Date
Nov. 27, 2024, 3:37 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 53.374731] ================================================================== [ 53.375355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 53.376376] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.377395] [ 53.377690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.379194] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.379850] Hardware name: linux,dummy-virt (DT) [ 53.380494] Call trace: [ 53.380881] show_stack+0x20/0x38 (C) [ 53.381504] dump_stack_lvl+0x8c/0xd0 [ 53.382056] print_report+0x118/0x5e0 [ 53.382655] kasan_report+0xc8/0x118 [ 53.383195] kasan_check_range+0x100/0x1a8 [ 53.383721] __kasan_check_read+0x20/0x30 [ 53.384532] kasan_atomics_helper+0xdd4/0x4858 [ 53.385148] kasan_atomics+0x198/0x2e8 [ 53.385749] kunit_try_run_case+0x14c/0x3d0 [ 53.386257] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.387068] kthread+0x24c/0x2d0 [ 53.387696] ret_from_fork+0x10/0x20 [ 53.388355] [ 53.388749] Allocated by task 254: [ 53.389228] kasan_save_stack+0x3c/0x68 [ 53.389885] kasan_save_track+0x20/0x40 [ 53.390426] kasan_save_alloc_info+0x40/0x58 [ 53.391060] __kasan_kmalloc+0xd4/0xd8 [ 53.391582] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.392263] kasan_atomics+0xb8/0x2e8 [ 53.392825] kunit_try_run_case+0x14c/0x3d0 [ 53.393412] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.394206] kthread+0x24c/0x2d0 [ 53.394740] ret_from_fork+0x10/0x20 [ 53.395276] [ 53.395636] The buggy address belongs to the object at fff00000c616b300 [ 53.395636] which belongs to the cache kmalloc-64 of size 64 [ 53.396926] The buggy address is located 0 bytes to the right of [ 53.396926] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.398335] [ 53.398669] The buggy address belongs to the physical page: [ 53.399350] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.400216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.401160] page_type: f5(slab) [ 53.401657] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.402590] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.403487] page dumped because: kasan: bad access detected [ 53.404252] [ 53.404621] Memory state around the buggy address: [ 53.405188] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.406108] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.406935] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.407870] ^ [ 53.408501] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.409384] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.410249] ================================================================== [ 53.992960] ================================================================== [ 53.993785] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 53.994812] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.995803] [ 53.996162] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.997535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.998185] Hardware name: linux,dummy-virt (DT) [ 53.998994] Call trace: [ 53.999467] show_stack+0x20/0x38 (C) [ 54.000195] dump_stack_lvl+0x8c/0xd0 [ 54.000943] print_report+0x118/0x5e0 [ 54.001558] kasan_report+0xc8/0x118 [ 54.002155] __asan_report_load8_noabort+0x20/0x30 [ 54.002891] kasan_atomics_helper+0x3f04/0x4858 [ 54.003594] kasan_atomics+0x198/0x2e8 [ 54.004091] kunit_try_run_case+0x14c/0x3d0 [ 54.004764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.005495] kthread+0x24c/0x2d0 [ 54.006116] ret_from_fork+0x10/0x20 [ 54.006784] [ 54.007170] Allocated by task 254: [ 54.007756] kasan_save_stack+0x3c/0x68 [ 54.008508] kasan_save_track+0x20/0x40 [ 54.009203] kasan_save_alloc_info+0x40/0x58 [ 54.009926] __kasan_kmalloc+0xd4/0xd8 [ 54.010555] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.011235] kasan_atomics+0xb8/0x2e8 [ 54.011948] kunit_try_run_case+0x14c/0x3d0 [ 54.012678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.013482] kthread+0x24c/0x2d0 [ 54.014126] ret_from_fork+0x10/0x20 [ 54.014704] [ 54.015117] The buggy address belongs to the object at fff00000c616b300 [ 54.015117] which belongs to the cache kmalloc-64 of size 64 [ 54.016721] The buggy address is located 0 bytes to the right of [ 54.016721] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.018117] [ 54.018606] The buggy address belongs to the physical page: [ 54.019423] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.020423] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.021239] page_type: f5(slab) [ 54.021792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.022826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.023833] page dumped because: kasan: bad access detected [ 54.024685] [ 54.025032] Memory state around the buggy address: [ 54.025746] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.026840] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.027744] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.028635] ^ [ 54.029371] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.030345] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.031222] ================================================================== [ 53.490893] ================================================================== [ 53.491969] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 53.492650] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.493708] [ 53.494000] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.495164] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.495924] Hardware name: linux,dummy-virt (DT) [ 53.496564] Call trace: [ 53.497014] show_stack+0x20/0x38 (C) [ 53.497656] dump_stack_lvl+0x8c/0xd0 [ 53.498206] print_report+0x118/0x5e0 [ 53.498750] kasan_report+0xc8/0x118 [ 53.499405] __asan_report_store8_noabort+0x20/0x30 [ 53.500068] kasan_atomics_helper+0x3e5c/0x4858 [ 53.500691] kasan_atomics+0x198/0x2e8 [ 53.501216] kunit_try_run_case+0x14c/0x3d0 [ 53.501886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.502588] kthread+0x24c/0x2d0 [ 53.503249] ret_from_fork+0x10/0x20 [ 53.503806] [ 53.504236] Allocated by task 254: [ 53.504735] kasan_save_stack+0x3c/0x68 [ 53.505217] kasan_save_track+0x20/0x40 [ 53.505882] kasan_save_alloc_info+0x40/0x58 [ 53.506520] __kasan_kmalloc+0xd4/0xd8 [ 53.507148] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.507835] kasan_atomics+0xb8/0x2e8 [ 53.508418] kunit_try_run_case+0x14c/0x3d0 [ 53.509033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.509702] kthread+0x24c/0x2d0 [ 53.510376] ret_from_fork+0x10/0x20 [ 53.510970] [ 53.511286] The buggy address belongs to the object at fff00000c616b300 [ 53.511286] which belongs to the cache kmalloc-64 of size 64 [ 53.512463] The buggy address is located 0 bytes to the right of [ 53.512463] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.513930] [ 53.514226] The buggy address belongs to the physical page: [ 53.515046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.516011] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.516783] page_type: f5(slab) [ 53.517387] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.518326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.519242] page dumped because: kasan: bad access detected [ 53.519874] [ 53.520197] Memory state around the buggy address: [ 53.520840] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.521674] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.522548] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.523401] ^ [ 53.523956] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.524793] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.525699] ================================================================== [ 52.211062] ================================================================== [ 52.212042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 52.213000] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.214264] [ 52.214754] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.216372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.216875] Hardware name: linux,dummy-virt (DT) [ 52.217702] Call trace: [ 52.218095] show_stack+0x20/0x38 (C) [ 52.218705] dump_stack_lvl+0x8c/0xd0 [ 52.219351] print_report+0x118/0x5e0 [ 52.219987] kasan_report+0xc8/0x118 [ 52.220635] __asan_report_load4_noabort+0x20/0x30 [ 52.221313] kasan_atomics_helper+0x40fc/0x4858 [ 52.221941] kasan_atomics+0x198/0x2e8 [ 52.222621] kunit_try_run_case+0x14c/0x3d0 [ 52.223225] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.223991] kthread+0x24c/0x2d0 [ 52.224588] ret_from_fork+0x10/0x20 [ 52.225172] [ 52.225481] Allocated by task 254: [ 52.226048] kasan_save_stack+0x3c/0x68 [ 52.226757] kasan_save_track+0x20/0x40 [ 52.227345] kasan_save_alloc_info+0x40/0x58 [ 52.227890] __kasan_kmalloc+0xd4/0xd8 [ 52.228511] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.229329] kasan_atomics+0xb8/0x2e8 [ 52.229800] kunit_try_run_case+0x14c/0x3d0 [ 52.230508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.231185] kthread+0x24c/0x2d0 [ 52.231854] ret_from_fork+0x10/0x20 [ 52.232761] [ 52.233771] The buggy address belongs to the object at fff00000c616b300 [ 52.233771] which belongs to the cache kmalloc-64 of size 64 [ 52.235235] The buggy address is located 0 bytes to the right of [ 52.235235] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.238613] [ 52.238871] The buggy address belongs to the physical page: [ 52.240258] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.242022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.243873] page_type: f5(slab) [ 52.245078] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.245694] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.246371] page dumped because: kasan: bad access detected [ 52.247550] [ 52.247852] Memory state around the buggy address: [ 52.248499] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.249384] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.250219] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.251081] ^ [ 52.251889] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.252695] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.253659] ================================================================== [ 53.565005] ================================================================== [ 53.565856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 53.566734] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.567497] [ 53.567978] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.569096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.569666] Hardware name: linux,dummy-virt (DT) [ 53.570352] Call trace: [ 53.570870] show_stack+0x20/0x38 (C) [ 53.571473] dump_stack_lvl+0x8c/0xd0 [ 53.572038] print_report+0x118/0x5e0 [ 53.572615] kasan_report+0xc8/0x118 [ 53.573201] kasan_check_range+0x100/0x1a8 [ 53.573823] __kasan_check_write+0x20/0x30 [ 53.574477] kasan_atomics_helper+0xf20/0x4858 [ 53.575061] kasan_atomics+0x198/0x2e8 [ 53.575767] kunit_try_run_case+0x14c/0x3d0 [ 53.576413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.577220] kthread+0x24c/0x2d0 [ 53.577865] ret_from_fork+0x10/0x20 [ 53.578420] [ 53.578829] Allocated by task 254: [ 53.579330] kasan_save_stack+0x3c/0x68 [ 53.579929] kasan_save_track+0x20/0x40 [ 53.580512] kasan_save_alloc_info+0x40/0x58 [ 53.581143] __kasan_kmalloc+0xd4/0xd8 [ 53.581704] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.582357] kasan_atomics+0xb8/0x2e8 [ 53.582832] kunit_try_run_case+0x14c/0x3d0 [ 53.583529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.584230] kthread+0x24c/0x2d0 [ 53.584797] ret_from_fork+0x10/0x20 [ 53.585352] [ 53.585651] The buggy address belongs to the object at fff00000c616b300 [ 53.585651] which belongs to the cache kmalloc-64 of size 64 [ 53.586983] The buggy address is located 0 bytes to the right of [ 53.586983] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.588421] [ 53.588745] The buggy address belongs to the physical page: [ 53.589368] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.590138] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.591099] page_type: f5(slab) [ 53.591632] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.592700] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.593596] page dumped because: kasan: bad access detected [ 53.594175] [ 53.594561] Memory state around the buggy address: [ 53.595164] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.596139] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.597065] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.597915] ^ [ 53.598347] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.598904] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.600852] ================================================================== [ 54.034021] ================================================================== [ 54.034816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 54.035762] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.036572] [ 54.037015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.038324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.038982] Hardware name: linux,dummy-virt (DT) [ 54.039656] Call trace: [ 54.040150] show_stack+0x20/0x38 (C) [ 54.040818] dump_stack_lvl+0x8c/0xd0 [ 54.041488] print_report+0x118/0x5e0 [ 54.042102] kasan_report+0xc8/0x118 [ 54.042716] kasan_check_range+0x100/0x1a8 [ 54.043424] __kasan_check_write+0x20/0x30 [ 54.044100] kasan_atomics_helper+0x1414/0x4858 [ 54.044763] kasan_atomics+0x198/0x2e8 [ 54.045405] kunit_try_run_case+0x14c/0x3d0 [ 54.046094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.046907] kthread+0x24c/0x2d0 [ 54.047550] ret_from_fork+0x10/0x20 [ 54.048016] [ 54.048557] Allocated by task 254: [ 54.049155] kasan_save_stack+0x3c/0x68 [ 54.049777] kasan_save_track+0x20/0x40 [ 54.050489] kasan_save_alloc_info+0x40/0x58 [ 54.051195] __kasan_kmalloc+0xd4/0xd8 [ 54.051872] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.052537] kasan_atomics+0xb8/0x2e8 [ 54.053096] kunit_try_run_case+0x14c/0x3d0 [ 54.053709] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.054483] kthread+0x24c/0x2d0 [ 54.055087] ret_from_fork+0x10/0x20 [ 54.055745] [ 54.056112] The buggy address belongs to the object at fff00000c616b300 [ 54.056112] which belongs to the cache kmalloc-64 of size 64 [ 54.057628] The buggy address is located 0 bytes to the right of [ 54.057628] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.059179] [ 54.059602] The buggy address belongs to the physical page: [ 54.060396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.061466] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.062394] page_type: f5(slab) [ 54.062961] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.063975] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.064925] page dumped because: kasan: bad access detected [ 54.065664] [ 54.065997] Memory state around the buggy address: [ 54.066742] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.067816] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.068698] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.069562] ^ [ 54.070240] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.071254] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.072141] ================================================================== [ 53.527355] ================================================================== [ 53.528089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 53.529241] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.530128] [ 53.530522] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.531667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.532247] Hardware name: linux,dummy-virt (DT) [ 53.532951] Call trace: [ 53.533348] show_stack+0x20/0x38 (C) [ 53.533962] dump_stack_lvl+0x8c/0xd0 [ 53.534490] print_report+0x118/0x5e0 [ 53.535118] kasan_report+0xc8/0x118 [ 53.535695] kasan_check_range+0x100/0x1a8 [ 53.536325] __kasan_check_write+0x20/0x30 [ 53.536887] kasan_atomics_helper+0xeb8/0x4858 [ 53.537594] kasan_atomics+0x198/0x2e8 [ 53.538090] kunit_try_run_case+0x14c/0x3d0 [ 53.538853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.539623] kthread+0x24c/0x2d0 [ 53.540193] ret_from_fork+0x10/0x20 [ 53.540734] [ 53.541078] Allocated by task 254: [ 53.541583] kasan_save_stack+0x3c/0x68 [ 53.542105] kasan_save_track+0x20/0x40 [ 53.542727] kasan_save_alloc_info+0x40/0x58 [ 53.543441] __kasan_kmalloc+0xd4/0xd8 [ 53.543958] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.544610] kasan_atomics+0xb8/0x2e8 [ 53.545154] kunit_try_run_case+0x14c/0x3d0 [ 53.545764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.546550] kthread+0x24c/0x2d0 [ 53.547005] ret_from_fork+0x10/0x20 [ 53.547555] [ 53.547909] The buggy address belongs to the object at fff00000c616b300 [ 53.547909] which belongs to the cache kmalloc-64 of size 64 [ 53.549206] The buggy address is located 0 bytes to the right of [ 53.549206] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.550612] [ 53.550891] The buggy address belongs to the physical page: [ 53.551610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.552564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.553322] page_type: f5(slab) [ 53.553869] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.554775] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.555832] page dumped because: kasan: bad access detected [ 53.556474] [ 53.556794] Memory state around the buggy address: [ 53.557399] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.558215] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.559067] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.559973] ^ [ 53.560615] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.561519] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.562367] ================================================================== [ 52.121977] ================================================================== [ 52.123216] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 52.124566] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.126498] [ 52.126783] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.128063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.128647] Hardware name: linux,dummy-virt (DT) [ 52.129412] Call trace: [ 52.129875] show_stack+0x20/0x38 (C) [ 52.130608] dump_stack_lvl+0x8c/0xd0 [ 52.131339] print_report+0x118/0x5e0 [ 52.132039] kasan_report+0xc8/0x118 [ 52.132733] kasan_check_range+0x100/0x1a8 [ 52.133459] __kasan_check_write+0x20/0x30 [ 52.134381] kasan_atomics_helper+0x24c/0x4858 [ 52.135117] kasan_atomics+0x198/0x2e8 [ 52.135648] kunit_try_run_case+0x14c/0x3d0 [ 52.136342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.137096] kthread+0x24c/0x2d0 [ 52.137952] ret_from_fork+0x10/0x20 [ 52.138499] [ 52.138850] Allocated by task 254: [ 52.139317] kasan_save_stack+0x3c/0x68 [ 52.139926] kasan_save_track+0x20/0x40 [ 52.140464] kasan_save_alloc_info+0x40/0x58 [ 52.141390] __kasan_kmalloc+0xd4/0xd8 [ 52.142100] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.142736] kasan_atomics+0xb8/0x2e8 [ 52.143288] kunit_try_run_case+0x14c/0x3d0 [ 52.143808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.144632] kthread+0x24c/0x2d0 [ 52.145072] ret_from_fork+0x10/0x20 [ 52.145894] [ 52.146249] The buggy address belongs to the object at fff00000c616b300 [ 52.146249] which belongs to the cache kmalloc-64 of size 64 [ 52.147602] The buggy address is located 0 bytes to the right of [ 52.147602] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.149070] [ 52.149533] The buggy address belongs to the physical page: [ 52.150217] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.151452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.152410] page_type: f5(slab) [ 52.153040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.154161] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.155082] page dumped because: kasan: bad access detected [ 52.155994] [ 52.156354] Memory state around the buggy address: [ 52.157033] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.158075] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.158926] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.159777] ^ [ 52.160540] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.161725] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.162676] ================================================================== [ 53.030985] ================================================================== [ 53.031769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 53.032556] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.033227] [ 53.033690] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.034951] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.035518] Hardware name: linux,dummy-virt (DT) [ 53.036095] Call trace: [ 53.036501] show_stack+0x20/0x38 (C) [ 53.036930] dump_stack_lvl+0x8c/0xd0 [ 53.037497] print_report+0x118/0x5e0 [ 53.037922] kasan_report+0xc8/0x118 [ 53.038356] __asan_report_load4_noabort+0x20/0x30 [ 53.038908] kasan_atomics_helper+0x3dcc/0x4858 [ 53.039444] kasan_atomics+0x198/0x2e8 [ 53.040136] kunit_try_run_case+0x14c/0x3d0 [ 53.040978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.041568] kthread+0x24c/0x2d0 [ 53.042008] ret_from_fork+0x10/0x20 [ 53.042492] [ 53.042751] Allocated by task 254: [ 53.043140] kasan_save_stack+0x3c/0x68 [ 53.043616] kasan_save_track+0x20/0x40 [ 53.044385] kasan_save_alloc_info+0x40/0x58 [ 53.045068] __kasan_kmalloc+0xd4/0xd8 [ 53.045848] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.046690] kasan_atomics+0xb8/0x2e8 [ 53.047279] kunit_try_run_case+0x14c/0x3d0 [ 53.047778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.048541] kthread+0x24c/0x2d0 [ 53.049182] ret_from_fork+0x10/0x20 [ 53.049836] [ 53.050223] The buggy address belongs to the object at fff00000c616b300 [ 53.050223] which belongs to the cache kmalloc-64 of size 64 [ 53.051341] The buggy address is located 0 bytes to the right of [ 53.051341] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.053034] [ 53.053508] The buggy address belongs to the physical page: [ 53.054175] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.055147] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.056085] page_type: f5(slab) [ 53.056687] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.057677] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.058388] page dumped because: kasan: bad access detected [ 53.059274] [ 53.059626] Memory state around the buggy address: [ 53.060455] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.061411] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.062470] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.063248] ^ [ 53.063909] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.064737] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.065681] ================================================================== [ 52.333628] ================================================================== [ 52.334450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 52.335540] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.336482] [ 52.336776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.337850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.338521] Hardware name: linux,dummy-virt (DT) [ 52.339080] Call trace: [ 52.339509] show_stack+0x20/0x38 (C) [ 52.340133] dump_stack_lvl+0x8c/0xd0 [ 52.340668] print_report+0x118/0x5e0 [ 52.341352] kasan_report+0xc8/0x118 [ 52.341897] kasan_check_range+0x100/0x1a8 [ 52.342525] __kasan_check_write+0x20/0x30 [ 52.343130] kasan_atomics_helper+0x3ac/0x4858 [ 52.343887] kasan_atomics+0x198/0x2e8 [ 52.344634] kunit_try_run_case+0x14c/0x3d0 [ 52.345420] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.346105] kthread+0x24c/0x2d0 [ 52.346795] ret_from_fork+0x10/0x20 [ 52.347381] [ 52.347721] Allocated by task 254: [ 52.348234] kasan_save_stack+0x3c/0x68 [ 52.348878] kasan_save_track+0x20/0x40 [ 52.349356] kasan_save_alloc_info+0x40/0x58 [ 52.350144] __kasan_kmalloc+0xd4/0xd8 [ 52.350749] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.351396] kasan_atomics+0xb8/0x2e8 [ 52.351952] kunit_try_run_case+0x14c/0x3d0 [ 52.352495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.353280] kthread+0x24c/0x2d0 [ 52.353848] ret_from_fork+0x10/0x20 [ 52.354357] [ 52.354756] The buggy address belongs to the object at fff00000c616b300 [ 52.354756] which belongs to the cache kmalloc-64 of size 64 [ 52.356087] The buggy address is located 0 bytes to the right of [ 52.356087] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.357497] [ 52.357786] The buggy address belongs to the physical page: [ 52.358426] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.359347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.360251] page_type: f5(slab) [ 52.360874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.361781] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.362656] page dumped because: kasan: bad access detected [ 52.363368] [ 52.363665] Memory state around the buggy address: [ 52.364370] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.365249] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.366123] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.366991] ^ [ 52.367597] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.368455] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.369269] ================================================================== [ 51.994490] ================================================================== [ 51.995965] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 51.996977] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 51.998802] [ 51.999223] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.000431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.001012] Hardware name: linux,dummy-virt (DT) [ 52.001759] Call trace: [ 52.002209] show_stack+0x20/0x38 (C) [ 52.002843] dump_stack_lvl+0x8c/0xd0 [ 52.003733] print_report+0x118/0x5e0 [ 52.004501] kasan_report+0xc8/0x118 [ 52.005282] __asan_report_load4_noabort+0x20/0x30 [ 52.006209] kasan_atomics_helper+0x40a8/0x4858 [ 52.006953] kasan_atomics+0x198/0x2e8 [ 52.007562] kunit_try_run_case+0x14c/0x3d0 [ 52.008184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.008920] kthread+0x24c/0x2d0 [ 52.009717] ret_from_fork+0x10/0x20 [ 52.010415] [ 52.010706] Allocated by task 254: [ 52.011527] kasan_save_stack+0x3c/0x68 [ 52.012142] kasan_save_track+0x20/0x40 [ 52.012971] kasan_save_alloc_info+0x40/0x58 [ 52.013800] __kasan_kmalloc+0xd4/0xd8 [ 52.014447] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.015255] kasan_atomics+0xb8/0x2e8 [ 52.015816] kunit_try_run_case+0x14c/0x3d0 [ 52.016456] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.017088] kthread+0x24c/0x2d0 [ 52.017747] ret_from_fork+0x10/0x20 [ 52.018394] [ 52.018767] The buggy address belongs to the object at fff00000c616b300 [ 52.018767] which belongs to the cache kmalloc-64 of size 64 [ 52.020535] The buggy address is located 0 bytes to the right of [ 52.020535] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.022447] [ 52.022973] The buggy address belongs to the physical page: [ 52.023560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.024480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.025337] page_type: f5(slab) [ 52.026010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.026976] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.027802] page dumped because: kasan: bad access detected [ 52.028536] [ 52.028879] Memory state around the buggy address: [ 52.029540] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.030264] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.031326] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.032121] ^ [ 52.032852] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.033832] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.034883] ================================================================== [ 53.105773] ================================================================== [ 53.106826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 53.107768] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.108556] [ 53.108909] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.109992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.110763] Hardware name: linux,dummy-virt (DT) [ 53.111430] Call trace: [ 53.111890] show_stack+0x20/0x38 (C) [ 53.112564] dump_stack_lvl+0x8c/0xd0 [ 53.113247] print_report+0x118/0x5e0 [ 53.113812] kasan_report+0xc8/0x118 [ 53.114479] __asan_report_load4_noabort+0x20/0x30 [ 53.115102] kasan_atomics_helper+0x3dbc/0x4858 [ 53.115823] kasan_atomics+0x198/0x2e8 [ 53.116375] kunit_try_run_case+0x14c/0x3d0 [ 53.117008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.117735] kthread+0x24c/0x2d0 [ 53.118377] ret_from_fork+0x10/0x20 [ 53.118956] [ 53.119268] Allocated by task 254: [ 53.119843] kasan_save_stack+0x3c/0x68 [ 53.120518] kasan_save_track+0x20/0x40 [ 53.121156] kasan_save_alloc_info+0x40/0x58 [ 53.121764] __kasan_kmalloc+0xd4/0xd8 [ 53.122335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.122895] kasan_atomics+0xb8/0x2e8 [ 53.123543] kunit_try_run_case+0x14c/0x3d0 [ 53.124150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.124889] kthread+0x24c/0x2d0 [ 53.125499] ret_from_fork+0x10/0x20 [ 53.126051] [ 53.126399] The buggy address belongs to the object at fff00000c616b300 [ 53.126399] which belongs to the cache kmalloc-64 of size 64 [ 53.127851] The buggy address is located 0 bytes to the right of [ 53.127851] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.129149] [ 53.129500] The buggy address belongs to the physical page: [ 53.130152] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.131040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.131886] page_type: f5(slab) [ 53.132443] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.133380] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.134289] page dumped because: kasan: bad access detected [ 53.135015] [ 53.135388] Memory state around the buggy address: [ 53.135999] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.136841] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.137708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.138658] ^ [ 53.139286] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.140130] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.141099] ================================================================== [ 52.682032] ================================================================== [ 52.683620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 52.684706] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.685872] [ 52.686258] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.687681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.688236] Hardware name: linux,dummy-virt (DT) [ 52.688787] Call trace: [ 52.689240] show_stack+0x20/0x38 (C) [ 52.689803] dump_stack_lvl+0x8c/0xd0 [ 52.690496] print_report+0x118/0x5e0 [ 52.691044] kasan_report+0xc8/0x118 [ 52.691705] kasan_check_range+0x100/0x1a8 [ 52.692491] __kasan_check_write+0x20/0x30 [ 52.693195] kasan_atomics_helper+0x760/0x4858 [ 52.693792] kasan_atomics+0x198/0x2e8 [ 52.694508] kunit_try_run_case+0x14c/0x3d0 [ 52.695137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.695967] kthread+0x24c/0x2d0 [ 52.696546] ret_from_fork+0x10/0x20 [ 52.697142] [ 52.697527] Allocated by task 254: [ 52.698024] kasan_save_stack+0x3c/0x68 [ 52.698763] kasan_save_track+0x20/0x40 [ 52.699382] kasan_save_alloc_info+0x40/0x58 [ 52.699994] __kasan_kmalloc+0xd4/0xd8 [ 52.700495] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.701208] kasan_atomics+0xb8/0x2e8 [ 52.701710] kunit_try_run_case+0x14c/0x3d0 [ 52.702339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.702975] kthread+0x24c/0x2d0 [ 52.703606] ret_from_fork+0x10/0x20 [ 52.704153] [ 52.704461] The buggy address belongs to the object at fff00000c616b300 [ 52.704461] which belongs to the cache kmalloc-64 of size 64 [ 52.705854] The buggy address is located 0 bytes to the right of [ 52.705854] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.707317] [ 52.707732] The buggy address belongs to the physical page: [ 52.708363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.709396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.710162] page_type: f5(slab) [ 52.710628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.711592] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.712554] page dumped because: kasan: bad access detected [ 52.713335] [ 52.713682] Memory state around the buggy address: [ 52.714315] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.715147] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.716054] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.716983] ^ [ 52.717737] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.718685] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.719561] ================================================================== [ 53.257578] ================================================================== [ 53.258355] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 53.259409] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.260430] [ 53.260802] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.262067] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.262584] Hardware name: linux,dummy-virt (DT) [ 53.263495] Call trace: [ 53.263930] show_stack+0x20/0x38 (C) [ 53.264683] dump_stack_lvl+0x8c/0xd0 [ 53.265347] print_report+0x118/0x5e0 [ 53.266055] kasan_report+0xc8/0x118 [ 53.266744] __asan_report_load4_noabort+0x20/0x30 [ 53.267476] kasan_atomics_helper+0x3dd8/0x4858 [ 53.268157] kasan_atomics+0x198/0x2e8 [ 53.268805] kunit_try_run_case+0x14c/0x3d0 [ 53.269618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.270310] kthread+0x24c/0x2d0 [ 53.270899] ret_from_fork+0x10/0x20 [ 53.271655] [ 53.272053] Allocated by task 254: [ 53.272700] kasan_save_stack+0x3c/0x68 [ 53.273349] kasan_save_track+0x20/0x40 [ 53.274080] kasan_save_alloc_info+0x40/0x58 [ 53.274804] __kasan_kmalloc+0xd4/0xd8 [ 53.275558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.276238] kasan_atomics+0xb8/0x2e8 [ 53.276911] kunit_try_run_case+0x14c/0x3d0 [ 53.277599] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.278383] kthread+0x24c/0x2d0 [ 53.278964] ret_from_fork+0x10/0x20 [ 53.279575] [ 53.279921] The buggy address belongs to the object at fff00000c616b300 [ 53.279921] which belongs to the cache kmalloc-64 of size 64 [ 53.281376] The buggy address is located 0 bytes to the right of [ 53.281376] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.282870] [ 53.283230] The buggy address belongs to the physical page: [ 53.283864] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.284784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.285658] page_type: f5(slab) [ 53.286142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.287107] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.288205] page dumped because: kasan: bad access detected [ 53.289043] [ 53.289485] Memory state around the buggy address: [ 53.290245] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.291240] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.292240] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.293149] ^ [ 53.293905] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.295015] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.296003] ================================================================== [ 53.142637] ================================================================== [ 53.