.145462] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.146067] kasan_report+0x102/0x140 [ 27.146629] ? kasan_atomics_helper+0x224d/0x5450 [ 27.147084] ? kasan_atomics_helper+0x224d/0x5450 [ 27.147722] kasan_check_range+0x10c/0x1c0 [ 27.148177] __kasan_check_write+0x18/0x20 [ 27.148652] kasan_atomics_helper+0x224d/0x5450 [ 27.149154] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.149511] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.150059] ? trace_hardirqs_on+0x37/0xe0 [ 27.150356] ? kasan_atomics+0x153/0x310 [ 27.150744] kasan_atomics+0x1dd/0x310 [ 27.151050] ? __pfx_kasan_atomics+0x10/0x10 [ 27.151361] ? __pfx_kasan_atomics+0x10/0x10 [ 27.151895] kunit_try_run_case+0x1b3/0x490 [ 27.152370] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.152920] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.153410] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.154001] ? __kthread_parkme+0x82/0x160 [ 27.154465] ? preempt_count_sub+0x50/0x80 [ 27.154990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.155525] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.156161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.156705] kthread+0x257/0x310 [ 27.156979] ? __pfx_kthread+0x10/0x10 [ 27.157252] ret_from_fork+0x41/0x80 [ 27.157544] ? __pfx_kthread+0x10/0x10 [ 27.158019] ret_from_fork_asm+0x1a/0x30 [ 27.158517] </TASK> [ 27.158848] [ 27.159076] Allocated by task 272: [ 27.159435] kasan_save_stack+0x3d/0x60 [ 27.159928] kasan_save_track+0x18/0x40 [ 27.160355] kasan_save_alloc_info+0x3b/0x50 [ 27.160878] __kasan_kmalloc+0xb7/0xc0 [ 27.161265] __kmalloc_cache_noprof+0x184/0x410 [ 27.161631] kasan_atomics+0x96/0x310 [ 27.161910] kunit_try_run_case+0x1b3/0x490 [ 27.162207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.162716] kthread+0x257/0x310 [ 27.163072] ret_from_fork+0x41/0x80 [ 27.163498] ret_from_fork_asm+0x1a/0x30 [ 27.163972] [ 27.164202] The buggy address belongs to the object at ffff8881028c7700 [ 27.164202] which belongs to the cache kmalloc-64 of size 64 [ 27.165284] The buggy address is located 0 bytes to the right of [ 27.165284] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 27.166284] [ 27.166453] The buggy address belongs to the physical page: [ 27.166833] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 27.167242] flags: 0x200000000000000(node=0|zone=2) [ 27.167776] page_type: f5(slab) [ 27.168149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.168886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.169561] page dumped because: kasan: bad access detected [ 27.170099] [ 27.170330] Memory state around the buggy address: [ 27.170847] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.171479] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.171924] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.172567] ^ [ 27.173078] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.173568] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.174097] ================================================================== [ 24.731116] ================================================================== [ 24.731783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 24.732139] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.732595] [ 24.733124] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.734579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.735003] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.735915] Call Trace: [ 24.736140] <TASK> [ 24.736339] dump_stack_lvl+0x73/0xb0 [ 24.736838] print_report+0xd1/0x640 [ 24.737267] ? __virt_addr_valid+0x1db/0x2d0 [ 24.737856] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.738452] kasan_report+0x102/0x140 [ 24.739015] ? kasan_atomics_helper+0x4b3c/0x5450 [ 24.739346] ? kasan_atomics_helper+0x4b3c/0x5450 [ 24.739701] __asan_report_store4_noabort+0x1b/0x30 [ 24.740022] kasan_atomics_helper+0x4b3c/0x5450 [ 24.740558] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.741127] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.741846] ? trace_hardirqs_on+0x37/0xe0 [ 24.742341] ? kasan_atomics+0x153/0x310 [ 24.742963] kasan_atomics+0x1dd/0x310 [ 24.743407] ? __pfx_kasan_atomics+0x10/0x10 [ 24.744050] ? __pfx_kasan_atomics+0x10/0x10 [ 24.744470] kunit_try_run_case+0x1b3/0x490 [ 24.745072] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.746725] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.747377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.747806] ? __kthread_parkme+0x82/0x160 [ 24.748436] ? preempt_count_sub+0x50/0x80 [ 24.749052] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.749670] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.750136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.750731] kthread+0x257/0x310 [ 24.751132] ? __pfx_kthread+0x10/0x10 [ 24.751553] ret_from_fork+0x41/0x80 [ 24.752010] ? __pfx_kthread+0x10/0x10 [ 24.752625] ret_from_fork_asm+0x1a/0x30 [ 24.753224] </TASK> [ 24.753665] [ 24.754004] Allocated by task 272: [ 24.754511] kasan_save_stack+0x3d/0x60 [ 24.755085] kasan_save_track+0x18/0x40 [ 24.755687] kasan_save_alloc_info+0x3b/0x50 [ 24.755963] __kasan_kmalloc+0xb7/0xc0 [ 24.756626] __kmalloc_cache_noprof+0x184/0x410 [ 24.757222] kasan_atomics+0x96/0x310 [ 24.757719] kunit_try_run_case+0x1b3/0x490 [ 24.758223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.758873] kthread+0x257/0x310 [ 24.759314] ret_from_fork+0x41/0x80 [ 24.759711] ret_from_fork_asm+0x1a/0x30 [ 24.760263] [ 24.760549] The buggy address belongs to the object at ffff8881028c7700 [ 24.760549] which belongs to the cache kmalloc-64 of size 64 [ 24.761769] The buggy address is located 0 bytes to the right of [ 24.761769] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.762792] [ 24.763031] The buggy address belongs to the physical page: [ 24.763383] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.764036] flags: 0x200000000000000(node=0|zone=2) [ 24.764540] page_type: f5(slab) [ 24.764918] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.765415] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.766195] page dumped because: kasan: bad access detected [ 24.766719] [ 24.767024] Memory state around the buggy address: [ 24.767457] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768270] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768903] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.769694] ^ [ 24.770148] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.770947] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771537] ================================================================== [ 26.308653] ================================================================== [ 26.309667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 26.310515] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.311173] [ 26.311433] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.312084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.312411] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.313264] Call Trace: [ 26.313663] <TASK> [ 26.314049] dump_stack_lvl+0x73/0xb0 [ 26.314622] print_report+0xd1/0x640 [ 26.315222] ? __virt_addr_valid+0x1db/0x2d0 [ 26.315874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.316706] kasan_report+0x102/0x140 [ 26.317236] ? kasan_atomics_helper+0x1819/0x5450 [ 26.317889] ? kasan_atomics_helper+0x1819/0x5450 [ 26.318462] kasan_check_range+0x10c/0x1c0 [ 26.318983] __kasan_check_write+0x18/0x20 [ 26.319433] kasan_atomics_helper+0x1819/0x5450 [ 26.320171] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.320787] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.321356] ? trace_hardirqs_on+0x37/0xe0 [ 26.321900] ? kasan_atomics+0x153/0x310 [ 26.322443] kasan_atomics+0x1dd/0x310 [ 26.322854] ? __pfx_kasan_atomics+0x10/0x10 [ 26.323434] ? __pfx_kasan_atomics+0x10/0x10 [ 26.324162] kunit_try_run_case+0x1b3/0x490 [ 26.324653] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.325215] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.326009] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.326691] ? __kthread_parkme+0x82/0x160 [ 26.327213] ? preempt_count_sub+0x50/0x80 [ 26.327682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.328120] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.328561] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.328959] kthread+0x257/0x310 [ 26.329357] ? __pfx_kthread+0x10/0x10 [ 26.329879] ret_from_fork+0x41/0x80 [ 26.330255] ? __pfx_kthread+0x10/0x10 [ 26.330648] ret_from_fork_asm+0x1a/0x30 [ 26.331116] </TASK> [ 26.331407] [ 26.331651] Allocated by task 272: [ 26.331920] kasan_save_stack+0x3d/0x60 [ 26.332205] kasan_save_track+0x18/0x40 [ 26.332691] kasan_save_alloc_info+0x3b/0x50 [ 26.333146] __kasan_kmalloc+0xb7/0xc0 [ 26.333618] __kmalloc_cache_noprof+0x184/0x410 [ 26.334105] kasan_atomics+0x96/0x310 [ 26.334523] kunit_try_run_case+0x1b3/0x490 [ 26.334866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.335197] kthread+0x257/0x310 [ 26.335632] ret_from_fork+0x41/0x80 [ 26.336039] ret_from_fork_asm+0x1a/0x30 [ 26.336475] [ 26.336778] The buggy address belongs to the object at ffff8881028c7700 [ 26.336778] which belongs to the cache kmalloc-64 of size 64 [ 26.338630] The buggy address is located 0 bytes to the right of [ 26.338630] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.340083] [ 26.340324] The buggy address belongs to the physical page: [ 26.341375] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.342150] flags: 0x200000000000000(node=0|zone=2) [ 26.342635] page_type: f5(slab) [ 26.342973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.343404] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.344060] page dumped because: kasan: bad access detected [ 26.344705] [ 26.344885] Memory state around the buggy address: [ 26.345378] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.345845] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.346474] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.347152] ^ [ 26.347507] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.348153] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.348564] ================================================================== [ 25.645513] ================================================================== [ 25.646000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 25.647500] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.648128] [ 25.648321] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.649604] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.649868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.651248] Call Trace: [ 25.651474] <TASK> [ 25.651711] dump_stack_lvl+0x73/0xb0 [ 25.652005] print_report+0xd1/0x640 [ 25.652295] ? __virt_addr_valid+0x1db/0x2d0 [ 25.653199] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.653775] kasan_report+0x102/0x140 [ 25.654333] ? kasan_atomics_helper+0x1149/0x5450 [ 25.654944] ? kasan_atomics_helper+0x1149/0x5450 [ 25.655516] kasan_check_range+0x10c/0x1c0 [ 25.656026] __kasan_check_write+0x18/0x20 [ 25.656393] kasan_atomics_helper+0x1149/0x5450 [ 25.657026] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.657421] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.658020] ? trace_hardirqs_on+0x37/0xe0 [ 25.658510] ? kasan_atomics+0x153/0x310 [ 25.658962] kasan_atomics+0x1dd/0x310 [ 25.659259] ? __pfx_kasan_atomics+0x10/0x10 [ 25.659647] ? __pfx_kasan_atomics+0x10/0x10 [ 25.660191] kunit_try_run_case+0x1b3/0x490 [ 25.660836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.661336] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.662015] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.662445] ? __kthread_parkme+0x82/0x160 [ 25.663075] ? preempt_count_sub+0x50/0x80 [ 25.663520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.664030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.664629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.665385] kthread+0x257/0x310 [ 25.665778] ? __pfx_kthread+0x10/0x10 [ 25.666074] ret_from_fork+0x41/0x80 [ 25.666358] ? __pfx_kthread+0x10/0x10 [ 25.666766] ret_from_fork_asm+0x1a/0x30 [ 25.667381] </TASK> [ 25.667756] [ 25.667991] Allocated by task 272: [ 25.668389] kasan_save_stack+0x3d/0x60 [ 25.668931] kasan_save_track+0x18/0x40 [ 25.669357] kasan_save_alloc_info+0x3b/0x50 [ 25.669894] __kasan_kmalloc+0xb7/0xc0 [ 25.670291] __kmalloc_cache_noprof+0x184/0x410 [ 25.670620] kasan_atomics+0x96/0x310 [ 25.670893] kunit_try_run_case+0x1b3/0x490 [ 25.671397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.671975] kthread+0x257/0x310 [ 25.672397] ret_from_fork+0x41/0x80 [ 25.672973] ret_from_fork_asm+0x1a/0x30 [ 25.673350] [ 25.673596] The buggy address belongs to the object at ffff8881028c7700 [ 25.673596] which belongs to the cache kmalloc-64 of size 64 [ 25.674696] The buggy address is located 0 bytes to the right of [ 25.674696] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.675331] [ 25.675557] The buggy address belongs to the physical page: [ 25.676082] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.676922] flags: 0x200000000000000(node=0|zone=2) [ 25.677456] page_type: f5(slab) [ 25.677927] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.678466] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.679163] page dumped because: kasan: bad access detected [ 25.679605] [ 25.679833] Memory state around the buggy address: [ 25.680200] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.680800] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.681519] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.682390] ^ [ 25.683170] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.683888] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.684852] ================================================================== [ 26.216790] ================================================================== [ 26.217639] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 26.218304] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.219456] [ 26.219766] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.220636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.221047] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.222930] Call Trace: [ 26.223200] <TASK> [ 26.223392] dump_stack_lvl+0x73/0xb0 [ 26.223902] print_report+0xd1/0x640 [ 26.224319] ? __virt_addr_valid+0x1db/0x2d0 [ 26.225318] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.225876] kasan_report+0x102/0x140 [ 26.226276] ? kasan_atomics_helper+0x16e8/0x5450 [ 26.227214] ? kasan_atomics_helper+0x16e8/0x5450 [ 26.227634] kasan_check_range+0x10c/0x1c0 [ 26.228358] __kasan_check_write+0x18/0x20 [ 26.229265] kasan_atomics_helper+0x16e8/0x5450 [ 26.229698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.230401] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.230818] ? trace_hardirqs_on+0x37/0xe0 [ 26.231200] ? kasan_atomics+0x153/0x310 [ 26.231594] kasan_atomics+0x1dd/0x310 [ 26.232032] ? __pfx_kasan_atomics+0x10/0x10 [ 26.232392] ? __pfx_kasan_atomics+0x10/0x10 [ 26.233017] kunit_try_run_case+0x1b3/0x490 [ 26.234125] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.235362] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.235867] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.236338] ? __kthread_parkme+0x82/0x160 [ 26.237335] ? preempt_count_sub+0x50/0x80 [ 26.238031] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.238633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.239347] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.240070] kthread+0x257/0x310 [ 26.240467] ? __pfx_kthread+0x10/0x10 [ 26.240985] ret_from_fork+0x41/0x80 [ 26.241308] ? __pfx_kthread+0x10/0x10 [ 26.242404] ret_from_fork_asm+0x1a/0x30 [ 26.242823] </TASK> [ 26.243113] [ 26.243616] Allocated by task 272: [ 26.244245] kasan_save_stack+0x3d/0x60 [ 26.244671] kasan_save_track+0x18/0x40 [ 26.245044] kasan_save_alloc_info+0x3b/0x50 [ 26.245396] __kasan_kmalloc+0xb7/0xc0 [ 26.246753] __kmalloc_cache_noprof+0x184/0x410 [ 26.247304] kasan_atomics+0x96/0x310 [ 26.247739] kunit_try_run_case+0x1b3/0x490 [ 26.248604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.249107] kthread+0x257/0x310 [ 26.249426] ret_from_fork+0x41/0x80 [ 26.249794] ret_from_fork_asm+0x1a/0x30 [ 26.250181] [ 26.250359] The buggy address belongs to the object at ffff8881028c7700 [ 26.250359] which belongs to the cache kmalloc-64 of size 64 [ 26.252538] The buggy address is located 0 bytes to the right of [ 26.252538] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.253809] [ 26.253981] The buggy address belongs to the physical page: [ 26.255024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.255915] flags: 0x200000000000000(node=0|zone=2) [ 26.256335] page_type: f5(slab) [ 26.256720] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.257896] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.258637] page dumped because: kasan: bad access detected [ 26.259440] [ 26.259705] Memory state around the buggy address: [ 26.260413] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.260924] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.261531] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.262038] ^ [ 26.262439] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.263615] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.264394] ================================================================== [ 26.943522] ================================================================== [ 26.944535] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 26.945030] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.946557] [ 26.946795] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.947300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.947781] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.948568] Call Trace: [ 26.948929] <TASK> [ 26.949214] dump_stack_lvl+0x73/0xb0 [ 26.949621] print_report+0xd1/0x640 [ 26.950060] ? __virt_addr_valid+0x1db/0x2d0 [ 26.950515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.951085] kasan_report+0x102/0x140 [ 26.951538] ? kasan_atomics_helper+0x4f9a/0x5450 [ 26.951930] ? kasan_atomics_helper+0x4f9a/0x5450 [ 26.952440] __asan_report_load8_noabort+0x18/0x20 [ 26.952847] kasan_atomics_helper+0x4f9a/0x5450 [ 26.953345] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.953884] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.954382] ? trace_hardirqs_on+0x37/0xe0 [ 26.954840] ? kasan_atomics+0x153/0x310 [ 26.955317] kasan_atomics+0x1dd/0x310 [ 26.955744] ? __pfx_kasan_atomics+0x10/0x10 [ 26.956175] ? __pfx_kasan_atomics+0x10/0x10 [ 26.956698] kunit_try_run_case+0x1b3/0x490 [ 26.957169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.957522] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.958025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.958613] ? __kthread_parkme+0x82/0x160 [ 26.959017] ? preempt_count_sub+0x50/0x80 [ 26.959355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.959849] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.960218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.961946] kthread+0x257/0x310 [ 26.962387] ? __pfx_kthread+0x10/0x10 [ 26.962896] ret_from_fork+0x41/0x80 [ 26.963337] ? __pfx_kthread+0x10/0x10 [ 26.963829] ret_from_fork_asm+0x1a/0x30 [ 26.964302] </TASK> [ 26.964650] [ 26.964885] Allocated by task 272: [ 26.965280] kasan_save_stack+0x3d/0x60 [ 26.965670] kasan_save_track+0x18/0x40 [ 26.965955] kasan_save_alloc_info+0x3b/0x50 [ 26.966259] __kasan_kmalloc+0xb7/0xc0 [ 26.966544] __kmalloc_cache_noprof+0x184/0x410 [ 26.967066] kasan_atomics+0x96/0x310 [ 26.967506] kunit_try_run_case+0x1b3/0x490 [ 26.968021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.968650] kthread+0x257/0x310 [ 26.969035] ret_from_fork+0x41/0x80 [ 26.969507] ret_from_fork_asm+0x1a/0x30 [ 26.969980] [ 26.970269] The buggy address belongs to the object at ffff8881028c7700 [ 26.970269] which belongs to the cache kmalloc-64 of size 64 [ 26.971182] The buggy address is located 0 bytes to the right of [ 26.971182] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.972085] [ 26.972335] The buggy address belongs to the physical page: [ 26.972789] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.973390] flags: 0x200000000000000(node=0|zone=2) [ 26.973966] page_type: f5(slab) [ 26.974357] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.975001] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.975659] page dumped because: kasan: bad access detected [ 26.976186] [ 26.976362] Memory state around the buggy address: [ 26.976923] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.977316] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.977763] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.978149] ^ [ 26.978438] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.979175] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.981424] ================================================================== [ 26.265634] ================================================================== [ 26.267100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 26.268221] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.269024] [ 26.269803] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.270633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.271162] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.272018] Call Trace: [ 26.272153] <TASK> [ 26.272265] dump_stack_lvl+0x73/0xb0 [ 26.272432] print_report+0xd1/0x640 [ 26.272687] ? __virt_addr_valid+0x1db/0x2d0 [ 26.273234] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.273810] kasan_report+0x102/0x140 [ 26.274241] ? kasan_atomics_helper+0x1780/0x5450 [ 26.274595] ? kasan_atomics_helper+0x1780/0x5450 [ 26.275113] kasan_check_range+0x10c/0x1c0 [ 26.275732] __kasan_check_write+0x18/0x20 [ 26.276276] kasan_atomics_helper+0x1780/0x5450 [ 26.276714] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.277043] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.277354] ? trace_hardirqs_on+0x37/0xe0 [ 26.277860] ? kasan_atomics+0x153/0x310 [ 26.278633] kasan_atomics+0x1dd/0x310 [ 26.279206] ? __pfx_kasan_atomics+0x10/0x10 [ 26.279778] ? __pfx_kasan_atomics+0x10/0x10 [ 26.280295] kunit_try_run_case+0x1b3/0x490 [ 26.280974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.281365] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.282011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.282453] ? __kthread_parkme+0x82/0x160 [ 26.283065] ? preempt_count_sub+0x50/0x80 [ 26.283458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.284098] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.284660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.285190] kthread+0x257/0x310 [ 26.285761] ? __pfx_kthread+0x10/0x10 [ 26.286130] ret_from_fork+0x41/0x80 [ 26.286687] ? __pfx_kthread+0x10/0x10 [ 26.287104] ret_from_fork_asm+0x1a/0x30 [ 26.287614] </TASK> [ 26.287941] [ 26.288164] Allocated by task 272: [ 26.288422] kasan_save_stack+0x3d/0x60 [ 26.288897] kasan_save_track+0x18/0x40 [ 26.289425] kasan_save_alloc_info+0x3b/0x50 [ 26.289912] __kasan_kmalloc+0xb7/0xc0 [ 26.290204] __kmalloc_cache_noprof+0x184/0x410 [ 26.290518] kasan_atomics+0x96/0x310 [ 26.290976] kunit_try_run_case+0x1b3/0x490 [ 26.291658] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.292271] kthread+0x257/0x310 [ 26.292672] ret_from_fork+0x41/0x80 [ 26.293220] ret_from_fork_asm+0x1a/0x30 [ 26.293699] [ 26.293932] The buggy address belongs to the object at ffff8881028c7700 [ 26.293932] which belongs to the cache kmalloc-64 of size 64 [ 26.294552] The buggy address is located 0 bytes to the right of [ 26.294552] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.295873] [ 26.296168] The buggy address belongs to the physical page: [ 26.296501] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.297305] flags: 0x200000000000000(node=0|zone=2) [ 26.297979] page_type: f5(slab) [ 26.298424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.299164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.299906] page dumped because: kasan: bad access detected [ 26.300330] [ 26.300681] Memory state around the buggy address: [ 26.301340] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.302618] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.303716] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.304120] ^ [ 26.304410] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.305149] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.306709] ================================================================== [ 26.133279] ================================================================== [ 26.134516] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 26.135267] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.135992] [ 26.136294] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.137064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.137417] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.138114] Call Trace: [ 26.138475] <TASK> [ 26.138840] dump_stack_lvl+0x73/0xb0 [ 26.139287] print_report+0xd1/0x640 [ 26.140293] ? __virt_addr_valid+0x1db/0x2d0 [ 26.140866] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.141435] kasan_report+0x102/0x140 [ 26.141994] ? kasan_atomics_helper+0x15b7/0x5450 [ 26.142471] ? kasan_atomics_helper+0x15b7/0x5450 [ 26.143106] kasan_check_range+0x10c/0x1c0 [ 26.143542] __kasan_check_write+0x18/0x20 [ 26.144118] kasan_atomics_helper+0x15b7/0x5450 [ 26.144742] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.145313] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.145860] ? trace_hardirqs_on+0x37/0xe0 [ 26.146284] ? kasan_atomics+0x153/0x310 [ 26.146837] kasan_atomics+0x1dd/0x310 [ 26.147190] ? __pfx_kasan_atomics+0x10/0x10 [ 26.147525] ? __pfx_kasan_atomics+0x10/0x10 [ 26.147857] kunit_try_run_case+0x1b3/0x490 [ 26.148245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.148864] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.149437] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.150050] ? __kthread_parkme+0x82/0x160 [ 26.150696] ? preempt_count_sub+0x50/0x80 [ 26.151172] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.151719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.152082] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.152433] kthread+0x257/0x310 [ 26.153006] ? __pfx_kthread+0x10/0x10 [ 26.153619] ret_from_fork+0x41/0x80 [ 26.154121] ? __pfx_kthread+0x10/0x10 [ 26.154610] ret_from_fork_asm+0x1a/0x30 [ 26.155213] </TASK> [ 26.155547] [ 26.155819] Allocated by task 272: [ 26.156252] kasan_save_stack+0x3d/0x60 [ 26.156807] kasan_save_track+0x18/0x40 [ 26.157301] kasan_save_alloc_info+0x3b/0x50 [ 26.157841] __kasan_kmalloc+0xb7/0xc0 [ 26.158348] __kmalloc_cache_noprof+0x184/0x410 [ 26.158856] kasan_atomics+0x96/0x310 [ 26.159338] kunit_try_run_case+0x1b3/0x490 [ 26.159808] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.160146] kthread+0x257/0x310 [ 26.160388] ret_from_fork+0x41/0x80 [ 26.160718] ret_from_fork_asm+0x1a/0x30 [ 26.160998] [ 26.161290] The buggy address belongs to the object at ffff8881028c7700 [ 26.161290] which belongs to the cache kmalloc-64 of size 64 [ 26.162564] The buggy address is located 0 bytes to the right of [ 26.162564] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.163776] [ 26.164064] The buggy address belongs to the physical page: [ 26.164632] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.165373] flags: 0x200000000000000(node=0|zone=2) [ 26.165967] page_type: f5(slab) [ 26.166419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.166935] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.167660] page dumped because: kasan: bad access detected [ 26.168305] [ 26.168561] Memory state around the buggy address: [ 26.169097] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.169556] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.170266] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.170998] ^ [ 26.171508] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.172100] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.172807] ================================================================== [ 24.440467] ================================================================== [ 24.441764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 24.442417] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.442954] [ 24.443208] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.443915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.444324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.445721] Call Trace: [ 24.446020] <TASK> [ 