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 53.144343] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.145226] [ 53.145661] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.146844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.147456] Hardware name: linux,dummy-virt (DT) [ 53.147984] Call trace: [ 53.148487] show_stack+0x20/0x38 (C) [ 53.149140] dump_stack_lvl+0x8c/0xd0 [ 53.149675] print_report+0x118/0x5e0 [ 53.150277] kasan_report+0xc8/0x118 [ 53.150893] kasan_check_range+0x100/0x1a8 [ 53.151513] __kasan_check_write+0x20/0x30 [ 53.152110] kasan_atomics_helper+0xc08/0x4858 [ 53.152741] kasan_atomics+0x198/0x2e8 [ 53.153402] kunit_try_run_case+0x14c/0x3d0 [ 53.154009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.154749] kthread+0x24c/0x2d0 [ 53.155361] ret_from_fork+0x10/0x20 [ 53.156005] [ 53.156308] Allocated by task 254: [ 53.156851] kasan_save_stack+0x3c/0x68 [ 53.157394] kasan_save_track+0x20/0x40 [ 53.157913] kasan_save_alloc_info+0x40/0x58 [ 53.158726] __kasan_kmalloc+0xd4/0xd8 [ 53.159443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.160194] kasan_atomics+0xb8/0x2e8 [ 53.160746] kunit_try_run_case+0x14c/0x3d0 [ 53.161396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.162129] kthread+0x24c/0x2d0 [ 53.162735] ret_from_fork+0x10/0x20 [ 53.163245] [ 53.163559] The buggy address belongs to the object at fff00000c616b300 [ 53.163559] which belongs to the cache kmalloc-64 of size 64 [ 53.164996] The buggy address is located 0 bytes to the right of [ 53.164996] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.166349] [ 53.166693] The buggy address belongs to the physical page: [ 53.167541] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.168454] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.169226] page_type: f5(slab) [ 53.169711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.170643] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.171520] page dumped because: kasan: bad access detected [ 53.172214] [ 53.172572] Memory state around the buggy address: [ 53.173169] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.174025] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.174947] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.175759] ^ [ 53.176385] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.177280] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.178160] ================================================================== [ 53.639959] ================================================================== [ 53.640872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 53.642013] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.642959] [ 53.643322] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.644276] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.644987] Hardware name: linux,dummy-virt (DT) [ 53.645620] Call trace: [ 53.646149] show_stack+0x20/0x38 (C) [ 53.646692] dump_stack_lvl+0x8c/0xd0 [ 53.647341] print_report+0x118/0x5e0 [ 53.648005] kasan_report+0xc8/0x118 [ 53.648615] kasan_check_range+0x100/0x1a8 [ 53.649348] __kasan_check_write+0x20/0x30 [ 53.649973] kasan_atomics_helper+0xff0/0x4858 [ 53.650667] kasan_atomics+0x198/0x2e8 [ 53.651221] kunit_try_run_case+0x14c/0x3d0 [ 53.651841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.652564] kthread+0x24c/0x2d0 [ 53.653072] ret_from_fork+0x10/0x20 [ 53.653747] [ 53.654065] Allocated by task 254: [ 53.654594] kasan_save_stack+0x3c/0x68 [ 53.655181] kasan_save_track+0x20/0x40 [ 53.655706] kasan_save_alloc_info+0x40/0x58 [ 53.656408] __kasan_kmalloc+0xd4/0xd8 [ 53.656907] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.657655] kasan_atomics+0xb8/0x2e8 [ 53.658169] kunit_try_run_case+0x14c/0x3d0 [ 53.658829] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.659432] kthread+0x24c/0x2d0 [ 53.660025] ret_from_fork+0x10/0x20 [ 53.660508] [ 53.660900] The buggy address belongs to the object at fff00000c616b300 [ 53.660900] which belongs to the cache kmalloc-64 of size 64 [ 53.662327] The buggy address is located 0 bytes to the right of [ 53.662327] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.663764] [ 53.664098] The buggy address belongs to the physical page: [ 53.664746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.665713] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.666566] page_type: f5(slab) [ 53.667168] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.668077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.669039] page dumped because: kasan: bad access detected [ 53.669743] [ 53.670069] Memory state around the buggy address: [ 53.670725] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.671687] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.672682] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.673597] ^ [ 53.674149] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.675024] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.675850] ================================================================== [ 52.077377] ================================================================== [ 52.079332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 52.079944] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.081247] [ 52.081709] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.082779] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.083193] Hardware name: linux,dummy-virt (DT) [ 52.084122] Call trace: [ 52.084708] show_stack+0x20/0x38 (C) [ 52.085422] dump_stack_lvl+0x8c/0xd0 [ 52.086267] print_report+0x118/0x5e0 [ 52.087019] kasan_report+0xc8/0x118 [ 52.087819] kasan_check_range+0x100/0x1a8 [ 52.088632] __kasan_check_read+0x20/0x30 [ 52.089467] kasan_atomics_helper+0x1ec/0x4858 [ 52.090163] kasan_atomics+0x198/0x2e8 [ 52.090924] kunit_try_run_case+0x14c/0x3d0 [ 52.091645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.092243] kthread+0x24c/0x2d0 [ 52.092895] ret_from_fork+0x10/0x20 [ 52.093655] [ 52.094052] Allocated by task 254: [ 52.094595] kasan_save_stack+0x3c/0x68 [ 52.095245] kasan_save_track+0x20/0x40 [ 52.096220] kasan_save_alloc_info+0x40/0x58 [ 52.096872] __kasan_kmalloc+0xd4/0xd8 [ 52.097691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.098150] kasan_atomics+0xb8/0x2e8 [ 52.098920] kunit_try_run_case+0x14c/0x3d0 [ 52.099790] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.100623] kthread+0x24c/0x2d0 [ 52.101454] ret_from_fork+0x10/0x20 [ 52.102144] [ 52.102409] The buggy address belongs to the object at fff00000c616b300 [ 52.102409] which belongs to the cache kmalloc-64 of size 64 [ 52.104075] The buggy address is located 0 bytes to the right of [ 52.104075] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.106167] [ 52.106403] The buggy address belongs to the physical page: [ 52.107428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.108361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.109262] page_type: f5(slab) [ 52.110157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.111058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.112000] page dumped because: kasan: bad access detected [ 52.112705] [ 52.112999] Memory state around the buggy address: [ 52.113729] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.114606] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.115458] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.116240] ^ [ 52.116968] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.117979] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.118831] ================================================================== [ 52.801951] ================================================================== [ 52.802702] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 52.803946] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.805663] [ 52.806133] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.807681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.808269] Hardware name: linux,dummy-virt (DT) [ 52.808829] Call trace: [ 52.809215] show_stack+0x20/0x38 (C) [ 52.809761] dump_stack_lvl+0x8c/0xd0 [ 52.810491] print_report+0x118/0x5e0 [ 52.811185] kasan_report+0xc8/0x118 [ 52.811913] __asan_report_load4_noabort+0x20/0x30 [ 52.812562] kasan_atomics_helper+0x42d8/0x4858 [ 52.813230] kasan_atomics+0x198/0x2e8 [ 52.813860] kunit_try_run_case+0x14c/0x3d0 [ 52.814481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.815346] kthread+0x24c/0x2d0 [ 52.815853] ret_from_fork+0x10/0x20 [ 52.816465] [ 52.816753] Allocated by task 254: [ 52.817288] kasan_save_stack+0x3c/0x68 [ 52.817820] kasan_save_track+0x20/0x40 [ 52.818472] kasan_save_alloc_info+0x40/0x58 [ 52.819002] __kasan_kmalloc+0xd4/0xd8 [ 52.819677] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.820309] kasan_atomics+0xb8/0x2e8 [ 52.820976] kunit_try_run_case+0x14c/0x3d0 [ 52.821652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.822528] kthread+0x24c/0x2d0 [ 52.823002] ret_from_fork+0x10/0x20 [ 52.823625] [ 52.823947] The buggy address belongs to the object at fff00000c616b300 [ 52.823947] which belongs to the cache kmalloc-64 of size 64 [ 52.825394] The buggy address is located 0 bytes to the right of [ 52.825394] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.826755] [ 52.827052] The buggy address belongs to the physical page: [ 52.827835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.828777] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.829632] page_type: f5(slab) [ 52.830136] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.831026] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.832022] page dumped because: kasan: bad access detected [ 52.832674] [ 52.833022] Memory state around the buggy address: [ 52.833615] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.834517] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.835497] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.836346] ^ [ 52.837379] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.838332] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.839332] ================================================================== [ 53.717558] ================================================================== [ 53.718399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 53.719139] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.720191] [ 53.720588] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.721766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.722426] Hardware name: linux,dummy-virt (DT) [ 53.722998] Call trace: [ 53.723472] show_stack+0x20/0x38 (C) [ 53.724041] dump_stack_lvl+0x8c/0xd0 [ 53.724634] print_report+0x118/0x5e0 [ 53.725177] kasan_report+0xc8/0x118 [ 53.725734] kasan_check_range+0x100/0x1a8 [ 53.726385] __kasan_check_write+0x20/0x30 [ 53.726963] kasan_atomics_helper+0x10c0/0x4858 [ 53.727655] kasan_atomics+0x198/0x2e8 [ 53.728149] kunit_try_run_case+0x14c/0x3d0 [ 53.728837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.729685] kthread+0x24c/0x2d0 [ 53.730248] ret_from_fork+0x10/0x20 [ 53.730858] [ 53.731164] Allocated by task 254: [ 53.731763] kasan_save_stack+0x3c/0x68 [ 53.732346] kasan_save_track+0x20/0x40 [ 53.732989] kasan_save_alloc_info+0x40/0x58 [ 53.733574] __kasan_kmalloc+0xd4/0xd8 [ 53.734191] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.734821] kasan_atomics+0xb8/0x2e8 [ 53.735358] kunit_try_run_case+0x14c/0x3d0 [ 53.735947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.736793] kthread+0x24c/0x2d0 [ 53.737270] ret_from_fork+0x10/0x20 [ 53.737830] [ 53.738128] The buggy address belongs to the object at fff00000c616b300 [ 53.738128] which belongs to the cache kmalloc-64 of size 64 [ 53.739636] The buggy address is located 0 bytes to the right of [ 53.739636] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.741047] [ 53.741345] The buggy address belongs to the physical page: [ 53.742124] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.743022] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.743857] page_type: f5(slab) [ 53.744351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.745189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.746175] page dumped because: kasan: bad access detected [ 53.746899] [ 53.747229] Memory state around the buggy address: [ 53.747853] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.748691] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.749650] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.750520] ^ [ 53.751199] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.752015] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.752858] ================================================================== [ 54.187491] ================================================================== [ 54.188191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 54.188936] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.189979] [ 54.190326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.191437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.191972] Hardware name: linux,dummy-virt (DT) [ 54.192618] Call trace: [ 54.193081] show_stack+0x20/0x38 (C) [ 54.193596] dump_stack_lvl+0x8c/0xd0 [ 54.194236] print_report+0x118/0x5e0 [ 54.194739] kasan_report+0xc8/0x118 [ 54.195478] kasan_check_range+0x100/0x1a8 [ 54.196096] __kasan_check_write+0x20/0x30 [ 54.196675] kasan_atomics_helper+0x15b4/0x4858 [ 54.197442] kasan_atomics+0x198/0x2e8 [ 54.197947] kunit_try_run_case+0x14c/0x3d0 [ 54.198672] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.199417] kthread+0x24c/0x2d0 [ 54.200077] ret_from_fork+0x10/0x20 [ 54.200560] [ 54.200921] Allocated by task 254: [ 54.201530] kasan_save_stack+0x3c/0x68 [ 54.202075] kasan_save_track+0x20/0x40 [ 54.202744] kasan_save_alloc_info+0x40/0x58 [ 54.203444] __kasan_kmalloc+0xd4/0xd8 [ 54.203911] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.204658] kasan_atomics+0xb8/0x2e8 [ 54.205108] kunit_try_run_case+0x14c/0x3d0 [ 54.205792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.206421] kthread+0x24c/0x2d0 [ 54.207041] ret_from_fork+0x10/0x20 [ 54.207624] [ 54.208087] The buggy address belongs to the object at fff00000c616b300 [ 54.208087] which belongs to the cache kmalloc-64 of size 64 [ 54.209498] The buggy address is located 0 bytes to the right of [ 54.209498] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.210906] [ 54.211217] The buggy address belongs to the physical page: [ 54.211954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.212838] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.213718] page_type: f5(slab) [ 54.214199] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.215068] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.215975] page dumped because: kasan: bad access detected [ 54.216786] [ 54.217094] Memory state around the buggy address: [ 54.217811] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.218668] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.219620] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.220431] ^ [ 54.221008] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.221879] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.222801] ================================================================== [ 52.918108] ================================================================== [ 52.918947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 52.919742] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.920490] [ 52.920916] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.922350] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.922984] Hardware name: linux,dummy-virt (DT) [ 52.923640] Call trace: [ 52.923969] show_stack+0x20/0x38 (C) [ 52.924632] dump_stack_lvl+0x8c/0xd0 [ 52.925173] print_report+0x118/0x5e0 [ 52.925786] kasan_report+0xc8/0x118 [ 52.926351] kasan_check_range+0x100/0x1a8 [ 52.927050] __kasan_check_write+0x20/0x30 [ 52.927685] kasan_atomics_helper+0xa04/0x4858 [ 52.928279] kasan_atomics+0x198/0x2e8 [ 52.928984] kunit_try_run_case+0x14c/0x3d0 [ 52.929678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.930488] kthread+0x24c/0x2d0 [ 52.931038] ret_from_fork+0x10/0x20 [ 52.931607] [ 52.932036] Allocated by task 254: [ 52.932638] kasan_save_stack+0x3c/0x68 [ 52.933141] kasan_save_track+0x20/0x40 [ 52.933799] kasan_save_alloc_info+0x40/0x58 [ 52.934320] __kasan_kmalloc+0xd4/0xd8 [ 52.934943] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.935621] kasan_atomics+0xb8/0x2e8 [ 52.936130] kunit_try_run_case+0x14c/0x3d0 [ 52.936810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.937489] kthread+0x24c/0x2d0 [ 52.938073] ret_from_fork+0x10/0x20 [ 52.938593] [ 52.939037] The buggy address belongs to the object at fff00000c616b300 [ 52.939037] which belongs to the cache kmalloc-64 of size 64 [ 52.940429] The buggy address is located 0 bytes to the right of [ 52.940429] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.941789] [ 52.942103] The buggy address belongs to the physical page: [ 52.942863] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.943739] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.944608] page_type: f5(slab) [ 52.945169] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.946148] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.947086] page dumped because: kasan: bad access detected [ 52.947722] [ 52.948058] Memory state around the buggy address: [ 52.948599] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.949553] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.950430] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.951384] ^ [ 52.952103] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.952929] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.953798] ================================================================== [ 52.993375] ================================================================== [ 52.994173] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 52.995762] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.996502] [ 52.996962] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.998093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.998652] Hardware name: linux,dummy-virt (DT) [ 52.999255] Call trace: [ 52.999705] show_stack+0x20/0x38 (C) [ 53.000420] dump_stack_lvl+0x8c/0xd0 [ 53.000976] print_report+0x118/0x5e0 [ 53.001747] kasan_report+0xc8/0x118 [ 53.002354] kasan_check_range+0x100/0x1a8 [ 53.002909] __kasan_check_write+0x20/0x30 [ 53.003677] kasan_atomics_helper+0xad4/0x4858 [ 53.004334] kasan_atomics+0x198/0x2e8 [ 53.004863] kunit_try_run_case+0x14c/0x3d0 [ 53.005646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.006506] kthread+0x24c/0x2d0 [ 53.007155] ret_from_fork+0x10/0x20 [ 53.007702] [ 53.008054] Allocated by task 254: [ 53.008689] kasan_save_stack+0x3c/0x68 [ 53.009249] kasan_save_track+0x20/0x40 [ 53.009752] kasan_save_alloc_info+0x40/0x58 [ 53.010482] __kasan_kmalloc+0xd4/0xd8 [ 53.011023] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.011713] kasan_atomics+0xb8/0x2e8 [ 53.012366] kunit_try_run_case+0x14c/0x3d0 [ 53.012933] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.013621] kthread+0x24c/0x2d0 [ 53.014192] ret_from_fork+0x10/0x20 [ 53.014715] [ 53.015093] The buggy address belongs to the object at fff00000c616b300 [ 53.015093] which belongs to the cache kmalloc-64 of size 64 [ 53.016401] The buggy address is located 0 bytes to the right of [ 53.016401] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.017862] [ 53.018198] The buggy address belongs to the physical page: [ 53.018769] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.019810] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.020640] page_type: f5(slab) [ 53.021101] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.022062] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.023052] page dumped because: kasan: bad access detected [ 53.023856] [ 53.024149] Memory state around the buggy address: [ 53.024747] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.025584] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.026490] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.027307] ^ [ 53.027910] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.028784] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.029629] ================================================================== [ 53.677803] ================================================================== [ 53.678628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 53.680142] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.681083] [ 53.681549] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.683312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.683953] Hardware name: linux,dummy-virt (DT) [ 53.684990] Call trace: [ 53.686124] show_stack+0x20/0x38 (C) [ 53.686813] dump_stack_lvl+0x8c/0xd0 [ 53.687438] print_report+0x118/0x5e0 [ 53.688066] kasan_report+0xc8/0x118 [ 53.688751] kasan_check_range+0x100/0x1a8 [ 53.689409] __kasan_check_write+0x20/0x30 [ 53.690006] kasan_atomics_helper+0x1058/0x4858 [ 53.690575] kasan_atomics+0x198/0x2e8 [ 53.691202] kunit_try_run_case+0x14c/0x3d0 [ 53.691903] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.692701] kthread+0x24c/0x2d0 [ 53.693259] ret_from_fork+0x10/0x20 [ 53.693849] [ 53.694204] Allocated by task 254: [ 53.694803] kasan_save_stack+0x3c/0x68 [ 53.695558] kasan_save_track+0x20/0x40 [ 53.696113] kasan_save_alloc_info+0x40/0x58 [ 53.696725] __kasan_kmalloc+0xd4/0xd8 [ 53.697328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.697941] kasan_atomics+0xb8/0x2e8 [ 53.698482] kunit_try_run_case+0x14c/0x3d0 [ 53.699117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.699825] kthread+0x24c/0x2d0 [ 53.700390] ret_from_fork+0x10/0x20 [ 53.700884] [ 53.701328] The buggy address belongs to the object at fff00000c616b300 [ 53.701328] which belongs to the cache kmalloc-64 of size 64 [ 53.702643] The buggy address is located 0 bytes to the right of [ 53.702643] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.704037] [ 53.704360] The buggy address belongs to the physical page: [ 53.705114] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.706170] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.707024] page_type: f5(slab) [ 53.707641] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.708549] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.709394] page dumped because: kasan: bad access detected [ 53.710133] [ 53.710529] Memory state around the buggy address: [ 53.711139] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.712012] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.712914] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.713793] ^ [ 53.714381] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.715320] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.716121] ================================================================== [ 53.216640] ================================================================== [ 53.218228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 53.219396] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.220539] [ 53.220882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.222070] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.222965] Hardware name: linux,dummy-virt (DT) [ 53.223564] Call trace: [ 53.224052] show_stack+0x20/0x38 (C) [ 53.224734] dump_stack_lvl+0x8c/0xd0 [ 53.225418] print_report+0x118/0x5e0 [ 53.226082] kasan_report+0xc8/0x118 [ 53.226718] kasan_check_range+0x100/0x1a8 [ 53.227421] __kasan_check_write+0x20/0x30 [ 53.228119] kasan_atomics_helper+0xca0/0x4858 [ 53.228886] kasan_atomics+0x198/0x2e8 [ 53.229582] kunit_try_run_case+0x14c/0x3d0 [ 53.230260] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.231129] kthread+0x24c/0x2d0 [ 53.231821] ret_from_fork+0x10/0x20 [ 53.232457] [ 53.232789] Allocated by task 254: [ 53.233365] kasan_save_stack+0x3c/0x68 [ 53.234067] kasan_save_track+0x20/0x40 [ 53.234716] kasan_save_alloc_info+0x40/0x58 [ 53.235381] __kasan_kmalloc+0xd4/0xd8 [ 53.236108] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.236816] kasan_atomics+0xb8/0x2e8 [ 53.237436] kunit_try_run_case+0x14c/0x3d0 [ 53.238110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.238872] kthread+0x24c/0x2d0 [ 53.239486] ret_from_fork+0x10/0x20 [ 53.240060] [ 53.240465] The buggy address belongs to the object at fff00000c616b300 [ 53.240465] which belongs to the cache kmalloc-64 of size 64 [ 53.241910] The buggy address is located 0 bytes to the right of [ 53.241910] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.243403] [ 53.243811] The buggy address belongs to the physical page: [ 53.244576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.245588] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.246382] page_type: f5(slab) [ 53.246969] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.248006] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.248949] page dumped because: kasan: bad access detected [ 53.249727] [ 53.250123] Memory state around the buggy address: [ 53.250787] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.251818] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.252709] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.253597] ^ [ 53.254266] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.255169] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.256024] ================================================================== [ 53.754169] ================================================================== [ 53.755578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 53.756382] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.757399] [ 53.757722] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.758934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.759442] Hardware name: linux,dummy-virt (DT) [ 53.759950] Call trace: [ 53.760448] show_stack+0x20/0x38 (C) [ 53.761101] dump_stack_lvl+0x8c/0xd0 [ 53.761646] print_report+0x118/0x5e0 [ 53.762350] kasan_report+0xc8/0x118 [ 53.763050] kasan_check_range+0x100/0x1a8 [ 53.763798] __kasan_check_write+0x20/0x30 [ 53.764486] kasan_atomics_helper+0x1128/0x4858 [ 53.765251] kasan_atomics+0x198/0x2e8 [ 53.765804] kunit_try_run_case+0x14c/0x3d0 [ 53.766536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.767247] kthread+0x24c/0x2d0 [ 53.767879] ret_from_fork+0x10/0x20 [ 53.768489] [ 53.768853] Allocated by task 254: [ 53.769373] kasan_save_stack+0x3c/0x68 [ 53.769932] kasan_save_track+0x20/0x40 [ 53.770516] kasan_save_alloc_info+0x40/0x58 [ 53.771227] __kasan_kmalloc+0xd4/0xd8 [ 53.771739] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.772485] kasan_atomics+0xb8/0x2e8 [ 53.773045] kunit_try_run_case+0x14c/0x3d0 [ 53.773658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.774437] kthread+0x24c/0x2d0 [ 53.774961] ret_from_fork+0x10/0x20 [ 53.775544] [ 53.775837] The buggy address belongs to the object at fff00000c616b300 [ 53.775837] which belongs to the cache kmalloc-64 of size 64 [ 53.777195] The buggy address is located 0 bytes to the right of [ 53.777195] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.778610] [ 53.778899] The buggy address belongs to the physical page: [ 53.779682] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.780522] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.781422] page_type: f5(slab) [ 53.781874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.782796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.783779] page dumped because: kasan: bad access detected [ 53.784453] [ 53.784759] Memory state around the buggy address: [ 53.785419] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.786267] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.787030] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.787950] ^ [ 53.788642] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.789655] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.790768] ================================================================== [ 54.112535] ================================================================== [ 54.113769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 54.114341] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.115135] [ 54.115535] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.116588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.117224] Hardware name: linux,dummy-virt (DT) [ 54.117778] Call trace: [ 54.118256] show_stack+0x20/0x38 (C) [ 54.118825] dump_stack_lvl+0x8c/0xd0 [ 54.119626] print_report+0x118/0x5e0 [ 54.120155] kasan_report+0xc8/0x118 [ 54.120748] kasan_check_range+0x100/0x1a8 [ 54.121395] __kasan_check_write+0x20/0x30 [ 54.122100] kasan_atomics_helper+0x14e4/0x4858 [ 54.122779] kasan_atomics+0x198/0x2e8 [ 54.123332] kunit_try_run_case+0x14c/0x3d0 [ 54.123996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.124732] kthread+0x24c/0x2d0 [ 54.125316] ret_from_fork+0x10/0x20 [ 54.125939] [ 54.126271] Allocated by task 254: [ 54.126851] kasan_save_stack+0x3c/0x68 [ 54.127370] kasan_save_track+0x20/0x40 [ 54.127998] kasan_save_alloc_info+0x40/0x58 [ 54.128599] __kasan_kmalloc+0xd4/0xd8 [ 54.129056] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.129788] kasan_atomics+0xb8/0x2e8 [ 54.130266] kunit_try_run_case+0x14c/0x3d0 [ 54.130968] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.131765] kthread+0x24c/0x2d0 [ 54.132390] ret_from_fork+0x10/0x20 [ 54.132899] [ 54.133333] The buggy address belongs to the object at fff00000c616b300 [ 54.133333] which belongs to the cache kmalloc-64 of size 64 [ 54.134708] The buggy address is located 0 bytes to the right of [ 54.134708] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.136152] [ 54.136496] The buggy address belongs to the physical page: [ 54.137283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.138205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.138947] page_type: f5(slab) [ 54.139508] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.140413] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.141337] page dumped because: kasan: bad access detected [ 54.142068] [ 54.142438] Memory state around the buggy address: [ 54.143087] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.143950] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.144802] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.145688] ^ [ 54.146285] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.147160] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.148092] ================================================================== [ 54.224042] ================================================================== [ 54.224765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 54.225778] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.226615] [ 54.227064] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.228171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.228627] Hardware name: linux,dummy-virt (DT) [ 54.229398] Call trace: [ 54.229783] show_stack+0x20/0x38 (C) [ 54.230469] dump_stack_lvl+0x8c/0xd0 [ 54.230982] print_report+0x118/0x5e0 [ 54.231640] kasan_report+0xc8/0x118 [ 54.232353] __asan_report_load8_noabort+0x20/0x30 [ 54.233098] kasan_atomics_helper+0x3db0/0x4858 [ 54.233773] kasan_atomics+0x198/0x2e8 [ 54.234338] kunit_try_run_case+0x14c/0x3d0 [ 54.234946] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.235589] kthread+0x24c/0x2d0 [ 54.236205] ret_from_fork+0x10/0x20 [ 54.236841] [ 54.237200] Allocated by task 254: [ 54.237723] kasan_save_stack+0x3c/0x68 [ 54.238346] kasan_save_track+0x20/0x40 [ 54.238930] kasan_save_alloc_info+0x40/0x58 [ 54.239476] __kasan_kmalloc+0xd4/0xd8 [ 54.240133] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.240829] kasan_atomics+0xb8/0x2e8 [ 54.241565] kunit_try_run_case+0x14c/0x3d0 [ 54.242201] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.243118] kthread+0x24c/0x2d0 [ 54.243646] ret_from_fork+0x10/0x20 [ 54.244190] [ 54.244515] The buggy address belongs to the object at fff00000c616b300 [ 54.244515] which belongs to the cache kmalloc-64 of size 64 [ 54.245998] The buggy address is located 0 bytes to the right of [ 54.245998] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.247411] [ 54.247740] The buggy address belongs to the physical page: [ 54.248348] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.249353] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.250135] page_type: f5(slab) [ 54.250671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.251554] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.252502] page dumped because: kasan: bad access detected [ 54.253252] [ 54.253586] Memory state around the buggy address: [ 54.254205] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.255057] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.255912] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.256826] ^ [ 54.257362] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.258180] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.259085] ================================================================== [ 54.335423] ================================================================== [ 54.336212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 54.337756] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.339284] [ 54.339627] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.340478] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.340833] Hardware name: linux,dummy-virt (DT) [ 54.341211] Call trace: [ 54.341494] show_stack+0x20/0x38 (C) [ 54.341872] dump_stack_lvl+0x8c/0xd0 [ 54.342249] print_report+0x118/0x5e0 [ 54.342732] kasan_report+0xc8/0x118 [ 54.343182] kasan_check_range+0x100/0x1a8 [ 54.343786] __kasan_check_write+0x20/0x30 [ 54.344620] kasan_atomics_helper+0x16d0/0x4858 [ 54.345442] kasan_atomics+0x198/0x2e8 [ 54.345835] kunit_try_run_case+0x14c/0x3d0 [ 54.346243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.346747] kthread+0x24c/0x2d0 [ 54.347133] ret_from_fork+0x10/0x20 [ 54.347560] [ 54.347843] Allocated by task 254: [ 54.348323] kasan_save_stack+0x3c/0x68 [ 54.349175] kasan_save_track+0x20/0x40 [ 54.349811] kasan_save_alloc_info+0x40/0x58 [ 54.350715] __kasan_kmalloc+0xd4/0xd8 [ 54.351425] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.351994] kasan_atomics+0xb8/0x2e8 [ 54.352451] kunit_try_run_case+0x14c/0x3d0 [ 54.352912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.353455] kthread+0x24c/0x2d0 [ 54.354124] ret_from_fork+0x10/0x20 [ 54.354877] [ 54.355357] The buggy address belongs to the object at fff00000c616b300 [ 54.355357] which belongs to the cache kmalloc-64 of size 64 [ 54.356872] The buggy address is located 0 bytes to the right of [ 54.356872] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.358030] [ 54.358512] The buggy address belongs to the physical page: [ 54.359702] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.360645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.361439] page_type: f5(slab) [ 54.361991] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.362904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.363830] page dumped because: kasan: bad access detected [ 54.364601] [ 54.364909] Memory state around the buggy address: [ 54.365556] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.366473] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.367361] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.368258] ^ [ 54.368920] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.369741] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.370675] ================================================================== [ 53.875913] ================================================================== [ 53.877604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 53.878344] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.879356] [ 53.879725] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.880979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.881660] Hardware name: linux,dummy-virt (DT) [ 53.882283] Call trace: [ 53.882674] show_stack+0x20/0x38 (C) [ 53.883282] dump_stack_lvl+0x8c/0xd0 [ 53.883940] print_report+0x118/0x5e0 [ 53.884537] kasan_report+0xc8/0x118 [ 53.885077] kasan_check_range+0x100/0x1a8 [ 53.885639] __kasan_check_write+0x20/0x30 [ 53.886438] kasan_atomics_helper+0x126c/0x4858 [ 53.887083] kasan_atomics+0x198/0x2e8 [ 53.887648] kunit_try_run_case+0x14c/0x3d0 [ 53.888249] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.888975] kthread+0x24c/0x2d0 [ 53.889600] ret_from_fork+0x10/0x20 [ 53.890235] [ 53.890580] Allocated by task 254: [ 53.891240] kasan_save_stack+0x3c/0x68 [ 53.891794] kasan_save_track+0x20/0x40 [ 53.892674] kasan_save_alloc_info+0x40/0x58 [ 53.893320] __kasan_kmalloc+0xd4/0xd8 [ 53.893947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.894781] kasan_atomics+0xb8/0x2e8 [ 53.895521] kunit_try_run_case+0x14c/0x3d0 [ 53.896223] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.897098] kthread+0x24c/0x2d0 [ 53.897691] ret_from_fork+0x10/0x20 [ 53.898217] [ 53.898763] The buggy address belongs to the object at fff00000c616b300 [ 53.898763] which belongs to the cache kmalloc-64 of size 64 [ 53.899959] The buggy address is located 0 bytes to the right of [ 53.899959] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.901074] [ 53.901410] The buggy address belongs to the physical page: [ 53.902064] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.902872] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.903851] page_type: f5(slab) [ 53.904575] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.905532] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.906407] page dumped because: kasan: bad access detected [ 53.907101] [ 53.907521] Memory state around the buggy address: [ 53.908103] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.908908] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.909807] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.910617] ^ [ 53.911260] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.912154] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.913066] ================================================================== [ 54.449976] ================================================================== [ 54.450860] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 54.451660] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.452441] [ 54.452815] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.453973] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.454585] Hardware name: linux,dummy-virt (DT) [ 54.455308] Call trace: [ 54.455736] show_stack+0x20/0x38 (C) [ 54.456313] dump_stack_lvl+0x8c/0xd0 [ 54.456924] print_report+0x118/0x5e0 [ 54.457495] kasan_report+0xc8/0x118 [ 54.458022] __asan_report_load8_noabort+0x20/0x30 [ 54.458680] kasan_atomics_helper+0x3e20/0x4858 [ 54.459475] kasan_atomics+0x198/0x2e8 [ 54.460011] kunit_try_run_case+0x14c/0x3d0 [ 54.460634] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.461367] kthread+0x24c/0x2d0 [ 54.461971] ret_from_fork+0x10/0x20 [ 54.462495] [ 54.462836] Allocated by task 254: [ 54.463315] kasan_save_stack+0x3c/0x68 [ 54.463938] kasan_save_track+0x20/0x40 [ 54.464545] kasan_save_alloc_info+0x40/0x58 [ 54.465154] __kasan_kmalloc+0xd4/0xd8 [ 54.465698] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.466423] kasan_atomics+0xb8/0x2e8 [ 54.466923] kunit_try_run_case+0x14c/0x3d0 [ 54.467580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.468281] kthread+0x24c/0x2d0 [ 54.468912] ret_from_fork+0x10/0x20 [ 54.469398] [ 54.469788] The buggy address belongs to the object at fff00000c616b300 [ 54.469788] which belongs to the cache kmalloc-64 of size 64 [ 54.471237] The buggy address is located 0 bytes to the right of [ 54.471237] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.472581] [ 54.472952] The buggy address belongs to the physical page: [ 54.473692] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.474544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.475482] page_type: f5(slab) [ 54.475968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.476829] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.477800] page dumped because: kasan: bad access detected [ 54.478511] [ 54.478832] Memory state around the buggy address: [ 54.479455] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.480171] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.481086] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.481957] ^ [ 54.482636] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.483538] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.484441] ================================================================== [ 52.955000] ================================================================== [ 52.956070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 52.956850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.957731] [ 52.958276] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.959565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.960050] Hardware name: linux,dummy-virt (DT) [ 52.960633] Call trace: [ 52.961093] show_stack+0x20/0x38 (C) [ 52.961742] dump_stack_lvl+0x8c/0xd0 [ 52.962371] print_report+0x118/0x5e0 [ 52.962901] kasan_report+0xc8/0x118 [ 52.963641] kasan_check_range+0x100/0x1a8 [ 52.964225] __kasan_check_write+0x20/0x30 [ 52.964939] kasan_atomics_helper+0xa6c/0x4858 [ 52.965643] kasan_atomics+0x198/0x2e8 [ 52.966124] kunit_try_run_case+0x14c/0x3d0 [ 52.966918] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.967695] kthread+0x24c/0x2d0 [ 52.968265] ret_from_fork+0x10/0x20 [ 52.968917] [ 52.969217] Allocated by task 254: [ 52.969865] kasan_save_stack+0x3c/0x68 [ 52.970447] kasan_save_track+0x20/0x40 [ 52.970970] kasan_save_alloc_info+0x40/0x58 [ 52.971713] __kasan_kmalloc+0xd4/0xd8 [ 52.972389] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.972960] kasan_atomics+0xb8/0x2e8 [ 52.973683] kunit_try_run_case+0x14c/0x3d0 [ 52.974346] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.975072] kthread+0x24c/0x2d0 [ 52.975586] ret_from_fork+0x10/0x20 [ 52.976083] [ 52.976420] The buggy address belongs to the object at fff00000c616b300 [ 52.976420] which belongs to the cache kmalloc-64 of size 64 [ 52.977876] The buggy address is located 0 bytes to the right of [ 52.977876] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.979239] [ 52.979658] The buggy address belongs to the physical page: [ 52.980396] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.981271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.982041] page_type: f5(slab) [ 52.982559] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.983385] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.984383] page dumped because: kasan: bad access detected [ 52.985103] [ 52.985449] Memory state around the buggy address: [ 52.986041] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.986896] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.987750] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.988666] ^ [ 52.989227] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.990047] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.990952] ================================================================== [ 52.164836] ================================================================== [ 52.166203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 52.166897] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.167850] [ 52.168138] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.169570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.170081] Hardware name: linux,dummy-virt (DT) [ 52.171513] Call trace: [ 52.172111] show_stack+0x20/0x38 (C) [ 52.172818] dump_stack_lvl+0x8c/0xd0 [ 52.173407] print_report+0x118/0x5e0 [ 52.174252] kasan_report+0xc8/0x118 [ 52.174892] kasan_check_range+0x100/0x1a8 [ 52.175568] __kasan_check_read+0x20/0x30 [ 52.176238] kasan_atomics_helper+0x2b0/0x4858 [ 52.176948] kasan_atomics+0x198/0x2e8 [ 52.177795] kunit_try_run_case+0x14c/0x3d0 [ 52.178509] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.179341] kthread+0x24c/0x2d0 [ 52.179973] ret_from_fork+0x10/0x20 [ 52.180856] [ 52.181415] Allocated by task 254: [ 52.181934] kasan_save_stack+0x3c/0x68 [ 52.182510] kasan_save_track+0x20/0x40 [ 52.183234] kasan_save_alloc_info+0x40/0x58 [ 52.183770] __kasan_kmalloc+0xd4/0xd8 [ 52.184420] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.185096] kasan_atomics+0xb8/0x2e8 [ 52.185974] kunit_try_run_case+0x14c/0x3d0 [ 52.186667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.187818] kthread+0x24c/0x2d0 [ 52.189061] ret_from_fork+0x10/0x20 [ 52.189669] [ 52.190177] The buggy address belongs to the object at fff00000c616b300 [ 52.190177] which belongs to the cache kmalloc-64 of size 64 [ 52.191880] The buggy address is located 0 bytes to the right of [ 52.191880] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.193823] [ 52.194122] The buggy address belongs to the physical page: [ 52.194968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.196045] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.196873] page_type: f5(slab) [ 52.197500] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.198539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.199771] page dumped because: kasan: bad access detected [ 52.200696] [ 52.201206] Memory state around the buggy address: [ 52.201776] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.202814] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.204127] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.204976] ^ [ 52.206054] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.207486] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.208750] ================================================================== [ 54.073584] ================================================================== [ 54.074220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 54.075146] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.076353] [ 54.076799] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.078416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.078898] Hardware name: linux,dummy-virt (DT) [ 54.079698] Call trace: [ 54.080264] show_stack+0x20/0x38 (C) [ 54.080923] dump_stack_lvl+0x8c/0xd0 [ 54.081558] print_report+0x118/0x5e0 [ 54.082181] kasan_report+0xc8/0x118 [ 54.082833] kasan_check_range+0x100/0x1a8 [ 54.083600] __kasan_check_write+0x20/0x30 [ 54.084346] kasan_atomics_helper+0x147c/0x4858 [ 54.085135] kasan_atomics+0x198/0x2e8 [ 54.085798] kunit_try_run_case+0x14c/0x3d0 [ 54.086513] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.087314] kthread+0x24c/0x2d0 [ 54.087920] ret_from_fork+0x10/0x20 [ 54.088571] [ 54.089057] Allocated by task 254: [ 54.089603] kasan_save_stack+0x3c/0x68 [ 54.090189] kasan_save_track+0x20/0x40 [ 54.090865] kasan_save_alloc_info+0x40/0x58 [ 54.091636] __kasan_kmalloc+0xd4/0xd8 [ 54.092238] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.092910] kasan_atomics+0xb8/0x2e8 [ 54.093509] kunit_try_run_case+0x14c/0x3d0 [ 54.094221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.095117] kthread+0x24c/0x2d0 [ 54.095693] ret_from_fork+0x10/0x20 [ 54.096184] [ 54.096594] The buggy address belongs to the object at fff00000c616b300 [ 54.096594] which belongs to the cache kmalloc-64 of size 64 [ 54.097824] The buggy address is located 0 bytes to the right of [ 54.097824] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.099360] [ 54.099649] The buggy address belongs to the physical page: [ 54.100334] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.101288] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.102017] page_type: f5(slab) [ 54.102564] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.103546] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.104443] page dumped because: kasan: bad access detected [ 54.105150] [ 54.105507] Memory state around the buggy address: [ 54.106068] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.106968] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.107913] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.108821] ^ [ 54.109384] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.110258] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.111153] ================================================================== [ 53.793156] ================================================================== [ 53.794733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 53.795641] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.796445] [ 53.796868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.797985] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.798959] Hardware name: linux,dummy-virt (DT) [ 53.799602] Call trace: [ 53.800010] show_stack+0x20/0x38 (C) [ 53.800886] dump_stack_lvl+0x8c/0xd0 [ 53.801487] print_report+0x118/0x5e0 [ 53.802009] kasan_report+0xc8/0x118 [ 53.802651] kasan_check_range+0x100/0x1a8 [ 53.803377] __kasan_check_write+0x20/0x30 [ 53.803970] kasan_atomics_helper+0x1190/0x4858 [ 53.804613] kasan_atomics+0x198/0x2e8 [ 53.805163] kunit_try_run_case+0x14c/0x3d0 [ 53.805819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.806618] kthread+0x24c/0x2d0 [ 53.807262] ret_from_fork+0x10/0x20 [ 53.807867] [ 53.808245] Allocated by task 254: [ 53.808703] kasan_save_stack+0x3c/0x68 [ 53.809364] kasan_save_track+0x20/0x40 [ 53.809952] kasan_save_alloc_info+0x40/0x58 [ 53.810540] __kasan_kmalloc+0xd4/0xd8 [ 53.811153] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.811760] kasan_atomics+0xb8/0x2e8 [ 53.812313] kunit_try_run_case+0x14c/0x3d0 [ 53.812961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.813601] kthread+0x24c/0x2d0 [ 53.814238] ret_from_fork+0x10/0x20 [ 53.814825] [ 53.815224] The buggy address belongs to the object at fff00000c616b300 [ 53.815224] which belongs to the cache kmalloc-64 of size 64 [ 53.816574] The buggy address is located 0 bytes to the right of [ 53.816574] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.817919] [ 53.818253] The buggy address belongs to the physical page: [ 53.818952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.819903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.820633] page_type: f5(slab) [ 53.821194] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.822058] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.823050] page dumped because: kasan: bad access detected [ 53.823738] [ 53.824088] Memory state around the buggy address: [ 53.824743] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.826224] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.827081] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.827864] ^ [ 53.828800] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.829388] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.829943] ================================================================== [ 54.411076] ================================================================== [ 54.411988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 54.414065] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.415842] [ 54.416143] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.417540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.418136] Hardware name: linux,dummy-virt (DT) [ 54.418754] Call trace: [ 54.419233] show_stack+0x20/0x38 (C) [ 54.420012] dump_stack_lvl+0x8c/0xd0 [ 54.420602] print_report+0x118/0x5e0 [ 54.421125] kasan_report+0xc8/0x118 [ 54.421756] kasan_check_range+0x100/0x1a8 [ 54.422365] __kasan_check_write+0x20/0x30 [ 54.423023] kasan_atomics_helper+0x175c/0x4858 [ 54.423773] kasan_atomics+0x198/0x2e8 [ 54.424355] kunit_try_run_case+0x14c/0x3d0 [ 54.424954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.425739] kthread+0x24c/0x2d0 [ 54.426397] ret_from_fork+0x10/0x20 [ 54.426974] [ 54.427356] Allocated by task 254: [ 54.427787] kasan_save_stack+0x3c/0x68 [ 54.428452] kasan_save_track+0x20/0x40 [ 54.428895] kasan_save_alloc_info+0x40/0x58 [ 54.429664] __kasan_kmalloc+0xd4/0xd8 [ 54.430213] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.430867] kasan_atomics+0xb8/0x2e8 [ 54.431420] kunit_try_run_case+0x14c/0x3d0 [ 54.431992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.432697] kthread+0x24c/0x2d0 [ 54.433206] ret_from_fork+0x10/0x20 [ 54.433764] [ 54.434080] The buggy address belongs to the object at fff00000c616b300 [ 54.434080] which belongs to the cache kmalloc-64 of size 64 [ 54.435376] The buggy address is located 0 bytes to the right of [ 54.435376] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.436706] [ 54.437091] The buggy address belongs to the physical page: [ 54.437775] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.438814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.439653] page_type: f5(slab) [ 54.440214] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.441120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.441988] page dumped because: kasan: bad access detected [ 54.442721] [ 54.443054] Memory state around the buggy address: [ 54.443644] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.444557] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.445478] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.446321] ^ [ 54.446898] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.447814] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.448687] ================================================================== [ 52.408265] ================================================================== [ 52.409660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 52.410394] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.411643] [ 52.412094] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.413537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.414098] Hardware name: linux,dummy-virt (DT) [ 52.414786] Call trace: [ 52.415253] show_stack+0x20/0x38 (C) [ 52.415808] dump_stack_lvl+0x8c/0xd0 [ 52.416405] print_report+0x118/0x5e0 [ 52.416938] kasan_report+0xc8/0x118 [ 52.417489] kasan_check_range+0x100/0x1a8 [ 52.418121] __kasan_check_write+0x20/0x30 [ 52.418863] kasan_atomics_helper+0x47c/0x4858 [ 52.419426] kasan_atomics+0x198/0x2e8 [ 52.420086] kunit_try_run_case+0x14c/0x3d0 [ 52.420658] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.421544] kthread+0x24c/0x2d0 [ 52.422104] ret_from_fork+0x10/0x20 [ 52.422764] [ 52.423114] Allocated by task 254: [ 52.423650] kasan_save_stack+0x3c/0x68 [ 52.424215] kasan_save_track+0x20/0x40 [ 52.424777] kasan_save_alloc_info+0x40/0x58 [ 52.425558] __kasan_kmalloc+0xd4/0xd8 [ 52.426061] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.426849] kasan_atomics+0xb8/0x2e8 [ 52.427371] kunit_try_run_case+0x14c/0x3d0 [ 52.428068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.428802] kthread+0x24c/0x2d0 [ 52.429396] ret_from_fork+0x10/0x20 [ 52.429941] [ 52.430214] The buggy address belongs to the object at fff00000c616b300 [ 52.430214] which belongs to the cache kmalloc-64 of size 64 [ 52.431621] The buggy address is located 0 bytes to the right of [ 52.431621] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.433022] [ 52.433405] The buggy address belongs to the physical page: [ 52.434098] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.435014] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.435823] page_type: f5(slab) [ 52.436423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.437412] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.438279] page dumped because: kasan: bad access detected [ 52.438938] [ 52.439273] Memory state around the buggy address: [ 52.439855] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.440788] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.441710] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.442613] ^ [ 52.443204] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.444099] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.445077] ================================================================== [ 52.878602] ================================================================== [ 52.880186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 52.881081] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.882423] [ 52.882868] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.884137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.884814] Hardware name: linux,dummy-virt (DT) [ 52.885387] Call trace: [ 52.885868] show_stack+0x20/0x38 (C) [ 52.886365] dump_stack_lvl+0x8c/0xd0 [ 52.887032] print_report+0x118/0x5e0 [ 52.887635] kasan_report+0xc8/0x118 [ 52.888163] kasan_check_range+0x100/0x1a8 [ 52.888887] __kasan_check_write+0x20/0x30 [ 52.889545] kasan_atomics_helper+0x99c/0x4858 [ 52.890328] kasan_atomics+0x198/0x2e8 [ 52.890855] kunit_try_run_case+0x14c/0x3d0 [ 52.891587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.892311] kthread+0x24c/0x2d0 [ 52.892948] ret_from_fork+0x10/0x20 [ 52.893468] [ 52.893823] Allocated by task 254: [ 52.894352] kasan_save_stack+0x3c/0x68 [ 52.894953] kasan_save_track+0x20/0x40 [ 52.895473] kasan_save_alloc_info+0x40/0x58 [ 52.896156] __kasan_kmalloc+0xd4/0xd8 [ 52.896745] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.897374] kasan_atomics+0xb8/0x2e8 [ 52.897871] kunit_try_run_case+0x14c/0x3d0 [ 52.898440] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.899092] kthread+0x24c/0x2d0 [ 52.899731] ret_from_fork+0x10/0x20 [ 52.900183] [ 52.900614] The buggy address belongs to the object at fff00000c616b300 [ 52.900614] which belongs to the cache kmalloc-64 of size 64 [ 52.902044] The buggy address is located 0 bytes to the right of [ 52.902044] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.903415] [ 52.903790] The buggy address belongs to the physical page: [ 52.904484] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.905500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.906196] page_type: f5(slab) [ 52.906810] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.907850] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.908642] page dumped because: kasan: bad access detected [ 52.909371] [ 52.909731] Memory state around the buggy address: [ 52.910326] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.911567] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.912484] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.913319] ^ [ 52.913889] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.914987] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.915780] ================================================================== [ 53.411482] ================================================================== [ 53.412668] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 53.413774] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.414611] [ 53.415104] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.416349] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.416862] Hardware name: linux,dummy-virt (DT) [ 53.417557] Call trace: [ 53.417911] show_stack+0x20/0x38 (C) [ 53.418628] dump_stack_lvl+0x8c/0xd0 [ 53.419158] print_report+0x118/0x5e0 [ 53.419752] kasan_report+0xc8/0x118 [ 53.420331] __asan_report_load8_noabort+0x20/0x30 [ 53.421004] kasan_atomics_helper+0x3f58/0x4858 [ 53.421677] kasan_atomics+0x198/0x2e8 [ 53.422211] kunit_try_run_case+0x14c/0x3d0 [ 53.422851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.423621] kthread+0x24c/0x2d0 [ 53.424136] ret_from_fork+0x10/0x20 [ 53.424731] [ 53.425104] Allocated by task 254: [ 53.425664] kasan_save_stack+0x3c/0x68 [ 53.426149] kasan_save_track+0x20/0x40 [ 53.426831] kasan_save_alloc_info+0x40/0x58 [ 53.427445] __kasan_kmalloc+0xd4/0xd8 [ 53.427926] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.428657] kasan_atomics+0xb8/0x2e8 [ 53.429190] kunit_try_run_case+0x14c/0x3d0 [ 53.429805] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.430623] kthread+0x24c/0x2d0 [ 53.431124] ret_from_fork+0x10/0x20 [ 53.431611] [ 53.432028] The buggy address belongs to the object at fff00000c616b300 [ 53.432028] which belongs to the cache kmalloc-64 of size 64 [ 53.433332] The buggy address is located 0 bytes to the right of [ 53.433332] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.434703] [ 53.435014] The buggy address belongs to the physical page: [ 53.435590] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.436671] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.437427] page_type: f5(slab) [ 53.437960] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.438938] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.439871] page dumped because: kasan: bad access detected [ 53.440569] [ 53.441080] Memory state around the buggy address: [ 53.441782] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.442699] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.443524] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.444436] ^ [ 53.445209] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.446164] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.447048] ================================================================== [ 52.840920] ================================================================== [ 52.841731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 52.842703] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.843548] [ 52.843968] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.845355] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.845913] Hardware name: linux,dummy-virt (DT) [ 52.846519] Call trace: [ 52.846945] show_stack+0x20/0x38 (C) [ 52.847611] dump_stack_lvl+0x8c/0xd0 [ 52.848128] print_report+0x118/0x5e0 [ 52.848778] kasan_report+0xc8/0x118 [ 52.849277] kasan_check_range+0x100/0x1a8 [ 52.849978] __kasan_check_write+0x20/0x30 [ 52.850647] kasan_atomics_helper+0x934/0x4858 [ 52.851353] kasan_atomics+0x198/0x2e8 [ 52.851915] kunit_try_run_case+0x14c/0x3d0 [ 52.852581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.853250] kthread+0x24c/0x2d0 [ 52.853883] ret_from_fork+0x10/0x20 [ 52.854506] [ 52.854845] Allocated by task 254: [ 52.855390] kasan_save_stack+0x3c/0x68 [ 52.855918] kasan_save_track+0x20/0x40 [ 52.856493] kasan_save_alloc_info+0x40/0x58 [ 52.857159] __kasan_kmalloc+0xd4/0xd8 [ 52.857693] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.858371] kasan_atomics+0xb8/0x2e8 [ 52.858916] kunit_try_run_case+0x14c/0x3d0 [ 52.859459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.860232] kthread+0x24c/0x2d0 [ 52.860885] ret_from_fork+0x10/0x20 [ 52.861458] [ 52.861790] The buggy address belongs to the object at fff00000c616b300 [ 52.861790] which belongs to the cache kmalloc-64 of size 64 [ 52.863172] The buggy address is located 0 bytes to the right of [ 52.863172] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.864537] [ 52.864860] The buggy address belongs to the physical page: [ 52.865557] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.866585] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.867488] page_type: f5(slab) [ 52.867934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.869119] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.869892] page dumped because: kasan: bad access detected [ 52.870565] [ 52.871003] Memory state around the buggy address: [ 52.871730] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.872773] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.873648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.874489] ^ [ 52.875167] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.876058] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.876894] ================================================================== [ 52.255354] ================================================================== [ 52.256117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 52.257493] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.258245] [ 52.258753] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.259994] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.260567] Hardware name: linux,dummy-virt (DT) [ 52.261238] Call trace: [ 52.261622] show_stack+0x20/0x38 (C) [ 52.262278] dump_stack_lvl+0x8c/0xd0 [ 52.262881] print_report+0x118/0x5e0 [ 52.263643] kasan_report+0xc8/0x118 [ 52.264218] kasan_check_range+0x100/0x1a8 [ 52.264933] __kasan_check_write+0x20/0x30 [ 52.265594] kasan_atomics_helper+0x32c/0x4858 [ 52.266113] kasan_atomics+0x198/0x2e8 [ 52.266856] kunit_try_run_case+0x14c/0x3d0 [ 52.267546] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.268355] kthread+0x24c/0x2d0 [ 52.268931] ret_from_fork+0x10/0x20 [ 52.269509] [ 52.269841] Allocated by task 254: [ 52.270385] kasan_save_stack+0x3c/0x68 [ 52.270853] kasan_save_track+0x20/0x40 [ 52.271519] kasan_save_alloc_info+0x40/0x58 [ 52.272036] __kasan_kmalloc+0xd4/0xd8 [ 52.272757] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.273422] kasan_atomics+0xb8/0x2e8 [ 52.274013] kunit_try_run_case+0x14c/0x3d0 [ 52.274602] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.275413] kthread+0x24c/0x2d0 [ 52.275915] ret_from_fork+0x10/0x20 [ 52.276535] [ 52.276851] The buggy address belongs to the object at fff00000c616b300 [ 52.276851] which belongs to the cache kmalloc-64 of size 64 [ 52.278224] The buggy address is located 0 bytes to the right of [ 52.278224] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.279750] [ 52.280045] The buggy address belongs to the physical page: [ 52.280838] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.281815] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.282586] page_type: f5(slab) [ 52.283188] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.284029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.285012] page dumped because: kasan: bad access detected [ 52.285696] [ 52.286050] Memory state around the buggy address: [ 52.286654] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.287646] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.288500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.289345] ^ [ 52.290074] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.290891] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.291721] ================================================================== [ 53.179959] ================================================================== [ 53.180653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 53.181824] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.182718] [ 53.183023] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.184158] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.184768] Hardware name: linux,dummy-virt (DT) [ 53.185505] Call trace: [ 53.185994] show_stack+0x20/0x38 (C) [ 53.186597] dump_stack_lvl+0x8c/0xd0 [ 53.187240] print_report+0x118/0x5e0 [ 53.187776] kasan_report+0xc8/0x118 [ 53.188310] __asan_report_load4_noabort+0x20/0x30 [ 53.188894] kasan_atomics_helper+0x3de4/0x4858 [ 53.189652] kasan_atomics+0x198/0x2e8 [ 53.190187] kunit_try_run_case+0x14c/0x3d0 [ 53.191121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.191818] kthread+0x24c/0x2d0 [ 53.192360] ret_from_fork+0x10/0x20 [ 53.192975] [ 53.193356] Allocated by task 254: [ 53.193758] kasan_save_stack+0x3c/0x68 [ 53.194468] kasan_save_track+0x20/0x40 [ 53.195020] kasan_save_alloc_info+0x40/0x58 [ 53.195658] __kasan_kmalloc+0xd4/0xd8 [ 53.196147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.196868] kasan_atomics+0xb8/0x2e8 [ 53.197367] kunit_try_run_case+0x14c/0x3d0 [ 53.198099] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.198707] kthread+0x24c/0x2d0 [ 53.199340] ret_from_fork+0x10/0x20 [ 53.199891] [ 53.200322] The buggy address belongs to the object at fff00000c616b300 [ 53.200322] which belongs to the cache kmalloc-64 of size 64 [ 53.201715] The buggy address is located 0 bytes to the right of [ 53.201715] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.203135] [ 53.203490] The buggy address belongs to the physical page: [ 53.204215] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.205129] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.205855] page_type: f5(slab) [ 53.206410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.207368] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.208283] page dumped because: kasan: bad access detected [ 53.209051] [ 53.209348] Memory state around the buggy address: [ 53.210015] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.210836] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.211648] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.212573] ^ [ 53.213165] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.214111] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.214966] ================================================================== [ 52.760897] ================================================================== [ 52.761800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 52.763094] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.764183] [ 52.764633] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.766269] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.766861] Hardware name: linux,dummy-virt (DT) [ 52.767518] Call trace: [ 52.768035] show_stack+0x20/0x38 (C) [ 52.768677] dump_stack_lvl+0x8c/0xd0 [ 52.769349] print_report+0x118/0x5e0 [ 52.769994] kasan_report+0xc8/0x118 [ 52.770622] kasan_check_range+0x100/0x1a8 [ 52.771309] __kasan_check_write+0x20/0x30 [ 52.771969] kasan_atomics_helper+0x894/0x4858 [ 52.772655] kasan_atomics+0x198/0x2e8 [ 52.773255] kunit_try_run_case+0x14c/0x3d0 [ 52.773956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.774777] kthread+0x24c/0x2d0 [ 52.775481] ret_from_fork+0x10/0x20 [ 52.776117] [ 52.776444] Allocated by task 254: [ 52.777065] kasan_save_stack+0x3c/0x68 [ 52.777664] kasan_save_track+0x20/0x40 [ 52.778402] kasan_save_alloc_info+0x40/0x58 [ 52.779078] __kasan_kmalloc+0xd4/0xd8 [ 52.779908] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.780330] kasan_atomics+0xb8/0x2e8 [ 52.780680] kunit_try_run_case+0x14c/0x3d0 [ 52.781062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.781528] kthread+0x24c/0x2d0 [ 52.781895] ret_from_fork+0x10/0x20 [ 52.782249] [ 52.783339] The buggy address belongs to the object at fff00000c616b300 [ 52.783339] which belongs to the cache kmalloc-64 of size 64 [ 52.786337] The buggy address is located 0 bytes to the right of [ 52.786337] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.787911] [ 52.788239] The buggy address belongs to the physical page: [ 52.788980] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.789831] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.790657] page_type: f5(slab) [ 52.791117] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.792101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.793089] page dumped because: kasan: bad access detected [ 52.793775] [ 52.794085] Memory state around the buggy address: [ 52.794711] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.795619] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.796547] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.797333] ^ [ 52.797995] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.798838] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.799713] ================================================================== [ 53.914681] ================================================================== [ 53.915772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 53.916771] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.917528] [ 53.917903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.919138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.919710] Hardware name: linux,dummy-virt (DT) [ 53.920275] Call trace: [ 53.921171] show_stack+0x20/0x38 (C) [ 53.921736] dump_stack_lvl+0x8c/0xd0 [ 53.922429] print_report+0x118/0x5e0 [ 53.922971] kasan_report+0xc8/0x118 [ 53.923542] kasan_check_range+0x100/0x1a8 [ 53.924216] __kasan_check_write+0x20/0x30 [ 53.924863] kasan_atomics_helper+0x12d8/0x4858 [ 53.925529] kasan_atomics+0x198/0x2e8 [ 53.926111] kunit_try_run_case+0x14c/0x3d0 [ 53.926748] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.927547] kthread+0x24c/0x2d0 [ 53.928117] ret_from_fork+0x10/0x20 [ 53.928618] [ 53.928975] Allocated by task 254: [ 53.929630] kasan_save_stack+0x3c/0x68 [ 53.930164] kasan_save_track+0x20/0x40 [ 53.930727] kasan_save_alloc_info+0x40/0x58 [ 53.931425] __kasan_kmalloc+0xd4/0xd8 [ 53.931967] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.932593] kasan_atomics+0xb8/0x2e8 [ 53.933105] kunit_try_run_case+0x14c/0x3d0 [ 53.933772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.934475] kthread+0x24c/0x2d0 [ 53.934954] ret_from_fork+0x10/0x20 [ 53.935628] [ 53.935986] The buggy address belongs to the object at fff00000c616b300 [ 53.935986] which belongs to the cache kmalloc-64 of size 64 [ 53.937371] The buggy address is located 0 bytes to the right of [ 53.937371] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.938841] [ 53.939177] The buggy address belongs to the physical page: [ 53.939883] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.940792] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.941703] page_type: f5(slab) [ 53.942170] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.943200] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.944182] page dumped because: kasan: bad access detected [ 53.944844] [ 53.945163] Memory state around the buggy address: [ 53.945761] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.946662] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.947549] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.948496] ^ [ 53.949073] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.949951] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.950840] ================================================================== [ 54.149963] ================================================================== [ 54.150741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 54.151714] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.152777] [ 54.153105] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.154282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.154913] Hardware name: linux,dummy-virt (DT) [ 54.155543] Call trace: [ 54.155970] show_stack+0x20/0x38 (C) [ 54.156493] dump_stack_lvl+0x8c/0xd0 [ 54.157154] print_report+0x118/0x5e0 [ 54.157728] kasan_report+0xc8/0x118 [ 54.158428] kasan_check_range+0x100/0x1a8 [ 54.159061] __kasan_check_write+0x20/0x30 [ 54.159763] kasan_atomics_helper+0x154c/0x4858 [ 54.160502] kasan_atomics+0x198/0x2e8 [ 54.161187] kunit_try_run_case+0x14c/0x3d0 [ 54.161760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.162567] kthread+0x24c/0x2d0 [ 54.163129] ret_from_fork+0x10/0x20 [ 54.163668] [ 54.164054] Allocated by task 254: [ 54.164587] kasan_save_stack+0x3c/0x68 [ 54.165110] kasan_save_track+0x20/0x40 [ 54.165697] kasan_save_alloc_info+0x40/0x58 [ 54.166419] __kasan_kmalloc+0xd4/0xd8 [ 54.166972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.167748] kasan_atomics+0xb8/0x2e8 [ 54.168268] kunit_try_run_case+0x14c/0x3d0 [ 54.168950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.169648] kthread+0x24c/0x2d0 [ 54.170166] ret_from_fork+0x10/0x20 [ 54.170702] [ 54.171021] The buggy address belongs to the object at fff00000c616b300 [ 54.171021] which belongs to the cache kmalloc-64 of size 64 [ 54.172390] The buggy address is located 0 bytes to the right of [ 54.172390] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.173668] [ 54.174105] The buggy address belongs to the physical page: [ 54.174908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.175826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.176648] page_type: f5(slab) [ 54.177213] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.178126] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.179030] page dumped because: kasan: bad access detected [ 54.179694] [ 54.180028] Memory state around the buggy address: [ 54.180651] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.181500] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.182420] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.183231] ^ [ 54.183813] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.184678] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.185609] ================================================================== [ 52.446565] ================================================================== [ 52.447283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 52.448609] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.449876] [ 52.450215] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.451388] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.452019] Hardware name: linux,dummy-virt (DT) [ 52.452590] Call trace: [ 52.453038] show_stack+0x20/0x38 (C) [ 52.453621] dump_stack_lvl+0x8c/0xd0 [ 52.454176] print_report+0x118/0x5e0 [ 52.454816] kasan_report+0xc8/0x118 [ 52.455373] kasan_check_range+0x100/0x1a8 [ 52.456077] __kasan_check_write+0x20/0x30 [ 52.456714] kasan_atomics_helper+0x4e4/0x4858 [ 52.457539] kasan_atomics+0x198/0x2e8 [ 52.458204] kunit_try_run_case+0x14c/0x3d0 [ 52.458912] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.459632] kthread+0x24c/0x2d0 [ 52.460186] ret_from_fork+0x10/0x20 [ 52.460896] [ 52.461204] Allocated by task 254: [ 52.461898] kasan_save_stack+0x3c/0x68 [ 52.462544] kasan_save_track+0x20/0x40 [ 52.463138] kasan_save_alloc_info+0x40/0x58 [ 52.463746] __kasan_kmalloc+0xd4/0xd8 [ 52.464445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.465029] kasan_atomics+0xb8/0x2e8 [ 52.465704] kunit_try_run_case+0x14c/0x3d0 [ 52.466252] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.467088] kthread+0x24c/0x2d0 [ 52.467650] ret_from_fork+0x10/0x20 [ 52.468151] [ 52.468547] The buggy address belongs to the object at fff00000c616b300 [ 52.468547] which belongs to the cache kmalloc-64 of size 64 [ 52.469835] The buggy address is located 0 bytes to the right of [ 52.469835] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.471316] [ 52.471610] The buggy address belongs to the physical page: [ 52.472309] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.473238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.474051] page_type: f5(slab) [ 52.474621] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.475492] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.476541] page dumped because: kasan: bad access detected [ 52.477209] [ 52.477578] Memory state around the buggy address: [ 52.478208] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.479114] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.480080] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.480968] ^ [ 52.481614] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.482521] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.483428] ================================================================== [ 53.298429] ================================================================== [ 53.299208] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 53.300162] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.300886] [ 53.301594] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.302958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.303470] Hardware name: linux,dummy-virt (DT) [ 53.304189] Call trace: [ 53.304589] show_stack+0x20/0x38 (C) [ 53.305112] dump_stack_lvl+0x8c/0xd0 [ 53.305839] print_report+0x118/0x5e0 [ 53.306406] kasan_report+0xc8/0x118 [ 53.306983] kasan_check_range+0x100/0x1a8 [ 53.307604] __kasan_check_write+0x20/0x30 [ 53.308223] kasan_atomics_helper+0xd3c/0x4858 [ 53.308935] kasan_atomics+0x198/0x2e8 [ 53.309557] kunit_try_run_case+0x14c/0x3d0 [ 53.310143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.311003] kthread+0x24c/0x2d0 [ 53.311567] ret_from_fork+0x10/0x20 [ 53.312127] [ 53.312438] Allocated by task 254: [ 53.312992] kasan_save_stack+0x3c/0x68 [ 53.313647] kasan_save_track+0x20/0x40 [ 53.314228] kasan_save_alloc_info+0x40/0x58 [ 53.314845] __kasan_kmalloc+0xd4/0xd8 [ 53.315427] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.316039] kasan_atomics+0xb8/0x2e8 [ 53.316792] kunit_try_run_case+0x14c/0x3d0 [ 53.317457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.318213] kthread+0x24c/0x2d0 [ 53.318796] ret_from_fork+0x10/0x20 [ 53.319520] [ 53.319815] The buggy address belongs to the object at fff00000c616b300 [ 53.319815] which belongs to the cache kmalloc-64 of size 64 [ 53.320939] The buggy address is located 0 bytes to the right of [ 53.320939] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.322143] [ 53.322582] The buggy address belongs to the physical page: [ 53.323069] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.324276] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.324851] page_type: f5(slab) [ 53.325218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.326013] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.326962] page dumped because: kasan: bad access detected [ 53.328030] [ 53.328375] Memory state around the buggy address: [ 53.329335] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.330169] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.330989] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.332202] ^ [ 53.333141] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.334083] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.334967] ================================================================== [ 52.370633] ================================================================== [ 52.371357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 52.372480] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.373489] [ 52.373826] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.375181] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.375852] Hardware name: linux,dummy-virt (DT) [ 52.376469] Call trace: [ 52.376968] show_stack+0x20/0x38 (C) [ 52.377540] dump_stack_lvl+0x8c/0xd0 [ 52.378268] print_report+0x118/0x5e0 [ 52.378871] kasan_report+0xc8/0x118 [ 52.379521] kasan_check_range+0x100/0x1a8 [ 52.380276] __kasan_check_write+0x20/0x30 [ 52.380904] kasan_atomics_helper+0x414/0x4858 [ 52.381592] kasan_atomics+0x198/0x2e8 [ 52.382235] kunit_try_run_case+0x14c/0x3d0 [ 52.382883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.383584] kthread+0x24c/0x2d0 [ 52.384211] ret_from_fork+0x10/0x20 [ 52.384781] [ 52.385083] Allocated by task 254: [ 52.385667] kasan_save_stack+0x3c/0x68 [ 52.386277] kasan_save_track+0x20/0x40 [ 52.386798] kasan_save_alloc_info+0x40/0x58 [ 52.387501] __kasan_kmalloc+0xd4/0xd8 [ 52.388038] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.388643] kasan_atomics+0xb8/0x2e8 [ 52.389239] kunit_try_run_case+0x14c/0x3d0 [ 52.389853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.390499] kthread+0x24c/0x2d0 [ 52.391135] ret_from_fork+0x10/0x20 [ 52.391673] [ 52.391996] The buggy address belongs to the object at fff00000c616b300 [ 52.391996] which belongs to the cache kmalloc-64 of size 64 [ 52.393287] The buggy address is located 0 bytes to the right of [ 52.393287] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.394792] [ 52.395110] The buggy address belongs to the physical page: [ 52.395806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.396707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.397608] page_type: f5(slab) [ 52.398094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.399154] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.400021] page dumped because: kasan: bad access detected [ 52.400686] [ 52.400995] Memory state around the buggy address: [ 52.401629] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.402448] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.403349] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.404174] ^ [ 52.404772] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.405677] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.406521] ================================================================== [ 53.448829] ================================================================== [ 53.449743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 53.451547] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.453257] [ 53.453680] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.454943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.455556] Hardware name: linux,dummy-virt (DT) [ 53.456199] Call trace: [ 53.456881] show_stack+0x20/0x38 (C) [ 53.457502] dump_stack_lvl+0x8c/0xd0 [ 53.458216] print_report+0x118/0x5e0 [ 53.458910] kasan_report+0xc8/0x118 [ 53.459609] kasan_check_range+0x100/0x1a8 [ 53.460261] __kasan_check_write+0x20/0x30 [ 53.460928] kasan_atomics_helper+0xe44/0x4858 [ 53.461635] kasan_atomics+0x198/0x2e8 [ 53.462248] kunit_try_run_case+0x14c/0x3d0 [ 53.462945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.463751] kthread+0x24c/0x2d0 [ 53.464379] ret_from_fork+0x10/0x20 [ 53.465043] [ 53.465444] Allocated by task 254: [ 53.465977] kasan_save_stack+0x3c/0x68 [ 53.466720] kasan_save_track+0x20/0x40 [ 53.467344] kasan_save_alloc_info+0x40/0x58 [ 53.467980] __kasan_kmalloc+0xd4/0xd8 [ 53.468702] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.469425] kasan_atomics+0xb8/0x2e8 [ 53.470034] kunit_try_run_case+0x14c/0x3d0 [ 53.470735] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.471597] kthread+0x24c/0x2d0 [ 53.472175] ret_from_fork+0x10/0x20 [ 53.472761] [ 53.473145] The buggy address belongs to the object at fff00000c616b300 [ 53.473145] which belongs to the cache kmalloc-64 of size 64 [ 53.474645] The buggy address is located 0 bytes to the right of [ 53.474645] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.476155] [ 53.476596] The buggy address belongs to the physical page: [ 53.477384] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.478395] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.479360] page_type: f5(slab) [ 53.479968] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.480957] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.481854] page dumped because: kasan: bad access detected [ 53.482607] [ 53.482947] Memory state around the buggy address: [ 53.483678] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.484698] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.485685] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.486718] ^ [ 53.487500] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.488289] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.489331] ================================================================== [ 53.602719] ================================================================== [ 53.603691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 53.604645] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.605446] [ 53.605841] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.607123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.607710] Hardware name: linux,dummy-virt (DT) [ 53.608366] Call trace: [ 53.608715] show_stack+0x20/0x38 (C) [ 53.609318] dump_stack_lvl+0x8c/0xd0 [ 53.610021] print_report+0x118/0x5e0 [ 53.610661] kasan_report+0xc8/0x118 [ 53.611165] kasan_check_range+0x100/0x1a8 [ 53.611931] __kasan_check_write+0x20/0x30 [ 53.612482] kasan_atomics_helper+0xf88/0x4858 [ 53.613346] kasan_atomics+0x198/0x2e8 [ 53.613821] kunit_try_run_case+0x14c/0x3d0 [ 53.614629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.615394] kthread+0x24c/0x2d0 [ 53.616029] ret_from_fork+0x10/0x20 [ 53.616567] [ 53.616949] Allocated by task 254: [ 53.617527] kasan_save_stack+0x3c/0x68 [ 53.618132] kasan_save_track+0x20/0x40 [ 53.618712] kasan_save_alloc_info+0x40/0x58 [ 53.619196] __kasan_kmalloc+0xd4/0xd8 [ 53.619846] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.620410] kasan_atomics+0xb8/0x2e8 [ 53.621024] kunit_try_run_case+0x14c/0x3d0 [ 53.621578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.622374] kthread+0x24c/0x2d0 [ 53.622935] ret_from_fork+0x10/0x20 [ 53.623408] [ 53.623856] The buggy address belongs to the object at fff00000c616b300 [ 53.623856] which belongs to the cache kmalloc-64 of size 64 [ 53.625376] The buggy address is located 0 bytes to the right of [ 53.625376] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.626786] [ 53.627064] The buggy address belongs to the physical page: [ 53.627703] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.628645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.629549] page_type: f5(slab) [ 53.630026] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.630954] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.631845] page dumped because: kasan: bad access detected [ 53.632604] [ 53.632954] Memory state around the buggy address: [ 53.633621] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.634463] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.635364] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.636198] ^ [ 53.636776] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.637675] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.638634] ================================================================== [ 52.522426] ================================================================== [ 