24.446249] dump_stack_lvl+0x73/0xb0 [ 24.446685] print_report+0xd1/0x640 [ 24.447055] ? __virt_addr_valid+0x1db/0x2d0 [ 24.447905] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.448508] kasan_report+0x102/0x140 [ 24.449035] ? kasan_atomics_helper+0x4bbe/0x5450 [ 24.449359] ? kasan_atomics_helper+0x4bbe/0x5450 [ 24.449878] __asan_report_load4_noabort+0x18/0x20 [ 24.450305] kasan_atomics_helper+0x4bbe/0x5450 [ 24.450838] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.451180] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.451680] ? trace_hardirqs_on+0x37/0xe0 [ 24.451995] ? kasan_atomics+0x153/0x310 [ 24.453010] kasan_atomics+0x1dd/0x310 [ 24.453455] ? __pfx_kasan_atomics+0x10/0x10 [ 24.453815] ? __pfx_kasan_atomics+0x10/0x10 [ 24.454323] kunit_try_run_case+0x1b3/0x490 [ 24.454877] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.455399] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.455744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.456249] ? __kthread_parkme+0x82/0x160 [ 24.456727] ? preempt_count_sub+0x50/0x80 [ 24.457040] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.457540] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.458619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.459178] kthread+0x257/0x310 [ 24.459573] ? __pfx_kthread+0x10/0x10 [ 24.460333] ret_from_fork+0x41/0x80 [ 24.460649] ? __pfx_kthread+0x10/0x10 [ 24.461276] ret_from_fork_asm+0x1a/0x30 [ 24.461896] </TASK> [ 24.462189] [ 24.462369] Allocated by task 272: [ 24.463150] kasan_save_stack+0x3d/0x60 [ 24.464091] kasan_save_track+0x18/0x40 [ 24.464641] kasan_save_alloc_info+0x3b/0x50 [ 24.465046] __kasan_kmalloc+0xb7/0xc0 [ 24.465429] __kmalloc_cache_noprof+0x184/0x410 [ 24.466070] kasan_atomics+0x96/0x310 [ 24.466615] kunit_try_run_case+0x1b3/0x490 [ 24.466939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.467545] kthread+0x257/0x310 [ 24.468133] ret_from_fork+0x41/0x80 [ 24.468564] ret_from_fork_asm+0x1a/0x30 [ 24.469042] [ 24.469232] The buggy address belongs to the object at ffff8881028c7700 [ 24.469232] which belongs to the cache kmalloc-64 of size 64 [ 24.470345] The buggy address is located 0 bytes to the right of [ 24.470345] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.471615] [ 24.471790] The buggy address belongs to the physical page: [ 24.472652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.473651] flags: 0x200000000000000(node=0|zone=2) [ 24.474164] page_type: f5(slab) [ 24.474549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.475341] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.476360] page dumped because: kasan: bad access detected [ 24.477011] [ 24.477175] Memory state around the buggy address: [ 24.477663] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.478313] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.478933] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.479559] ^ [ 24.480118] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.480513] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.480922] ================================================================== [ 25.870562] ================================================================== [ 25.871897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 25.872671] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.873728] [ 25.874038] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.874687] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.874974] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.875810] Call Trace: [ 25.876164] <TASK> [ 25.876517] dump_stack_lvl+0x73/0xb0 [ 25.877010] print_report+0xd1/0x640 [ 25.877469] ? __virt_addr_valid+0x1db/0x2d0 [ 25.877937] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.878551] kasan_report+0x102/0x140 [ 25.879029] ? kasan_atomics_helper+0x49d0/0x5450 [ 25.879376] ? kasan_atomics_helper+0x49d0/0x5450 [ 25.879793] __asan_report_load4_noabort+0x18/0x20 [ 25.880351] kasan_atomics_helper+0x49d0/0x5450 [ 25.880926] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.881503] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.882081] ? trace_hardirqs_on+0x37/0xe0 [ 25.882517] ? kasan_atomics+0x153/0x310 [ 25.883032] kasan_atomics+0x1dd/0x310 [ 25.883534] ? __pfx_kasan_atomics+0x10/0x10 [ 25.883940] ? __pfx_kasan_atomics+0x10/0x10 [ 25.884470] kunit_try_run_case+0x1b3/0x490 [ 25.884961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.885335] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.885925] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.886369] ? __kthread_parkme+0x82/0x160 [ 25.886750] ? preempt_count_sub+0x50/0x80 [ 25.887133] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.887702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.888340] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.888988] kthread+0x257/0x310 [ 25.889390] ? __pfx_kthread+0x10/0x10 [ 25.889748] ret_from_fork+0x41/0x80 [ 25.890030] ? __pfx_kthread+0x10/0x10 [ 25.890318] ret_from_fork_asm+0x1a/0x30 [ 25.890702] </TASK> [ 25.890908] [ 25.891065] Allocated by task 272: [ 25.891301] kasan_save_stack+0x3d/0x60 [ 25.891810] kasan_save_track+0x18/0x40 [ 25.892276] kasan_save_alloc_info+0x3b/0x50 [ 25.892810] __kasan_kmalloc+0xb7/0xc0 [ 25.893234] __kmalloc_cache_noprof+0x184/0x410 [ 25.893762] kasan_atomics+0x96/0x310 [ 25.894192] kunit_try_run_case+0x1b3/0x490 [ 25.894740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.895287] kthread+0x257/0x310 [ 25.895776] ret_from_fork+0x41/0x80 [ 25.896232] ret_from_fork_asm+0x1a/0x30 [ 25.896755] [ 25.896987] The buggy address belongs to the object at ffff8881028c7700 [ 25.896987] which belongs to the cache kmalloc-64 of size 64 [ 25.897937] The buggy address is located 0 bytes to the right of [ 25.897937] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.898630] [ 25.898807] The buggy address belongs to the physical page: [ 25.899374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.900151] flags: 0x200000000000000(node=0|zone=2) [ 25.900747] page_type: f5(slab) [ 25.901125] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.901936] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.902682] page dumped because: kasan: bad access detected [ 25.903126] [ 25.903330] Memory state around the buggy address: [ 25.903903] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.904402] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.905047] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.905474] ^ [ 25.906033] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.906548] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.907164] ================================================================== [ 25.360722] ================================================================== [ 25.362818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 25.364292] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.365037] [ 25.365337] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.366037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.366463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.368124] Call Trace: [ 25.368449] <TASK> [ 25.368712] dump_stack_lvl+0x73/0xb0 [ 25.369121] print_report+0xd1/0x640 [ 25.370690] ? __virt_addr_valid+0x1db/0x2d0 [ 25.371148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.371539] kasan_report+0x102/0x140 [ 25.372020] ? kasan_atomics_helper+0xde1/0x5450 [ 25.372455] ? kasan_atomics_helper+0xde1/0x5450 [ 25.373977] kasan_check_range+0x10c/0x1c0 [ 25.374306] __kasan_check_write+0x18/0x20 [ 25.374862] kasan_atomics_helper+0xde1/0x5450 [ 25.375373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.376000] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.376537] ? trace_hardirqs_on+0x37/0xe0 [ 25.377043] ? kasan_atomics+0x153/0x310 [ 25.377477] kasan_atomics+0x1dd/0x310 [ 25.377925] ? __pfx_kasan_atomics+0x10/0x10 [ 25.378318] ? __pfx_kasan_atomics+0x10/0x10 [ 25.378923] kunit_try_run_case+0x1b3/0x490 [ 25.379404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.379961] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.380457] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.381071] ? __kthread_parkme+0x82/0x160 [ 25.381553] ? preempt_count_sub+0x50/0x80 [ 25.382103] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.382556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.382976] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.383317] kthread+0x257/0x310 [ 25.383725] ? __pfx_kthread+0x10/0x10 [ 25.384215] ret_from_fork+0x41/0x80 [ 25.384776] ? __pfx_kthread+0x10/0x10 [ 25.385299] ret_from_fork_asm+0x1a/0x30 [ 25.385871] </TASK> [ 25.386215] [ 25.386437] Allocated by task 272: [ 25.386902] kasan_save_stack+0x3d/0x60 [ 25.387339] kasan_save_track+0x18/0x40 [ 25.387866] kasan_save_alloc_info+0x3b/0x50 [ 25.388331] __kasan_kmalloc+0xb7/0xc0 [ 25.388761] __kmalloc_cache_noprof+0x184/0x410 [ 25.389180] kasan_atomics+0x96/0x310 [ 25.389537] kunit_try_run_case+0x1b3/0x490 [ 25.390051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.390624] kthread+0x257/0x310 [ 25.391009] ret_from_fork+0x41/0x80 [ 25.391413] ret_from_fork_asm+0x1a/0x30 [ 25.391946] [ 25.392180] The buggy address belongs to the object at ffff8881028c7700 [ 25.392180] which belongs to the cache kmalloc-64 of size 64 [ 25.393112] The buggy address is located 0 bytes to the right of [ 25.393112] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.393994] [ 25.394279] The buggy address belongs to the physical page: [ 25.394925] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.395702] flags: 0x200000000000000(node=0|zone=2) [ 25.396013] page_type: f5(slab) [ 25.396411] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.397171] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.397824] page dumped because: kasan: bad access detected [ 25.398247] [ 25.398498] Memory state around the buggy address: [ 25.398976] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399355] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.399800] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.400168] ^ [ 25.400455] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.401213] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.401901] ================================================================== [ 24.528159] ================================================================== [ 24.528879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 24.529382] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.530142] [ 24.530401] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.531147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.531593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.532200] Call Trace: [ 24.532536] <TASK> [ 24.532867] dump_stack_lvl+0x73/0xb0 [ 24.533508] print_report+0xd1/0x640 [ 24.533865] ? __virt_addr_valid+0x1db/0x2d0 [ 24.534269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.535109] kasan_report+0x102/0x140 [ 24.535587] ? kasan_atomics_helper+0x4b8a/0x5450 [ 24.536146] ? kasan_atomics_helper+0x4b8a/0x5450 [ 24.536653] __asan_report_load4_noabort+0x18/0x20 [ 24.537147] kasan_atomics_helper+0x4b8a/0x5450 [ 24.537808] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.538335] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.538759] ? trace_hardirqs_on+0x37/0xe0 [ 24.539050] ? kasan_atomics+0x153/0x310 [ 24.539623] kasan_atomics+0x1dd/0x310 [ 24.540110] ? __pfx_kasan_atomics+0x10/0x10 [ 24.540623] ? __pfx_kasan_atomics+0x10/0x10 [ 24.541119] kunit_try_run_case+0x1b3/0x490 [ 24.541720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.542133] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.542777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.543173] ? __kthread_parkme+0x82/0x160 [ 24.543690] ? preempt_count_sub+0x50/0x80 [ 24.544131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.544643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.545464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.546056] kthread+0x257/0x310 [ 24.546466] ? __pfx_kthread+0x10/0x10 [ 24.546934] ret_from_fork+0x41/0x80 [ 24.547213] ? __pfx_kthread+0x10/0x10 [ 24.547775] ret_from_fork_asm+0x1a/0x30 [ 24.548322] </TASK> [ 24.548726] [ 24.548950] Allocated by task 272: [ 24.549274] kasan_save_stack+0x3d/0x60 [ 24.549679] kasan_save_track+0x18/0x40 [ 24.550183] kasan_save_alloc_info+0x3b/0x50 [ 24.550664] __kasan_kmalloc+0xb7/0xc0 [ 24.551014] __kmalloc_cache_noprof+0x184/0x410 [ 24.551567] kasan_atomics+0x96/0x310 [ 24.552026] kunit_try_run_case+0x1b3/0x490 [ 24.552557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.553082] kthread+0x257/0x310 [ 24.553408] ret_from_fork+0x41/0x80 [ 24.554031] ret_from_fork_asm+0x1a/0x30 [ 24.554367] [ 24.554556] The buggy address belongs to the object at ffff8881028c7700 [ 24.554556] which belongs to the cache kmalloc-64 of size 64 [ 24.555116] The buggy address is located 0 bytes to the right of [ 24.555116] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.556104] [ 24.556342] The buggy address belongs to the physical page: [ 24.556928] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.557688] flags: 0x200000000000000(node=0|zone=2) [ 24.558187] page_type: f5(slab) [ 24.558692] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.559470] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.560176] page dumped because: kasan: bad access detected [ 24.560819] [ 24.560985] Memory state around the buggy address: [ 24.561258] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.561890] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.562738] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.563342] ^ [ 24.563702] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.564461] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.565157] ================================================================== [ 25.078820] ================================================================== [ 25.079421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 25.080356] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.081199] [ 25.082034] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.082722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.083161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.083800] Call Trace: [ 25.084368] <TASK> [ 25.084709] dump_stack_lvl+0x73/0xb0 [ 25.085177] print_report+0xd1/0x640 [ 25.085658] ? __virt_addr_valid+0x1db/0x2d0 [ 25.086144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.086632] kasan_report+0x102/0x140 [ 25.087073] ? kasan_atomics_helper+0x993/0x5450 [ 25.087534] ? kasan_atomics_helper+0x993/0x5450 [ 25.087983] kasan_check_range+0x10c/0x1c0 [ 25.088508] __kasan_check_write+0x18/0x20 [ 25.088967] kasan_atomics_helper+0x993/0x5450 [ 25.089459] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.090021] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.090549] ? trace_hardirqs_on+0x37/0xe0 [ 25.091037] ? kasan_atomics+0x153/0x310 [ 25.091515] kasan_atomics+0x1dd/0x310 [ 25.091966] ? __pfx_kasan_atomics+0x10/0x10 [ 25.092443] ? __pfx_kasan_atomics+0x10/0x10 [ 25.092890] kunit_try_run_case+0x1b3/0x490 [ 25.093350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.093882] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.094431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.095132] ? __kthread_parkme+0x82/0x160 [ 25.095671] ? preempt_count_sub+0x50/0x80 [ 25.096011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.096400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.097092] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.097647] kthread+0x257/0x310 [ 25.098097] ? __pfx_kthread+0x10/0x10 [ 25.098450] ret_from_fork+0x41/0x80 [ 25.098995] ? __pfx_kthread+0x10/0x10 [ 25.099331] ret_from_fork_asm+0x1a/0x30 [ 25.099898] </TASK> [ 25.100161] [ 25.100387] Allocated by task 272: [ 25.100902] kasan_save_stack+0x3d/0x60 [ 25.101331] kasan_save_track+0x18/0x40 [ 25.101775] kasan_save_alloc_info+0x3b/0x50 [ 25.102380] __kasan_kmalloc+0xb7/0xc0 [ 25.102845] __kmalloc_cache_noprof+0x184/0x410 [ 25.103213] kasan_atomics+0x96/0x310 [ 25.103518] kunit_try_run_case+0x1b3/0x490 [ 25.103967] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.104640] kthread+0x257/0x310 [ 25.105079] ret_from_fork+0x41/0x80 [ 25.105605] ret_from_fork_asm+0x1a/0x30 [ 25.106097] [ 25.106343] The buggy address belongs to the object at ffff8881028c7700 [ 25.106343] which belongs to the cache kmalloc-64 of size 64 [ 25.107279] The buggy address is located 0 bytes to the right of [ 25.107279] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.108291] [ 25.108467] The buggy address belongs to the physical page: [ 25.108953] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.109787] flags: 0x200000000000000(node=0|zone=2) [ 25.110344] page_type: f5(slab) [ 25.110787] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.111270] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.111791] page dumped because: kasan: bad access detected [ 25.112183] [ 25.112427] Memory state around the buggy address: [ 25.112929] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.113606] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.114372] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.115195] ^ [ 25.115792] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.116438] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.117094] ================================================================== [ 25.516320] ================================================================== [ 25.517534] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 25.518242] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.518711] [ 25.518904] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.519819] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.520169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.520807] Call Trace: [ 25.521126] <TASK> [ 25.521372] dump_stack_lvl+0x73/0xb0 [ 25.521866] print_report+0xd1/0x640 [ 25.522197] ? __virt_addr_valid+0x1db/0x2d0 [ 25.522539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.523131] kasan_report+0x102/0x140 [ 25.523625] ? kasan_atomics_helper+0x4a38/0x5450 [ 25.524132] ? kasan_atomics_helper+0x4a38/0x5450 [ 25.524710] __asan_report_load4_noabort+0x18/0x20 [ 25.525058] kasan_atomics_helper+0x4a38/0x5450 [ 25.525424] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.525837] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.526174] ? trace_hardirqs_on+0x37/0xe0 [ 25.526470] ? kasan_atomics+0x153/0x310 [ 25.526999] kasan_atomics+0x1dd/0x310 [ 25.527439] ? __pfx_kasan_atomics+0x10/0x10 [ 25.527976] ? __pfx_kasan_atomics+0x10/0x10 [ 25.528459] kunit_try_run_case+0x1b3/0x490 [ 25.528996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.529606] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.531051] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.532535] ? __kthread_parkme+0x82/0x160 [ 25.533030] ? preempt_count_sub+0x50/0x80 [ 25.534635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.535157] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.536628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.536948] kthread+0x257/0x310 [ 25.537194] ? __pfx_kthread+0x10/0x10 [ 25.537896] ret_from_fork+0x41/0x80 [ 25.538219] ? __pfx_kthread+0x10/0x10 [ 25.538525] ret_from_fork_asm+0x1a/0x30 [ 25.540036] </TASK> [ 25.540329] [ 25.541680] Allocated by task 272: [ 25.543842] kasan_save_stack+0x3d/0x60 [ 25.544275] kasan_save_track+0x18/0x40 [ 25.544770] kasan_save_alloc_info+0x3b/0x50 [ 25.545265] __kasan_kmalloc+0xb7/0xc0 [ 25.546808] __kmalloc_cache_noprof+0x184/0x410 [ 25.547193] kasan_atomics+0x96/0x310 [ 25.547681] kunit_try_run_case+0x1b3/0x490 [ 25.548168] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.548678] kthread+0x257/0x310 [ 25.549090] ret_from_fork+0x41/0x80 [ 25.549560] ret_from_fork_asm+0x1a/0x30 [ 25.550095] [ 25.550354] The buggy address belongs to the object at ffff8881028c7700 [ 25.550354] which belongs to the cache kmalloc-64 of size 64 [ 25.551234] The buggy address is located 0 bytes to the right of [ 25.551234] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.552278] [ 25.552555] The buggy address belongs to the physical page: [ 25.553158] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.553979] flags: 0x200000000000000(node=0|zone=2) [ 25.554544] page_type: f5(slab) [ 25.554986] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.556154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.557685] page dumped because: kasan: bad access detected [ 25.558013] [ 25.558197] Memory state around the buggy address: [ 25.558561] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.559042] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.559898] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.560393] ^ [ 25.560928] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.561412] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.561975] ================================================================== [ 25.831508] ================================================================== [ 25.832041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 25.832610] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.833471] [ 25.834071] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.835641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.835980] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.836746] Call Trace: [ 25.837021] <TASK> [ 25.837251] dump_stack_lvl+0x73/0xb0 [ 25.837519] print_report+0xd1/0x640 [ 25.837993] ? __virt_addr_valid+0x1db/0x2d0 [ 25.838450] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.840097] kasan_report+0x102/0x140 [ 25.840428] ? kasan_atomics_helper+0x12e7/0x5450 [ 25.841326] ? kasan_atomics_helper+0x12e7/0x5450 [ 25.841953] kasan_check_range+0x10c/0x1c0 [ 25.842600] __kasan_check_write+0x18/0x20 [ 25.843186] kasan_atomics_helper+0x12e7/0x5450 [ 25.843819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.844083] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.844272] ? trace_hardirqs_on+0x37/0xe0 [ 25.844456] ? kasan_atomics+0x153/0x310 [ 25.844885] kasan_atomics+0x1dd/0x310 [ 25.845400] ? __pfx_kasan_atomics+0x10/0x10 [ 25.845986] ? __pfx_kasan_atomics+0x10/0x10 [ 25.846439] kunit_try_run_case+0x1b3/0x490 [ 25.847025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.847654] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.848227] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.848867] ? __kthread_parkme+0x82/0x160 [ 25.849162] ? preempt_count_sub+0x50/0x80 [ 25.849652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.850380] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.850904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.851364] kthread+0x257/0x310 [ 25.851738] ? __pfx_kthread+0x10/0x10 [ 25.852140] ret_from_fork+0x41/0x80 [ 25.852637] ? __pfx_kthread+0x10/0x10 [ 25.853064] ret_from_fork_asm+0x1a/0x30 [ 25.853385] </TASK> [ 25.853733] [ 25.853993] Allocated by task 272: [ 25.854380] kasan_save_stack+0x3d/0x60 [ 25.854903] kasan_save_track+0x18/0x40 [ 25.855331] kasan_save_alloc_info+0x3b/0x50 [ 25.855774] __kasan_kmalloc+0xb7/0xc0 [ 25.856201] __kmalloc_cache_noprof+0x184/0x410 [ 25.856652] kasan_atomics+0x96/0x310 [ 25.857068] kunit_try_run_case+0x1b3/0x490 [ 25.857549] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.857933] kthread+0x257/0x310 [ 25.858200] ret_from_fork+0x41/0x80 [ 25.858715] ret_from_fork_asm+0x1a/0x30 [ 25.859164] [ 25.859394] The buggy address belongs to the object at ffff8881028c7700 [ 25.859394] which belongs to the cache kmalloc-64 of size 64 [ 25.860464] The buggy address is located 0 bytes to the right of [ 25.860464] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.861364] [ 25.861660] The buggy address belongs to the physical page: [ 25.862182] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.862742] flags: 0x200000000000000(node=0|zone=2) [ 25.863276] page_type: f5(slab) [ 25.863746] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.864268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.864871] page dumped because: kasan: bad access detected [ 25.865361] [ 25.865647] Memory state around the buggy address: [ 25.866064] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.866708] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.867306] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.867767] ^ [ 25.868067] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.868521] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.869200] ================================================================== [ 25.118604] ================================================================== [ 25.120078] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 25.121518] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.122073] [ 25.122341] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.123745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.124068] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.124629] Call Trace: [ 25.124989] <TASK> [ 25.125342] dump_stack_lvl+0x73/0xb0 [ 25.125835] print_report+0xd1/0x640 [ 25.126284] ? __virt_addr_valid+0x1db/0x2d0 [ 25.126834] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.127662] kasan_report+0x102/0x140 [ 25.128389] ? kasan_atomics_helper+0xa2c/0x5450 [ 25.129150] ? kasan_atomics_helper+0xa2c/0x5450 [ 25.129724] kasan_check_range+0x10c/0x1c0 [ 25.130217] __kasan_check_write+0x18/0x20 [ 25.130840] kasan_atomics_helper+0xa2c/0x5450 [ 25.131170] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.131511] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.131834] ? trace_hardirqs_on+0x37/0xe0 [ 25.132122] ? kasan_atomics+0x153/0x310 [ 25.132411] kasan_atomics+0x1dd/0x310 [ 25.133512] ? __pfx_kasan_atomics+0x10/0x10 [ 25.134060] ? __pfx_kasan_atomics+0x10/0x10 [ 25.134759] kunit_try_run_case+0x1b3/0x490 [ 25.135357] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.136029] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.136533] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.137152] ? __kthread_parkme+0x82/0x160 [ 25.137664] ? preempt_count_sub+0x50/0x80 [ 25.138105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.138620] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.139135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.139525] kthread+0x257/0x310 [ 25.139923] ? __pfx_kthread+0x10/0x10 [ 25.140425] ret_from_fork+0x41/0x80 [ 25.140963] ? __pfx_kthread+0x10/0x10 [ 25.141397] ret_from_fork_asm+0x1a/0x30 [ 25.141851] </TASK> [ 25.142070] [ 25.142229] Allocated by task 272: [ 25.142465] kasan_save_stack+0x3d/0x60 [ 25.143001] kasan_save_track+0x18/0x40 [ 25.143639] kasan_save_alloc_info+0x3b/0x50 [ 25.144186] __kasan_kmalloc+0xb7/0xc0 [ 25.144654] __kmalloc_cache_noprof+0x184/0x410 [ 25.145173] kasan_atomics+0x96/0x310 [ 25.145765] kunit_try_run_case+0x1b3/0x490 [ 25.146124] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.146467] kthread+0x257/0x310 [ 25.146985] ret_from_fork+0x41/0x80 [ 25.147439] ret_from_fork_asm+0x1a/0x30 [ 25.147949] [ 25.148224] The buggy address belongs to the object at ffff8881028c7700 [ 25.148224] which belongs to the cache kmalloc-64 of size 64 [ 25.149391] The buggy address is located 0 bytes to the right of [ 25.149391] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.150173] [ 25.150404] The buggy address belongs to the physical page: [ 25.151086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.151796] flags: 0x200000000000000(node=0|zone=2) [ 25.152444] page_type: f5(slab) [ 25.153015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.156895] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.157500] page dumped because: kasan: bad access detected [ 25.158180] [ 25.158534] Memory state around the buggy address: [ 25.159969] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.160942] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.161478] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.162435] ^ [ 25.163303] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.163820] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.164725] ================================================================== [ 24.772817] ================================================================== [ 24.773792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 24.774552] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.775258] [ 24.775655] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.776289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.776618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.777457] Call