52.523536] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 52.524533] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.525542] [ 52.525955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.527046] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.527373] Hardware name: linux,dummy-virt (DT) [ 52.528061] Call trace: [ 52.528660] show_stack+0x20/0x38 (C) [ 52.529205] dump_stack_lvl+0x8c/0xd0 [ 52.529842] print_report+0x118/0x5e0 [ 52.530480] kasan_report+0xc8/0x118 [ 52.531121] kasan_check_range+0x100/0x1a8 [ 52.531771] __kasan_check_write+0x20/0x30 [ 52.532520] kasan_atomics_helper+0x5b4/0x4858 [ 52.533262] kasan_atomics+0x198/0x2e8 [ 52.533914] kunit_try_run_case+0x14c/0x3d0 [ 52.534625] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.535505] kthread+0x24c/0x2d0 [ 52.536136] ret_from_fork+0x10/0x20 [ 52.536760] [ 52.537088] Allocated by task 254: [ 52.537715] kasan_save_stack+0x3c/0x68 [ 52.538434] kasan_save_track+0x20/0x40 [ 52.539057] kasan_save_alloc_info+0x40/0x58 [ 52.539735] __kasan_kmalloc+0xd4/0xd8 [ 52.540360] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.541030] kasan_atomics+0xb8/0x2e8 [ 52.541657] kunit_try_run_case+0x14c/0x3d0 [ 52.542384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.543157] kthread+0x24c/0x2d0 [ 52.543743] ret_from_fork+0x10/0x20 [ 52.544379] [ 52.544856] The buggy address belongs to the object at fff00000c616b300 [ 52.544856] which belongs to the cache kmalloc-64 of size 64 [ 52.546264] The buggy address is located 0 bytes to the right of [ 52.546264] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.547896] [ 52.548185] The buggy address belongs to the physical page: [ 52.548954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.550020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.550882] page_type: f5(slab) [ 52.551430] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.552470] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.553435] page dumped because: kasan: bad access detected [ 52.554153] [ 52.554488] Memory state around the buggy address: [ 52.555205] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.556165] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.557051] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.557905] ^ [ 52.558570] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.559492] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.560424] ================================================================== [ 53.834230] ================================================================== [ 53.836904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 53.839170] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.841667] [ 53.841979] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.843130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.843710] Hardware name: linux,dummy-virt (DT) [ 53.844289] Call trace: [ 53.844690] show_stack+0x20/0x38 (C) [ 53.845336] dump_stack_lvl+0x8c/0xd0 [ 53.845906] print_report+0x118/0x5e0 [ 53.846481] kasan_report+0xc8/0x118 [ 53.847019] kasan_check_range+0x100/0x1a8 [ 53.847582] __kasan_check_write+0x20/0x30 [ 53.848352] kasan_atomics_helper+0x11f8/0x4858 [ 53.849004] kasan_atomics+0x198/0x2e8 [ 53.849704] kunit_try_run_case+0x14c/0x3d0 [ 53.850338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.851241] kthread+0x24c/0x2d0 [ 53.851926] ret_from_fork+0x10/0x20 [ 53.852480] [ 53.852776] Allocated by task 254: [ 53.853236] kasan_save_stack+0x3c/0x68 [ 53.853853] kasan_save_track+0x20/0x40 [ 53.854343] kasan_save_alloc_info+0x40/0x58 [ 53.854983] __kasan_kmalloc+0xd4/0xd8 [ 53.855689] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.856195] kasan_atomics+0xb8/0x2e8 [ 53.856834] kunit_try_run_case+0x14c/0x3d0 [ 53.857503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.858181] kthread+0x24c/0x2d0 [ 53.858744] ret_from_fork+0x10/0x20 [ 53.859263] [ 53.859579] The buggy address belongs to the object at fff00000c616b300 [ 53.859579] which belongs to the cache kmalloc-64 of size 64 [ 53.861061] The buggy address is located 0 bytes to the right of [ 53.861061] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.862476] [ 53.862792] The buggy address belongs to the physical page: [ 53.863485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.864371] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.865225] page_type: f5(slab) [ 53.865666] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.866604] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.867536] page dumped because: kasan: bad access detected [ 53.868220] [ 53.868601] Memory state around the buggy address: [ 53.869265] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.870099] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.870920] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.871840] ^ [ 53.872593] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.873392] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.874279] ================================================================== [ 53.952560] ================================================================== [ 53.953249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 53.954003] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.955075] [ 53.955472] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.956565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.957337] Hardware name: linux,dummy-virt (DT) [ 53.957929] Call trace: [ 53.958357] show_stack+0x20/0x38 (C) [ 53.959031] dump_stack_lvl+0x8c/0xd0 [ 53.959687] print_report+0x118/0x5e0 [ 53.960401] kasan_report+0xc8/0x118 [ 53.961120] kasan_check_range+0x100/0x1a8 [ 53.961857] __kasan_check_write+0x20/0x30 [ 53.962619] kasan_atomics_helper+0x1384/0x4858 [ 53.963504] kasan_atomics+0x198/0x2e8 [ 53.964114] kunit_try_run_case+0x14c/0x3d0 [ 53.964772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.965553] kthread+0x24c/0x2d0 [ 53.966233] ret_from_fork+0x10/0x20 [ 53.966958] [ 53.967320] Allocated by task 254: [ 53.967929] kasan_save_stack+0x3c/0x68 [ 53.968656] kasan_save_track+0x20/0x40 [ 53.969353] kasan_save_alloc_info+0x40/0x58 [ 53.970004] __kasan_kmalloc+0xd4/0xd8 [ 53.970646] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.971309] kasan_atomics+0xb8/0x2e8 [ 53.971994] kunit_try_run_case+0x14c/0x3d0 [ 53.972690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.973468] kthread+0x24c/0x2d0 [ 53.974051] ret_from_fork+0x10/0x20 [ 53.974681] [ 53.975024] The buggy address belongs to the object at fff00000c616b300 [ 53.975024] which belongs to the cache kmalloc-64 of size 64 [ 53.976538] The buggy address is located 0 bytes to the right of [ 53.976538] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.978100] [ 53.978508] The buggy address belongs to the physical page: [ 53.979362] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.980368] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.981321] page_type: f5(slab) [ 53.981877] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.982879] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.983891] page dumped because: kasan: bad access detected [ 53.984631] [ 53.984969] Memory state around the buggy address: [ 53.985692] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.986711] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.987618] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.988523] ^ [ 53.989323] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.990255] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.991238] ================================================================== [ 52.721398] ================================================================== [ 52.722012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 52.722971] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.723807] [ 52.724142] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.725574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.726179] Hardware name: linux,dummy-virt (DT) [ 52.726857] Call trace: [ 52.727248] show_stack+0x20/0x38 (C) [ 52.727941] dump_stack_lvl+0x8c/0xd0 [ 52.728591] print_report+0x118/0x5e0 [ 52.729251] kasan_report+0xc8/0x118 [ 52.729893] kasan_check_range+0x100/0x1a8 [ 52.730598] __kasan_check_write+0x20/0x30 [ 52.731251] kasan_atomics_helper+0x7cc/0x4858 [ 52.731950] kasan_atomics+0x198/0x2e8 [ 52.732589] kunit_try_run_case+0x14c/0x3d0 [ 52.733272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.734145] kthread+0x24c/0x2d0 [ 52.734827] ret_from_fork+0x10/0x20 [ 52.735522] [ 52.735932] Allocated by task 254: [ 52.736540] kasan_save_stack+0x3c/0x68 [ 52.737239] kasan_save_track+0x20/0x40 [ 52.737857] kasan_save_alloc_info+0x40/0x58 [ 52.738620] __kasan_kmalloc+0xd4/0xd8 [ 52.739210] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.739903] kasan_atomics+0xb8/0x2e8 [ 52.740495] kunit_try_run_case+0x14c/0x3d0 [ 52.741083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.741822] kthread+0x24c/0x2d0 [ 52.742487] ret_from_fork+0x10/0x20 [ 52.743272] [ 52.743664] The buggy address belongs to the object at fff00000c616b300 [ 52.743664] which belongs to the cache kmalloc-64 of size 64 [ 52.745066] The buggy address is located 0 bytes to the right of [ 52.745066] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.746548] [ 52.747006] The buggy address belongs to the physical page: [ 52.747783] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.748771] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.749608] page_type: f5(slab) [ 52.750263] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.751236] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.752165] page dumped because: kasan: bad access detected [ 52.752888] [ 52.753245] Memory state around the buggy address: [ 52.753998] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.754890] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.755810] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.756680] ^ [ 52.757409] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.758280] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.759143] ================================================================== [ 52.562092] ================================================================== [ 52.562737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 52.563803] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.564611] [ 52.564994] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.566207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.566839] Hardware name: linux,dummy-virt (DT) [ 52.567520] Call trace: [ 52.568029] show_stack+0x20/0x38 (C) [ 52.568539] dump_stack_lvl+0x8c/0xd0 [ 52.569184] print_report+0x118/0x5e0 [ 52.569827] kasan_report+0xc8/0x118 [ 52.570355] kasan_check_range+0x100/0x1a8 [ 52.571002] __kasan_check_write+0x20/0x30 [ 52.571664] kasan_atomics_helper+0x61c/0x4858 [ 52.572218] kasan_atomics+0x198/0x2e8 [ 52.572924] kunit_try_run_case+0x14c/0x3d0 [ 52.573557] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.574241] kthread+0x24c/0x2d0 [ 52.574886] ret_from_fork+0x10/0x20 [ 52.575522] [ 52.575869] Allocated by task 254: [ 52.576288] kasan_save_stack+0x3c/0x68 [ 52.576973] kasan_save_track+0x20/0x40 [ 52.577509] kasan_save_alloc_info+0x40/0x58 [ 52.578079] __kasan_kmalloc+0xd4/0xd8 [ 52.578702] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.579273] kasan_atomics+0xb8/0x2e8 [ 52.579887] kunit_try_run_case+0x14c/0x3d0 [ 52.580396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.581145] kthread+0x24c/0x2d0 [ 52.581678] ret_from_fork+0x10/0x20 [ 52.582313] [ 52.582651] The buggy address belongs to the object at fff00000c616b300 [ 52.582651] which belongs to the cache kmalloc-64 of size 64 [ 52.583990] The buggy address is located 0 bytes to the right of [ 52.583990] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.585657] [ 52.586377] The buggy address belongs to the physical page: [ 52.587103] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.588218] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.589215] page_type: f5(slab) [ 52.589677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.590716] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.591749] page dumped because: kasan: bad access detected [ 52.592516] [ 52.592855] Memory state around the buggy address: [ 52.593626] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.594569] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.595522] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.596397] ^ [ 52.597086] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.597979] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.598993] ================================================================== [ 54.486040] ================================================================== [ 54.486779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 54.487802] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.488932] [ 54.489712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.490879] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.491813] Hardware name: linux,dummy-virt (DT) [ 54.492573] Call trace: [ 54.493055] show_stack+0x20/0x38 (C) [ 54.493647] dump_stack_lvl+0x8c/0xd0 [ 54.494208] print_report+0x118/0x5e0 [ 54.494853] kasan_report+0xc8/0x118 [ 54.495449] kasan_check_range+0x100/0x1a8 [ 54.496136] __kasan_check_write+0x20/0x30 [ 54.496713] kasan_atomics_helper+0x17ec/0x4858 [ 54.497460] kasan_atomics+0x198/0x2e8 [ 54.497991] kunit_try_run_case+0x14c/0x3d0 [ 54.498694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.499526] kthread+0x24c/0x2d0 [ 54.500031] ret_from_fork+0x10/0x20 [ 54.500631] [ 54.501100] Allocated by task 254: [ 54.501659] kasan_save_stack+0x3c/0x68 [ 54.502174] kasan_save_track+0x20/0x40 [ 54.502956] kasan_save_alloc_info+0x40/0x58 [ 54.503606] __kasan_kmalloc+0xd4/0xd8 [ 54.504121] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.504920] kasan_atomics+0xb8/0x2e8 [ 54.505488] kunit_try_run_case+0x14c/0x3d0 [ 54.506053] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.506705] kthread+0x24c/0x2d0 [ 54.507288] ret_from_fork+0x10/0x20 [ 54.507798] [ 54.508174] The buggy address belongs to the object at fff00000c616b300 [ 54.508174] which belongs to the cache kmalloc-64 of size 64 [ 54.509628] The buggy address is located 0 bytes to the right of [ 54.509628] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.511003] [ 54.511396] The buggy address belongs to the physical page: [ 54.512099] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.512996] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.514013] page_type: f5(slab) [ 54.514595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.515605] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.516507] page dumped because: kasan: bad access detected [ 54.517264] [ 54.517610] Memory state around the buggy address: [ 54.518268] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.519110] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.519931] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.520797] ^ [ 54.521430] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.522316] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.523224] ================================================================== [ 54.260663] ================================================================== [ 54.262468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 54.263247] Write of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.264253] [ 54.264589] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.265788] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.266372] Hardware name: linux,dummy-virt (DT) [ 54.266972] Call trace: [ 54.267405] show_stack+0x20/0x38 (C) [ 54.268069] dump_stack_lvl+0x8c/0xd0 [ 54.268682] print_report+0x118/0x5e0 [ 54.269227] kasan_report+0xc8/0x118 [ 54.269782] kasan_check_range+0x100/0x1a8 [ 54.270419] __kasan_check_write+0x20/0x30 [ 54.271056] kasan_atomics_helper+0x1644/0x4858 [ 54.271732] kasan_atomics+0x198/0x2e8 [ 54.272345] kunit_try_run_case+0x14c/0x3d0 [ 54.272841] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.273616] kthread+0x24c/0x2d0 [ 54.274209] ret_from_fork+0x10/0x20 [ 54.274832] [ 54.275200] Allocated by task 254: [ 54.275656] kasan_save_stack+0x3c/0x68 [ 54.276315] kasan_save_track+0x20/0x40 [ 54.276881] kasan_save_alloc_info+0x40/0x58 [ 54.277384] __kasan_kmalloc+0xd4/0xd8 [ 54.277998] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.278623] kasan_atomics+0xb8/0x2e8 [ 54.279269] kunit_try_run_case+0x14c/0x3d0 [ 54.279923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.280570] kthread+0x24c/0x2d0 [ 54.281168] ret_from_fork+0x10/0x20 [ 54.281714] [ 54.281986] The buggy address belongs to the object at fff00000c616b300 [ 54.281986] which belongs to the cache kmalloc-64 of size 64 [ 54.283384] The buggy address is located 0 bytes to the right of [ 54.283384] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.284892] [ 54.285202] The buggy address belongs to the physical page: [ 54.286001] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.286895] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.287753] page_type: f5(slab) [ 54.288218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.289207] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.290053] page dumped because: kasan: bad access detected [ 54.290624] [ 54.290984] Memory state around the buggy address: [ 54.291615] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.292569] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.293541] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.294437] ^ [ 54.295065] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.295925] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.296834] ================================================================== [ 52.295279] ================================================================== [ 52.296061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 52.296850] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.297714] [ 52.298172] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.299244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.300106] Hardware name: linux,dummy-virt (DT) [ 52.300654] Call trace: [ 52.301108] show_stack+0x20/0x38 (C) [ 52.301673] dump_stack_lvl+0x8c/0xd0 [ 52.302339] print_report+0x118/0x5e0 [ 52.302898] kasan_report+0xc8/0x118 [ 52.303461] __asan_report_store4_noabort+0x20/0x30 [ 52.304168] kasan_atomics_helper+0x3f94/0x4858 [ 52.305159] kasan_atomics+0x198/0x2e8 [ 52.305831] kunit_try_run_case+0x14c/0x3d0 [ 52.306616] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.307468] kthread+0x24c/0x2d0 [ 52.308063] ret_from_fork+0x10/0x20 [ 52.308635] [ 52.309044] Allocated by task 254: [ 52.309607] kasan_save_stack+0x3c/0x68 [ 52.310365] kasan_save_track+0x20/0x40 [ 52.311021] kasan_save_alloc_info+0x40/0x58 [ 52.311808] __kasan_kmalloc+0xd4/0xd8 [ 52.312398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.313099] kasan_atomics+0xb8/0x2e8 [ 52.313819] kunit_try_run_case+0x14c/0x3d0 [ 52.314481] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.315214] kthread+0x24c/0x2d0 [ 52.315843] ret_from_fork+0x10/0x20 [ 52.316462] [ 52.316794] The buggy address belongs to the object at fff00000c616b300 [ 52.316794] which belongs to the cache kmalloc-64 of size 64 [ 52.318314] The buggy address is located 0 bytes to the right of [ 52.318314] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.319726] [ 52.320076] The buggy address belongs to the physical page: [ 52.320813] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.321860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.322734] page_type: f5(slab) [ 52.323271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.324264] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.325195] page dumped because: kasan: bad access detected [ 52.325959] [ 52.326532] Memory state around the buggy address: [ 52.327102] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.328001] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.328915] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.329719] ^ [ 52.330361] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.331110] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.332134] ================================================================== [ 52.600490] ================================================================== [ 52.602128] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 52.603170] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.604274] [ 52.604694] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.605826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.606613] Hardware name: linux,dummy-virt (DT) [ 52.607280] Call trace: [ 52.607768] show_stack+0x20/0x38 (C) [ 52.608458] dump_stack_lvl+0x8c/0xd0 [ 52.609112] print_report+0x118/0x5e0 [ 52.609781] kasan_report+0xc8/0x118 [ 52.610365] kasan_check_range+0x100/0x1a8 [ 52.610997] __kasan_check_write+0x20/0x30 [ 52.611713] kasan_atomics_helper+0x684/0x4858 [ 52.612431] kasan_atomics+0x198/0x2e8 [ 52.613073] kunit_try_run_case+0x14c/0x3d0 [ 52.613835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.614733] kthread+0x24c/0x2d0 [ 52.615358] ret_from_fork+0x10/0x20 [ 52.615981] [ 52.616347] Allocated by task 254: [ 52.617039] kasan_save_stack+0x3c/0x68 [ 52.617695] kasan_save_track+0x20/0x40 [ 52.618347] kasan_save_alloc_info+0x40/0x58 [ 52.619026] __kasan_kmalloc+0xd4/0xd8 [ 52.619666] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.620346] kasan_atomics+0xb8/0x2e8 [ 52.620930] kunit_try_run_case+0x14c/0x3d0 [ 52.621587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.622373] kthread+0x24c/0x2d0 [ 52.623040] ret_from_fork+0x10/0x20 [ 52.623771] [ 52.624146] The buggy address belongs to the object at fff00000c616b300 [ 52.624146] which belongs to the cache kmalloc-64 of size 64 [ 52.625585] The buggy address is located 0 bytes to the right of [ 52.625585] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.627110] [ 52.627547] The buggy address belongs to the physical page: [ 52.628282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.629470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.630358] page_type: f5(slab) [ 52.630929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.631967] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.632885] page dumped because: kasan: bad access detected [ 52.633668] [ 52.634000] Memory state around the buggy address: [ 52.634811] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.635639] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.636708] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.637624] ^ [ 52.638358] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.639251] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.640137] ================================================================== [ 52.642691] ================================================================== [ 52.643499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 52.644259] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.645238] [ 52.645595] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.646759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.647287] Hardware name: linux,dummy-virt (DT) [ 52.647947] Call trace: [ 52.648475] show_stack+0x20/0x38 (C) [ 52.649018] dump_stack_lvl+0x8c/0xd0 [ 52.649830] print_report+0x118/0x5e0 [ 52.650521] kasan_report+0xc8/0x118 [ 52.651210] kasan_check_range+0x100/0x1a8 [ 52.651884] __kasan_check_write+0x20/0x30 [ 52.652588] kasan_atomics_helper+0x6ec/0x4858 [ 52.653218] kasan_atomics+0x198/0x2e8 [ 52.653865] kunit_try_run_case+0x14c/0x3d0 [ 52.654572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.655350] kthread+0x24c/0x2d0 [ 52.655993] ret_from_fork+0x10/0x20 [ 52.656597] [ 52.656956] Allocated by task 254: [ 52.657610] kasan_save_stack+0x3c/0x68 [ 52.658287] kasan_save_track+0x20/0x40 [ 52.658892] kasan_save_alloc_info+0x40/0x58 [ 52.659656] __kasan_kmalloc+0xd4/0xd8 [ 52.660321] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.660992] kasan_atomics+0xb8/0x2e8 [ 52.661643] kunit_try_run_case+0x14c/0x3d0 [ 52.662283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.663103] kthread+0x24c/0x2d0 [ 52.663664] ret_from_fork+0x10/0x20 [ 52.664184] [ 52.664496] The buggy address belongs to the object at fff00000c616b300 [ 52.664496] which belongs to the cache kmalloc-64 of size 64 [ 52.665935] The buggy address is located 0 bytes to the right of [ 52.665935] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.667509] [ 52.668000] The buggy address belongs to the physical page: [ 52.668736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.669803] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.670735] page_type: f5(slab) [ 52.671271] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.672289] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.673252] page dumped because: kasan: bad access detected [ 52.674051] [ 52.674469] Memory state around the buggy address: [ 52.675196] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.676124] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.677011] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.677926] ^ [ 52.678641] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.679636] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.680544] ================================================================== [ 52.484854] ================================================================== [ 52.485604] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 52.486590] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.487504] [ 52.487882] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.488977] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.489568] Hardware name: linux,dummy-virt (DT) [ 52.490100] Call trace: [ 52.490599] show_stack+0x20/0x38 (C) [ 52.491117] dump_stack_lvl+0x8c/0xd0 [ 52.491780] print_report+0x118/0x5e0 [ 52.492361] kasan_report+0xc8/0x118 [ 52.492910] kasan_check_range+0x100/0x1a8 [ 52.493507] __kasan_check_write+0x20/0x30 [ 52.494082] kasan_atomics_helper+0x54c/0x4858 [ 52.494820] kasan_atomics+0x198/0x2e8 [ 52.495416] kunit_try_run_case+0x14c/0x3d0 [ 52.496089] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.496779] kthread+0x24c/0x2d0 [ 52.497417] ret_from_fork+0x10/0x20 [ 52.498005] [ 52.498314] Allocated by task 254: [ 52.498842] kasan_save_stack+0x3c/0x68 [ 52.499440] kasan_save_track+0x20/0x40 [ 52.500114] kasan_save_alloc_info+0x40/0x58 [ 52.500743] __kasan_kmalloc+0xd4/0xd8 [ 52.501284] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.501828] kasan_atomics+0xb8/0x2e8 [ 52.502444] kunit_try_run_case+0x14c/0x3d0 [ 52.503025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.503760] kthread+0x24c/0x2d0 [ 52.504379] ret_from_fork+0x10/0x20 [ 52.504931] [ 52.505219] The buggy address belongs to the object at fff00000c616b300 [ 52.505219] which belongs to the cache kmalloc-64 of size 64 [ 52.506692] The buggy address is located 0 bytes to the right of [ 52.506692] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.507984] [ 52.508400] The buggy address belongs to the physical page: [ 52.509121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.509928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.510798] page_type: f5(slab) [ 52.511273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.512458] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.513358] page dumped because: kasan: bad access detected [ 52.514016] [ 52.514320] Memory state around the buggy address: [ 52.514925] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.515808] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.516564] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.517497] ^ [ 52.518045] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.518948] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.519794] ================================================================== [ 52.036811] ================================================================== [ 52.038179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 52.038838] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 52.040352] [ 52.040648] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 52.042447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 52.042856] Hardware name: linux,dummy-virt (DT) [ 52.043456] Call trace: [ 52.043928] show_stack+0x20/0x38 (C) [ 52.044532] dump_stack_lvl+0x8c/0xd0 [ 52.045377] print_report+0x118/0x5e0 [ 52.045910] kasan_report+0xc8/0x118 [ 52.046582] __asan_report_store4_noabort+0x20/0x30 [ 52.047242] kasan_atomics_helper+0x3f7c/0x4858 [ 52.047890] kasan_atomics+0x198/0x2e8 [ 52.048385] kunit_try_run_case+0x14c/0x3d0 [ 52.049288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.050034] kthread+0x24c/0x2d0 [ 52.050649] ret_from_fork+0x10/0x20 [ 52.051284] [ 52.051674] Allocated by task 254: [ 52.052287] kasan_save_stack+0x3c/0x68 [ 52.052846] kasan_save_track+0x20/0x40 [ 52.053792] kasan_save_alloc_info+0x40/0x58 [ 52.054360] __kasan_kmalloc+0xd4/0xd8 [ 52.054987] __kmalloc_cache_noprof+0x15c/0x3c0 [ 52.055662] kasan_atomics+0xb8/0x2e8 [ 52.056176] kunit_try_run_case+0x14c/0x3d0 [ 52.056838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 52.058132] kthread+0x24c/0x2d0 [ 52.058592] ret_from_fork+0x10/0x20 [ 52.059047] [ 52.059510] The buggy address belongs to the object at fff00000c616b300 [ 52.059510] which belongs to the cache kmalloc-64 of size 64 [ 52.060840] The buggy address is located 0 bytes to the right of [ 52.060840] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 52.062437] [ 52.062922] The buggy address belongs to the physical page: [ 52.063642] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 52.065327] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 52.066126] page_type: f5(slab) [ 52.066590] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 52.067593] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 52.068529] page dumped because: kasan: bad access detected [ 52.069199] [ 52.069900] Memory state around the buggy address: [ 52.070600] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.071603] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 52.072556] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 52.073597] ^ [ 52.074143] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.074997] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 52.075851] ================================================================== [ 53.336673] ================================================================== [ 53.338288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 53.339564] Read of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.340755] [ 53.341178] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.342366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.342899] Hardware name: linux,dummy-virt (DT) [ 53.343570] Call trace: [ 53.343938] show_stack+0x20/0x38 (C) [ 53.344584] dump_stack_lvl+0x8c/0xd0 [ 53.345235] print_report+0x118/0x5e0 [ 53.345831] kasan_report+0xc8/0x118 [ 53.346388] __asan_report_load4_noabort+0x20/0x30 [ 53.347032] kasan_atomics_helper+0x3e04/0x4858 [ 53.347762] kasan_atomics+0x198/0x2e8 [ 53.348569] kunit_try_run_case+0x14c/0x3d0 [ 53.349158] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.349778] kthread+0x24c/0x2d0 [ 53.350501] ret_from_fork+0x10/0x20 [ 53.351069] [ 53.351466] Allocated by task 254: [ 53.351957] kasan_save_stack+0x3c/0x68 [ 53.352524] kasan_save_track+0x20/0x40 [ 53.353154] kasan_save_alloc_info+0x40/0x58 [ 53.353781] __kasan_kmalloc+0xd4/0xd8 [ 53.354271] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.355055] kasan_atomics+0xb8/0x2e8 [ 53.355618] kunit_try_run_case+0x14c/0x3d0 [ 53.356279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.356992] kthread+0x24c/0x2d0 [ 53.357573] ret_from_fork+0x10/0x20 [ 53.358167] [ 53.358506] The buggy address belongs to the object at fff00000c616b300 [ 53.358506] which belongs to the cache kmalloc-64 of size 64 [ 53.359830] The buggy address is located 0 bytes to the right of [ 53.359830] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.361212] [ 53.361686] The buggy address belongs to the physical page: [ 53.362428] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.363386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.364194] page_type: f5(slab) [ 53.364683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.365571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.366495] page dumped because: kasan: bad access detected [ 53.367080] [ 53.367452] Memory state around the buggy address: [ 53.368144] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.369000] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.369902] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.370764] ^ [ 53.371375] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.372245] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.373047] ================================================================== [ 54.298245] ================================================================== [ 54.299095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 54.299913] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.300827] [ 54.301255] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.302463] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.303109] Hardware name: linux,dummy-virt (DT) [ 54.303776] Call trace: [ 54.304165] show_stack+0x20/0x38 (C) [ 54.304693] dump_stack_lvl+0x8c/0xd0 [ 54.305364] print_report+0x118/0x5e0 [ 54.305884] kasan_report+0xc8/0x118 [ 54.306607] __asan_report_load8_noabort+0x20/0x30 [ 54.307338] kasan_atomics_helper+0x3df4/0x4858 [ 54.308017] kasan_atomics+0x198/0x2e8 [ 54.308738] kunit_try_run_case+0x14c/0x3d0 [ 54.309315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.310229] kthread+0x24c/0x2d0 [ 54.310733] ret_from_fork+0x10/0x20 [ 54.311360] [ 54.311645] Allocated by task 254: [ 54.312080] kasan_save_stack+0x3c/0x68 [ 54.312762] kasan_save_track+0x20/0x40 [ 54.313363] kasan_save_alloc_info+0x40/0x58 [ 54.313996] __kasan_kmalloc+0xd4/0xd8 [ 54.314589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.315127] kasan_atomics+0xb8/0x2e8 [ 54.315762] kunit_try_run_case+0x14c/0x3d0 [ 54.316473] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.317119] kthread+0x24c/0x2d0 [ 54.317716] ret_from_fork+0x10/0x20 [ 54.318252] [ 54.318569] The buggy address belongs to the object at fff00000c616b300 [ 54.318569] which belongs to the cache kmalloc-64 of size 64 [ 54.319956] The buggy address is located 0 bytes to the right of [ 54.319956] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.321398] [ 54.321690] The buggy address belongs to the physical page: [ 54.322446] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.323516] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.324286] page_type: f5(slab) [ 54.324870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.325783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.326668] page dumped because: kasan: bad access detected [ 54.327470] [ 54.327978] Memory state around the buggy address: [ 54.328773] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.329613] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.330500] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.331494] ^ [ 54.332067] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.332885] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.333826] ================================================================== [ 54.372193] ================================================================== [ 54.373132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 54.374265] Read of size 8 at addr fff00000c616b330 by task kunit_try_catch/254 [ 54.375392] [ 54.375776] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 54.377307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 54.377800] Hardware name: linux,dummy-virt (DT) [ 54.378717] Call trace: [ 54.379534] show_stack+0x20/0x38 (C) [ 54.380060] dump_stack_lvl+0x8c/0xd0 [ 54.380809] print_report+0x118/0x5e0 [ 54.381633] kasan_report+0xc8/0x118 [ 54.382240] __asan_report_load8_noabort+0x20/0x30 [ 54.383205] kasan_atomics_helper+0x3e10/0x4858 [ 54.383927] kasan_atomics+0x198/0x2e8 [ 54.384533] kunit_try_run_case+0x14c/0x3d0 [ 54.385361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.386196] kthread+0x24c/0x2d0 [ 54.386781] ret_from_fork+0x10/0x20 [ 54.387405] [ 54.387852] Allocated by task 254: [ 54.388354] kasan_save_stack+0x3c/0x68 [ 54.389057] kasan_save_track+0x20/0x40 [ 54.389660] kasan_save_alloc_info+0x40/0x58 [ 54.390176] __kasan_kmalloc+0xd4/0xd8 [ 54.390910] __kmalloc_cache_noprof+0x15c/0x3c0 [ 54.391590] kasan_atomics+0xb8/0x2e8 [ 54.392139] kunit_try_run_case+0x14c/0x3d0 [ 54.392637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 54.393445] kthread+0x24c/0x2d0 [ 54.393977] ret_from_fork+0x10/0x20 [ 54.394544] [ 54.394875] The buggy address belongs to the object at fff00000c616b300 [ 54.394875] which belongs to the cache kmalloc-64 of size 64 [ 54.396131] The buggy address is located 0 bytes to the right of [ 54.396131] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 54.397552] [ 54.397923] The buggy address belongs to the physical page: [ 54.398688] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 54.399612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 54.400425] page_type: f5(slab) [ 54.400977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 54.401817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 54.402800] page dumped because: kasan: bad access detected [ 54.403512] [ 54.403857] Memory state around the buggy address: [ 54.404544] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.405390] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 54.406176] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 54.407013] ^ [ 54.407736] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.408611] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 54.409433] ================================================================== [ 53.067869] ================================================================== [ 53.068725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 53.069670] Write of size 4 at addr fff00000c616b330 by task kunit_try_catch/254 [ 53.070660] [ 53.071041] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 53.071954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 53.072656] Hardware name: linux,dummy-virt (DT) [ 53.073334] Call trace: [ 53.073760] show_stack+0x20/0x38 (C) [ 53.074250] dump_stack_lvl+0x8c/0xd0 [ 53.074807] print_report+0x118/0x5e0 [ 53.075584] kasan_report+0xc8/0x118 [ 53.076217] kasan_check_range+0x100/0x1a8 [ 53.076899] __kasan_check_write+0x20/0x30 [ 53.077427] kasan_atomics_helper+0xb70/0x4858 [ 53.078229] kasan_atomics+0x198/0x2e8 [ 53.078919] kunit_try_run_case+0x14c/0x3d0 [ 53.079578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.080485] kthread+0x24c/0x2d0 [ 53.081077] ret_from_fork+0x10/0x20 [ 53.081761] [ 53.082143] Allocated by task 254: [ 53.082761] kasan_save_stack+0x3c/0x68 [ 53.083446] kasan_save_track+0x20/0x40 [ 53.083950] kasan_save_alloc_info+0x40/0x58 [ 53.084489] __kasan_kmalloc+0xd4/0xd8 [ 53.084893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 53.085463] kasan_atomics+0xb8/0x2e8 [ 53.086120] kunit_try_run_case+0x14c/0x3d0 [ 53.086601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 53.087125] kthread+0x24c/0x2d0 [ 53.087580] ret_from_fork+0x10/0x20 [ 53.088016] [ 53.088458] The buggy address belongs to the object at fff00000c616b300 [ 53.088458] which belongs to the cache kmalloc-64 of size 64 [ 53.090216] The buggy address is located 0 bytes to the right of [ 53.090216] allocated 48-byte region [fff00000c616b300, fff00000c616b330) [ 53.091620] [ 53.091901] The buggy address belongs to the physical page: [ 53.092932] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10616b [ 53.093933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 53.094810] page_type: f5(slab) [ 53.095318] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 53.096185] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 53.097049] page dumped because: kasan: bad access detected [ 53.097839] [ 53.098083] Memory state around the buggy address: [ 53.098700] fff00000c616b200: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.099842] fff00000c616b280: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 53.100696] >fff00000c616b300: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 53.101558] ^ [ 53.102250] fff00000c616b380: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.103107] fff00000c616b400: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 53.104052] ==================================================================