Trace: [ 24.777920] <TASK> [ 24.778378] dump_stack_lvl+0x73/0xb0 [ 24.778895] print_report+0xd1/0x640 [ 24.779329] ? __virt_addr_valid+0x1db/0x2d0 [ 24.779721] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.780335] kasan_report+0x102/0x140 [ 24.780889] ? kasan_atomics_helper+0x566/0x5450 [ 24.781385] ? kasan_atomics_helper+0x566/0x5450 [ 24.781970] kasan_check_range+0x10c/0x1c0 [ 24.782450] __kasan_check_write+0x18/0x20 [ 24.782895] kasan_atomics_helper+0x566/0x5450 [ 24.783429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.784077] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.784621] ? trace_hardirqs_on+0x37/0xe0 [ 24.785095] ? kasan_atomics+0x153/0x310 [ 24.785611] kasan_atomics+0x1dd/0x310 [ 24.786134] ? __pfx_kasan_atomics+0x10/0x10 [ 24.786716] ? __pfx_kasan_atomics+0x10/0x10 [ 24.787202] kunit_try_run_case+0x1b3/0x490 [ 24.787731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.788248] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.789196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.791385] ? __kthread_parkme+0x82/0x160 [ 24.791860] ? preempt_count_sub+0x50/0x80 [ 24.792979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.793358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.794274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.794705] kthread+0x257/0x310 [ 24.795338] ? __pfx_kthread+0x10/0x10 [ 24.795910] ret_from_fork+0x41/0x80 [ 24.796295] ? __pfx_kthread+0x10/0x10 [ 24.797281] ret_from_fork_asm+0x1a/0x30 [ 24.797978] </TASK> [ 24.798528] [ 24.798818] Allocated by task 272: [ 24.799093] kasan_save_stack+0x3d/0x60 [ 24.799882] kasan_save_track+0x18/0x40 [ 24.800500] kasan_save_alloc_info+0x3b/0x50 [ 24.801013] __kasan_kmalloc+0xb7/0xc0 [ 24.801385] __kmalloc_cache_noprof+0x184/0x410 [ 24.802258] kasan_atomics+0x96/0x310 [ 24.802922] kunit_try_run_case+0x1b3/0x490 [ 24.803314] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.804160] kthread+0x257/0x310 [ 24.804782] ret_from_fork+0x41/0x80 [ 24.805361] ret_from_fork_asm+0x1a/0x30 [ 24.806165] [ 24.806338] The buggy address belongs to the object at ffff8881028c7700 [ 24.806338] which belongs to the cache kmalloc-64 of size 64 [ 24.807450] The buggy address is located 0 bytes to the right of [ 24.807450] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.808456] [ 24.809378] The buggy address belongs to the physical page: [ 24.809882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.810858] flags: 0x200000000000000(node=0|zone=2) [ 24.811440] page_type: f5(slab) [ 24.811862] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.812506] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.813174] page dumped because: kasan: bad access detected [ 24.813883] [ 24.814251] Memory state around the buggy address: [ 24.814805] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.815355] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.816261] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.816896] ^ [ 24.817278] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.818292] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.818907] ================================================================== [ 27.061755] ================================================================== [ 27.062416] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 27.063269] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 27.063980] [ 27.064236] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.064852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.065118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.065989] Call Trace: [ 27.066319] <TASK> [ 27.066670] dump_stack_lvl+0x73/0xb0 [ 27.067096] print_report+0xd1/0x640 [ 27.067401] ? __virt_addr_valid+0x1db/0x2d0 [ 27.067794] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.068228] kasan_report+0x102/0x140 [ 27.068723] ? kasan_atomics_helper+0x218b/0x5450 [ 27.069214] ? kasan_atomics_helper+0x218b/0x5450 [ 27.069787] kasan_check_range+0x10c/0x1c0 [ 27.070264] __kasan_check_write+0x18/0x20 [ 27.070755] kasan_atomics_helper+0x218b/0x5450 [ 27.071144] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.071471] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.071905] ? trace_hardirqs_on+0x37/0xe0 [ 27.072338] ? kasan_atomics+0x153/0x310 [ 27.072863] kasan_atomics+0x1dd/0x310 [ 27.073300] ? __pfx_kasan_atomics+0x10/0x10 [ 27.073840] ? __pfx_kasan_atomics+0x10/0x10 [ 27.074329] kunit_try_run_case+0x1b3/0x490 [ 27.074721] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.075041] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.075632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.076138] ? __kthread_parkme+0x82/0x160 [ 27.076651] ? preempt_count_sub+0x50/0x80 [ 27.077093] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.077412] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.078054] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.078658] kthread+0x257/0x310 [ 27.079046] ? __pfx_kthread+0x10/0x10 [ 27.079478] ret_from_fork+0x41/0x80 [ 27.079932] ? __pfx_kthread+0x10/0x10 [ 27.080220] ret_from_fork_asm+0x1a/0x30 [ 27.080553] </TASK> [ 27.080880] [ 27.081104] Allocated by task 272: [ 27.081469] kasan_save_stack+0x3d/0x60 [ 27.081952] kasan_save_track+0x18/0x40 [ 27.082334] kasan_save_alloc_info+0x3b/0x50 [ 27.082748] __kasan_kmalloc+0xb7/0xc0 [ 27.083024] __kmalloc_cache_noprof+0x184/0x410 [ 27.083324] kasan_atomics+0x96/0x310 [ 27.083786] kunit_try_run_case+0x1b3/0x490 [ 27.084231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.085196] kthread+0x257/0x310 [ 27.086051] ret_from_fork+0x41/0x80 [ 27.086464] ret_from_fork_asm+0x1a/0x30 [ 27.087612] [ 27.087852] The buggy address belongs to the object at ffff8881028c7700 [ 27.087852] which belongs to the cache kmalloc-64 of size 64 [ 27.088817] The buggy address is located 0 bytes to the right of [ 27.088817] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 27.090693] [ 27.090930] The buggy address belongs to the physical page: [ 27.091374] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 27.092961] flags: 0x200000000000000(node=0|zone=2) [ 27.093328] page_type: f5(slab) [ 27.093694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.094280] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.094888] page dumped because: kasan: bad access detected [ 27.095346] [ 27.095532] Memory state around the buggy address: [ 27.096039] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.096631] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.097017] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.097710] ^ [ 27.098195] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.098881] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.099268] ================================================================== [ 26.814807] ================================================================== [ 26.815356] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 26.815728] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.816946] [ 26.817207] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.818006] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.818422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.819972] Call Trace: [ 26.820637] <TASK> [ 26.820851] dump_stack_lvl+0x73/0xb0 [ 26.821111] print_report+0xd1/0x640 [ 26.821913] ? __virt_addr_valid+0x1db/0x2d0 [ 26.822266] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.823088] kasan_report+0x102/0x140 [ 26.823628] ? kasan_atomics_helper+0x1f44/0x5450 [ 26.824140] ? kasan_atomics_helper+0x1f44/0x5450 [ 26.824573] kasan_check_range+0x10c/0x1c0 [ 26.825356] __kasan_check_write+0x18/0x20 [ 26.825802] kasan_atomics_helper+0x1f44/0x5450 [ 26.826518] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.826969] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.827409] ? trace_hardirqs_on+0x37/0xe0 [ 26.827816] ? kasan_atomics+0x153/0x310 [ 26.828165] kasan_atomics+0x1dd/0x310 [ 26.829126] ? __pfx_kasan_atomics+0x10/0x10 [ 26.829431] ? __pfx_kasan_atomics+0x10/0x10 [ 26.830171] kunit_try_run_case+0x1b3/0x490 [ 26.830862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.831371] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.832007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.832619] ? __kthread_parkme+0x82/0x160 [ 26.832807] ? preempt_count_sub+0x50/0x80 [ 26.832971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.833143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.833343] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.833615] kthread+0x257/0x310 [ 26.834756] ? __pfx_kthread+0x10/0x10 [ 26.835574] ret_from_fork+0x41/0x80 [ 26.836319] ? __pfx_kthread+0x10/0x10 [ 26.836687] ret_from_fork_asm+0x1a/0x30 [ 26.837022] </TASK> [ 26.837297] [ 26.837532] Allocated by task 272: [ 26.838028] kasan_save_stack+0x3d/0x60 [ 26.838341] kasan_save_track+0x18/0x40 [ 26.838776] kasan_save_alloc_info+0x3b/0x50 [ 26.839143] __kasan_kmalloc+0xb7/0xc0 [ 26.839429] __kmalloc_cache_noprof+0x184/0x410 [ 26.839911] kasan_atomics+0x96/0x310 [ 26.840200] kunit_try_run_case+0x1b3/0x490 [ 26.840650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.841060] kthread+0x257/0x310 [ 26.841439] ret_from_fork+0x41/0x80 [ 26.841824] ret_from_fork_asm+0x1a/0x30 [ 26.842121] [ 26.842289] The buggy address belongs to the object at ffff8881028c7700 [ 26.842289] which belongs to the cache kmalloc-64 of size 64 [ 26.843559] The buggy address is located 0 bytes to the right of [ 26.843559] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.844412] [ 26.844610] The buggy address belongs to the physical page: [ 26.844917] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.845791] flags: 0x200000000000000(node=0|zone=2) [ 26.846297] page_type: f5(slab) [ 26.846801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.847474] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.848364] page dumped because: kasan: bad access detected [ 26.848850] [ 26.849045] Memory state around the buggy address: [ 26.849334] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.849835] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.850609] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.851247] ^ [ 26.852934] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.853476] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.854140] ================================================================== [ 26.855545] ================================================================== [ 26.857611] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 26.858265] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.858915] [ 26.859118] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.861432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.862156] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.862999] Call Trace: [ 26.863263] <TASK> [ 26.863526] dump_stack_lvl+0x73/0xb0 [ 26.864040] print_report+0xd1/0x640 [ 26.864638] ? __virt_addr_valid+0x1db/0x2d0 [ 26.865347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.866065] kasan_report+0x102/0x140 [ 26.866686] ? kasan_atomics_helper+0x4f73/0x5450 [ 26.867313] ? kasan_atomics_helper+0x4f73/0x5450 [ 26.867726] __asan_report_load8_noabort+0x18/0x20 [ 26.868366] kasan_atomics_helper+0x4f73/0x5450 [ 26.868996] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.869461] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.869883] ? trace_hardirqs_on+0x37/0xe0 [ 26.870657] ? kasan_atomics+0x153/0x310 [ 26.871396] kasan_atomics+0x1dd/0x310 [ 26.871912] ? __pfx_kasan_atomics+0x10/0x10 [ 26.872361] ? __pfx_kasan_atomics+0x10/0x10 [ 26.873057] kunit_try_run_case+0x1b3/0x490 [ 26.873378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.873971] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.874569] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.875202] ? __kthread_parkme+0x82/0x160 [ 26.875842] ? preempt_count_sub+0x50/0x80 [ 26.876126] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.877030] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.877622] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.878289] kthread+0x257/0x310 [ 26.879312] ? __pfx_kthread+0x10/0x10 [ 26.880073] ret_from_fork+0x41/0x80 [ 26.880438] ? __pfx_kthread+0x10/0x10 [ 26.880695] ret_from_fork_asm+0x1a/0x30 [ 26.881428] </TASK> [ 26.882217] [ 26.882354] Allocated by task 272: [ 26.883108] kasan_save_stack+0x3d/0x60 [ 26.883515] kasan_save_track+0x18/0x40 [ 26.884224] kasan_save_alloc_info+0x3b/0x50 [ 26.885023] __kasan_kmalloc+0xb7/0xc0 [ 26.885948] __kmalloc_cache_noprof+0x184/0x410 [ 26.886438] kasan_atomics+0x96/0x310 [ 26.887289] kunit_try_run_case+0x1b3/0x490 [ 26.888052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.888401] kthread+0x257/0x310 [ 26.888790] ret_from_fork+0x41/0x80 [ 26.889172] ret_from_fork_asm+0x1a/0x30 [ 26.889555] [ 26.889834] The buggy address belongs to the object at ffff8881028c7700 [ 26.889834] which belongs to the cache kmalloc-64 of size 64 [ 26.891537] The buggy address is located 0 bytes to the right of [ 26.891537] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.892888] [ 26.893589] The buggy address belongs to the physical page: [ 26.893898] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.894771] flags: 0x200000000000000(node=0|zone=2) [ 26.895320] page_type: f5(slab) [ 26.896214] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.897075] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.898115] page dumped because: kasan: bad access detected [ 26.898918] [ 26.899359] Memory state around the buggy address: [ 26.899847] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.900397] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.900986] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.901539] ^ [ 26.902071] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.902730] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.903133] ================================================================== [ 24.568431] ================================================================== [ 24.569001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 24.569394] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.570551] [ 24.570919] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.571915] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.572418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.573202] Call