[ 30.742459] ================================================================== [ 30.743595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 30.744434] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.745319] [ 30.745558] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.746650] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.747183] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.748157] Call Trace: [ 30.748505] <TASK> [ 30.748894] dump_stack_lvl+0x73/0xb0 [ 30.749371] print_report+0xd1/0x640 [ 30.749966] ? __virt_addr_valid+0x1db/0x2d0 [ 30.750696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.751346] kasan_report+0x102/0x140 [ 30.751960] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.752430] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.753087] kasan_check_range+0x10c/0x1c0 [ 30.753660] __kasan_check_write+0x18/0x20 [ 30.754165] kasan_atomics_helper+0xfaa/0x5450 [ 30.754746] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.755354] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.756071] ? kasan_atomics+0x153/0x310 [ 30.756585] kasan_atomics+0x1dd/0x310 [ 30.757226] ? __pfx_kasan_atomics+0x10/0x10 [ 30.757677] ? __pfx_read_tsc+0x10/0x10 [ 30.758409] ? ktime_get_ts64+0x84/0x230 [ 30.758813] kunit_try_run_case+0x1b3/0x490 [ 30.759417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.759834] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.760522] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.761095] ? __kthread_parkme+0x82/0x160 [ 30.761510] ? preempt_count_sub+0x50/0x80 [ 30.762111] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.762739] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.763621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.764379] kthread+0x257/0x310 [ 30.764741] ? __pfx_kthread+0x10/0x10 [ 30.765299] ret_from_fork+0x41/0x80 [ 30.765863] ? __pfx_kthread+0x10/0x10 [ 30.766471] ret_from_fork_asm+0x1a/0x30 [ 30.766950] </TASK> [ 30.767391] [ 30.767644] Allocated by task 273: [ 30.768016] kasan_save_stack+0x3d/0x60 [ 30.768597] kasan_save_track+0x18/0x40 [ 30.769278] kasan_save_alloc_info+0x3b/0x50 [ 30.769818] __kasan_kmalloc+0xb7/0xc0 [ 30.770292] __kmalloc_cache_noprof+0x184/0x410 [ 30.770937] kasan_atomics+0x96/0x310 [ 30.771289] kunit_try_run_case+0x1b3/0x490 [ 30.771820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.772617] kthread+0x257/0x310 [ 30.773013] ret_from_fork+0x41/0x80 [ 30.773757] ret_from_fork_asm+0x1a/0x30 [ 30.774362] [ 30.774607] The buggy address belongs to the object at ffff888101aba780 [ 30.774607] which belongs to the cache kmalloc-64 of size 64 [ 30.776707] The buggy address is located 0 bytes to the right of [ 30.776707] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.778506] [ 30.778676] The buggy address belongs to the physical page: [ 30.779080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.780432] flags: 0x200000000000000(node=0|zone=2) [ 30.780847] page_type: f5(slab) [ 30.781650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.782567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.783285] page dumped because: kasan: bad access detected [ 30.784131] [ 30.784557] Memory state around the buggy address: [ 30.785285] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.786572] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.787237] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.788252] ^ [ 30.788756] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.789127] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.789792] ================================================================== [ 31.837116] ================================================================== [ 31.837873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 31.839215] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.839755] [ 31.839930] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.841444] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.842044] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.843095] Call Trace: [ 31.843575] <TASK> [ 31.843828] dump_stack_lvl+0x73/0xb0 [ 31.844603] print_report+0xd1/0x640 [ 31.844975] ? __virt_addr_valid+0x1db/0x2d0 [ 31.845655] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.846312] kasan_report+0x102/0x140 [ 31.846686] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.847148] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.847959] kasan_check_range+0x10c/0x1c0 [ 31.848553] __kasan_check_write+0x18/0x20 [ 31.849155] kasan_atomics_helper+0x1b23/0x5450 [ 31.849733] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.850439] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.850862] ? kasan_atomics+0x153/0x310 [ 31.851722] kasan_atomics+0x1dd/0x310 [ 31.852219] ? __pfx_kasan_atomics+0x10/0x10 [ 31.852850] ? __pfx_read_tsc+0x10/0x10 [ 31.853427] ? ktime_get_ts64+0x84/0x230 [ 31.853967] kunit_try_run_case+0x1b3/0x490 [ 31.854582] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.855052] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.855879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.856549] ? __kthread_parkme+0x82/0x160 [ 31.857175] ? preempt_count_sub+0x50/0x80 [ 31.857797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.858503] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.859270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.859916] kthread+0x257/0x310 [ 31.860383] ? __pfx_kthread+0x10/0x10 [ 31.860760] ret_from_fork+0x41/0x80 [ 31.861645] ? __pfx_kthread+0x10/0x10 [ 31.862027] ret_from_fork_asm+0x1a/0x30 [ 31.862551] </TASK> [ 31.863075] [ 31.863364] Allocated by task 273: [ 31.863727] kasan_save_stack+0x3d/0x60 [ 31.864682] kasan_save_track+0x18/0x40 [ 31.865079] kasan_save_alloc_info+0x3b/0x50 [ 31.865537] __kasan_kmalloc+0xb7/0xc0 [ 31.865915] __kmalloc_cache_noprof+0x184/0x410 [ 31.866753] kasan_atomics+0x96/0x310 [ 31.867359] kunit_try_run_case+0x1b3/0x490 [ 31.867904] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.868522] kthread+0x257/0x310 [ 31.868816] ret_from_fork+0x41/0x80 [ 31.869651] ret_from_fork_asm+0x1a/0x30 [ 31.870080] [ 31.870291] The buggy address belongs to the object at ffff888101aba780 [ 31.870291] which belongs to the cache kmalloc-64 of size 64 [ 31.871628] The buggy address is located 0 bytes to the right of [ 31.871628] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.873031] [ 31.873242] The buggy address belongs to the physical page: [ 31.873759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.874812] flags: 0x200000000000000(node=0|zone=2) [ 31.875376] page_type: f5(slab) [ 31.875956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.876766] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.877633] page dumped because: kasan: bad access detected [ 31.878211] [ 31.878409] Memory state around the buggy address: [ 31.879275] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.879886] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.880749] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.881548] ^ [ 31.882107] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.882935] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.883540] ================================================================== [ 30.924233] ================================================================== [ 30.924650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 30.925881] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.926591] [ 30.926783] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.927886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.928489] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.929248] Call Trace: [ 30.929613] <TASK> [ 30.929942] dump_stack_lvl+0x73/0xb0 [ 30.930363] print_report+0xd1/0x640 [ 30.930904] ? __virt_addr_valid+0x1db/0x2d0 [ 30.931536] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.932192] kasan_report+0x102/0x140 [ 30.932720] ? kasan_atomics_helper+0x1149/0x5450 [ 30.933304] ? kasan_atomics_helper+0x1149/0x5450 [ 30.933773] kasan_check_range+0x10c/0x1c0 [ 30.935078] __kasan_check_write+0x18/0x20 [ 30.935601] kasan_atomics_helper+0x1149/0x5450 [ 30.936405] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.936634] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.936842] ? kasan_atomics+0x153/0x310 [ 30.937150] kasan_atomics+0x1dd/0x310 [ 30.937855] ? __pfx_kasan_atomics+0x10/0x10 [ 30.938336] ? __pfx_read_tsc+0x10/0x10 [ 30.938779] ? ktime_get_ts64+0x84/0x230 [ 30.939704] kunit_try_run_case+0x1b3/0x490 [ 30.940256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.940617] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.941192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.941614] ? __kthread_parkme+0x82/0x160 [ 30.942092] ? preempt_count_sub+0x50/0x80 [ 30.942863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.943556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.944487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.945384] kthread+0x257/0x310 [ 30.945803] ? __pfx_kthread+0x10/0x10 [ 30.946126] ret_from_fork+0x41/0x80 [ 30.946634] ? __pfx_kthread+0x10/0x10 [ 30.947022] ret_from_fork_asm+0x1a/0x30 [ 30.947378] </TASK> [ 30.947716] [ 30.947949] Allocated by task 273: [ 30.948371] kasan_save_stack+0x3d/0x60 [ 30.948825] kasan_save_track+0x18/0x40 [ 30.949274] kasan_save_alloc_info+0x3b/0x50 [ 30.949582] __kasan_kmalloc+0xb7/0xc0 [ 30.950084] __kmalloc_cache_noprof+0x184/0x410 [ 30.950637] kasan_atomics+0x96/0x310 [ 30.950912] kunit_try_run_case+0x1b3/0x490 [ 30.951509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.952087] kthread+0x257/0x310 [ 30.952428] ret_from_fork+0x41/0x80 [ 30.952778] ret_from_fork_asm+0x1a/0x30 [ 30.953269] [ 30.953469] The buggy address belongs to the object at ffff888101aba780 [ 30.953469] which belongs to the cache kmalloc-64 of size 64 [ 30.954255] The buggy address is located 0 bytes to the right of [ 30.954255] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.955425] [ 30.955587] The buggy address belongs to the physical page: [ 30.955998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.956944] flags: 0x200000000000000(node=0|zone=2) [ 30.957277] page_type: f5(slab) [ 30.957523] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.959081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.959633] page dumped because: kasan: bad access detected [ 30.959977] [ 30.960279] Memory state around the buggy address: [ 30.960870] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.961815] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.962500] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.963162] ^ [ 30.963577] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.964203] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.964615] ================================================================== [ 31.184647] ================================================================== [ 31.185376] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 31.185916] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.186844] [ 31.187034] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.188519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.189010] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.189919] Call Trace: [ 31.190400] <TASK> [ 31.190836] dump_stack_lvl+0x73/0xb0 [ 31.191234] print_report+0xd1/0x640 [ 31.191907] ? __virt_addr_valid+0x1db/0x2d0 [ 31.192315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.192933] kasan_report+0x102/0x140 [ 31.193566] ? kasan_atomics_helper+0x13b6/0x5450 [ 31.194146] ? kasan_atomics_helper+0x13b6/0x5450 [ 31.194726] kasan_check_range+0x10c/0x1c0 [ 31.195410] __kasan_check_read+0x15/0x20 [ 31.195873] kasan_atomics_helper+0x13b6/0x5450 [ 31.196574] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.197438] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.197884] ? kasan_atomics+0x153/0x310 [ 31.198443] kasan_atomics+0x1dd/0x310 [ 31.198952] ? __pfx_kasan_atomics+0x10/0x10 [ 31.199519] ? __pfx_read_tsc+0x10/0x10 [ 31.199818] ? ktime_get_ts64+0x84/0x230 [ 31.200247] kunit_try_run_case+0x1b3/0x490 [ 31.200833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.201534] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.201948] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.202762] ? __kthread_parkme+0x82/0x160 [ 31.203391] ? preempt_count_sub+0x50/0x80 [ 31.203769] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.204637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.205440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.205957] kthread+0x257/0x310 [ 31.206430] ? __pfx_kthread+0x10/0x10 [ 31.206942] ret_from_fork+0x41/0x80 [ 31.207459] ? __pfx_kthread+0x10/0x10 [ 31.207959] ret_from_fork_asm+0x1a/0x30 [ 31.208304] </TASK> [ 31.208611] [ 31.208965] Allocated by task 273: [ 31.209724] kasan_save_stack+0x3d/0x60 [ 31.210089] kasan_save_track+0x18/0x40 [ 31.210786] kasan_save_alloc_info+0x3b/0x50 [ 31.211268] __kasan_kmalloc+0xb7/0xc0 [ 31.211651] __kmalloc_cache_noprof+0x184/0x410 [ 31.212110] kasan_atomics+0x96/0x310 [ 31.212494] kunit_try_run_case+0x1b3/0x490 [ 31.213103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.213524] kthread+0x257/0x310 [ 31.213967] ret_from_fork+0x41/0x80 [ 31.214502] ret_from_fork_asm+0x1a/0x30 [ 31.214896] [ 31.215245] The buggy address belongs to the object at ffff888101aba780 [ 31.215245] which belongs to the cache kmalloc-64 of size 64 [ 31.216270] The buggy address is located 0 bytes to the right of [ 31.216270] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.217261] [ 31.217621] The buggy address belongs to the physical page: [ 31.218506] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.219305] flags: 0x200000000000000(node=0|zone=2) [ 31.219808] page_type: f5(slab) [ 31.220392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.221262] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.221778] page dumped because: kasan: bad access detected [ 31.222541] [ 31.222782] Memory state around the buggy address: [ 31.223220] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.224099] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.224952] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.225753] ^ [ 31.226372] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.227199] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.227809] ================================================================== [ 31.740189] ================================================================== [ 31.740812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 31.741718] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.742512] [ 31.742833] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.743714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.744202] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.744862] Call Trace: [ 31.745379] <TASK> [ 31.745730] dump_stack_lvl+0x73/0xb0 [ 31.746205] print_report+0xd1/0x640 [ 31.746718] ? __virt_addr_valid+0x1db/0x2d0 [ 31.747494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.748079] kasan_report+0x102/0x140 [ 31.748497] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.748968] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.749699] kasan_check_range+0x10c/0x1c0 [ 31.750096] __kasan_check_write+0x18/0x20 [ 31.750713] kasan_atomics_helper+0x19e4/0x5450 [ 31.751312] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.751836] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.752398] ? kasan_atomics+0x153/0x310 [ 31.752960] kasan_atomics+0x1dd/0x310 [ 31.753326] ? __pfx_kasan_atomics+0x10/0x10 [ 31.753767] ? __pfx_read_tsc+0x10/0x10 [ 31.754533] ? ktime_get_ts64+0x84/0x230 [ 31.754929] kunit_try_run_case+0x1b3/0x490 [ 31.755447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.756078] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.756511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.757082] ? __kthread_parkme+0x82/0x160 [ 31.757634] ? preempt_count_sub+0x50/0x80 [ 31.757945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.758691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.759160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.759882] kthread+0x257/0x310 [ 31.760515] ? __pfx_kthread+0x10/0x10 [ 31.760950] ret_from_fork+0x41/0x80 [ 31.761446] ? __pfx_kthread+0x10/0x10 [ 31.761728] ret_from_fork_asm+0x1a/0x30 [ 31.762358] </TASK> [ 31.762699] [ 31.763095] Allocated by task 273: [ 31.763398] kasan_save_stack+0x3d/0x60 [ 31.763880] kasan_save_track+0x18/0x40 [ 31.764464] kasan_save_alloc_info+0x3b/0x50 [ 31.764945] __kasan_kmalloc+0xb7/0xc0 [ 31.765475] __kmalloc_cache_noprof+0x184/0x410 [ 31.766009] kasan_atomics+0x96/0x310 [ 31.766561] kunit_try_run_case+0x1b3/0x490 [ 31.766908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.768476] kthread+0x257/0x310 [ 31.768763] ret_from_fork+0x41/0x80 [ 31.769437] ret_from_fork_asm+0x1a/0x30 [ 31.769924] [ 31.770243] The buggy address belongs to the object at ffff888101aba780 [ 31.770243] which belongs to the cache kmalloc-64 of size 64 [ 31.771452] The buggy address is located 0 bytes to the right of [ 31.771452] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.772806] [ 31.773192] The buggy address belongs to the physical page: [ 31.773901] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.775166] flags: 0x200000000000000(node=0|zone=2) [ 31.775694] page_type: f5(slab) [ 31.776088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.776787] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.777373] page dumped because: kasan: bad access detected [ 31.778164] [ 31.778524] Memory state around the buggy address: [ 31.779467] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.780296] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.782120] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.782921] ^ [ 31.783421] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.784172] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.784446] ================================================================== [ 30.643111] ================================================================== [ 30.643703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 30.645474] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.646396] [ 30.646616] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.647681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.648241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.648805] Call Trace: [ 30.648945] <TASK> [ 30.649182] dump_stack_lvl+0x73/0xb0 [ 30.649688] print_report+0xd1/0x640 [ 30.650430] ? __virt_addr_valid+0x1db/0x2d0 [ 30.650864] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.651485] kasan_report+0x102/0x140 [ 30.651800] ? kasan_atomics_helper+0xe79/0x5450 [ 30.652551] ? kasan_atomics_helper+0xe79/0x5450 [ 30.653440] kasan_check_range+0x10c/0x1c0 [ 30.653973] __kasan_check_write+0x18/0x20 [ 30.654429] kasan_atomics_helper+0xe79/0x5450 [ 30.654849] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.655536] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.656140] ? kasan_atomics+0x153/0x310 [ 30.656642] kasan_atomics+0x1dd/0x310 [ 30.657145] ? __pfx_kasan_atomics+0x10/0x10 [ 30.657731] ? __pfx_read_tsc+0x10/0x10 [ 30.658325] ? ktime_get_ts64+0x84/0x230 [ 30.658783] kunit_try_run_case+0x1b3/0x490 [ 30.659742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.660693] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.661358] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.661784] ? __kthread_parkme+0x82/0x160 [ 30.662409] ? preempt_count_sub+0x50/0x80 [ 30.663492] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.663928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.664605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.665653] kthread+0x257/0x310 [ 30.666638] ? __pfx_kthread+0x10/0x10 [ 30.667055] ret_from_fork+0x41/0x80 [ 30.667735] ? __pfx_kthread+0x10/0x10 [ 30.668434] ret_from_fork_asm+0x1a/0x30 [ 30.668792] </TASK> [ 30.669092] [ 30.669678] Allocated by task 273: [ 30.670035] kasan_save_stack+0x3d/0x60 [ 30.670427] kasan_save_track+0x18/0x40 [ 30.670800] kasan_save_alloc_info+0x3b/0x50 [ 30.671660] __kasan_kmalloc+0xb7/0xc0 [ 30.672040] __kmalloc_cache_noprof+0x184/0x410 [ 30.672800] kasan_atomics+0x96/0x310 [ 30.673473] kunit_try_run_case+0x1b3/0x490 [ 30.673947] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.674834] kthread+0x257/0x310 [ 30.675307] ret_from_fork+0x41/0x80 [ 30.675733] ret_from_fork_asm+0x1a/0x30 [ 30.676491] [ 30.676812] The buggy address belongs to the object at ffff888101aba780 [ 30.676812] which belongs to the cache kmalloc-64 of size 64 [ 30.678150] The buggy address is located 0 bytes to the right of [ 30.678150] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.680006] [ 30.680630] The buggy address belongs to the physical page: [ 30.681378] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.682020] flags: 0x200000000000000(node=0|zone=2) [ 30.682603] page_type: f5(slab) [ 30.682898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.683810] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.684657] page dumped because: kasan: bad access detected [ 30.685306] [ 30.685553] Memory state around the buggy address: [ 30.686652] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.687339] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.688028] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.689284] ^ [ 30.689864] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.690793] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.691669] ================================================================== [ 30.388178] ================================================================== [ 30.388575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 30.390431] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.391250] [ 30.391362] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.391732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.391909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.393235] Call Trace: [ 30.393523] <TASK> [ 30.393809] dump_stack_lvl+0x73/0xb0 [ 30.394358] print_report+0xd1/0x640 [ 30.394647] ? __virt_addr_valid+0x1db/0x2d0 [ 30.395265] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.395856] kasan_report+0x102/0x140 [ 30.396337] ? kasan_atomics_helper+0xac8/0x5450 [ 30.396877] ? kasan_atomics_helper+0xac8/0x5450 [ 30.397467] kasan_check_range+0x10c/0x1c0 [ 30.397783] __kasan_check_write+0x18/0x20 [ 30.398437] kasan_atomics_helper+0xac8/0x5450 [ 30.398748] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.399266] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.399781] ? kasan_atomics+0x153/0x310 [ 30.400255] kasan_atomics+0x1dd/0x310 [ 30.400668] ? __pfx_kasan_atomics+0x10/0x10 [ 30.401151] ? __pfx_read_tsc+0x10/0x10 [ 30.401618] ? ktime_get_ts64+0x84/0x230 [ 30.401952] kunit_try_run_case+0x1b3/0x490 [ 30.402503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.402974] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.403426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.403950] ? __kthread_parkme+0x82/0x160 [ 30.404486] ? preempt_count_sub+0x50/0x80 [ 30.405071] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.405556] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.406195] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.406811] kthread+0x257/0x310 [ 30.407153] ? __pfx_kthread+0x10/0x10 [ 30.407697] ret_from_fork+0x41/0x80 [ 30.408327] ? __pfx_kthread+0x10/0x10 [ 30.408732] ret_from_fork_asm+0x1a/0x30 [ 30.409148] </TASK> [ 30.409476] [ 30.409760] Allocated by task 273: [ 30.410253] kasan_save_stack+0x3d/0x60 [ 30.410688] kasan_save_track+0x18/0x40 [ 30.411420] kasan_save_alloc_info+0x3b/0x50 [ 30.412266] __kasan_kmalloc+0xb7/0xc0 [ 30.413050] __kmalloc_cache_noprof+0x184/0x410 [ 30.413493] kasan_atomics+0x96/0x310 [ 30.413921] kunit_try_run_case+0x1b3/0x490 [ 30.414605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.415083] kthread+0x257/0x310 [ 30.415467] ret_from_fork+0x41/0x80 [ 30.415888] ret_from_fork_asm+0x1a/0x30 [ 30.416368] [ 30.416622] The buggy address belongs to the object at ffff888101aba780 [ 30.416622] which belongs to the cache kmalloc-64 of size 64 [ 30.417674] The buggy address is located 0 bytes to the right of [ 30.417674] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.418957] [ 30.419299] The buggy address belongs to the physical page: [ 30.419806] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.420647] flags: 0x200000000000000(node=0|zone=2) [ 30.421209] page_type: f5(slab) [ 30.421662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.422490] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.423257] page dumped because: kasan: bad access detected [ 30.423813] [ 30.424066] Memory state around the buggy address: [ 30.424626] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.425458] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.426186] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.426834] ^ [ 30.427436] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.427976] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.428576] ================================================================== [ 31.364354] ================================================================== [ 31.365337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 31.366586] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.367407] [ 31.367645] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.368595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.369153] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.369835] Call Trace: [ 31.370301] <TASK> [ 31.370743] dump_stack_lvl+0x73/0xb0 [ 31.371243] print_report+0xd1/0x640 [ 31.371552] ? __virt_addr_valid+0x1db/0x2d0 [ 31.372187] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.372761] kasan_report+0x102/0x140 [ 31.373266] ? kasan_atomics_helper+0x151e/0x5450 [ 31.373785] ? kasan_atomics_helper+0x151e/0x5450 [ 31.374498] kasan_check_range+0x10c/0x1c0 [ 31.374911] __kasan_check_write+0x18/0x20 [ 31.375595] kasan_atomics_helper+0x151e/0x5450 [ 31.376119] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.376622] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.377230] ? kasan_atomics+0x153/0x310 [ 31.377740] kasan_atomics+0x1dd/0x310 [ 31.378294] ? __pfx_kasan_atomics+0x10/0x10 [ 31.378900] ? __pfx_read_tsc+0x10/0x10 [ 31.379445] ? ktime_get_ts64+0x84/0x230 [ 31.379913] kunit_try_run_case+0x1b3/0x490 [ 31.380431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.380926] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.381376] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.381975] ? __kthread_parkme+0x82/0x160 [ 31.382488] ? preempt_count_sub+0x50/0x80 [ 31.383101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.383536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.384180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.385101] kthread+0x257/0x310 [ 31.385577] ? __pfx_kthread+0x10/0x10 [ 31.385947] ret_from_fork+0x41/0x80 [ 31.386627] ? __pfx_kthread+0x10/0x10 [ 31.387116] ret_from_fork_asm+0x1a/0x30 [ 31.387537] </TASK> [ 31.388032] [ 31.388331] Allocated by task 273: [ 31.388579] kasan_save_stack+0x3d/0x60 [ 31.389108] kasan_save_track+0x18/0x40 [ 31.389574] kasan_save_alloc_info+0x3b/0x50 [ 31.389933] __kasan_kmalloc+0xb7/0xc0 [ 31.390688] __kmalloc_cache_noprof+0x184/0x410 [ 31.391308] kasan_atomics+0x96/0x310 [ 31.391730] kunit_try_run_case+0x1b3/0x490 [ 31.392146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.392621] kthread+0x257/0x310 [ 31.393110] ret_from_fork+0x41/0x80 [ 31.393722] ret_from_fork_asm+0x1a/0x30 [ 31.394303] [ 31.394545] The buggy address belongs to the object at ffff888101aba780 [ 31.394545] which belongs to the cache kmalloc-64 of size 64 [ 31.395471] The buggy address is located 0 bytes to the right of [ 31.395471] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.396504] [ 31.396707] The buggy address belongs to the physical page: [ 31.397267] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.398761] flags: 0x200000000000000(node=0|zone=2) [ 31.399607] page_type: f5(slab) [ 31.400468] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.401101] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.401794] page dumped because: kasan: bad access detected [ 31.402401] [ 31.402641] Memory state around the buggy address: [ 31.403225] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.403842] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.404566] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.405310] ^ [ 31.405701] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.406482] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.407017] ================================================================== [ 29.601623] ================================================================== [ 29.603205] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 29.603923] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.604658] [ 29.605751] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.607174] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.607740] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.608781] Call Trace: [ 29.609002] <TASK> [ 29.609555] dump_stack_lvl+0x73/0xb0 [ 29.610000] print_report+0xd1/0x640 [ 29.610872] ? __virt_addr_valid+0x1db/0x2d0 [ 29.611859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.612500] kasan_report+0x102/0x140 [ 29.613224] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.613850] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.614507] __asan_report_store4_noabort+0x1b/0x30 [ 29.615641] kasan_atomics_helper+0x4ba4/0x5450 [ 29.616182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.616866] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.617667] ? kasan_atomics+0x153/0x310 [ 29.618092] kasan_atomics+0x1dd/0x310 [ 29.618870] ? __pfx_kasan_atomics+0x10/0x10 [ 29.619741] ? __pfx_read_tsc+0x10/0x10 [ 29.620403] ? ktime_get_ts64+0x84/0x230 [ 29.620872] kunit_try_run_case+0x1b3/0x490 [ 29.621866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.622502] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.623156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.624293] ? __kthread_parkme+0x82/0x160 [ 29.625192] ? preempt_count_sub+0x50/0x80 [ 29.625664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.626511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.626956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.627692] kthread+0x257/0x310 [ 29.628190] ? __pfx_kthread+0x10/0x10 [ 29.628796] ret_from_fork+0x41/0x80 [ 29.629171] ? __pfx_kthread+0x10/0x10 [ 29.629929] ret_from_fork_asm+0x1a/0x30 [ 29.630667] </TASK> [ 29.630965] [ 29.631293] Allocated by task 273: [ 29.631710] kasan_save_stack+0x3d/0x60 [ 29.632267] kasan_save_track+0x18/0x40 [ 29.632716] kasan_save_alloc_info+0x3b/0x50 [ 29.633574] __kasan_kmalloc+0xb7/0xc0 [ 29.633963] __kmalloc_cache_noprof+0x184/0x410 [ 29.634627] kasan_atomics+0x96/0x310 [ 29.635305] kunit_try_run_case+0x1b3/0x490 [ 29.635885] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.636475] kthread+0x257/0x310 [ 29.637215] ret_from_fork+0x41/0x80 [ 29.637581] ret_from_fork_asm+0x1a/0x30 [ 29.638130] [ 29.638330] The buggy address belongs to the object at ffff888101aba780 [ 29.638330] which belongs to the cache kmalloc-64 of size 64 [ 29.639352] The buggy address is located 0 bytes to the right of [ 29.639352] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.640657] [ 29.640886] The buggy address belongs to the physical page: [ 29.641603] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.642528] flags: 0x200000000000000(node=0|zone=2) [ 29.643045] page_type: f5(slab) [ 29.643693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.644573] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.645506] page dumped because: kasan: bad access detected [ 29.646061] [ 29.646551] Memory state around the buggy address: [ 29.647057] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.648241] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.648803] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.649663] ^ [ 29.650302] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.651047] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.651928] ================================================================== [ 32.108340] ================================================================== [ 32.109227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 32.109938] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.110626] [ 32.110906] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.111727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.112058] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.112904] Call Trace: [ 32.113297] <TASK> [ 32.113637] dump_stack_lvl+0x73/0xb0 [ 32.114115] print_report+0xd1/0x640 [ 32.114537] ? __virt_addr_valid+0x1db/0x2d0 [ 32.115058] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.115544] kasan_report+0x102/0x140 [ 32.116092] ? kasan_atomics_helper+0x1eab/0x5450 [ 32.116449] ? kasan_atomics_helper+0x1eab/0x5450 [ 32.117113] kasan_check_range+0x10c/0x1c0 [ 32.117497] __kasan_check_write+0x18/0x20 [ 32.117797] kasan_atomics_helper+0x1eab/0x5450 [ 32.118385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.118726] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.119499] ? kasan_atomics+0x153/0x310 [ 32.120240] kasan_atomics+0x1dd/0x310 [ 32.120932] ? __pfx_kasan_atomics+0x10/0x10 [ 32.121768] ? __pfx_read_tsc+0x10/0x10 [ 32.122295] ? ktime_get_ts64+0x84/0x230 [ 32.122776] kunit_try_run_case+0x1b3/0x490 [ 32.123371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.123859] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.124390] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.124919] ? __kthread_parkme+0x82/0x160 [ 32.125437] ? preempt_count_sub+0x50/0x80 [ 32.126003] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.126630] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.127200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.127822] kthread+0x257/0x310 [ 32.128386] ? __pfx_kthread+0x10/0x10 [ 32.128790] ret_from_fork+0x41/0x80 [ 32.129391] ? __pfx_kthread+0x10/0x10 [ 32.129775] ret_from_fork_asm+0x1a/0x30 [ 32.130314] </TASK> [ 32.130676] [ 32.130921] Allocated by task 273: [ 32.131418] kasan_save_stack+0x3d/0x60 [ 32.131846] kasan_save_track+0x18/0x40 [ 32.132358] kasan_save_alloc_info+0x3b/0x50 [ 32.132778] __kasan_kmalloc+0xb7/0xc0 [ 32.133309] __kmalloc_cache_noprof+0x184/0x410 [ 32.133901] kasan_atomics+0x96/0x310 [ 32.134455] kunit_try_run_case+0x1b3/0x490 [ 32.134921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.135569] kthread+0x257/0x310 [ 32.135958] ret_from_fork+0x41/0x80 [ 32.136369] ret_from_fork_asm+0x1a/0x30 [ 32.136831] [ 32.137199] The buggy address belongs to the object at ffff888101aba780 [ 32.137199] which belongs to the cache kmalloc-64 of size 64 [ 32.138242] The buggy address is located 0 bytes to the right of [ 32.138242] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.139418] [ 32.139671] The buggy address belongs to the physical page: [ 32.140096] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.140894] flags: 0x200000000000000(node=0|zone=2) [ 32.141443] page_type: f5(slab) [ 32.141697] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.142649] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.143331] page dumped because: kasan: bad access detected [ 32.143845] [ 32.144142] Memory state around the buggy address: [ 32.144648] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.145409] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.146134] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.146869] ^ [ 32.147382] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.148056] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.148707] ================================================================== [ 32.353925] ================================================================== [ 32.354454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 32.355069] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.355853] [ 32.356198] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.357001] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.357372] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.358207] Call Trace: [ 32.358440] <TASK> [ 32.358636] dump_stack_lvl+0x73/0xb0 [ 32.359159] print_report+0xd1/0x640 [ 32.359565] ? __virt_addr_valid+0x1db/0x2d0 [ 32.359947] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.360626] kasan_report+0x102/0x140 [ 32.361003] ? kasan_atomics_helper+0x4fb4/0x5450 [ 32.361455] ? kasan_atomics_helper+0x4fb4/0x5450 [ 32.361886] __asan_report_load8_noabort+0x18/0x20 [ 32.362399] kasan_atomics_helper+0x4fb4/0x5450 [ 32.362965] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.363608] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.364101] ? kasan_atomics+0x153/0x310 [ 32.364595] kasan_atomics+0x1dd/0x310 [ 32.364927] ? __pfx_kasan_atomics+0x10/0x10 [ 32.365411] ? __pfx_read_tsc+0x10/0x10 [ 32.365805] ? ktime_get_ts64+0x84/0x230 [ 32.366274] kunit_try_run_case+0x1b3/0x490 [ 32.366786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.367263] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.367747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.368218] ? __kthread_parkme+0x82/0x160 [ 32.368665] ? preempt_count_sub+0x50/0x80 [ 32.368974] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.369585] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.370327] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.370762] kthread+0x257/0x310 [ 32.371190] ? __pfx_kthread+0x10/0x10 [ 32.371565] ret_from_fork+0x41/0x80 [ 32.372072] ? __pfx_kthread+0x10/0x10 [ 32.372418] ret_from_fork_asm+0x1a/0x30 [ 32.372874] </TASK> [ 32.373153] [ 32.373312] Allocated by task 273: [ 32.373552] kasan_save_stack+0x3d/0x60 [ 32.373836] kasan_save_track+0x18/0x40 [ 32.374311] kasan_save_alloc_info+0x3b/0x50 [ 32.374859] __kasan_kmalloc+0xb7/0xc0 [ 32.375442] __kmalloc_cache_noprof+0x184/0x410 [ 32.375959] kasan_atomics+0x96/0x310 [ 32.376260] kunit_try_run_case+0x1b3/0x490 [ 32.376700] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.377404] kthread+0x257/0x310 [ 32.377895] ret_from_fork+0x41/0x80 [ 32.378500] ret_from_fork_asm+0x1a/0x30 [ 32.378970] [ 32.379251] The buggy address belongs to the object at ffff888101aba780 [ 32.379251] which belongs to the cache kmalloc-64 of size 64 [ 32.380308] The buggy address is located 0 bytes to the right of [ 32.380308] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.381585] [ 32.382003] The buggy address belongs to the physical page: [ 32.382487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.383418] flags: 0x200000000000000(node=0|zone=2) [ 32.383967] page_type: f5(slab) [ 32.384458] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.385275] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.385908] page dumped because: kasan: bad access detected [ 32.386653] [ 32.386909] Memory state around the buggy address: [ 32.387516] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.388284] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.389009] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.389535] ^ [ 32.389965] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.390708] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.391135] ================================================================== [ 32.437516] ================================================================== [ 32.438275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 32.438832] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.439526] [ 32.439727] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.440479] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.440756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.441802] Call Trace: [ 32.442257] <TASK> [ 32.442465] dump_stack_lvl+0x73/0xb0 [ 32.442759] print_report+0xd1/0x640 [ 32.443404] ? __virt_addr_valid+0x1db/0x2d0 [ 32.444331] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.445180] kasan_report+0x102/0x140 [ 32.445578] ? kasan_atomics_helper+0x4fa7/0x5450 [ 32.445914] ? kasan_atomics_helper+0x4fa7/0x5450 [ 32.446587] __asan_report_load8_noabort+0x18/0x20 [ 32.447315] kasan_atomics_helper+0x4fa7/0x5450 [ 32.447900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.448661] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.449336] ? kasan_atomics+0x153/0x310 [ 32.449671] kasan_atomics+0x1dd/0x310 [ 32.450384] ? __pfx_kasan_atomics+0x10/0x10 [ 32.450836] ? __pfx_read_tsc+0x10/0x10 [ 32.451490] ? ktime_get_ts64+0x84/0x230 [ 32.452045] kunit_try_run_case+0x1b3/0x490 [ 32.452519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.453344] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.453895] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.454474] ? __kthread_parkme+0x82/0x160 [ 32.454883] ? preempt_count_sub+0x50/0x80 [ 32.455345] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.455937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.456579] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.457223] kthread+0x257/0x310 [ 32.457717] ? __pfx_kthread+0x10/0x10 [ 32.458208] ret_from_fork+0x41/0x80 [ 32.458628] ? __pfx_kthread+0x10/0x10 [ 32.459156] ret_from_fork_asm+0x1a/0x30 [ 32.459748] </TASK> [ 32.459954] [ 32.460268] Allocated by task 273: [ 32.460841] kasan_save_stack+0x3d/0x60 [ 32.461224] kasan_save_track+0x18/0x40 [ 32.461670] kasan_save_alloc_info+0x3b/0x50 [ 32.462166] __kasan_kmalloc+0xb7/0xc0 [ 32.462471] __kmalloc_cache_noprof+0x184/0x410 [ 32.462838] kasan_atomics+0x96/0x310 [ 32.463414] kunit_try_run_case+0x1b3/0x490 [ 32.463886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.464357] kthread+0x257/0x310 [ 32.464745] ret_from_fork+0x41/0x80 [ 32.465319] ret_from_fork_asm+0x1a/0x30 [ 32.465804] [ 32.466086] The buggy address belongs to the object at ffff888101aba780 [ 32.466086] which belongs to the cache kmalloc-64 of size 64 [ 32.467232] The buggy address is located 0 bytes to the right of [ 32.467232] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.468294] [ 32.468539] The buggy address belongs to the physical page: [ 32.469197] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.469793] flags: 0x200000000000000(node=0|zone=2) [ 32.470459] page_type: f5(slab) [ 