Trace: [ 24.573653] <TASK> [ 24.573943] dump_stack_lvl+0x73/0xb0 [ 24.574356] print_report+0xd1/0x640 [ 24.574713] ? __virt_addr_valid+0x1db/0x2d0 [ 24.575272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.575985] kasan_report+0x102/0x140 [ 24.576502] ? kasan_atomics_helper+0x4b70/0x5450 [ 24.577112] ? kasan_atomics_helper+0x4b70/0x5450 [ 24.577734] __asan_report_store4_noabort+0x1b/0x30 [ 24.578288] kasan_atomics_helper+0x4b70/0x5450 [ 24.578888] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.579386] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.580001] ? trace_hardirqs_on+0x37/0xe0 [ 24.580419] ? kasan_atomics+0x153/0x310 [ 24.581015] kasan_atomics+0x1dd/0x310 [ 24.581500] ? __pfx_kasan_atomics+0x10/0x10 [ 24.582099] ? __pfx_kasan_atomics+0x10/0x10 [ 24.582550] kunit_try_run_case+0x1b3/0x490 [ 24.583078] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.583637] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.584140] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.584662] ? __kthread_parkme+0x82/0x160 [ 24.585190] ? preempt_count_sub+0x50/0x80 [ 24.585833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.586304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.586933] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.587568] kthread+0x257/0x310 [ 24.588049] ? __pfx_kthread+0x10/0x10 [ 24.588399] ret_from_fork+0x41/0x80 [ 24.588934] ? __pfx_kthread+0x10/0x10 [ 24.589415] ret_from_fork_asm+0x1a/0x30 [ 24.589862] </TASK> [ 24.590256] [ 24.590527] Allocated by task 272: [ 24.590874] kasan_save_stack+0x3d/0x60 [ 24.591153] kasan_save_track+0x18/0x40 [ 24.591420] kasan_save_alloc_info+0x3b/0x50 [ 24.592024] __kasan_kmalloc+0xb7/0xc0 [ 24.592469] __kmalloc_cache_noprof+0x184/0x410 [ 24.593143] kasan_atomics+0x96/0x310 [ 24.593643] kunit_try_run_case+0x1b3/0x490 [ 24.594170] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.594797] kthread+0x257/0x310 [ 24.595149] ret_from_fork+0x41/0x80 [ 24.595747] ret_from_fork_asm+0x1a/0x30 [ 24.596138] [ 24.596464] The buggy address belongs to the object at ffff8881028c7700 [ 24.596464] which belongs to the cache kmalloc-64 of size 64 [ 24.597372] The buggy address is located 0 bytes to the right of [ 24.597372] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.598569] [ 24.598860] The buggy address belongs to the physical page: [ 24.599188] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.600075] flags: 0x200000000000000(node=0|zone=2) [ 24.600567] page_type: f5(slab) [ 24.601009] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.601698] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.602225] page dumped because: kasan: bad access detected [ 24.602840] [ 24.603140] Memory state around the buggy address: [ 24.603621] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.604082] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.604913] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.605675] ^ [ 24.606097] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.606806] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.607355] ================================================================== [ 26.176175] ================================================================== [ 26.176725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 26.177203] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.177958] [ 26.178279] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.179325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.179630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.180074] Call Trace: [ 26.180288] <TASK> [ 26.180473] dump_stack_lvl+0x73/0xb0 [ 26.181881] print_report+0xd1/0x640 [ 26.182392] ? __virt_addr_valid+0x1db/0x2d0 [ 26.183281] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.184140] kasan_report+0x102/0x140 [ 26.184716] ? kasan_atomics_helper+0x1650/0x5450 [ 26.185355] ? kasan_atomics_helper+0x1650/0x5450 [ 26.186210] kasan_check_range+0x10c/0x1c0 [ 26.186746] __kasan_check_write+0x18/0x20 [ 26.187472] kasan_atomics_helper+0x1650/0x5450 [ 26.188013] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.188372] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.188979] ? trace_hardirqs_on+0x37/0xe0 [ 26.189297] ? kasan_atomics+0x153/0x310 [ 26.189850] kasan_atomics+0x1dd/0x310 [ 26.190375] ? __pfx_kasan_atomics+0x10/0x10 [ 26.190998] ? __pfx_kasan_atomics+0x10/0x10 [ 26.191554] kunit_try_run_case+0x1b3/0x490 [ 26.192105] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.192705] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.193237] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.193850] ? __kthread_parkme+0x82/0x160 [ 26.194199] ? preempt_count_sub+0x50/0x80 [ 26.194541] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.195080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.195513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.196014] kthread+0x257/0x310 [ 26.196413] ? __pfx_kthread+0x10/0x10 [ 26.196867] ret_from_fork+0x41/0x80 [ 26.197274] ? __pfx_kthread+0x10/0x10 [ 26.197625] ret_from_fork_asm+0x1a/0x30 [ 26.198107] </TASK> [ 26.198402] [ 26.198655] Allocated by task 272: [ 26.198933] kasan_save_stack+0x3d/0x60 [ 26.199360] kasan_save_track+0x18/0x40 [ 26.199752] kasan_save_alloc_info+0x3b/0x50 [ 26.200184] __kasan_kmalloc+0xb7/0xc0 [ 26.200649] __kmalloc_cache_noprof+0x184/0x410 [ 26.201048] kasan_atomics+0x96/0x310 [ 26.201340] kunit_try_run_case+0x1b3/0x490 [ 26.201905] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.202302] kthread+0x257/0x310 [ 26.203627] ret_from_fork+0x41/0x80 [ 26.204031] ret_from_fork_asm+0x1a/0x30 [ 26.204392] [ 26.204637] The buggy address belongs to the object at ffff8881028c7700 [ 26.204637] which belongs to the cache kmalloc-64 of size 64 [ 26.205443] The buggy address is located 0 bytes to the right of [ 26.205443] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.207512] [ 26.207751] The buggy address belongs to the physical page: [ 26.208187] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.208772] flags: 0x200000000000000(node=0|zone=2) [ 26.209232] page_type: f5(slab) [ 26.209916] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.210462] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.210942] page dumped because: kasan: bad access detected [ 26.211251] [ 26.211410] Memory state around the buggy address: [ 26.211953] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.212641] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.213142] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.213728] ^ [ 26.214022] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.214736] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.215399] ================================================================== [ 26.387768] ================================================================== [ 26.388422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 26.389165] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.389672] [ 26.389875] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.390447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.390942] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.391790] Call Trace: [ 26.392108] <TASK> [ 26.392388] dump_stack_lvl+0x73/0xb0 [ 26.392892] print_report+0xd1/0x640 [ 26.393311] ? __virt_addr_valid+0x1db/0x2d0 [ 26.393834] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.394253] kasan_report+0x102/0x140 [ 26.394743] ? kasan_atomics_helper+0x194b/0x5450 [ 26.395123] ? kasan_atomics_helper+0x194b/0x5450 [ 26.395705] kasan_check_range+0x10c/0x1c0 [ 26.396165] __kasan_check_write+0x18/0x20 [ 26.396511] kasan_atomics_helper+0x194b/0x5450 [ 26.397035] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.397542] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.397923] ? trace_hardirqs_on+0x37/0xe0 [ 26.398387] ? kasan_atomics+0x153/0x310 [ 26.398818] kasan_atomics+0x1dd/0x310 [ 26.399122] ? __pfx_kasan_atomics+0x10/0x10 [ 26.399434] ? __pfx_kasan_atomics+0x10/0x10 [ 26.401581] kunit_try_run_case+0x1b3/0x490 [ 26.402088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.402612] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.403100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.404039] ? __kthread_parkme+0x82/0x160 [ 26.404763] ? preempt_count_sub+0x50/0x80 [ 26.405953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.406859] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.408165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.408805] kthread+0x257/0x310 [ 26.409163] ? __pfx_kthread+0x10/0x10 [ 26.409610] ret_from_fork+0x41/0x80 [ 26.410073] ? __pfx_kthread+0x10/0x10 [ 26.410547] ret_from_fork_asm+0x1a/0x30 [ 26.411084] </TASK> [ 26.411364] [ 26.411553] Allocated by task 272: [ 26.411852] kasan_save_stack+0x3d/0x60 [ 26.412307] kasan_save_track+0x18/0x40 [ 26.412832] kasan_save_alloc_info+0x3b/0x50 [ 26.413299] __kasan_kmalloc+0xb7/0xc0 [ 26.413700] __kmalloc_cache_noprof+0x184/0x410 [ 26.414218] kasan_atomics+0x96/0x310 [ 26.414678] kunit_try_run_case+0x1b3/0x490 [ 26.414977] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.415390] kthread+0x257/0x310 [ 26.415886] ret_from_fork+0x41/0x80 [ 26.416302] ret_from_fork_asm+0x1a/0x30 [ 26.416762] [ 26.416929] The buggy address belongs to the object at ffff8881028c7700 [ 26.416929] which belongs to the cache kmalloc-64 of size 64 [ 26.417885] The buggy address is located 0 bytes to the right of [ 26.417885] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.418943] [ 26.419118] The buggy address belongs to the physical page: [ 26.419527] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.420306] flags: 0x200000000000000(node=0|zone=2) [ 26.420857] page_type: f5(slab) [ 26.421231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.421808] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.422322] page dumped because: kasan: bad access detected [ 26.422810] [ 26.423039] Memory state around the buggy address: [ 26.423526] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.424155] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.424558] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.425236] ^ [ 26.425786] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.426374] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.426818] ================================================================== [ 25.606373] ================================================================== [ 25.607569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 25.608109] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.608648] [ 25.608831] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.609788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.610111] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.611023] Call Trace: [ 25.611283] <TASK> [ 25.611647] dump_stack_lvl+0x73/0xb0 [ 25.612008] print_report+0xd1/0x640 [ 25.612515] ? __virt_addr_valid+0x1db/0x2d0 [ 25.612941] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.613381] kasan_report+0x102/0x140 [ 25.613981] ? kasan_atomics_helper+0x4a1e/0x5450 [ 25.614423] ? kasan_atomics_helper+0x4a1e/0x5450 [ 25.615079] __asan_report_load4_noabort+0x18/0x20 [ 25.615551] kasan_atomics_helper+0x4a1e/0x5450 [ 25.616133] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.616704] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.617090] ? trace_hardirqs_on+0x37/0xe0 [ 25.617614] ? kasan_atomics+0x153/0x310 [ 25.618005] kasan_atomics+0x1dd/0x310 [ 25.618426] ? __pfx_kasan_atomics+0x10/0x10 [ 25.618889] ? __pfx_kasan_atomics+0x10/0x10 [ 25.619214] kunit_try_run_case+0x1b3/0x490 [ 25.621556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.622087] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.622621] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.622960] ? __kthread_parkme+0x82/0x160 [ 25.623809] ? preempt_count_sub+0x50/0x80 [ 25.625430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.625876] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.626255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.626656] kthread+0x257/0x310 [ 25.627050] ? __pfx_kthread+0x10/0x10 [ 25.627469] ret_from_fork+0x41/0x80 [ 25.627914] ? __pfx_kthread+0x10/0x10 [ 25.628335] ret_from_fork_asm+0x1a/0x30 [ 25.628886] </TASK> [ 25.629092] [ 25.629249] Allocated by task 272: [ 25.629654] kasan_save_stack+0x3d/0x60 [ 25.630089] kasan_save_track+0x18/0x40 [ 25.630378] kasan_save_alloc_info+0x3b/0x50 [ 25.630981] __kasan_kmalloc+0xb7/0xc0 [ 25.631275] __kmalloc_cache_noprof+0x184/0x410 [ 25.631795] kasan_atomics+0x96/0x310 [ 25.632093] kunit_try_run_case+0x1b3/0x490 [ 25.632388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.632855] kthread+0x257/0x310 [ 25.633277] ret_from_fork+0x41/0x80 [ 25.633725] ret_from_fork_asm+0x1a/0x30 [ 25.634170] [ 25.634392] The buggy address belongs to the object at ffff8881028c7700 [ 25.634392] which belongs to the cache kmalloc-64 of size 64 [ 25.635582] The buggy address is located 0 bytes to the right of [ 25.635582] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.636405] [ 25.636602] The buggy address belongs to the physical page: [ 25.636909] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.637645] flags: 0x200000000000000(node=0|zone=2) [ 25.638134] page_type: f5(slab) [ 25.638522] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.639211] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.639630] page dumped because: kasan: bad access detected [ 25.639940] [ 25.640162] Memory state around the buggy address: [ 25.640619] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.641287] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.642153] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.642596] ^ [ 25.643117] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.643547] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.644172] ================================================================== [ 26.517328] ================================================================== [ 26.518100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 26.518766] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.519367] [ 