32.470811] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.471904] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.473148] page dumped because: kasan: bad access detected [ 32.473739] [ 32.474023] Memory state around the buggy address: [ 32.474740] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.475845] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.477065] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.477680] ^ [ 32.478624] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.479582] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.480167] ================================================================== [ 32.533735] ================================================================== [ 32.535016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 32.536229] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.537387] [ 32.537603] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.539036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.539729] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.540698] Call Trace: [ 32.541003] <TASK> [ 32.541354] dump_stack_lvl+0x73/0xb0 [ 32.542281] print_report+0xd1/0x640 [ 32.542702] ? __virt_addr_valid+0x1db/0x2d0 [ 32.543787] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.544633] kasan_report+0x102/0x140 [ 32.545024] ? kasan_atomics_helper+0x5117/0x5450 [ 32.545851] ? kasan_atomics_helper+0x5117/0x5450 [ 32.546595] __asan_report_load8_noabort+0x18/0x20 [ 32.547018] kasan_atomics_helper+0x5117/0x5450 [ 32.547825] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.548351] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.549143] ? kasan_atomics+0x153/0x310 [ 32.549589] kasan_atomics+0x1dd/0x310 [ 32.549969] ? __pfx_kasan_atomics+0x10/0x10 [ 32.550825] ? __pfx_read_tsc+0x10/0x10 [ 32.551452] ? ktime_get_ts64+0x84/0x230 [ 32.551820] kunit_try_run_case+0x1b3/0x490 [ 32.552682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.553382] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.553857] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.554953] ? __kthread_parkme+0x82/0x160 [ 32.555563] ? preempt_count_sub+0x50/0x80 [ 32.556029] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.556565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.557736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.558646] kthread+0x257/0x310 [ 32.559319] ? __pfx_kthread+0x10/0x10 [ 32.559769] ret_from_fork+0x41/0x80 [ 32.560332] ? __pfx_kthread+0x10/0x10 [ 32.560769] ret_from_fork_asm+0x1a/0x30 [ 32.561163] </TASK> [ 32.561384] [ 32.561769] Allocated by task 273: [ 32.562252] kasan_save_stack+0x3d/0x60 [ 32.562755] kasan_save_track+0x18/0x40 [ 32.563568] kasan_save_alloc_info+0x3b/0x50 [ 32.564527] __kasan_kmalloc+0xb7/0xc0 [ 32.565419] __kmalloc_cache_noprof+0x184/0x410 [ 32.565880] kasan_atomics+0x96/0x310 [ 32.566915] kunit_try_run_case+0x1b3/0x490 [ 32.567714] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.568329] kthread+0x257/0x310 [ 32.568827] ret_from_fork+0x41/0x80 [ 32.569146] ret_from_fork_asm+0x1a/0x30 [ 32.569776] [ 32.570003] The buggy address belongs to the object at ffff888101aba780 [ 32.570003] which belongs to the cache kmalloc-64 of size 64 [ 32.570935] The buggy address is located 0 bytes to the right of [ 32.570935] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.572192] [ 32.572478] The buggy address belongs to the physical page: [ 32.573049] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.573568] flags: 0x200000000000000(node=0|zone=2) [ 32.574248] page_type: f5(slab) [ 32.574671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.575453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.576227] page dumped because: kasan: bad access detected [ 32.576700] [ 32.576858] Memory state around the buggy address: [ 32.577518] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.578194] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.578928] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.579658] ^ [ 32.580145] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.580692] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.581655] ================================================================== [ 30.595638] ================================================================== [ 30.596648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 30.597675] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.598555] [ 30.598833] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.599688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.600342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.600974] Call Trace: [ 30.601451] <TASK> [ 30.601784] dump_stack_lvl+0x73/0xb0 [ 30.602460] print_report+0xd1/0x640 [ 30.602957] ? __virt_addr_valid+0x1db/0x2d0 [ 30.603493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.604203] kasan_report+0x102/0x140 [ 30.604684] ? kasan_atomics_helper+0xde1/0x5450 [ 30.605391] ? kasan_atomics_helper+0xde1/0x5450 [ 30.606075] kasan_check_range+0x10c/0x1c0 [ 30.606517] __kasan_check_write+0x18/0x20 [ 30.607145] kasan_atomics_helper+0xde1/0x5450 [ 30.607609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.608095] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.608619] ? kasan_atomics+0x153/0x310 [ 30.609138] kasan_atomics+0x1dd/0x310 [ 30.609458] ? __pfx_kasan_atomics+0x10/0x10 [ 30.609780] ? __pfx_read_tsc+0x10/0x10 [ 30.610405] ? ktime_get_ts64+0x84/0x230 [ 30.611183] kunit_try_run_case+0x1b3/0x490 [ 30.611634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.612333] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.612778] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.613256] ? __kthread_parkme+0x82/0x160 [ 30.613867] ? preempt_count_sub+0x50/0x80 [ 30.614511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.614843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.615901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.616410] kthread+0x257/0x310 [ 30.616884] ? __pfx_kthread+0x10/0x10 [ 30.617368] ret_from_fork+0x41/0x80 [ 30.618003] ? __pfx_kthread+0x10/0x10 [ 30.618519] ret_from_fork_asm+0x1a/0x30 [ 30.618891] </TASK> [ 30.619450] [ 30.619655] Allocated by task 273: [ 30.620202] kasan_save_stack+0x3d/0x60 [ 30.620517] kasan_save_track+0x18/0x40 [ 30.621022] kasan_save_alloc_info+0x3b/0x50 [ 30.621376] __kasan_kmalloc+0xb7/0xc0 [ 30.621867] __kmalloc_cache_noprof+0x184/0x410 [ 30.622682] kasan_atomics+0x96/0x310 [ 30.622962] kunit_try_run_case+0x1b3/0x490 [ 30.623284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.623669] kthread+0x257/0x310 [ 30.624138] ret_from_fork+0x41/0x80 [ 30.624739] ret_from_fork_asm+0x1a/0x30 [ 30.625503] [ 30.625883] The buggy address belongs to the object at ffff888101aba780 [ 30.625883] which belongs to the cache kmalloc-64 of size 64 [ 30.626819] The buggy address is located 0 bytes to the right of [ 30.626819] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.628519] [ 30.629369] The buggy address belongs to the physical page: [ 30.630675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.631593] flags: 0x200000000000000(node=0|zone=2) [ 30.632237] page_type: f5(slab) [ 30.632767] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.633556] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.634693] page dumped because: kasan: bad access detected [ 30.635416] [ 30.635866] Memory state around the buggy address: [ 30.636495] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.637582] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.638226] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.639500] ^ [ 30.640005] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.640882] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.641796] ================================================================== [ 29.549392] ================================================================== [ 29.550762] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 29.551739] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.552532] [ 29.553321] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.554531] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.555164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.556170] Call Trace: [ 29.556809] <TASK> [ 29.557181] dump_stack_lvl+0x73/0xb0 [ 29.557518] print_report+0xd1/0x640 [ 29.558016] ? __virt_addr_valid+0x1db/0x2d0 [ 29.558810] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.559707] kasan_report+0x102/0x140 [ 29.560408] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.560863] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.561576] __asan_report_load4_noabort+0x18/0x20 [ 29.562299] kasan_atomics_helper+0x4bbe/0x5450 [ 29.562880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.563805] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.564478] ? kasan_atomics+0x153/0x310 [ 29.564952] kasan_atomics+0x1dd/0x310 [ 29.565617] ? __pfx_kasan_atomics+0x10/0x10 [ 29.566266] ? __pfx_read_tsc+0x10/0x10 [ 29.566822] ? ktime_get_ts64+0x84/0x230 [ 29.567632] kunit_try_run_case+0x1b3/0x490 [ 29.568236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.568774] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.569540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.570132] ? __kthread_parkme+0x82/0x160 [ 29.570674] ? preempt_count_sub+0x50/0x80 [ 29.571468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.571848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.572607] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.573251] kthread+0x257/0x310 [ 29.573776] ? __pfx_kthread+0x10/0x10 [ 29.574455] ret_from_fork+0x41/0x80 [ 29.574948] ? __pfx_kthread+0x10/0x10 [ 29.575832] ret_from_fork_asm+0x1a/0x30 [ 29.576483] </TASK> [ 29.576747] [ 29.577159] Allocated by task 273: [ 29.577466] kasan_save_stack+0x3d/0x60 [ 29.577900] kasan_save_track+0x18/0x40 [ 29.578434] kasan_save_alloc_info+0x3b/0x50 [ 29.578957] __kasan_kmalloc+0xb7/0xc0 [ 29.579251] __kmalloc_cache_noprof+0x184/0x410 [ 29.580183] kasan_atomics+0x96/0x310 [ 29.580756] kunit_try_run_case+0x1b3/0x490 [ 29.581266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.581957] kthread+0x257/0x310 [ 29.582395] ret_from_fork+0x41/0x80 [ 29.583575] ret_from_fork_asm+0x1a/0x30 [ 29.584072] [ 29.584302] The buggy address belongs to the object at ffff888101aba780 [ 29.584302] which belongs to the cache kmalloc-64 of size 64 [ 29.585657] The buggy address is located 0 bytes to the right of [ 29.585657] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.587427] [ 29.587702] The buggy address belongs to the physical page: [ 29.588402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.589329] flags: 0x200000000000000(node=0|zone=2) [ 29.589948] page_type: f5(slab) [ 29.590583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.591326] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.592232] page dumped because: kasan: bad access detected [ 29.592964] [ 29.593559] Memory state around the buggy address: [ 29.594090] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.594901] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.596055] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.597352] ^ [ 29.597854] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.598895] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.599712] ================================================================== [ 29.802635] ================================================================== [ 29.803171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 29.804087] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.804517] [ 29.804682] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.806745] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.807168] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.808060] Call Trace: [ 29.808259] <TASK> [ 29.808771] dump_stack_lvl+0x73/0xb0 [ 29.809294] print_report+0xd1/0x640 [ 29.809648] ? __virt_addr_valid+0x1db/0x2d0 [ 29.810874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.811258] kasan_report+0x102/0x140 [ 29.811906] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.812751] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.813391] __asan_report_load4_noabort+0x18/0x20 [ 29.814078] kasan_atomics_helper+0x4b56/0x5450 [ 29.814610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.814941] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.815678] ? kasan_atomics+0x153/0x310 [ 29.816245] kasan_atomics+0x1dd/0x310 [ 29.816782] ? __pfx_kasan_atomics+0x10/0x10 [ 29.817570] ? __pfx_read_tsc+0x10/0x10 [ 29.818255] ? ktime_get_ts64+0x84/0x230 [ 29.818703] kunit_try_run_case+0x1b3/0x490 [ 29.819310] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.819757] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.820416] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.820874] ? __kthread_parkme+0x82/0x160 [ 29.821639] ? preempt_count_sub+0x50/0x80 [ 29.822210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.822664] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.823529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.823955] kthread+0x257/0x310 [ 29.824777] ? __pfx_kthread+0x10/0x10 [ 29.825541] ret_from_fork+0x41/0x80 [ 29.825881] ? __pfx_kthread+0x10/0x10 [ 29.826446] ret_from_fork_asm+0x1a/0x30 [ 29.826891] </TASK> [ 29.827408] [ 29.827577] Allocated by task 273: [ 29.827917] kasan_save_stack+0x3d/0x60 [ 29.828433] kasan_save_track+0x18/0x40 [ 29.828795] kasan_save_alloc_info+0x3b/0x50 [ 29.829232] __kasan_kmalloc+0xb7/0xc0 [ 29.829840] __kmalloc_cache_noprof+0x184/0x410 [ 29.830802] kasan_atomics+0x96/0x310 [ 29.831284] kunit_try_run_case+0x1b3/0x490 [ 29.832026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.832905] kthread+0x257/0x310 [ 29.833340] ret_from_fork+0x41/0x80 [ 29.834151] ret_from_fork_asm+0x1a/0x30 [ 29.834558] [ 29.835046] The buggy address belongs to the object at ffff888101aba780 [ 29.835046] which belongs to the cache kmalloc-64 of size 64 [ 29.836441] The buggy address is located 0 bytes to the right of [ 29.836441] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.837872] [ 29.838094] The buggy address belongs to the physical page: [ 29.839101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.839762] flags: 0x200000000000000(node=0|zone=2) [ 29.840405] page_type: f5(slab) [ 29.840944] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.842165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.842788] page dumped because: kasan: bad access detected [ 29.843454] [ 29.843790] Memory state around the buggy address: [ 29.844531] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.845687] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.846649] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.847140] ^ [ 29.847730] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.848458] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.849578] ================================================================== [ 31.322225] ================================================================== [ 31.323303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 31.323855] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.324297] [ 31.324555] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.325761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.326086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.327122] Call Trace: [ 31.327469] <TASK> [ 31.327685] dump_stack_lvl+0x73/0xb0 [ 31.327975] print_report+0xd1/0x640 [ 31.328540] ? __virt_addr_valid+0x1db/0x2d0 [ 31.329113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.329580] kasan_report+0x102/0x140 [ 31.330120] ? kasan_atomics_helper+0x50d6/0x5450 [ 31.330654] ? kasan_atomics_helper+0x50d6/0x5450 [ 31.331254] __asan_report_store8_noabort+0x1b/0x30 [ 31.331781] kasan_atomics_helper+0x50d6/0x5450 [ 31.332344] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.332893] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.333469] ? kasan_atomics+0x153/0x310 [ 31.333947] kasan_atomics+0x1dd/0x310 [ 31.334515] ? __pfx_kasan_atomics+0x10/0x10 [ 31.334946] ? __pfx_read_tsc+0x10/0x10 [ 31.336178] ? ktime_get_ts64+0x84/0x230 [ 31.336650] kunit_try_run_case+0x1b3/0x490 [ 31.337084] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.338539] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.338977] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.339501] ? __kthread_parkme+0x82/0x160 [ 31.339898] ? preempt_count_sub+0x50/0x80 [ 31.340314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.340768] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.341374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.341773] kthread+0x257/0x310 [ 31.342433] ? __pfx_kthread+0x10/0x10 [ 31.343052] ret_from_fork+0x41/0x80 [ 31.343663] ? __pfx_kthread+0x10/0x10 [ 31.344194] ret_from_fork_asm+0x1a/0x30 [ 31.344693] </TASK> [ 31.345155] [ 31.345328] Allocated by task 273: [ 31.345570] kasan_save_stack+0x3d/0x60 [ 31.346286] kasan_save_track+0x18/0x40 [ 31.346790] kasan_save_alloc_info+0x3b/0x50 [ 31.347380] __kasan_kmalloc+0xb7/0xc0 [ 31.347777] __kmalloc_cache_noprof+0x184/0x410 [ 31.348255] kasan_atomics+0x96/0x310 [ 31.348641] kunit_try_run_case+0x1b3/0x490 [ 31.349234] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.349781] kthread+0x257/0x310 [ 31.350272] ret_from_fork+0x41/0x80 [ 31.350633] ret_from_fork_asm+0x1a/0x30 [ 31.350964] [ 31.351304] The buggy address belongs to the object at ffff888101aba780 [ 31.351304] which belongs to the cache kmalloc-64 of size 64 [ 31.352502] The buggy address is located 0 bytes to the right of [ 31.352502] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.353743] [ 31.354064] The buggy address belongs to the physical page: [ 31.354650] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.355325] flags: 0x200000000000000(node=0|zone=2) [ 31.355915] page_type: f5(slab) [ 31.356395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.357191] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.357913] page dumped because: kasan: bad access detected [ 31.358413] [ 31.358571] Memory state around the buggy address: [ 31.359231] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.359901] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.360741] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.361365] ^ [ 31.361844] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.362586] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.363312] ================================================================== [ 29.956578] ================================================================== [ 29.957307] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 29.958237] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.959020] [ 29.959191] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.960883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.961197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.962251] Call Trace: [ 29.962792] <TASK> [ 29.963437] dump_stack_lvl+0x73/0xb0 [ 29.963798] print_report+0xd1/0x640 [ 29.964458] ? __virt_addr_valid+0x1db/0x2d0 [ 29.965051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.965659] kasan_report+0x102/0x140 [ 29.966236] ? kasan_atomics_helper+0x566/0x5450 [ 29.967337] ? kasan_atomics_helper+0x566/0x5450 [ 29.967952] kasan_check_range+0x10c/0x1c0 [ 29.968565] __kasan_check_write+0x18/0x20 [ 29.969065] kasan_atomics_helper+0x566/0x5450 [ 29.969834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.970527] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.971189] ? kasan_atomics+0x153/0x310 [ 29.971705] kasan_atomics+0x1dd/0x310 [ 29.972473] ? __pfx_kasan_atomics+0x10/0x10 [ 29.973372] ? __pfx_read_tsc+0x10/0x10 [ 29.973935] ? ktime_get_ts64+0x84/0x230 [ 29.974609] kunit_try_run_case+0x1b3/0x490 [ 29.975293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.976006] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.976682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.977579] ? __kthread_parkme+0x82/0x160 [ 29.978068] ? preempt_count_sub+0x50/0x80 [ 29.978527] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.979248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.979853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.981079] kthread+0x257/0x310 [ 29.981395] ? __pfx_kthread+0x10/0x10 [ 29.981605] ret_from_fork+0x41/0x80 [ 29.981785] ? __pfx_kthread+0x10/0x10 [ 29.983099] ret_from_fork_asm+0x1a/0x30 [ 29.983804] </TASK> [ 29.984083] [ 29.984423] Allocated by task 273: [ 29.985147] kasan_save_stack+0x3d/0x60 [ 29.986292] kasan_save_track+0x18/0x40 [ 29.987302] kasan_save_alloc_info+0x3b/0x50 [ 29.987740] __kasan_kmalloc+0xb7/0xc0 [ 29.988774] __kmalloc_cache_noprof+0x184/0x410 [ 29.989531] kasan_atomics+0x96/0x310 [ 29.989932] kunit_try_run_case+0x1b3/0x490 [ 29.991268] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.991899] kthread+0x257/0x310 [ 29.992646] ret_from_fork+0x41/0x80 [ 29.993483] ret_from_fork_asm+0x1a/0x30 [ 29.993869] [ 29.994590] The buggy address belongs to the object at ffff888101aba780 [ 29.994590] which belongs to the cache kmalloc-64 of size 64 [ 29.996036] The buggy address is located 0 bytes to the right of [ 29.996036] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.997259] [ 29.997789] The buggy address belongs to the physical page: [ 29.998463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.999465] flags: 0x200000000000000(node=0|zone=2) [ 29.999965] page_type: f5(slab) [ 30.000259] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.001189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.002649] page dumped because: kasan: bad access detected [ 30.003219] [ 30.003589] Memory state around the buggy address: [ 30.004104] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.005301] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.005908] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.006598] ^ [ 30.007443] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.008283] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.008853] ================================================================== [ 30.469849] ================================================================== [ 30.470605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 30.471345] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.471943] [ 30.472251] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.472864] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.473352] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.473959] Call Trace: [ 30.474223] <TASK> [ 30.474540] dump_stack_lvl+0x73/0xb0 [ 30.475052] print_report+0xd1/0x640 [ 30.475516] ? __virt_addr_valid+0x1db/0x2d0 [ 30.476084] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.476463] kasan_report+0x102/0x140 [ 30.476936] ? kasan_atomics_helper+0xc71/0x5450 [ 30.477526] ? kasan_atomics_helper+0xc71/0x5450 [ 30.477979] kasan_check_range+0x10c/0x1c0 [ 30.478481] __kasan_check_write+0x18/0x20 [ 30.478911] kasan_atomics_helper+0xc71/0x5450 [ 30.479297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.479897] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.480407] ? kasan_atomics+0x153/0x310 [ 30.480742] kasan_atomics+0x1dd/0x310 [ 30.481290] ? __pfx_kasan_atomics+0x10/0x10 [ 30.481752] ? __pfx_read_tsc+0x10/0x10 [ 30.482161] ? ktime_get_ts64+0x84/0x230 [ 30.482480] kunit_try_run_case+0x1b3/0x490 [ 30.483067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.483613] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.484195] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.484555] ? __kthread_parkme+0x82/0x160 [ 30.484852] ? preempt_count_sub+0x50/0x80 [ 30.485395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.485953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.486685] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.487329] kthread+0x257/0x310 [ 30.487623] ? __pfx_kthread+0x10/0x10 [ 30.488122] ret_from_fork+0x41/0x80 [ 30.488405] ? __pfx_kthread+0x10/0x10 [ 30.488687] ret_from_fork_asm+0x1a/0x30 [ 30.489265] </TASK> [ 30.489559] [ 30.489804] Allocated by task 273: [ 30.490117] kasan_save_stack+0x3d/0x60 [ 30.490409] kasan_save_track+0x18/0x40 [ 30.490883] kasan_save_alloc_info+0x3b/0x50 [ 30.491506] __kasan_kmalloc+0xb7/0xc0 [ 30.491934] __kmalloc_cache_noprof+0x184/0x410 [ 30.492331] kasan_atomics+0x96/0x310 [ 30.492613] kunit_try_run_case+0x1b3/0x490 [ 30.493180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.493780] kthread+0x257/0x310 [ 30.494273] ret_from_fork+0x41/0x80 [ 30.494582] ret_from_fork_asm+0x1a/0x30 [ 30.494873] [ 30.495099] The buggy address belongs to the object at ffff888101aba780 [ 30.495099] which belongs to the cache kmalloc-64 of size 64 [ 30.496470] The buggy address is located 0 bytes to the right of [ 30.496470] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.497520] [ 30.497693] The buggy address belongs to the physical page: [ 30.498228] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.498901] flags: 0x200000000000000(node=0|zone=2) [ 30.499415] page_type: f5(slab) [ 30.499747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.500449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.500978] page dumped because: kasan: bad access detected [ 30.501376] [ 30.501641] Memory state around the buggy address: [ 30.502261] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.502793] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.503584] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.504337] ^ [ 30.504801] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.505442] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.506259] ================================================================== [ 30.507044] ================================================================== [ 30.507784] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 30.509705] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.511088] [ 30.511344] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.512136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.512512] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.513299] Call Trace: [ 30.513548] <TASK> [ 30.513880] dump_stack_lvl+0x73/0xb0 [ 30.514409] print_report+0xd1/0x640 [ 30.514771] ? __virt_addr_valid+0x1db/0x2d0 [ 30.515251] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.515759] kasan_report+0x102/0x140 [ 30.516410] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.516767] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.517313] __asan_report_load4_noabort+0x18/0x20 [ 30.518127] kasan_atomics_helper+0x4a86/0x5450 [ 30.518610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.519081] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.519479] ? kasan_atomics+0x153/0x310 [ 30.520085] kasan_atomics+0x1dd/0x310 [ 30.520630] ? __pfx_kasan_atomics+0x10/0x10 [ 30.521303] ? __pfx_read_tsc+0x10/0x10 [ 30.521672] ? ktime_get_ts64+0x84/0x230 [ 30.522350] kunit_try_run_case+0x1b3/0x490 [ 30.522937] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.523517] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.524061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.524742] ? __kthread_parkme+0x82/0x160 [ 30.525482] ? preempt_count_sub+0x50/0x80 [ 30.525946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.526659] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.527573] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.528140] kthread+0x257/0x310 [ 30.528585] ? __pfx_kthread+0x10/0x10 [ 30.529014] ret_from_fork+0x41/0x80 [ 30.529528] ? __pfx_kthread+0x10/0x10 [ 30.529924] ret_from_fork_asm+0x1a/0x30 [ 30.530615] </TASK> [ 30.530912] [ 30.531321] Allocated by task 273: [ 30.531636] kasan_save_stack+0x3d/0x60 [ 30.532403] kasan_save_track+0x18/0x40 [ 30.532799] kasan_save_alloc_info+0x3b/0x50 [ 30.533655] __kasan_kmalloc+0xb7/0xc0 [ 30.534263] __kmalloc_cache_noprof+0x184/0x410 [ 30.534796] kasan_atomics+0x96/0x310 [ 30.535177] kunit_try_run_case+0x1b3/0x490 [ 30.535625] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.536295] kthread+0x257/0x310 [ 30.536813] ret_from_fork+0x41/0x80 [ 30.537471] ret_from_fork_asm+0x1a/0x30 [ 30.537960] [ 30.538327] The buggy address belongs to the object at ffff888101aba780 [ 30.538327] which belongs to the cache kmalloc-64 of size 64 [ 30.539589] The buggy address is located 0 bytes to the right of [ 30.539589] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.540854] [ 30.541227] The buggy address belongs to the physical page: [ 30.541855] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.542839] flags: 0x200000000000000(node=0|zone=2) [ 30.543488] page_type: f5(slab) [ 30.543911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.544842] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.545706] page dumped because: kasan: bad access detected [ 30.546364] [ 30.546686] Memory state around the buggy address: [ 30.547289] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.548016] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.548845] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.549639] ^ [ 30.550268] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.550924] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.551771] ================================================================== [ 31.696467] ================================================================== [ 31.697508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 31.698118] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.698936] [ 31.699216] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.700202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.700618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.701670] Call Trace: [ 31.701967] <TASK> [ 31.702365] dump_stack_lvl+0x73/0xb0 [ 31.702814] print_report+0xd1/0x640 [ 31.703370] ? __virt_addr_valid+0x1db/0x2d0 [ 31.703825] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.704464] kasan_report+0x102/0x140 [ 31.704902] ? kasan_atomics_helper+0x194b/0x5450 [ 31.705785] ? kasan_atomics_helper+0x194b/0x5450 [ 31.706571] kasan_check_range+0x10c/0x1c0 [ 31.707097] __kasan_check_write+0x18/0x20 [ 31.707643] kasan_atomics_helper+0x194b/0x5450 [ 31.708320] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.708691] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.709392] ? kasan_atomics+0x153/0x310 [ 31.709884] kasan_atomics+0x1dd/0x310 [ 31.710402] ? __pfx_kasan_atomics+0x10/0x10 [ 31.711208] ? __pfx_read_tsc+0x10/0x10 [ 31.711763] ? ktime_get_ts64+0x84/0x230 [ 31.712236] kunit_try_run_case+0x1b3/0x490 [ 31.712838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.713630] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.714106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.714655] ? __kthread_parkme+0x82/0x160 [ 31.715236] ? preempt_count_sub+0x50/0x80 [ 31.715558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.715889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.716677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.717296] kthread+0x257/0x310 [ 31.717563] ? __pfx_kthread+0x10/0x10 [ 31.718190] ret_from_fork+0x41/0x80 [ 31.718779] ? __pfx_kthread+0x10/0x10 [ 31.719335] ret_from_fork_asm+0x1a/0x30 [ 31.719797] </TASK> [ 31.720122] [ 31.720367] Allocated by task 273: [ 31.720660] kasan_save_stack+0x3d/0x60 [ 31.720945] kasan_save_track+0x18/0x40 [ 31.721252] kasan_save_alloc_info+0x3b/0x50 [ 31.722080] __kasan_kmalloc+0xb7/0xc0 [ 31.722593] __kmalloc_cache_noprof+0x184/0x410 [ 31.723144] kasan_atomics+0x96/0x310 [ 31.723426] kunit_try_run_case+0x1b3/0x490 [ 31.724031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.724624] kthread+0x257/0x310 [ 31.725092] ret_from_fork+0x41/0x80 [ 31.725482] ret_from_fork_asm+0x1a/0x30 [ 31.725921] [ 31.726359] The buggy address belongs to the object at ffff888101aba780 [ 31.726359] which belongs to the cache kmalloc-64 of size 64 [ 31.727538] The buggy address is located 0 bytes to the right of [ 31.727538] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.728808] [ 31.729077] The buggy address belongs to the physical page: [ 31.729571] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.730058] flags: 0x200000000000000(node=0|zone=2) [ 31.730717] page_type: f5(slab) [ 31.731286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.731791] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.732851] page dumped because: kasan: bad access detected [ 31.733464] [ 31.733740] Memory state around the buggy address: [ 31.734382] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.735070] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.735784] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.736716] ^ [ 31.737124] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.738404] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.739121] ================================================================== [ 31.273294] ================================================================== [ 31.274577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 31.275695] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.276939] [ 31.277596] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.278739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.279863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.281085] Call Trace: [ 31.281368] <TASK> [ 31.281626] dump_stack_lvl+0x73/0xb0 [ 31.282730] print_report+0xd1/0x640 [ 31.283477] ? __virt_addr_valid+0x1db/0x2d0 [ 31.283899] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.284704] kasan_report+0x102/0x140 [ 31.285557] ? kasan_atomics_helper+0x1468/0x5450 [ 31.286296] ? kasan_atomics_helper+0x1468/0x5450 [ 31.286814] kasan_check_range+0x10c/0x1c0 [ 31.287718] __kasan_check_write+0x18/0x20 [ 31.288127] kasan_atomics_helper+0x1468/0x5450 [ 31.288841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.289528] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.290263] ? kasan_atomics+0x153/0x310 [ 31.290701] kasan_atomics+0x1dd/0x310 [ 31.291102] ? __pfx_kasan_atomics+0x10/0x10 [ 31.292324] ? __pfx_read_tsc+0x10/0x10 [ 31.292934] ? ktime_get_ts64+0x84/0x230 [ 31.293599] kunit_try_run_case+0x1b3/0x490 [ 31.294393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.294889] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.295744] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.296561] ? __kthread_parkme+0x82/0x160 [ 31.296976] ? preempt_count_sub+0x50/0x80 [ 31.297729] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.298621] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.299535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.300041] kthread+0x257/0x310 [ 31.300555] ? __pfx_kthread+0x10/0x10 [ 31.301310] ret_from_fork+0x41/0x80 [ 31.301781] ? __pfx_kthread+0x10/0x10 [ 31.302442] ret_from_fork_asm+0x1a/0x30 [ 31.303171] </TASK> [ 31.303370] [ 31.303598] Allocated by task 273: [ 31.304378] kasan_save_stack+0x3d/0x60 [ 31.304788] kasan_save_track+0x18/0x40 [ 31.305754] kasan_save_alloc_info+0x3b/0x50 [ 31.306250] __kasan_kmalloc+0xb7/0xc0 [ 31.306551] __kmalloc_cache_noprof+0x184/0x410 [ 31.307133] kasan_atomics+0x96/0x310 [ 31.307447] kunit_try_run_case+0x1b3/0x490 [ 31.307921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.308596] kthread+0x257/0x310 [ 31.308961] ret_from_fork+0x41/0x80 [ 31.309320] ret_from_fork_asm+0x1a/0x30 [ 31.309750] [ 31.310092] The buggy address belongs to the object at ffff888101aba780 [ 31.310092] which belongs to the cache kmalloc-64 of size 64 [ 31.311282] The buggy address is located 0 bytes to the right of [ 31.311282] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.312246] [ 31.312407] The buggy address belongs to the physical page: [ 31.313077] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.313960] flags: 0x200000000000000(node=0|zone=2) [ 31.314453] page_type: f5(slab) [ 31.314804] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.315566] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.316230] page dumped because: kasan: bad access detected [ 31.316776] [ 31.317105] Memory state around the buggy address: [ 31.317497] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.318131] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.319076] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.319608] ^ [ 31.320057] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.320716] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.321446] ================================================================== [ 31.228876] ================================================================== [ 31.229760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 31.230637] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.231135] [ 31.231308] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.232727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.233019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.234397] Call Trace: [ 31.234697] <TASK> [ 31.235140] dump_stack_lvl+0x73/0xb0 [ 31.235483] print_report+0xd1/0x640 [ 31.236094] ? __virt_addr_valid+0x1db/0x2d0 [ 31.236488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.237156] kasan_report+0x102/0x140 [ 31.237560] ? kasan_atomics_helper+0x4eb0/0x5450 [ 31.237897] ? kasan_atomics_helper+0x4eb0/0x5450 [ 31.238791] __asan_report_load8_noabort+0x18/0x20 [ 31.239304] kasan_atomics_helper+0x4eb0/0x5450 [ 31.239858] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.240606] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.241139] ? kasan_atomics+0x153/0x310 [ 31.241629] kasan_atomics+0x1dd/0x310 [ 31.242196] ? __pfx_kasan_atomics+0x10/0x10 [ 31.242529] ? __pfx_read_tsc+0x10/0x10 [ 31.243284] ? ktime_get_ts64+0x84/0x230 [ 31.243902] kunit_try_run_case+0x1b3/0x490 [ 31.244440] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.244970] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.245613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.246138] ? __kthread_parkme+0x82/0x160 [ 31.246756] ? preempt_count_sub+0x50/0x80 [ 31.247207] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.247794] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.248562] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.249430] kthread+0x257/0x310 [ 31.249855] ? __pfx_kthread+0x10/0x10 [ 31.250319] ret_from_fork+0x41/0x80 [ 31.250658] ? __pfx_kthread+0x10/0x10 [ 31.251430] ret_from_fork_asm+0x1a/0x30 [ 31.251776] </TASK> [ 31.252103] [ 31.252455] Allocated by task 273: [ 31.252868] kasan_save_stack+0x3d/0x60 [ 31.253381] kasan_save_track+0x18/0x40 [ 31.253744] kasan_save_alloc_info+0x3b/0x50 [ 31.254398] __kasan_kmalloc+0xb7/0xc0 [ 31.254875] __kmalloc_cache_noprof+0x184/0x410 [ 31.255204] kasan_atomics+0x96/0x310 [ 31.255882] kunit_try_run_case+0x1b3/0x490 [ 31.256422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.256888] kthread+0x257/0x310 [ 31.257583] ret_from_fork+0x41/0x80 [ 31.257974] ret_from_fork_asm+0x1a/0x30 [ 31.258534] [ 31.258768] The buggy address belongs to the object at ffff888101aba780 [ 31.258768] which belongs to the cache kmalloc-64 of size 64 [ 31.259891] The buggy address is located 0 bytes to the right of [ 31.259891] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.260934] [ 31.261360] The buggy address belongs to the physical page: [ 31.262086] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.262807] flags: 0x200000000000000(node=0|zone=2) [ 31.263565] page_type: f5(slab) [ 31.263940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.264662] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.265647] page dumped because: kasan: bad access detected [ 31.266243] [ 31.266603] Memory state around the buggy address: [ 31.267084] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.267640] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.268518] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.269220] ^ [ 31.269651] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.270380] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.271068] ================================================================== [ 30.831413] ================================================================== [ 30.833331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 30.834029] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.834460] [ 30.834716] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.836500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.836954] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.838249] Call Trace: [ 30.838472] <TASK> [ 30.838822] dump_stack_lvl+0x73/0xb0 [ 30.839643] print_report+0xd1/0x640 [ 30.839959] ? __virt_addr_valid+0x1db/0x2d0 [ 30.840722] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.841216] kasan_report+0x102/0x140 [ 30.842019] ? kasan_atomics_helper+0x107a/0x5450 [ 30.842424] ? kasan_atomics_helper+0x107a/0x5450 [ 30.843052] kasan_check_range+0x10c/0x1c0 [ 30.843538] __kasan_check_write+0x18/0x20 [ 30.844041] kasan_atomics_helper+0x107a/0x5450 [ 30.844496] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.845159] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.845947] ? kasan_atomics+0x153/0x310 [ 30.846670] kasan_atomics+0x1dd/0x310 [ 30.847400] ? __pfx_kasan_atomics+0x10/0x10 [ 30.847893] ? __pfx_read_tsc+0x10/0x10 [ 30.848237] ? ktime_get_ts64+0x84/0x230 [ 30.848771] kunit_try_run_case+0x1b3/0x490 [ 30.849263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.850433] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.851025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.851948] ? __kthread_parkme+0x82/0x160 [ 30.852575] ? preempt_count_sub+0x50/0x80 [ 30.853263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.853924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.855201] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.855694] kthread+0x257/0x310 [ 30.856443] ? __pfx_kthread+0x10/0x10 [ 30.857020] ret_from_fork+0x41/0x80 [ 30.857697] ? __pfx_kthread+0x10/0x10 [ 30.858371] ret_from_fork_asm+0x1a/0x30 [ 30.859011] </TASK> [ 30.859740] [ 30.859933] Allocated by task 273: [ 30.860207] kasan_save_stack+0x3d/0x60 [ 30.861028] kasan_save_track+0x18/0x40 [ 30.861653] kasan_save_alloc_info+0x3b/0x50 [ 30.862541] __kasan_kmalloc+0xb7/0xc0 [ 30.863141] __kmalloc_cache_noprof+0x184/0x410 [ 30.863857] kasan_atomics+0x96/0x310 [ 30.864439] kunit_try_run_case+0x1b3/0x490 [ 30.864777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.865587] kthread+0x257/0x310 [ 30.865858] ret_from_fork+0x41/0x80 [ 30.866758] ret_from_fork_asm+0x1a/0x30 [ 30.867336] [ 30.867554] The buggy address belongs to the object at ffff888101aba780 [ 30.867554] which belongs to the cache kmalloc-64 of size 64 [ 30.869416] The buggy address is located 0 bytes to the right of [ 30.869416] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.870657] [ 30.871251] The buggy address belongs to the physical page: [ 30.871801] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.872938] flags: 0x200000000000000(node=0|zone=2) [ 30.873399] page_type: f5(slab) [ 30.873860] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.874482] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.875318] page dumped because: kasan: bad access detected [ 30.875817] [ 30.876135] Memory state around the buggy address: [ 30.876637] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.877557] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.878242] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.879078] ^ [ 30.879471] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880109] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.880772] ================================================================== [ 31.008757] ================================================================== [ 31.009623] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 31.010600] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.011597] [ 31.011770] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.013123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.013626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.014494] Call Trace: [ 31.015013] <TASK> [ 31.015295] dump_stack_lvl+0x73/0xb0 [ 31.015591] print_report+0xd1/0x640 [ 31.015875] ? __virt_addr_valid+0x1db/0x2d0 [ 31.016524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.017212] kasan_report+0x102/0x140 [ 31.017862] ? kasan_atomics_helper+0x1218/0x5450 [ 31.018625] ? kasan_atomics_helper+0x1218/0x5450 [ 31.018973] kasan_check_range+0x10c/0x1c0 [ 31.019310] __kasan_check_write+0x18/0x20 [ 31.019820] kasan_atomics_helper+0x1218/0x5450 [ 31.020517] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.021081] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.021849] ? kasan_atomics+0x153/0x310 [ 31.022555] kasan_atomics+0x1dd/0x310 [ 31.023106] ? __pfx_kasan_atomics+0x10/0x10 [ 31.023479] ? __pfx_read_tsc+0x10/0x10 [ 31.023768] ? ktime_get_ts64+0x84/0x230 [ 31.024095] kunit_try_run_case+0x1b3/0x490 [ 31.024701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.025370] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.025970] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.026693] ? __kthread_parkme+0x82/0x160 [ 31.027271] ? preempt_count_sub+0x50/0x80 [ 31.027631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.027961] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.028824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.029714] kthread+0x257/0x310 [ 31.030089] ? __pfx_kthread+0x10/0x10 [ 31.030741] ret_from_fork+0x41/0x80 [ 31.031122] ? __pfx_kthread+0x10/0x10 [ 31.031625] ret_from_fork_asm+0x1a/0x30 [ 31.032822] </TASK> [ 31.033098] [ 31.033250] Allocated by task 273: [ 31.033935] kasan_save_stack+0x3d/0x60 [ 31.034290] kasan_save_track+0x18/0x40 [ 31.034941] kasan_save_alloc_info+0x3b/0x50 [ 31.035717] __kasan_kmalloc+0xb7/0xc0 [ 31.035974] __kmalloc_cache_noprof+0x184/0x410 [ 31.036740] kasan_atomics+0x96/0x310 [ 31.037268] kunit_try_run_case+0x1b3/0x490 [ 31.037648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.038315] kthread+0x257/0x310 [ 31.038581] ret_from_fork+0x41/0x80 [ 31.039263] ret_from_fork_asm+0x1a/0x30 [ 31.039859] [ 31.040163] The buggy address belongs to the object at ffff888101aba780 [ 31.040163] which belongs to the cache kmalloc-64 of size 64 [ 31.041595] The buggy address is located 0 bytes to the right of [ 31.041595] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.042917] [ 31.043357] The buggy address belongs to the physical page: [ 31.043908] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.044740] flags: 0x200000000000000(node=0|zone=2) [ 31.045388] page_type: f5(slab) [ 31.045553] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.045843] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.046480] page dumped because: kasan: bad access detected [ 31.046924] [ 31.047216] Memory state around the buggy address: [ 31.047671] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.048275] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.048786] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.049667] ^ [ 31.050221] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.050924] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.051499] ================================================================== [ 30.010201] ================================================================== [ 30.011199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 30.012395] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.013143] [ 30.013318] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.014836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.015537] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.016619] Call Trace: [ 30.016832] <TASK> [ 30.017047] dump_stack_lvl+0x73/0xb0 [ 30.017616] print_report+0xd1/0x640 [ 30.018270] ? __virt_addr_valid+0x1db/0x2d0 [ 30.019255] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.019726] kasan_report+0x102/0x140 [ 30.020247] ? kasan_atomics_helper+0x5ff/0x5450 [ 30.020751] ? kasan_atomics_helper+0x5ff/0x5450 [ 30.021476] kasan_check_range+0x10c/0x1c0 [ 30.022422] __kasan_check_write+0x18/0x20 [ 30.023371] kasan_atomics_helper+0x5ff/0x5450 [ 30.023914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.024580] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.025285] ? kasan_atomics+0x153/0x310 [ 30.026197] kasan_atomics+0x1dd/0x310 [ 30.026614] ? __pfx_kasan_atomics+0x10/0x10 [ 30.027419] ? __pfx_read_tsc+0x10/0x10 [ 30.027765] ? ktime_get_ts64+0x84/0x230 [ 30.028427] kunit_try_run_case+0x1b3/0x490 [ 30.029094] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.029848] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.030596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.031466] ? __kthread_parkme+0x82/0x160 [ 30.031897] ? preempt_count_sub+0x50/0x80 [ 30.032624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.033049] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.033635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.034553] kthread+0x257/0x310 [ 30.035336] ? __pfx_kthread+0x10/0x10 [ 30.036126] ret_from_fork+0x41/0x80 [ 30.036563] ? __pfx_kthread+0x10/0x10 [ 30.037169] ret_from_fork_asm+0x1a/0x30 [ 30.037604] </TASK> [ 30.038075] [ 30.038259] Allocated by task 273: [ 30.038877] kasan_save_stack+0x3d/0x60 [ 30.039240] kasan_save_track+0x18/0x40 [ 30.040195] kasan_save_alloc_info+0x3b/0x50 [ 30.040528] __kasan_kmalloc+0xb7/0xc0 [ 30.041115] __kmalloc_cache_noprof+0x184/0x410 [ 30.041583] kasan_atomics+0x96/0x310 [ 30.042296] kunit_try_run_case+0x1b3/0x490 [ 30.042735] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.043440] kthread+0x257/0x310 [ 30.043741] ret_from_fork+0x41/0x80 [ 30.044312] ret_from_fork_asm+0x1a/0x30 [ 30.045009] [ 30.045522] The buggy address belongs to the object at ffff888101aba780 [ 30.045522] which belongs to the cache kmalloc-64 of size 64 [ 30.046790] The buggy address is located 0 bytes to the right of [ 30.046790] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.047908] [ 30.048178] The buggy address belongs to the physical page: [ 30.049332] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.050156] flags: 0x200000000000000(node=0|zone=2) [ 30.050663] page_type: f5(slab) [ 30.050910] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.051822] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.052825] page dumped because: kasan: bad access detected [ 30.053467] [ 30.053644] Memory state around the buggy address: [ 30.054289] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.055148] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.055858] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.056946] ^ [ 30.057528] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.058562] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.059236] ================================================================== [ 30.881819] ================================================================== [ 30.882331] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 30.883105] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.883842] [ 30.884039] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.885207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.886048] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.886852] Call Trace: [ 30.887113] <TASK> [ 30.887469] dump_stack_lvl+0x73/0xb0 [ 30.887969] print_report+0xd1/0x640 [ 30.888549] ? __virt_addr_valid+0x1db/0x2d0 [ 30.888906] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.889719] kasan_report+0x102/0x140 [ 30.890264] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.890643] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.891010] __asan_report_load4_noabort+0x18/0x20 [ 30.891713] kasan_atomics_helper+0x4a1e/0x5450 [ 30.892368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.892961] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.893443] ? kasan_atomics+0x153/0x310 [ 30.893965] kasan_atomics+0x1dd/0x310 [ 30.894323] ? __pfx_kasan_atomics+0x10/0x10 [ 30.894779] ? __pfx_read_tsc+0x10/0x10 [ 30.895453] ? ktime_get_ts64+0x84/0x230 [ 30.895844] kunit_try_run_case+0x1b3/0x490 [ 30.896350] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.896953] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.897572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.898146] ? __kthread_parkme+0x82/0x160 [ 30.898500] ? preempt_count_sub+0x50/0x80 [ 30.899001] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.899449] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.900306] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.900846] kthread+0x257/0x310 [ 30.901134] ? __pfx_kthread+0x10/0x10 [ 30.901699] ret_from_fork+0x41/0x80 [ 30.902286] ? __pfx_kthread+0x10/0x10 [ 30.902639] ret_from_fork_asm+0x1a/0x30 [ 30.904470] </TASK> [ 30.904787] [ 30.905066] Allocated by task 273: [ 30.905424] kasan_save_stack+0x3d/0x60 [ 30.905797] kasan_save_track+0x18/0x40 [ 30.906200] kasan_save_alloc_info+0x3b/0x50 [ 30.906583] __kasan_kmalloc+0xb7/0xc0 [ 30.907270] __kmalloc_cache_noprof+0x184/0x410 [ 30.907978] kasan_atomics+0x96/0x310 [ 30.908755] kunit_try_run_case+0x1b3/0x490 [ 30.909522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.909888] kthread+0x257/0x310 [ 30.910415] ret_from_fork+0x41/0x80 [ 30.910874] ret_from_fork_asm+0x1a/0x30 [ 30.911394] [ 30.911621] The buggy address belongs to the object at ffff888101aba780 [ 30.911621] which belongs to the cache kmalloc-64 of size 64 [ 30.912654] The buggy address is located 0 bytes to the right of [ 30.912654] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.913764] [ 30.914121] The buggy address belongs to the physical page: [ 30.914580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.915524] flags: 0x200000000000000(node=0|zone=2) [ 30.916120] page_type: f5(slab) [ 30.916410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.917210] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.917775] page dumped because: kasan: bad access detected [ 30.918385] [ 30.918677] Memory state around the buggy address: [ 30.919201] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.919872] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.920525] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.921197] ^ [ 30.921798] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.922463] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.923269] ================================================================== [ 31.454289] ================================================================== [ 31.455292] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 31.456182] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.457482] [ 31.457795] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.459639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.460437] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.461378] Call Trace: [ 31.461631] <TASK> [ 31.461896] dump_stack_lvl+0x73/0xb0 [ 31.462779] print_report+0xd1/0x640 [ 31.463556] ? __virt_addr_valid+0x1db/0x2d0 [ 31.464015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.464650] kasan_report+0x102/0x140 [ 31.465671] ? kasan_atomics_helper+0x1650/0x5450 [ 31.466429] ? kasan_atomics_helper+0x1650/0x5450 [ 31.466945] kasan_check_range+0x10c/0x1c0 [ 31.467525] __kasan_check_write+0x18/0x20 [ 31.468016] kasan_atomics_helper+0x1650/0x5450 [ 31.468858] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.469456] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.470605] ? kasan_atomics+0x153/0x310 [ 31.471017] kasan_atomics+0x1dd/0x310 [ 31.471902] ? __pfx_kasan_atomics+0x10/0x10 [ 31.472535] ? __pfx_read_tsc+0x10/0x10 [ 31.473007] ? ktime_get_ts64+0x84/0x230 [ 31.473842] kunit_try_run_case+0x1b3/0x490 [ 31.474538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.474934] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.476125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.476602] ? __kthread_parkme+0x82/0x160 [ 31.477568] ? preempt_count_sub+0x50/0x80 [ 31.478005] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.478904] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.479761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.480884] kthread+0x257/0x310 [ 31.481272] ? __pfx_kthread+0x10/0x10 [ 31.481891] ret_from_fork+0x41/0x80 [ 31.482370] ? __pfx_kthread+0x10/0x10 [ 31.482736] ret_from_fork_asm+0x1a/0x30 [ 31.483735] </TASK> [ 31.483975] [ 31.484182] Allocated by task 273: [ 31.484933] kasan_save_stack+0x3d/0x60 [ 31.485596] kasan_save_track+0x18/0x40 [ 31.486592] kasan_save_alloc_info+0x3b/0x50 [ 31.487032] __kasan_kmalloc+0xb7/0xc0 [ 31.487830] __kmalloc_cache_noprof+0x184/0x410 [ 31.488649] kasan_atomics+0x96/0x310 [ 31.489052] kunit_try_run_case+0x1b3/0x490 [ 31.489799] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.490311] kthread+0x257/0x310 [ 31.490667] ret_from_fork+0x41/0x80 [ 31.491024] ret_from_fork_asm+0x1a/0x30 [ 31.491832] [ 31.492015] The buggy address belongs to the object at ffff888101aba780 [ 31.492015] which belongs to the cache kmalloc-64 of size 64 [ 31.494282] The buggy address is located 0 bytes to the right of [ 31.494282] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.495742] [ 31.495855] The buggy address belongs to the physical page: [ 31.496151] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.497720] flags: 0x200000000000000(node=0|zone=2) [ 31.498115] page_type: f5(slab) [ 31.498554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.499693] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.500685] page dumped because: kasan: bad access detected [ 31.501140] [ 31.501430] Memory state around the buggy address: [ 31.502414] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.503309] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.504256] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.504904] ^ [ 31.505647] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.506741] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.507511] ================================================================== [ 31.785010] ================================================================== [ 31.785532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 31.786703] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.789137] [ 31.789483] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.791423] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.792090] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.793287] Call Trace: [ 31.793634] <TASK> [ 31.794276] dump_stack_lvl+0x73/0xb0 [ 31.794734] print_report+0xd1/0x640 [ 31.795188] ? __virt_addr_valid+0x1db/0x2d0 [ 31.795651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.796632] kasan_report+0x102/0x140 [ 31.797218] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.797837] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.798561] kasan_check_range+0x10c/0x1c0 [ 31.799348] __kasan_check_write+0x18/0x20 [ 31.799974] kasan_atomics_helper+0x1a80/0x5450 [ 31.800828] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.801413] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.801966] ? kasan_atomics+0x153/0x310 [ 31.802855] kasan_atomics+0x1dd/0x310 [ 31.803645] ? __pfx_kasan_atomics+0x10/0x10 [ 31.804017] ? __pfx_read_tsc+0x10/0x10 [ 31.804592] ? ktime_get_ts64+0x84/0x230 [ 31.805294] kunit_try_run_case+0x1b3/0x490 [ 31.805925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.806510] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.806951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.807842] ? __kthread_parkme+0x82/0x160 [ 31.808758] ? preempt_count_sub+0x50/0x80 [ 31.809482] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.809916] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.810734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.811584] kthread+0x257/0x310 [ 31.811958] ? __pfx_kthread+0x10/0x10 [ 31.812810] ret_from_fork+0x41/0x80 [ 31.813412] ? __pfx_kthread+0x10/0x10 [ 31.813815] ret_from_fork_asm+0x1a/0x30 [ 31.814551] </TASK> [ 31.814820] [ 31.815014] Allocated by task 273: [ 31.815475] kasan_save_stack+0x3d/0x60 [ 31.816408] kasan_save_track+0x18/0x40 [ 31.816767] kasan_save_alloc_info+0x3b/0x50 [ 31.817527] __kasan_kmalloc+0xb7/0xc0 [ 31.817849] __kmalloc_cache_noprof+0x184/0x410 [ 31.818602] kasan_atomics+0x96/0x310 [ 31.819289] kunit_try_run_case+0x1b3/0x490 [ 31.819697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.820542] kthread+0x257/0x310 [ 31.820898] ret_from_fork+0x41/0x80 [ 31.821476] ret_from_fork_asm+0x1a/0x30 [ 31.821933] [ 31.822473] The buggy address belongs to the object at ffff888101aba780 [ 31.822473] which belongs to the cache kmalloc-64 of size 64 [ 31.823767] The buggy address is located 0 bytes to the right of [ 31.823767] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.824907] [ 31.825450] The buggy address belongs to the physical page: [ 31.826079] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.826812] flags: 0x200000000000000(node=0|zone=2) [ 31.827532] page_type: f5(slab) [ 31.828115] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.828925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.829921] page dumped because: kasan: bad access detected [ 31.830482] [ 31.830651] Memory state around the buggy address: [ 31.831130] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.832203] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.832916] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.833902] ^ [ 31.834592] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.835388] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.835952] ================================================================== [ 30.110874] ================================================================== [ 30.112040] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 30.113166] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.113519] [ 30.113632] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.114034] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.114902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.115701] Call Trace: [ 30.115912] <TASK> [ 30.116138] dump_stack_lvl+0x73/0xb0 [ 30.116642] print_report+0xd1/0x640 [ 30.117101] ? __virt_addr_valid+0x1db/0x2d0 [ 30.117422] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.118133] kasan_report+0x102/0x140 [ 30.118823] ? kasan_atomics_helper+0x730/0x5450 [ 30.119561] ? kasan_atomics_helper+0x730/0x5450 [ 30.120348] kasan_check_range+0x10c/0x1c0 [ 30.120969] __kasan_check_write+0x18/0x20 [ 30.121572] kasan_atomics_helper+0x730/0x5450 [ 30.121929] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.122428] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.123259] ? kasan_atomics+0x153/0x310 [ 30.123858] kasan_atomics+0x1dd/0x310 [ 30.124474] ? __pfx_kasan_atomics+0x10/0x10 [ 30.125017] ? __pfx_read_tsc+0x10/0x10 [ 30.125449] ? ktime_get_ts64+0x84/0x230 [ 30.125932] kunit_try_run_case+0x1b3/0x490 [ 30.126823] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.128081] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.128679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.129419] ? __kthread_parkme+0x82/0x160 [ 30.129848] ? preempt_count_sub+0x50/0x80 [ 30.130763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.131559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.132505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.133008] kthread+0x257/0x310 [ 30.133417] ? __pfx_kthread+0x10/0x10 [ 30.133845] ret_from_fork+0x41/0x80 [ 30.134532] ? __pfx_kthread+0x10/0x10 [ 30.135498] ret_from_fork_asm+0x1a/0x30 [ 30.135810] </TASK> [ 30.136132] [ 30.136374] Allocated by task 273: [ 30.136752] kasan_save_stack+0x3d/0x60 [ 30.137584] kasan_save_track+0x18/0x40 [ 30.138022] kasan_save_alloc_info+0x3b/0x50 [ 30.138612] __kasan_kmalloc+0xb7/0xc0 [ 30.139375] __kmalloc_cache_noprof+0x184/0x410 [ 30.140444] kasan_atomics+0x96/0x310 [ 30.140763] kunit_try_run_case+0x1b3/0x490 [ 30.141256] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.141826] kthread+0x257/0x310 [ 30.142178] ret_from_fork+0x41/0x80 [ 30.142595] ret_from_fork_asm+0x1a/0x30 [ 30.143101] [ 30.143292] The buggy address belongs to the object at ffff888101aba780 [ 30.143292] which belongs to the cache kmalloc-64 of size 64 [ 30.144624] The buggy address is located 0 bytes to the right of [ 30.144624] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.145460] [ 30.145766] The buggy address belongs to the physical page: [ 30.146276] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.147089] flags: 0x200000000000000(node=0|zone=2) [ 30.147530] page_type: f5(slab) [ 30.147858] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.148464] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.149381] page dumped because: kasan: bad access detected [ 30.149782] [ 30.150036] Memory state around the buggy address: [ 30.150504] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.151143] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.151715] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.152463] ^ [ 30.152923] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.153574] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.154169] ================================================================== [ 32.149482] ================================================================== [ 32.149901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 32.150721] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.151408] [ 32.151678] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.152671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.153088] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.154054] Call Trace: [ 32.154375] <TASK> [ 32.154740] dump_stack_lvl+0x73/0xb0 [ 32.155301] print_report+0xd1/0x640 [ 32.155631] ? __virt_addr_valid+0x1db/0x2d0 [ 32.156245] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.156771] kasan_report+0x102/0x140 [ 32.157343] ? kasan_atomics_helper+0x1f44/0x5450 [ 32.157860] ? kasan_atomics_helper+0x1f44/0x5450 [ 32.158438] kasan_check_range+0x10c/0x1c0 [ 32.158786] __kasan_check_write+0x18/0x20 [ 32.159392] kasan_atomics_helper+0x1f44/0x5450 [ 32.159841] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.160450] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.160912] ? kasan_atomics+0x153/0x310 [ 32.161521] kasan_atomics+0x1dd/0x310 [ 32.162128] ? __pfx_kasan_atomics+0x10/0x10 [ 32.162540] ? __pfx_read_tsc+0x10/0x10 [ 32.162911] ? ktime_get_ts64+0x84/0x230 [ 32.163467] kunit_try_run_case+0x1b3/0x490 [ 32.163881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.164495] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.165061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.165664] ? __kthread_parkme+0x82/0x160 [ 32.166182] ? preempt_count_sub+0x50/0x80 [ 32.166728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.167278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.167861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.168377] kthread+0x257/0x310 [ 32.168865] ? __pfx_kthread+0x10/0x10 [ 32.169393] ret_from_fork+0x41/0x80 [ 32.169744] ? __pfx_kthread+0x10/0x10 [ 32.170339] ret_from_fork_asm+0x1a/0x30 [ 32.170809] </TASK> [ 32.171220] [ 32.171439] Allocated by task 273: [ 32.171844] kasan_save_stack+0x3d/0x60 [ 32.172419] kasan_save_track+0x18/0x40 [ 32.172814] kasan_save_alloc_info+0x3b/0x50 [ 32.173427] __kasan_kmalloc+0xb7/0xc0 [ 32.173871] __kmalloc_cache_noprof+0x184/0x410 [ 32.174539] kasan_atomics+0x96/0x310 [ 32.174941] kunit_try_run_case+0x1b3/0x490 [ 32.175404] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.175950] kthread+0x257/0x310 [ 32.176437] ret_from_fork+0x41/0x80 [ 32.176907] ret_from_fork_asm+0x1a/0x30 [ 32.177383] [ 32.177580] The buggy address belongs to the object at ffff888101aba780 [ 32.177580] which belongs to the cache kmalloc-64 of size 64 [ 32.178439] The buggy address is located 0 bytes to the right of [ 32.178439] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.179882] [ 32.180818] The buggy address belongs to the physical page: [ 32.181487] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.182039] flags: 0x200000000000000(node=0|zone=2) [ 32.182573] page_type: f5(slab) [ 32.182851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.183973] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.184451] page dumped because: kasan: bad access detected [ 32.184894] [ 32.185094] Memory state around the buggy address: [ 32.185541] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.186072] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.186629] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.187321] ^ [ 32.187717] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.188423] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.188887] ================================================================== [ 31.607765] ================================================================== [ 31.608587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 31.609301] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.610337] [ 31.610760] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.613225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.613677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.615595] Call Trace: [ 31.615972] <TASK> [ 31.616240] dump_stack_lvl+0x73/0xb0 [ 31.616744] print_report+0xd1/0x640 [ 31.617197] ? __virt_addr_valid+0x1db/0x2d0 [ 31.617789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.618427] kasan_report+0x102/0x140 [ 31.619067] ? kasan_atomics_helper+0x1819/0x5450 [ 31.619451] ? kasan_atomics_helper+0x1819/0x5450 [ 31.620023] kasan_check_range+0x10c/0x1c0 [ 31.620632] __kasan_check_write+0x18/0x20 [ 31.621288] kasan_atomics_helper+0x1819/0x5450 [ 31.621861] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.622510] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.623182] ? kasan_atomics+0x153/0x310 [ 31.623624] kasan_atomics+0x1dd/0x310 [ 31.624186] ? __pfx_kasan_atomics+0x10/0x10 [ 31.624505] ? __pfx_read_tsc+0x10/0x10 [ 31.625200] ? ktime_get_ts64+0x84/0x230 [ 31.625716] kunit_try_run_case+0x1b3/0x490 [ 31.626220] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.626664] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.627617] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.628103] ? __kthread_parkme+0x82/0x160 [ 31.628738] ? preempt_count_sub+0x50/0x80 [ 31.629298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.629838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.630452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.631178] kthread+0x257/0x310 [ 31.631672] ? __pfx_kthread+0x10/0x10 [ 31.632075] ret_from_fork+0x41/0x80 [ 31.632731] ? __pfx_kthread+0x10/0x10 [ 31.633130] ret_from_fork_asm+0x1a/0x30 [ 31.633507] </TASK> [ 31.633836] [ 31.634033] Allocated by task 273: [ 31.634444] kasan_save_stack+0x3d/0x60 [ 31.634893] kasan_save_track+0x18/0x40 [ 31.635434] kasan_save_alloc_info+0x3b/0x50 [ 31.635879] __kasan_kmalloc+0xb7/0xc0 [ 31.636543] __kmalloc_cache_noprof+0x184/0x410 [ 31.636886] kasan_atomics+0x96/0x310 [ 31.637420] kunit_try_run_case+0x1b3/0x490 [ 31.637937] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.638409] kthread+0x257/0x310 [ 31.638906] ret_from_fork+0x41/0x80 [ 31.639462] ret_from_fork_asm+0x1a/0x30 [ 31.640021] [ 31.640292] The buggy address belongs to the object at ffff888101aba780 [ 31.640292] which belongs to the cache kmalloc-64 of size 64 [ 31.641403] The buggy address is located 0 bytes to the right of [ 31.641403] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.643130] [ 31.644146] The buggy address belongs to the physical page: [ 31.644728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.645578] flags: 0x200000000000000(node=0|zone=2) [ 31.646068] page_type: f5(slab) [ 31.646506] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.647174] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.648102] page dumped because: kasan: bad access detected [ 31.648532] [ 31.648783] Memory state around the buggy address: [ 31.649492] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.650168] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.650963] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.651704] ^ [ 31.652222] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.652906] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.653558] ================================================================== [ 30.194092] ================================================================== [ 30.194906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 30.195594] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.196224] [ 30.196456] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.197050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.197542] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.198500] Call Trace: [ 30.198834] <TASK> [ 30.199052] dump_stack_lvl+0x73/0xb0 [ 30.199346] print_report+0xd1/0x640 [ 30.199627] ? __virt_addr_valid+0x1db/0x2d0 [ 30.199944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.200624] kasan_report+0x102/0x140 [ 30.201132] ? kasan_atomics_helper+0x861/0x5450 [ 30.201839] ? kasan_atomics_helper+0x861/0x5450 [ 30.202537] kasan_check_range+0x10c/0x1c0 [ 30.202959] __kasan_check_write+0x18/0x20 [ 30.203365] kasan_atomics_helper+0x861/0x5450 [ 30.203810] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.204476] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.204907] ? kasan_atomics+0x153/0x310 [ 30.205481] kasan_atomics+0x1dd/0x310 [ 30.205782] ? __pfx_kasan_atomics+0x10/0x10 [ 30.206211] ? __pfx_read_tsc+0x10/0x10 [ 30.206930] ? ktime_get_ts64+0x84/0x230 [ 30.207468] kunit_try_run_case+0x1b3/0x490 [ 30.207861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.208354] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.208691] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.209049] ? __kthread_parkme+0x82/0x160 [ 30.209588] ? preempt_count_sub+0x50/0x80 [ 30.210221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.210810] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.211399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.211865] kthread+0x257/0x310 [ 30.212281] ? __pfx_kthread+0x10/0x10 [ 30.212706] ret_from_fork+0x41/0x80 [ 30.213030] ? __pfx_kthread+0x10/0x10 [ 30.213496] ret_from_fork_asm+0x1a/0x30 [ 30.213886] </TASK> [ 30.214231] [ 30.214402] Allocated by task 273: [ 30.214648] kasan_save_stack+0x3d/0x60 [ 30.214927] kasan_save_track+0x18/0x40 [ 30.215400] kasan_save_alloc_info+0x3b/0x50 [ 30.215952] __kasan_kmalloc+0xb7/0xc0 [ 30.216472] __kmalloc_cache_noprof+0x184/0x410 [ 30.216855] kasan_atomics+0x96/0x310 [ 30.217158] kunit_try_run_case+0x1b3/0x490 [ 30.217654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.219932] kthread+0x257/0x310 [ 30.220925] ret_from_fork+0x41/0x80 [ 30.221747] ret_from_fork_asm+0x1a/0x30 [ 30.222581] [ 30.222744] The buggy address belongs to the object at ffff888101aba780 [ 30.222744] which belongs to the cache kmalloc-64 of size 64 [ 30.224434] The buggy address is located 0 bytes to the right of [ 30.224434] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.225756] [ 30.226409] The buggy address belongs to the physical page: [ 30.227101] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.227955] flags: 0x200000000000000(node=0|zone=2) [ 30.228573] page_type: f5(slab) [ 30.229002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.230122] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.230799] page dumped because: kasan: bad access detected [ 30.231706] [ 30.231877] Memory state around the buggy address: [ 30.232194] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.233502] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.234380] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.235277] ^ [ 30.235660] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.236320] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.236891] ================================================================== [ 32.025237] ================================================================== [ 32.025754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 32.027428] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.028693] [ 32.029505] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.029900] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.030175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.031710] Call Trace: [ 32.032069] <TASK> [ 32.032478] dump_stack_lvl+0x73/0xb0 [ 32.032852] print_report+0xd1/0x640 [ 32.033253] ? __virt_addr_valid+0x1db/0x2d0 [ 32.033547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.033895] kasan_report+0x102/0x140 [ 32.034216] ? kasan_atomics_helper+0x1d7b/0x5450 [ 32.034563] ? kasan_atomics_helper+0x1d7b/0x5450 [ 32.034918] kasan_check_range+0x10c/0x1c0 [ 32.035291] __kasan_check_write+0x18/0x20 [ 32.035768] kasan_atomics_helper+0x1d7b/0x5450 [ 32.036336] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.036667] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.036971] ? kasan_atomics+0x153/0x310 [ 32.037283] kasan_atomics+0x1dd/0x310 [ 32.037555] ? __pfx_kasan_atomics+0x10/0x10 [ 32.037872] ? __pfx_read_tsc+0x10/0x10 [ 32.038216] ? ktime_get_ts64+0x84/0x230 [ 32.038539] kunit_try_run_case+0x1b3/0x490 [ 32.038977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.039647] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.039976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.040655] ? __kthread_parkme+0x82/0x160 [ 32.040950] ? preempt_count_sub+0x50/0x80 [ 32.041371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.041903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.042583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.043251] kthread+0x257/0x310 [ 32.043578] ? __pfx_kthread+0x10/0x10 [ 32.044254] ret_from_fork+0x41/0x80 [ 32.044689] ? __pfx_kthread+0x10/0x10 [ 32.044978] ret_from_fork_asm+0x1a/0x30 [ 32.045640] </TASK> [ 32.045960] [ 32.046312] Allocated by task 273: [ 32.046631] kasan_save_stack+0x3d/0x60 [ 32.046915] kasan_save_track+0x18/0x40 [ 32.047254] kasan_save_alloc_info+0x3b/0x50 [ 32.047559] __kasan_kmalloc+0xb7/0xc0 [ 32.048161] __kmalloc_cache_noprof+0x184/0x410 [ 32.048744] kasan_atomics+0x96/0x310 [ 32.049321] kunit_try_run_case+0x1b3/0x490 [ 32.049874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.050674] kthread+0x257/0x310 [ 32.051231] ret_from_fork+0x41/0x80 [ 32.051603] ret_from_fork_asm+0x1a/0x30 [ 32.052045] [ 32.052337] The buggy address belongs to the object at ffff888101aba780 [ 32.052337] which belongs to the cache kmalloc-64 of size 64 [ 32.053570] The buggy address is located 0 bytes to the right of [ 32.053570] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.054724] [ 32.054963] The buggy address belongs to the physical page: [ 32.055586] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.056382] flags: 0x200000000000000(node=0|zone=2) [ 32.056881] page_type: f5(slab) [ 32.057349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.057790] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.058633] page dumped because: kasan: bad access detected [ 32.059336] [ 32.059514] Memory state around the buggy address: [ 32.059821] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.060719] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.062514] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.063115] ^ [ 32.063541] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.064592] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.065154] ================================================================== [ 31.559488] ================================================================== [ 31.561462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 31.562105] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.562878] [ 31.563773] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.564630] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.564811] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.565264] Call Trace: [ 31.565720] <TASK> [ 31.566094] dump_stack_lvl+0x73/0xb0 [ 31.566601] print_report+0xd1/0x640 [ 31.567130] ? __virt_addr_valid+0x1db/0x2d0 [ 31.567566] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.568207] kasan_report+0x102/0x140 [ 31.568874] ? kasan_atomics_helper+0x1780/0x5450 [ 31.569550] ? kasan_atomics_helper+0x1780/0x5450 [ 31.570266] kasan_check_range+0x10c/0x1c0 [ 31.570843] __kasan_check_write+0x18/0x20 [ 31.571323] kasan_atomics_helper+0x1780/0x5450 [ 31.571751] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.572820] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.573471] ? kasan_atomics+0x153/0x310 [ 31.574082] kasan_atomics+0x1dd/0x310 [ 31.574639] ? __pfx_kasan_atomics+0x10/0x10 [ 31.575261] ? __pfx_read_tsc+0x10/0x10 [ 31.575607] ? ktime_get_ts64+0x84/0x230 [ 31.576014] kunit_try_run_case+0x1b3/0x490 [ 31.576871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.577654] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.578418] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.578775] ? __kthread_parkme+0x82/0x160 [ 31.580054] ? preempt_count_sub+0x50/0x80 [ 31.580592] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.580907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.581655] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.582342] kthread+0x257/0x310 [ 31.582775] ? __pfx_kthread+0x10/0x10 [ 31.583324] ret_from_fork+0x41/0x80 [ 31.583879] ? __pfx_kthread+0x10/0x10 [ 31.584595] ret_from_fork_asm+0x1a/0x30 [ 31.585281] </TASK> [ 31.585622] [ 31.585908] Allocated by task 273: [ 31.586529] kasan_save_stack+0x3d/0x60 [ 31.587057] kasan_save_track+0x18/0x40 [ 31.587503] kasan_save_alloc_info+0x3b/0x50 [ 31.588177] __kasan_kmalloc+0xb7/0xc0 [ 31.588634] __kmalloc_cache_noprof+0x184/0x410 [ 31.589229] kasan_atomics+0x96/0x310 [ 31.589645] kunit_try_run_case+0x1b3/0x490 [ 31.590247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.591068] kthread+0x257/0x310 [ 31.591341] ret_from_fork+0x41/0x80 [ 31.592033] ret_from_fork_asm+0x1a/0x30 [ 31.592356] [ 31.592605] The buggy address belongs to the object at ffff888101aba780 [ 31.592605] which belongs to the cache kmalloc-64 of size 64 [ 31.593818] The buggy address is located 0 bytes to the right of [ 31.593818] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.595299] [ 31.595467] The buggy address belongs to the physical page: [ 31.596394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.597215] flags: 0x200000000000000(node=0|zone=2) [ 31.597918] page_type: f5(slab) [ 31.598381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.599462] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.600359] page dumped because: kasan: bad access detected [ 31.601057] [ 31.601423] Memory state around the buggy address: [ 31.602000] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.602850] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.603662] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.604612] ^ [ 31.605133] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.605915] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.606891] ================================================================== [ 32.316871] ================================================================== [ 32.317398] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 