26.519727] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.520380] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.520886] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.521551] Call Trace: [ 26.521828] <TASK> [ 26.522036] dump_stack_lvl+0x73/0xb0 [ 26.522686] print_report+0xd1/0x640 [ 26.523125] ? __virt_addr_valid+0x1db/0x2d0 [ 26.524439] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.525046] kasan_report+0x102/0x140 [ 26.525620] ? kasan_atomics_helper+0x1b23/0x5450 [ 26.526135] ? kasan_atomics_helper+0x1b23/0x5450 [ 26.526551] kasan_check_range+0x10c/0x1c0 [ 26.526917] __kasan_check_write+0x18/0x20 [ 26.527408] kasan_atomics_helper+0x1b23/0x5450 [ 26.527976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.528547] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.528939] ? trace_hardirqs_on+0x37/0xe0 [ 26.529444] ? kasan_atomics+0x153/0x310 [ 26.529925] kasan_atomics+0x1dd/0x310 [ 26.530406] ? __pfx_kasan_atomics+0x10/0x10 [ 26.530882] ? __pfx_kasan_atomics+0x10/0x10 [ 26.531207] kunit_try_run_case+0x1b3/0x490 [ 26.531759] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.532264] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.532828] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.533386] ? __kthread_parkme+0x82/0x160 [ 26.533900] ? preempt_count_sub+0x50/0x80 [ 26.534378] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.534979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.535628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.536112] kthread+0x257/0x310 [ 26.536437] ? __pfx_kthread+0x10/0x10 [ 26.536964] ret_from_fork+0x41/0x80 [ 26.537290] ? __pfx_kthread+0x10/0x10 [ 26.537827] ret_from_fork_asm+0x1a/0x30 [ 26.538196] </TASK> [ 26.538533] [ 26.538806] Allocated by task 272: [ 26.539131] kasan_save_stack+0x3d/0x60 [ 26.539639] kasan_save_track+0x18/0x40 [ 26.539954] kasan_save_alloc_info+0x3b/0x50 [ 26.540459] __kasan_kmalloc+0xb7/0xc0 [ 26.540806] __kmalloc_cache_noprof+0x184/0x410 [ 26.541107] kasan_atomics+0x96/0x310 [ 26.541385] kunit_try_run_case+0x1b3/0x490 [ 26.541908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.542457] kthread+0x257/0x310 [ 26.542939] ret_from_fork+0x41/0x80 [ 26.543350] ret_from_fork_asm+0x1a/0x30 [ 26.543869] [ 26.544099] The buggy address belongs to the object at ffff8881028c7700 [ 26.544099] which belongs to the cache kmalloc-64 of size 64 [ 26.545056] The buggy address is located 0 bytes to the right of [ 26.545056] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.546030] [ 26.546314] The buggy address belongs to the physical page: [ 26.546926] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.547569] flags: 0x200000000000000(node=0|zone=2) [ 26.548101] page_type: f5(slab) [ 26.548531] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.549140] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.549724] page dumped because: kasan: bad access detected [ 26.550143] [ 26.550417] Memory state around the buggy address: [ 26.550903] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.551521] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.552179] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.552734] ^ [ 26.553246] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.553916] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.554393] ================================================================== [ 24.866136] ================================================================== [ 24.866581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 24.867189] Write of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.867943] [ 24.868201] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.868987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.869249] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.870091] Call Trace: [ 24.870537] <TASK> [ 24.870931] dump_stack_lvl+0x73/0xb0 [ 24.871568] print_report+0xd1/0x640 [ 24.872537] ? __virt_addr_valid+0x1db/0x2d0 [ 24.873057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.873523] kasan_report+0x102/0x140 [ 24.873960] ? kasan_atomics_helper+0x698/0x5450 [ 24.874382] ? kasan_atomics_helper+0x698/0x5450 [ 24.875043] kasan_check_range+0x10c/0x1c0 [ 24.875458] __kasan_check_write+0x18/0x20 [ 24.875973] kasan_atomics_helper+0x698/0x5450 [ 24.876462] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.876834] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.877354] ? trace_hardirqs_on+0x37/0xe0 [ 24.877679] ? kasan_atomics+0x153/0x310 [ 24.878017] kasan_atomics+0x1dd/0x310 [ 24.878447] ? __pfx_kasan_atomics+0x10/0x10 [ 24.879129] ? __pfx_kasan_atomics+0x10/0x10 [ 24.879810] kunit_try_run_case+0x1b3/0x490 [ 24.880140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.880460] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.881102] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.881882] ? __kthread_parkme+0x82/0x160 [ 24.882428] ? preempt_count_sub+0x50/0x80 [ 24.883004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.883447] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.884067] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.884420] kthread+0x257/0x310 [ 24.884897] ? __pfx_kthread+0x10/0x10 [ 24.885307] ret_from_fork+0x41/0x80 [ 24.885861] ? __pfx_kthread+0x10/0x10 [ 24.886450] ret_from_fork_asm+0x1a/0x30 [ 24.887045] </TASK> [ 24.887401] [ 24.887653] Allocated by task 272: [ 24.888069] kasan_save_stack+0x3d/0x60 [ 24.888437] kasan_save_track+0x18/0x40 [ 24.888966] kasan_save_alloc_info+0x3b/0x50 [ 24.889435] __kasan_kmalloc+0xb7/0xc0 [ 24.889990] __kmalloc_cache_noprof+0x184/0x410 [ 24.890513] kasan_atomics+0x96/0x310 [ 24.890947] kunit_try_run_case+0x1b3/0x490 [ 24.891403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.892158] kthread+0x257/0x310 [ 24.892564] ret_from_fork+0x41/0x80 [ 24.892999] ret_from_fork_asm+0x1a/0x30 [ 24.893530] [ 24.893807] The buggy address belongs to the object at ffff8881028c7700 [ 24.893807] which belongs to the cache kmalloc-64 of size 64 [ 24.894891] The buggy address is located 0 bytes to the right of [ 24.894891] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.895511] [ 24.895805] The buggy address belongs to the physical page: [ 24.896373] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.897288] flags: 0x200000000000000(node=0|zone=2) [ 24.897898] page_type: f5(slab) [ 24.898185] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.898613] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.899004] page dumped because: kasan: bad access detected [ 24.899601] [ 24.899877] Memory state around the buggy address: [ 24.900328] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.901131] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.901860] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.902332] ^ [ 24.902800] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.903539] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.904296] ================================================================== [ 26.982563] ================================================================== [ 26.984446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 26.985154] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.985868] [ 26.986132] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.986783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.987210] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.987952] Call Trace: [ 26.988257] <TASK> [ 26.988542] dump_stack_lvl+0x73/0xb0 [ 26.988929] print_report+0xd1/0x640 [ 26.989219] ? __virt_addr_valid+0x1db/0x2d0 [ 26.989759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.990309] kasan_report+0x102/0x140 [ 26.990811] ? kasan_atomics_helper+0x20c9/0x5450 [ 26.991220] ? kasan_atomics_helper+0x20c9/0x5450 [ 26.992552] kasan_check_range+0x10c/0x1c0 [ 26.993072] __kasan_check_write+0x18/0x20 [ 26.993983] kasan_atomics_helper+0x20c9/0x5450 [ 26.994685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.995270] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.995843] ? trace_hardirqs_on+0x37/0xe0 [ 26.996258] ? kasan_atomics+0x153/0x310 [ 26.996662] kasan_atomics+0x1dd/0x310 [ 26.997085] ? __pfx_kasan_atomics+0x10/0x10 [ 26.997661] ? __pfx_kasan_atomics+0x10/0x10 [ 26.998173] kunit_try_run_case+0x1b3/0x490 [ 26.998640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.999012] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.999469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.000049] ? __kthread_parkme+0x82/0x160 [ 27.000395] ? preempt_count_sub+0x50/0x80 [ 27.000918] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.001367] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.001944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.002455] kthread+0x257/0x310 [ 27.002800] ? __pfx_kthread+0x10/0x10 [ 27.003229] ret_from_fork+0x41/0x80 [ 27.003725] ? __pfx_kthread+0x10/0x10 [ 27.004134] ret_from_fork_asm+0x1a/0x30 [ 27.004655] </TASK> [ 27.004943] [ 27.005160] Allocated by task 272: [ 27.005473] kasan_save_stack+0x3d/0x60 [ 27.005898] kasan_save_track+0x18/0x40 [ 27.006188] kasan_save_alloc_info+0x3b/0x50 [ 27.006509] __kasan_kmalloc+0xb7/0xc0 [ 27.006973] __kmalloc_cache_noprof+0x184/0x410 [ 27.007441] kasan_atomics+0x96/0x310 [ 27.007906] kunit_try_run_case+0x1b3/0x490 [ 27.008362] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.008955] kthread+0x257/0x310 [ 27.009287] ret_from_fork+0x41/0x80 [ 27.009750] ret_from_fork_asm+0x1a/0x30 [ 27.010071] [ 27.010299] The buggy address belongs to the object at ffff8881028c7700 [ 27.010299] which belongs to the cache kmalloc-64 of size 64 [ 27.011123] The buggy address is located 0 bytes to the right of [ 27.011123] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 27.011910] [ 27.012129] The buggy address belongs to the physical page: [ 27.012688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 27.013375] flags: 0x200000000000000(node=0|zone=2) [ 27.013917] page_type: f5(slab) [ 27.014182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.014854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.015277] page dumped because: kasan: bad access detected [ 27.015853] [ 27.016081] Memory state around the buggy address: [ 27.016553] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.017095] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.017782] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.018219] ^ [ 27.018528] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.019193] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.019873] ================================================================== [ 27.175782] ================================================================== [ 27.176478] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 27.177980] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 27.178566] [ 27.180792] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 27.181531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.181988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.182683] Call Trace: [ 27.182906] <TASK> [ 27.183106] dump_stack_lvl+0x73/0xb0 [ 27.183406] print_report+0xd1/0x640 [ 27.183888] ? __virt_addr_valid+0x1db/0x2d0 [ 27.184374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.184993] kasan_report+0x102/0x140 [ 27.185453] ? kasan_atomics_helper+0x5117/0x5450 [ 27.186015] ? kasan_atomics_helper+0x5117/0x5450 [ 27.186371] __asan_report_load8_noabort+0x18/0x20 [ 27.186932] kasan_atomics_helper+0x5117/0x5450 [ 27.187420] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.187997] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.188415] ? trace_hardirqs_on+0x37/0xe0 [ 27.188791] ? kasan_atomics+0x153/0x310 [ 27.189097] kasan_atomics+0x1dd/0x310 [ 27.189525] ? __pfx_kasan_atomics+0x10/0x10 [ 27.190037] ? __pfx_kasan_atomics+0x10/0x10 [ 27.190540] kunit_try_run_case+0x1b3/0x490 [ 27.191056] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.191560] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.192088] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.192423] ? __kthread_parkme+0x82/0x160 [ 27.192796] ? preempt_count_sub+0x50/0x80 [ 27.193106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.193423] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.194085] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.194704] kthread+0x257/0x310 [ 27.195105] ? __pfx_kthread+0x10/0x10 [ 27.195627] ret_from_fork+0x41/0x80 [ 27.196059] ? __pfx_kthread+0x10/0x10 [ 27.196500] ret_from_fork_asm+0x1a/0x30 [ 27.197001] </TASK> [ 27.197289] [ 27.197528] Allocated by task 272: [ 27.197941] kasan_save_stack+0x3d/0x60 [ 27.198371] kasan_save_track+0x18/0x40 [ 27.198849] kasan_save_alloc_info+0x3b/0x50 [ 27.199160] __kasan_kmalloc+0xb7/0xc0 [ 27.199628] __kmalloc_cache_noprof+0x184/0x410 [ 27.199995] kasan_atomics+0x96/0x310 [ 27.200409] kunit_try_run_case+0x1b3/0x490 [ 27.200820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.201224] kthread+0x257/0x310 [ 27.201646] ret_from_fork+0x41/0x80 [ 27.202024] ret_from_fork_asm+0x1a/0x30 [ 27.202465] [ 27.202737] The buggy address belongs to the object at ffff8881028c7700 [ 27.202737] which belongs to the cache kmalloc-64 of size 64 [ 27.203605] The buggy address is located 0 bytes to the right of [ 27.203605] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 27.204286] [ 27.204535] The buggy address belongs to the physical page: [ 27.205089] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 27.205873] flags: 0x200000000000000(node=0|zone=2) [ 27.206306] page_type: f5(slab) [ 27.206619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.207259] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.207968] page dumped because: kasan: bad access detected [ 27.208380] [ 27.210630] Memory state around the buggy address: [ 27.211105] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.211764] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.212368] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.214768] ^ [ 27.215230] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.215983] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.217666] ================================================================== [ 26.767698] ================================================================== [ 26.768085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 26.769836] Write of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.770317] [ 26.770535] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.772170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.772686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.772965] Call Trace: [ 26.773081] <TASK> [ 26.773188] dump_stack_lvl+0x73/0xb0 [ 26.773347] print_report+0xd1/0x640 [ 26.774303] ? __virt_addr_valid+0x1db/0x2d0 [ 26.775175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.775883] kasan_report+0x102/0x140 [ 26.776387] ? kasan_atomics_helper+0x1eab/0x5450 [ 26.777060] ? kasan_atomics_helper+0x1eab/0x5450 [ 26.777673] kasan_check_range+0x10c/0x1c0 [ 26.778207] __kasan_check_write+0x18/0x20 [ 26.778614] kasan_atomics_helper+0x1eab/0x5450 [ 26.779109] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.779652] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.780140] ? trace_hardirqs_on+0x37/0xe0 [ 26.781116] ? kasan_atomics+0x153/0x310 [ 26.781540] kasan_atomics+0x1dd/0x310 [ 26.782334] ? __pfx_kasan_atomics+0x10/0x10 [ 26.782928] ? __pfx_kasan_atomics+0x10/0x10 [ 26.783338] kunit_try_run_case+0x1b3/0x490 [ 26.783879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.784268] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.785755] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.786216] ? __kthread_parkme+0x82/0x160 [ 26.786854] ? preempt_count_sub+0x50/0x80 [ 26.787515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.788154] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.789182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.789844] kthread+0x257/0x310 [ 26.790153] ? __pfx_kthread+0x10/0x10 [ 26.790594] ret_from_fork+0x41/0x80 [ 26.791055] ? __pfx_kthread+0x10/0x10 [ 26.791376] ret_from_fork_asm+0x1a/0x30 [ 26.792379] </TASK> [ 26.792841] [ 26.793256] Allocated by task 272: [ 26.793620] kasan_save_stack+0x3d/0x60 [ 26.794277] kasan_save_track+0x18/0x40 [ 26.794721] kasan_save_alloc_info+0x3b/0x50 [ 26.795393] __kasan_kmalloc+0xb7/0xc0 [ 26.796036] __kmalloc_cache_noprof+0x184/0x410 [ 26.796636] kasan_atomics+0x96/0x310 [ 26.797036] kunit_try_run_case+0x1b3/0x490 [ 26.797407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.797959] kthread+0x257/0x310 [ 26.798279] ret_from_fork+0x41/0x80 [ 26.799272] ret_from_fork_asm+0x1a/0x30 [ 26.799587] [ 26.800265] The buggy address belongs to the object at ffff8881028c7700 [ 26.800265] which belongs to the cache kmalloc-64 of size 64 [ 26.801569] The buggy address is located 0 bytes to the right of [ 26.801569] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.802588] [ 26.802812] The buggy address belongs to the physical page: [ 26.803294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.804371] flags: 0x200000000000000(node=0|zone=2) [ 26.805168] page_type: f5(slab) [ 26.805636] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.806473] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.807013] page dumped because: kasan: bad access detected [ 26.807463] [ 26.808194] Memory state around the buggy address: [ 26.808671] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.809377] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.810232] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.811057] ^ [ 26.811461] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.812458] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.813125] ================================================================== [ 24.652897] ================================================================== [ 24.653647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 24.654321] Read of size 4 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 24.654749] [ 24.655000] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 24.655900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.656318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 24.657010] Call Trace: [ 24.657248] <TASK> [ 24.657676] dump_stack_lvl+0x73/0xb0 [ 24.658068] print_report+0xd1/0x640 [ 24.658502] ? __virt_addr_valid+0x1db/0x2d0 [ 24.658886] ? kasan_complete_mode_report_info+0x2a/0x200 [ 24.659378] kasan_report+0x102/0x140 [ 24.659738] ? kasan_atomics_helper+0x4b56/0x5450 [ 24.660062] ? kasan_atomics_helper+0x4b56/0x5450 [ 24.660619] __asan_report_load4_noabort+0x18/0x20 [ 24.661123] kasan_atomics_helper+0x4b56/0x5450 [ 24.661671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 24.662192] ? __kmalloc_cache_noprof+0x184/0x410 [ 24.662640] ? trace_hardirqs_on+0x37/0xe0 [ 24.662934] ? kasan_atomics+0x153/0x310 [ 24.663375] kasan_atomics+0x1dd/0x310 [ 24.663881] ? __pfx_kasan_atomics+0x10/0x10 [ 24.664349] ? __pfx_kasan_atomics+0x10/0x10 [ 24.664791] kunit_try_run_case+0x1b3/0x490 [ 24.665182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.665786] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 24.666201] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 24.666625] ? __kthread_parkme+0x82/0x160 [ 24.667085] ? preempt_count_sub+0x50/0x80 [ 24.667462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 24.668016] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 24.668396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.669005] kthread+0x257/0x310 [ 24.669396] ? __pfx_kthread+0x10/0x10 [ 24.669804] ret_from_fork+0x41/0x80 [ 24.670177] ? __pfx_kthread+0x10/0x10 [ 24.670467] ret_from_fork_asm+0x1a/0x30 [ 24.670852] </TASK> [ 24.671048] [ 24.671264] Allocated by task 272: [ 24.671692] kasan_save_stack+0x3d/0x60 [ 24.672122] kasan_save_track+0x18/0x40 [ 24.672555] kasan_save_alloc_info+0x3b/0x50 [ 24.673055] __kasan_kmalloc+0xb7/0xc0 [ 24.673464] __kmalloc_cache_noprof+0x184/0x410 [ 24.673977] kasan_atomics+0x96/0x310 [ 24.674386] kunit_try_run_case+0x1b3/0x490 [ 24.674891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 24.675372] kthread+0x257/0x310 [ 24.675697] ret_from_fork+0x41/0x80 [ 24.675968] ret_from_fork_asm+0x1a/0x30 [ 24.676242] [ 24.676401] The buggy address belongs to the object at ffff8881028c7700 [ 24.676401] which belongs to the cache kmalloc-64 of size 64 [ 24.677472] The buggy address is located 0 bytes to the right of [ 24.677472] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 24.678630] [ 24.678858] The buggy address belongs to the physical page: [ 24.679366] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 24.680034] flags: 0x200000000000000(node=0|zone=2) [ 24.680525] page_type: f5(slab) [ 24.680827] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 24.681403] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.681857] page dumped because: kasan: bad access detected [ 24.682171] [ 24.682386] Memory state around the buggy address: [ 24.682893] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.683522] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.684183] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.684859] ^ [ 24.685358] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.685973] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.686383] ================================================================== [ 26.592863] ================================================================== [ 26.593657] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 26.594358] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 26.595207] [ 26.595540] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 26.596180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.596442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.597228] Call Trace: [ 26.597642] <TASK> [ 26.597990] dump_stack_lvl+0x73/0xb0 [ 26.598444] print_report+0xd1/0x640 [ 26.598977] ? __virt_addr_valid+0x1db/0x2d0 [ 26.599476] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.600007] kasan_report+0x102/0x140 [ 26.600383] ? kasan_atomics_helper+0x4f32/0x5450 [ 26.600978] ? kasan_atomics_helper+0x4f32/0x5450 [ 26.601524] __asan_report_load8_noabort+0x18/0x20 [ 26.602108] kasan_atomics_helper+0x4f32/0x5450 [ 26.602671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.603179] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.603822] ? trace_hardirqs_on+0x37/0xe0 [ 26.604165] ? kasan_atomics+0x153/0x310 [ 26.604540] kasan_atomics+0x1dd/0x310 [ 26.605097] ? __pfx_kasan_atomics+0x10/0x10 [ 26.605663] ? __pfx_kasan_atomics+0x10/0x10 [ 26.606161] kunit_try_run_case+0x1b3/0x490 [ 26.606472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.607154] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.607779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.608379] ? __kthread_parkme+0x82/0x160 [ 26.608910] ? preempt_count_sub+0x50/0x80 [ 26.609441] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.609995] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.610384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.610806] kthread+0x257/0x310 [ 26.611272] ? __pfx_kthread+0x10/0x10 [ 26.611908] ret_from_fork+0x41/0x80 [ 26.612334] ? __pfx_kthread+0x10/0x10 [ 26.612904] ret_from_fork_asm+0x1a/0x30 [ 26.613437] </TASK> [ 26.613856] [ 26.614146] Allocated by task 272: [ 26.614554] kasan_save_stack+0x3d/0x60 [ 26.615114] kasan_save_track+0x18/0x40 [ 26.615699] kasan_save_alloc_info+0x3b/0x50 [ 26.616092] __kasan_kmalloc+0xb7/0xc0 [ 26.616431] __kmalloc_cache_noprof+0x184/0x410 [ 26.617044] kasan_atomics+0x96/0x310 [ 26.617475] kunit_try_run_case+0x1b3/0x490 [ 26.618002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.618564] kthread+0x257/0x310 [ 26.619068] ret_from_fork+0x41/0x80 [ 26.619459] ret_from_fork_asm+0x1a/0x30 [ 26.619950] [ 26.620204] The buggy address belongs to the object at ffff8881028c7700 [ 26.620204] which belongs to the cache kmalloc-64 of size 64 [ 26.621156] The buggy address is located 0 bytes to the right of [ 26.621156] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 26.622197] [ 26.622402] The buggy address belongs to the physical page: [ 26.623043] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 26.623667] flags: 0x200000000000000(node=0|zone=2) [ 26.624218] page_type: f5(slab) [ 26.624724] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.625403] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.625998] page dumped because: kasan: bad access detected [ 26.626673] [ 26.626946] Memory state around the buggy address: [ 26.627242] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.627825] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.628502] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.629158] ^ [ 26.629702] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.630426] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.631068] ================================================================== [ 25.908863] ================================================================== [ 25.910365] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 25.910934] Read of size 8 at addr ffff8881028c7730 by task kunit_try_catch/272 [ 25.911327] [ 25.911542] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241126 #1 [ 25.912156] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.912647] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.913423] Call Trace: [ 25.913822] <TASK> [ 25.914164] dump_stack_lvl+0x73/0xb0 [ 25.914700] print_report+0xd1/0x640 [ 25.915141] ? __virt_addr_valid+0x1db/0x2d0 [ 25.915714] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.916233] kasan_report+0x102/0x140 [ 25.916882] ? kasan_atomics_helper+0x13b6/0x5450 [ 25.917225] ? kasan_atomics_helper+0x13b6/0x5450 [ 25.918702] kasan_check_range+0x10c/0x1c0 [ 25.919249] __kasan_check_read+0x15/0x20 [ 25.919740] kasan_atomics_helper+0x13b6/0x5450 [ 25.920243] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.921369] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.921988] ? trace_hardirqs_on+0x37/0xe0 [ 25.922446] ? kasan_atomics+0x153/0x310 [ 25.922995] kasan_atomics+0x1dd/0x310 [ 25.923439] ? __pfx_kasan_atomics+0x10/0x10 [ 25.925941] ? __pfx_kasan_atomics+0x10/0x10 [ 25.926324] kunit_try_run_case+0x1b3/0x490 [ 25.926834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.927278] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.928165] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.928912] ? __kthread_parkme+0x82/0x160 [ 25.929443] ? preempt_count_sub+0x50/0x80 [ 25.930066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.930663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.931406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.932141] kthread+0x257/0x310 [ 25.932992] ? __pfx_kthread+0x10/0x10 [ 25.933392] ret_from_fork+0x41/0x80 [ 25.933846] ? __pfx_kthread+0x10/0x10 [ 25.934723] ret_from_fork_asm+0x1a/0x30 [ 25.935396] </TASK> [ 25.935870] [ 25.936012] Allocated by task 272: [ 25.936575] kasan_save_stack+0x3d/0x60 [ 25.937143] kasan_save_track+0x18/0x40 [ 25.937591] kasan_save_alloc_info+0x3b/0x50 [ 25.938510] __kasan_kmalloc+0xb7/0xc0 [ 25.939114] __kmalloc_cache_noprof+0x184/0x410 [ 25.939409] kasan_atomics+0x96/0x310 [ 25.939820] kunit_try_run_case+0x1b3/0x490 [ 25.940690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.941031] kthread+0x257/0x310 [ 25.941522] ret_from_fork+0x41/0x80 [ 25.942055] ret_from_fork_asm+0x1a/0x30 [ 25.942610] [ 25.942881] The buggy address belongs to the object at ffff8881028c7700 [ 25.942881] which belongs to the cache kmalloc-64 of size 64 [ 25.944228] The buggy address is located 0 bytes to the right of [ 25.944228] allocated 48-byte region [ffff8881028c7700, ffff8881028c7730) [ 25.945640] [ 25.945930] The buggy address belongs to the physical page: [ 25.946654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1028c7 [ 25.947520] flags: 0x200000000000000(node=0|zone=2) [ 25.948343] page_type: f5(slab) [ 25.948713] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.949657] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.950269] page dumped because: kasan: bad access detected [ 25.950886] [ 25.951053] Memory state around the buggy address: [ 25.951728] ffff8881028c7600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.952653] ffff8881028c7680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.953553] >ffff8881028c7700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.954203] ^ [ 25.954964] ffff8881028c7780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.955450] ffff8881028c7800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.956388] ==================================================================