32.318190] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.318812] [ 32.319096] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.319934] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.320271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.321242] Call Trace: [ 32.321521] <TASK> [ 32.321718] dump_stack_lvl+0x73/0xb0 [ 32.322242] print_report+0xd1/0x640 [ 32.322724] ? __virt_addr_valid+0x1db/0x2d0 [ 32.323180] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.323694] kasan_report+0x102/0x140 [ 32.324092] ? kasan_atomics_helper+0x20c9/0x5450 [ 32.324581] ? kasan_atomics_helper+0x20c9/0x5450 [ 32.325097] kasan_check_range+0x10c/0x1c0 [ 32.325611] __kasan_check_write+0x18/0x20 [ 32.325931] kasan_atomics_helper+0x20c9/0x5450 [ 32.326314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.326918] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.327512] ? kasan_atomics+0x153/0x310 [ 32.327847] kasan_atomics+0x1dd/0x310 [ 32.328396] ? __pfx_kasan_atomics+0x10/0x10 [ 32.328925] ? __pfx_read_tsc+0x10/0x10 [ 32.329398] ? ktime_get_ts64+0x84/0x230 [ 32.329810] kunit_try_run_case+0x1b3/0x490 [ 32.330266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.330677] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.331063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.331653] ? __kthread_parkme+0x82/0x160 [ 32.332199] ? preempt_count_sub+0x50/0x80 [ 32.332543] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.333181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.333717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.334307] kthread+0x257/0x310 [ 32.334757] ? __pfx_kthread+0x10/0x10 [ 32.335192] ret_from_fork+0x41/0x80 [ 32.335579] ? __pfx_kthread+0x10/0x10 [ 32.336067] ret_from_fork_asm+0x1a/0x30 [ 32.336412] </TASK> [ 32.336721] [ 32.336893] Allocated by task 273: [ 32.337350] kasan_save_stack+0x3d/0x60 [ 32.337625] kasan_save_track+0x18/0x40 [ 32.337911] kasan_save_alloc_info+0x3b/0x50 [ 32.338513] __kasan_kmalloc+0xb7/0xc0 [ 32.339060] __kmalloc_cache_noprof+0x184/0x410 [ 32.339505] kasan_atomics+0x96/0x310 [ 32.339899] kunit_try_run_case+0x1b3/0x490 [ 32.340349] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.340735] kthread+0x257/0x310 [ 32.341006] ret_from_fork+0x41/0x80 [ 32.341527] ret_from_fork_asm+0x1a/0x30 [ 32.342063] [ 32.342313] The buggy address belongs to the object at ffff888101aba780 [ 32.342313] which belongs to the cache kmalloc-64 of size 64 [ 32.343207] The buggy address is located 0 bytes to the right of [ 32.343207] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.344329] [ 32.344571] The buggy address belongs to the physical page: [ 32.345199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.345767] flags: 0x200000000000000(node=0|zone=2) [ 32.346152] page_type: f5(slab) [ 32.346555] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.347489] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.348151] page dumped because: kasan: bad access detected [ 32.348480] [ 32.348726] Memory state around the buggy address: [ 32.349358] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.350190] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.350787] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.351396] ^ [ 32.351768] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.352405] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.353063] ================================================================== [ 30.553036] ================================================================== [ 30.553696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 30.556000] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.557005] [ 30.557312] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.558447] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.558863] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.559832] Call Trace: [ 30.560075] <TASK> [ 30.560447] dump_stack_lvl+0x73/0xb0 [ 30.560904] print_report+0xd1/0x640 [ 30.561277] ? __virt_addr_valid+0x1db/0x2d0 [ 30.561772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.562491] kasan_report+0x102/0x140 [ 30.562844] ? kasan_atomics_helper+0xd48/0x5450 [ 30.563484] ? kasan_atomics_helper+0xd48/0x5450 [ 30.563927] kasan_check_range+0x10c/0x1c0 [ 30.564262] __kasan_check_write+0x18/0x20 [ 30.564765] kasan_atomics_helper+0xd48/0x5450 [ 30.565390] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.566070] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.566523] ? kasan_atomics+0x153/0x310 [ 30.566943] kasan_atomics+0x1dd/0x310 [ 30.567311] ? __pfx_kasan_atomics+0x10/0x10 [ 30.567788] ? __pfx_read_tsc+0x10/0x10 [ 30.568411] ? ktime_get_ts64+0x84/0x230 [ 30.568762] kunit_try_run_case+0x1b3/0x490 [ 30.569534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.569916] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.570650] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.571313] ? __kthread_parkme+0x82/0x160 [ 30.571763] ? preempt_count_sub+0x50/0x80 [ 30.572271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.572713] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.573534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.574183] kthread+0x257/0x310 [ 30.574574] ? __pfx_kthread+0x10/0x10 [ 30.575003] ret_from_fork+0x41/0x80 [ 30.575512] ? __pfx_kthread+0x10/0x10 [ 30.575909] ret_from_fork_asm+0x1a/0x30 [ 30.576478] </TASK> [ 30.576673] [ 30.576961] Allocated by task 273: [ 30.577351] kasan_save_stack+0x3d/0x60 [ 30.577765] kasan_save_track+0x18/0x40 [ 30.578107] kasan_save_alloc_info+0x3b/0x50 [ 30.578674] __kasan_kmalloc+0xb7/0xc0 [ 30.579020] __kmalloc_cache_noprof+0x184/0x410 [ 30.579705] kasan_atomics+0x96/0x310 [ 30.580001] kunit_try_run_case+0x1b3/0x490 [ 30.580535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.581019] kthread+0x257/0x310 [ 30.581276] ret_from_fork+0x41/0x80 [ 30.582068] ret_from_fork_asm+0x1a/0x30 [ 30.582494] [ 30.582751] The buggy address belongs to the object at ffff888101aba780 [ 30.582751] which belongs to the cache kmalloc-64 of size 64 [ 30.583746] The buggy address is located 0 bytes to the right of [ 30.583746] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.585076] [ 30.585282] The buggy address belongs to the physical page: [ 30.585739] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.586429] flags: 0x200000000000000(node=0|zone=2) [ 30.587143] page_type: f5(slab) [ 30.587580] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.588042] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.588469] page dumped because: kasan: bad access detected [ 30.589163] [ 30.589506] Memory state around the buggy address: [ 30.590139] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.590767] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.591918] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.592606] ^ [ 30.592922] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.593457] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.594477] ================================================================== [ 31.931635] ================================================================== [ 31.932214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 31.932818] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.933964] [ 31.934375] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.935047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.935626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.936696] Call Trace: [ 31.937149] <TASK> [ 31.937398] dump_stack_lvl+0x73/0xb0 [ 31.937848] print_report+0xd1/0x640 [ 31.938375] ? __virt_addr_valid+0x1db/0x2d0 [ 31.938952] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.939498] kasan_report+0x102/0x140 [ 31.939797] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.940711] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.941424] __asan_report_load8_noabort+0x18/0x20 [ 31.942209] kasan_atomics_helper+0x4f32/0x5450 [ 31.942610] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.943101] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.943803] ? kasan_atomics+0x153/0x310 [ 31.944504] kasan_atomics+0x1dd/0x310 [ 31.944973] ? __pfx_kasan_atomics+0x10/0x10 [ 31.945453] ? __pfx_read_tsc+0x10/0x10 [ 31.946124] ? ktime_get_ts64+0x84/0x230 [ 31.946538] kunit_try_run_case+0x1b3/0x490 [ 31.947170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.947639] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.948233] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.948703] ? __kthread_parkme+0x82/0x160 [ 31.949260] ? preempt_count_sub+0x50/0x80 [ 31.949698] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.950341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.950944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.951783] kthread+0x257/0x310 [ 31.952603] ? __pfx_kthread+0x10/0x10 [ 31.953371] ret_from_fork+0x41/0x80 [ 31.953923] ? __pfx_kthread+0x10/0x10 [ 31.954438] ret_from_fork_asm+0x1a/0x30 [ 31.954894] </TASK> [ 31.955316] [ 31.955566] Allocated by task 273: [ 31.956005] kasan_save_stack+0x3d/0x60 [ 31.956418] kasan_save_track+0x18/0x40 [ 31.956805] kasan_save_alloc_info+0x3b/0x50 [ 31.957370] __kasan_kmalloc+0xb7/0xc0 [ 31.957723] __kmalloc_cache_noprof+0x184/0x410 [ 31.958335] kasan_atomics+0x96/0x310 [ 31.958891] kunit_try_run_case+0x1b3/0x490 [ 31.959433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.960005] kthread+0x257/0x310 [ 31.960295] ret_from_fork+0x41/0x80 [ 31.960836] ret_from_fork_asm+0x1a/0x30 [ 31.961445] [ 31.961689] The buggy address belongs to the object at ffff888101aba780 [ 31.961689] which belongs to the cache kmalloc-64 of size 64 [ 31.962536] The buggy address is located 0 bytes to the right of [ 31.962536] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.964146] [ 31.964379] The buggy address belongs to the physical page: [ 31.964890] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.965776] flags: 0x200000000000000(node=0|zone=2) [ 31.966387] page_type: f5(slab) [ 31.966846] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.967781] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.968229] page dumped because: kasan: bad access detected [ 31.969009] [ 31.969268] Memory state around the buggy address: [ 31.969769] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.970504] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.971038] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.971935] ^ [ 31.972533] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.973541] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.974024] ================================================================== [ 30.965829] ================================================================== [ 30.966395] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 30.967501] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.967921] [ 30.968255] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.969766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.970148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.971199] Call Trace: [ 30.971564] <TASK> [ 30.971920] dump_stack_lvl+0x73/0xb0 [ 30.972320] print_report+0xd1/0x640 [ 30.972807] ? __virt_addr_valid+0x1db/0x2d0 [ 30.973517] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.974213] kasan_report+0x102/0x140 [ 30.974615] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.975327] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.975693] __asan_report_load4_noabort+0x18/0x20 [ 30.976371] kasan_atomics_helper+0x4a04/0x5450 [ 30.976768] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.977450] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.978068] ? kasan_atomics+0x153/0x310 [ 30.978730] kasan_atomics+0x1dd/0x310 [ 30.979260] ? __pfx_kasan_atomics+0x10/0x10 [ 30.979820] ? __pfx_read_tsc+0x10/0x10 [ 30.980360] ? ktime_get_ts64+0x84/0x230 [ 30.980886] kunit_try_run_case+0x1b3/0x490 [ 30.981303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.982056] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.982536] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.983212] ? __kthread_parkme+0x82/0x160 [ 30.983640] ? preempt_count_sub+0x50/0x80 [ 30.984213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.984543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.984929] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.985872] kthread+0x257/0x310 [ 30.986434] ? __pfx_kthread+0x10/0x10 [ 30.986725] ret_from_fork+0x41/0x80 [ 30.987078] ? __pfx_kthread+0x10/0x10 [ 30.987664] ret_from_fork_asm+0x1a/0x30 [ 30.988330] </TASK> [ 30.988705] [ 30.988880] Allocated by task 273: [ 30.989388] kasan_save_stack+0x3d/0x60 [ 30.989677] kasan_save_track+0x18/0x40 [ 30.990176] kasan_save_alloc_info+0x3b/0x50 [ 30.990782] __kasan_kmalloc+0xb7/0xc0 [ 30.991452] __kmalloc_cache_noprof+0x184/0x410 [ 30.991975] kasan_atomics+0x96/0x310 [ 30.992466] kunit_try_run_case+0x1b3/0x490 [ 30.992954] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.993544] kthread+0x257/0x310 [ 30.994017] ret_from_fork+0x41/0x80 [ 30.994514] ret_from_fork_asm+0x1a/0x30 [ 30.995051] [ 30.995395] The buggy address belongs to the object at ffff888101aba780 [ 30.995395] which belongs to the cache kmalloc-64 of size 64 [ 30.996292] The buggy address is located 0 bytes to the right of [ 30.996292] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.997738] [ 30.998080] The buggy address belongs to the physical page: [ 30.998431] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.998879] flags: 0x200000000000000(node=0|zone=2) [ 30.999746] page_type: f5(slab) [ 31.000364] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.001241] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.001665] page dumped because: kasan: bad access detected [ 31.002631] [ 31.002846] Memory state around the buggy address: [ 31.003502] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.004344] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.005032] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.005628] ^ [ 31.006174] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.006776] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.007440] ================================================================== [ 31.139414] ================================================================== [ 31.140072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 31.140884] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.141840] [ 31.142236] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.143053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.143572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.144176] Call Trace: [ 31.144420] <TASK> [ 31.144778] dump_stack_lvl+0x73/0xb0 [ 31.145366] print_report+0xd1/0x640 [ 31.145810] ? __virt_addr_valid+0x1db/0x2d0 [ 31.146586] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.147213] kasan_report+0x102/0x140 [ 31.148843] ? kasan_atomics_helper+0x49d0/0x5450 [ 31.149688] ? kasan_atomics_helper+0x49d0/0x5450 [ 31.150607] __asan_report_load4_noabort+0x18/0x20 [ 31.151357] kasan_atomics_helper+0x49d0/0x5450 [ 31.151827] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.152683] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.153520] ? kasan_atomics+0x153/0x310 [ 31.154169] kasan_atomics+0x1dd/0x310 [ 31.154647] ? __pfx_kasan_atomics+0x10/0x10 [ 31.155595] ? __pfx_read_tsc+0x10/0x10 [ 31.156019] ? ktime_get_ts64+0x84/0x230 [ 31.156584] kunit_try_run_case+0x1b3/0x490 [ 31.157096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.157649] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.158402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.158851] ? __kthread_parkme+0x82/0x160 [ 31.159418] ? preempt_count_sub+0x50/0x80 [ 31.159776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.160648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.161186] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.161785] kthread+0x257/0x310 [ 31.162326] ? __pfx_kthread+0x10/0x10 [ 31.162836] ret_from_fork+0x41/0x80 [ 31.163342] ? __pfx_kthread+0x10/0x10 [ 31.163944] ret_from_fork_asm+0x1a/0x30 [ 31.164669] </TASK> [ 31.164977] [ 31.165244] Allocated by task 273: [ 31.165518] kasan_save_stack+0x3d/0x60 [ 31.166092] kasan_save_track+0x18/0x40 [ 31.166738] kasan_save_alloc_info+0x3b/0x50 [ 31.167071] __kasan_kmalloc+0xb7/0xc0 [ 31.167551] __kmalloc_cache_noprof+0x184/0x410 [ 31.168210] kasan_atomics+0x96/0x310 [ 31.168694] kunit_try_run_case+0x1b3/0x490 [ 31.169310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.169702] kthread+0x257/0x310 [ 31.169959] ret_from_fork+0x41/0x80 [ 31.170534] ret_from_fork_asm+0x1a/0x30 [ 31.171199] [ 31.171494] The buggy address belongs to the object at ffff888101aba780 [ 31.171494] which belongs to the cache kmalloc-64 of size 64 [ 31.172363] The buggy address is located 0 bytes to the right of [ 31.172363] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.173706] [ 31.173930] The buggy address belongs to the physical page: [ 31.174525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.175009] flags: 0x200000000000000(node=0|zone=2) [ 31.175589] page_type: f5(slab) [ 31.176076] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.177013] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.177608] page dumped because: kasan: bad access detected [ 31.178095] [ 31.178461] Memory state around the buggy address: [ 31.179161] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.179771] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.180668] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.181413] ^ [ 31.182099] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.182777] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.183593] ================================================================== [ 30.790718] ================================================================== [ 30.791849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 30.792716] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.793500] [ 30.793677] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.794821] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.795412] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.795920] Call Trace: [ 30.796299] <TASK> [ 30.796605] dump_stack_lvl+0x73/0xb0 [ 30.797237] print_report+0xd1/0x640 [ 30.797728] ? __virt_addr_valid+0x1db/0x2d0 [ 30.798144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.799160] kasan_report+0x102/0x140 [ 30.799427] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.800007] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.800674] __asan_report_load4_noabort+0x18/0x20 [ 30.801241] kasan_atomics_helper+0x4a38/0x5450 [ 30.801805] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.802424] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.802783] ? kasan_atomics+0x153/0x310 [ 30.803134] kasan_atomics+0x1dd/0x310 [ 30.803410] ? __pfx_kasan_atomics+0x10/0x10 [ 30.803702] ? __pfx_read_tsc+0x10/0x10 [ 30.803968] ? ktime_get_ts64+0x84/0x230 [ 30.804322] kunit_try_run_case+0x1b3/0x490 [ 30.804646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.805226] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.805696] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.806099] ? __kthread_parkme+0x82/0x160 [ 30.806677] ? preempt_count_sub+0x50/0x80 [ 30.807306] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.807689] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.808558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.809177] kthread+0x257/0x310 [ 30.809482] ? __pfx_kthread+0x10/0x10 [ 30.810071] ret_from_fork+0x41/0x80 [ 30.810507] ? __pfx_kthread+0x10/0x10 [ 30.810976] ret_from_fork_asm+0x1a/0x30 [ 30.811369] </TASK> [ 30.811730] [ 30.812050] Allocated by task 273: [ 30.812497] kasan_save_stack+0x3d/0x60 [ 30.812932] kasan_save_track+0x18/0x40 [ 30.813410] kasan_save_alloc_info+0x3b/0x50 [ 30.813845] __kasan_kmalloc+0xb7/0xc0 [ 30.814417] __kmalloc_cache_noprof+0x184/0x410 [ 30.814829] kasan_atomics+0x96/0x310 [ 30.815414] kunit_try_run_case+0x1b3/0x490 [ 30.815868] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.816512] kthread+0x257/0x310 [ 30.816959] ret_from_fork+0x41/0x80 [ 30.817430] ret_from_fork_asm+0x1a/0x30 [ 30.817733] [ 30.817937] The buggy address belongs to the object at ffff888101aba780 [ 30.817937] which belongs to the cache kmalloc-64 of size 64 [ 30.819581] The buggy address is located 0 bytes to the right of [ 30.819581] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.820652] [ 30.820812] The buggy address belongs to the physical page: [ 30.821532] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.822150] flags: 0x200000000000000(node=0|zone=2) [ 30.822664] page_type: f5(slab) [ 30.823173] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.823783] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.824668] page dumped because: kasan: bad access detected [ 30.825198] [ 30.825359] Memory state around the buggy address: [ 30.825962] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.826759] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.827552] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.828256] ^ [ 30.828749] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.829526] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.830226] ================================================================== [ 32.190063] ================================================================== [ 32.191856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 32.192426] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.193413] [ 32.194271] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.195426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.195710] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.196747] Call Trace: [ 32.197659] <TASK> [ 32.197873] dump_stack_lvl+0x73/0xb0 [ 32.198210] print_report+0xd1/0x640 [ 32.198670] ? __virt_addr_valid+0x1db/0x2d0 [ 32.199523] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.200165] kasan_report+0x102/0x140 [ 32.200797] ? kasan_atomics_helper+0x4f73/0x5450 [ 32.201613] ? kasan_atomics_helper+0x4f73/0x5450 [ 32.202298] __asan_report_load8_noabort+0x18/0x20 [ 32.202966] kasan_atomics_helper+0x4f73/0x5450 [ 32.203834] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.204196] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.204787] ? kasan_atomics+0x153/0x310 [ 32.205730] kasan_atomics+0x1dd/0x310 [ 32.206127] ? __pfx_kasan_atomics+0x10/0x10 [ 32.206829] ? __pfx_read_tsc+0x10/0x10 [ 32.207517] ? ktime_get_ts64+0x84/0x230 [ 32.207932] kunit_try_run_case+0x1b3/0x490 [ 32.208693] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.209256] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.210001] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.210735] ? __kthread_parkme+0x82/0x160 [ 32.211485] ? preempt_count_sub+0x50/0x80 [ 32.211901] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.212953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.213494] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.214272] kthread+0x257/0x310 [ 32.214655] ? __pfx_kthread+0x10/0x10 [ 32.215500] ret_from_fork+0x41/0x80 [ 32.215946] ? __pfx_kthread+0x10/0x10 [ 32.216901] ret_from_fork_asm+0x1a/0x30 [ 32.217733] </TASK> [ 32.218236] [ 32.218416] Allocated by task 273: [ 32.219308] kasan_save_stack+0x3d/0x60 [ 32.219747] kasan_save_track+0x18/0x40 [ 32.220256] kasan_save_alloc_info+0x3b/0x50 [ 32.220463] __kasan_kmalloc+0xb7/0xc0 [ 32.220640] __kmalloc_cache_noprof+0x184/0x410 [ 32.220835] kasan_atomics+0x96/0x310 [ 32.221048] kunit_try_run_case+0x1b3/0x490 [ 32.221627] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.222998] kthread+0x257/0x310 [ 32.223442] ret_from_fork+0x41/0x80 [ 32.223654] ret_from_fork_asm+0x1a/0x30 [ 32.223840] [ 32.223936] The buggy address belongs to the object at ffff888101aba780 [ 32.223936] which belongs to the cache kmalloc-64 of size 64 [ 32.225935] The buggy address is located 0 bytes to the right of [ 32.225935] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.226793] [ 32.226896] The buggy address belongs to the physical page: [ 32.227304] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.228713] flags: 0x200000000000000(node=0|zone=2) [ 32.229075] page_type: f5(slab) [ 32.229611] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.230577] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.231290] page dumped because: kasan: bad access detected [ 32.231812] [ 32.232471] Memory state around the buggy address: [ 32.233356] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.234070] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.234605] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.235208] ^ [ 32.235661] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.236343] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.236956] ================================================================== [ 30.285112] ================================================================== [ 30.286959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 30.287645] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.288600] [ 30.288788] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.290019] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.290717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.291870] Call Trace: [ 30.292608] <TASK> [ 30.292842] dump_stack_lvl+0x73/0xb0 [ 30.293747] print_report+0xd1/0x640 [ 30.294496] ? __virt_addr_valid+0x1db/0x2d0 [ 30.294926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.295815] kasan_report+0x102/0x140 [ 30.296599] ? kasan_atomics_helper+0x993/0x5450 [ 30.297276] ? kasan_atomics_helper+0x993/0x5450 [ 30.297912] kasan_check_range+0x10c/0x1c0 [ 30.298669] __kasan_check_write+0x18/0x20 [ 30.299094] kasan_atomics_helper+0x993/0x5450 [ 30.300151] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.300586] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.301038] ? kasan_atomics+0x153/0x310 [ 30.301921] kasan_atomics+0x1dd/0x310 [ 30.302654] ? __pfx_kasan_atomics+0x10/0x10 [ 30.303345] ? __pfx_read_tsc+0x10/0x10 [ 30.303821] ? ktime_get_ts64+0x84/0x230 [ 30.304630] kunit_try_run_case+0x1b3/0x490 [ 30.305450] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.305957] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.306455] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.307863] ? __kthread_parkme+0x82/0x160 [ 30.308380] ? preempt_count_sub+0x50/0x80 [ 30.308858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.309705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.310597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.311766] kthread+0x257/0x310 [ 30.312104] ? __pfx_kthread+0x10/0x10 [ 30.313014] ret_from_fork+0x41/0x80 [ 30.313517] ? __pfx_kthread+0x10/0x10 [ 30.313924] ret_from_fork_asm+0x1a/0x30 [ 30.314938] </TASK> [ 30.315154] [ 30.315595] Allocated by task 273: [ 30.315864] kasan_save_stack+0x3d/0x60 [ 30.316666] kasan_save_track+0x18/0x40 [ 30.317605] kasan_save_alloc_info+0x3b/0x50 [ 30.318050] __kasan_kmalloc+0xb7/0xc0 [ 30.318844] __kmalloc_cache_noprof+0x184/0x410 [ 30.319658] kasan_atomics+0x96/0x310 [ 30.320577] kunit_try_run_case+0x1b3/0x490 [ 30.320963] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.321908] kthread+0x257/0x310 [ 30.322402] ret_from_fork+0x41/0x80 [ 30.322654] ret_from_fork_asm+0x1a/0x30 [ 30.323546] [ 30.323767] The buggy address belongs to the object at ffff888101aba780 [ 30.323767] which belongs to the cache kmalloc-64 of size 64 [ 30.325615] The buggy address is located 0 bytes to the right of [ 30.325615] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.327408] [ 30.327588] The buggy address belongs to the physical page: [ 30.328503] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.329367] flags: 0x200000000000000(node=0|zone=2) [ 30.329950] page_type: f5(slab) [ 30.330401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.331541] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.332447] page dumped because: kasan: bad access detected [ 30.332776] [ 30.333430] Memory state around the buggy address: [ 30.333950] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.334595] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.335636] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.336401] ^ [ 30.337317] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.338006] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.339453] ================================================================== [ 32.237859] ================================================================== [ 32.238546] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 32.239299] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.239877] [ 32.240119] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.240930] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.241325] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.242077] Call Trace: [ 32.242406] <TASK> [ 32.242712] dump_stack_lvl+0x73/0xb0 [ 32.243138] print_report+0xd1/0x640 [ 32.243440] ? __virt_addr_valid+0x1db/0x2d0 [ 32.243862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.244519] kasan_report+0x102/0x140 [ 32.244839] ? kasan_atomics_helper+0x2007/0x5450 [ 32.245387] ? kasan_atomics_helper+0x2007/0x5450 [ 32.245979] kasan_check_range+0x10c/0x1c0 [ 32.246496] __kasan_check_write+0x18/0x20 [ 32.246957] kasan_atomics_helper+0x2007/0x5450 [ 32.247368] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.247925] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.248429] ? kasan_atomics+0x153/0x310 [ 32.248819] kasan_atomics+0x1dd/0x310 [ 32.249250] ? __pfx_kasan_atomics+0x10/0x10 [ 32.249743] ? __pfx_read_tsc+0x10/0x10 [ 32.250159] ? ktime_get_ts64+0x84/0x230 [ 32.250662] kunit_try_run_case+0x1b3/0x490 [ 32.251211] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.251548] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.252184] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.252557] ? __kthread_parkme+0x82/0x160 [ 32.252861] ? preempt_count_sub+0x50/0x80 [ 32.253242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.253844] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.254610] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.255077] kthread+0x257/0x310 [ 32.255351] ? __pfx_kthread+0x10/0x10 [ 32.255838] ret_from_fork+0x41/0x80 [ 32.256377] ? __pfx_kthread+0x10/0x10 [ 32.256856] ret_from_fork_asm+0x1a/0x30 [ 32.258267] </TASK> [ 32.258614] [ 32.258857] Allocated by task 273: [ 32.259229] kasan_save_stack+0x3d/0x60 [ 32.259646] kasan_save_track+0x18/0x40 [ 32.260650] kasan_save_alloc_info+0x3b/0x50 [ 32.261529] __kasan_kmalloc+0xb7/0xc0 [ 32.262065] __kmalloc_cache_noprof+0x184/0x410 [ 32.262536] kasan_atomics+0x96/0x310 [ 32.262844] kunit_try_run_case+0x1b3/0x490 [ 32.263359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.263750] kthread+0x257/0x310 [ 32.264228] ret_from_fork+0x41/0x80 [ 32.264525] ret_from_fork_asm+0x1a/0x30 [ 32.264960] [ 32.265193] The buggy address belongs to the object at ffff888101aba780 [ 32.265193] which belongs to the cache kmalloc-64 of size 64 [ 32.266254] The buggy address is located 0 bytes to the right of [ 32.266254] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.267235] [ 32.267471] The buggy address belongs to the physical page: [ 32.267892] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.268674] flags: 0x200000000000000(node=0|zone=2) [ 32.269118] page_type: f5(slab) [ 32.269550] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.270211] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.270979] page dumped because: kasan: bad access detected [ 32.271404] [ 32.271643] Memory state around the buggy address: [ 32.272226] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.272662] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.273434] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.274084] ^ [ 32.274565] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.275154] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.275828] ================================================================== [ 31.508621] ================================================================== [ 31.510020] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 31.511373] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.512491] [ 31.512673] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.513705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.514074] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.515214] Call Trace: [ 31.515689] <TASK> [ 31.516582] dump_stack_lvl+0x73/0xb0 [ 31.516963] print_report+0xd1/0x640 [ 31.517729] ? __virt_addr_valid+0x1db/0x2d0 [ 31.518721] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.519616] kasan_report+0x102/0x140 [ 31.520016] ? kasan_atomics_helper+0x16e8/0x5450 [ 31.521123] ? kasan_atomics_helper+0x16e8/0x5450 [ 31.521579] kasan_check_range+0x10c/0x1c0 [ 31.521999] __kasan_check_write+0x18/0x20 [ 31.522863] kasan_atomics_helper+0x16e8/0x5450 [ 31.523921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.524827] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.525399] ? kasan_atomics+0x153/0x310 [ 31.525825] kasan_atomics+0x1dd/0x310 [ 31.526743] ? __pfx_kasan_atomics+0x10/0x10 [ 31.527283] ? __pfx_read_tsc+0x10/0x10 [ 31.527855] ? ktime_get_ts64+0x84/0x230 [ 31.528541] kunit_try_run_case+0x1b3/0x490 [ 31.528969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.529718] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.530435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.531090] ? __kthread_parkme+0x82/0x160 [ 31.531731] ? preempt_count_sub+0x50/0x80 [ 31.532461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.532889] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.533783] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.534332] kthread+0x257/0x310 [ 31.534521] ? __pfx_kthread+0x10/0x10 [ 31.534704] ret_from_fork+0x41/0x80 [ 31.534881] ? __pfx_kthread+0x10/0x10 [ 31.535141] ret_from_fork_asm+0x1a/0x30 [ 31.535460] </TASK> [ 31.535908] [ 31.536319] Allocated by task 273: [ 31.536566] kasan_save_stack+0x3d/0x60 [ 31.536848] kasan_save_track+0x18/0x40 [ 31.537313] kasan_save_alloc_info+0x3b/0x50 [ 31.538001] __kasan_kmalloc+0xb7/0xc0 [ 31.538323] __kmalloc_cache_noprof+0x184/0x410 [ 31.539167] kasan_atomics+0x96/0x310 [ 31.539769] kunit_try_run_case+0x1b3/0x490 [ 31.540374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.541090] kthread+0x257/0x310 [ 31.541634] ret_from_fork+0x41/0x80 [ 31.542086] ret_from_fork_asm+0x1a/0x30 [ 31.542713] [ 31.542947] The buggy address belongs to the object at ffff888101aba780 [ 31.542947] which belongs to the cache kmalloc-64 of size 64 [ 31.544250] The buggy address is located 0 bytes to the right of [ 31.544250] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.545702] [ 31.545807] The buggy address belongs to the physical page: [ 31.546072] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.547565] flags: 0x200000000000000(node=0|zone=2) [ 31.548025] page_type: f5(slab) [ 31.548905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.549708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.551134] page dumped because: kasan: bad access detected [ 31.551648] [ 31.551903] Memory state around the buggy address: [ 31.553089] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.553765] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.554587] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.555782] ^ [ 31.556180] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.557620] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.558504] ================================================================== [ 30.693305] ================================================================== [ 30.694706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 30.695520] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.696571] [ 30.696804] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.697938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.698459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.699671] Call Trace: [ 30.699915] <TASK> [ 30.700116] dump_stack_lvl+0x73/0xb0 [ 30.701009] print_report+0xd1/0x640 [ 30.701427] ? __virt_addr_valid+0x1db/0x2d0 [ 30.702172] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.702738] kasan_report+0x102/0x140 [ 30.703433] ? kasan_atomics_helper+0xf11/0x5450 [ 30.704121] ? kasan_atomics_helper+0xf11/0x5450 [ 30.704622] kasan_check_range+0x10c/0x1c0 [ 30.705381] __kasan_check_write+0x18/0x20 [ 30.706031] kasan_atomics_helper+0xf11/0x5450 [ 30.706800] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.707761] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.708205] ? kasan_atomics+0x153/0x310 [ 30.708691] kasan_atomics+0x1dd/0x310 [ 30.709095] ? __pfx_kasan_atomics+0x10/0x10 [ 30.710098] ? __pfx_read_tsc+0x10/0x10 [ 30.710738] ? ktime_get_ts64+0x84/0x230 [ 30.711440] kunit_try_run_case+0x1b3/0x490 [ 30.711867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.712650] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.713389] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.714082] ? __kthread_parkme+0x82/0x160 [ 30.714723] ? preempt_count_sub+0x50/0x80 [ 30.715400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.715857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.716356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.717266] kthread+0x257/0x310 [ 30.717611] ? __pfx_kthread+0x10/0x10 [ 30.718200] ret_from_fork+0x41/0x80 [ 30.718796] ? __pfx_kthread+0x10/0x10 [ 30.719311] ret_from_fork_asm+0x1a/0x30 [ 30.719904] </TASK> [ 30.720191] [ 30.720572] Allocated by task 273: [ 30.721016] kasan_save_stack+0x3d/0x60 [ 30.721568] kasan_save_track+0x18/0x40 [ 30.722190] kasan_save_alloc_info+0x3b/0x50 [ 30.722681] __kasan_kmalloc+0xb7/0xc0 [ 30.723136] __kmalloc_cache_noprof+0x184/0x410 [ 30.723706] kasan_atomics+0x96/0x310 [ 30.724381] kunit_try_run_case+0x1b3/0x490 [ 30.724953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.725622] kthread+0x257/0x310 [ 30.726357] ret_from_fork+0x41/0x80 [ 30.726748] ret_from_fork_asm+0x1a/0x30 [ 30.727500] [ 30.727722] The buggy address belongs to the object at ffff888101aba780 [ 30.727722] which belongs to the cache kmalloc-64 of size 64 [ 30.729093] The buggy address is located 0 bytes to the right of [ 30.729093] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.730302] [ 30.730630] The buggy address belongs to the physical page: [ 30.731219] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.732233] flags: 0x200000000000000(node=0|zone=2) [ 30.732617] page_type: f5(slab) [ 30.733029] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.733802] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.734798] page dumped because: kasan: bad access detected [ 30.735470] [ 30.735711] Memory state around the buggy address: [ 30.736228] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.737182] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.737941] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.738785] ^ [ 30.739397] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.740184] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.740837] ================================================================== [ 31.094269] ================================================================== [ 31.094697] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 31.095255] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.096325] [ 31.096502] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.097312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.098312] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.099657] Call Trace: [ 31.099795] <TASK> [ 31.099916] dump_stack_lvl+0x73/0xb0 [ 31.100205] print_report+0xd1/0x640 [ 31.100796] ? __virt_addr_valid+0x1db/0x2d0 [ 31.101694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.102191] kasan_report+0x102/0x140 [ 31.102949] ? kasan_atomics_helper+0x12e7/0x5450 [ 31.103598] ? kasan_atomics_helper+0x12e7/0x5450 [ 31.104168] kasan_check_range+0x10c/0x1c0 [ 31.104603] __kasan_check_write+0x18/0x20 [ 31.105554] kasan_atomics_helper+0x12e7/0x5450 [ 31.106074] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.106761] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.107561] ? kasan_atomics+0x153/0x310 [ 31.107971] kasan_atomics+0x1dd/0x310 [ 31.108650] ? __pfx_kasan_atomics+0x10/0x10 [ 31.109570] ? __pfx_read_tsc+0x10/0x10 [ 31.109974] ? ktime_get_ts64+0x84/0x230 [ 31.110673] kunit_try_run_case+0x1b3/0x490 [ 31.111385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.111853] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.112698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.113560] ? __kthread_parkme+0x82/0x160 [ 31.114233] ? preempt_count_sub+0x50/0x80 [ 31.114660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.115494] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.116128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.116664] kthread+0x257/0x310 [ 31.117695] ? __pfx_kthread+0x10/0x10 [ 31.118536] ret_from_fork+0x41/0x80 [ 31.118949] ? __pfx_kthread+0x10/0x10 [ 31.119444] ret_from_fork_asm+0x1a/0x30 [ 31.120025] </TASK> [ 31.120398] [ 31.120650] Allocated by task 273: [ 31.121048] kasan_save_stack+0x3d/0x60 [ 31.121489] kasan_save_track+0x18/0x40 [ 31.121879] kasan_save_alloc_info+0x3b/0x50 [ 31.122318] __kasan_kmalloc+0xb7/0xc0 [ 31.123032] __kmalloc_cache_noprof+0x184/0x410 [ 31.123347] kasan_atomics+0x96/0x310 [ 31.123893] kunit_try_run_case+0x1b3/0x490 [ 31.124391] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.124855] kthread+0x257/0x310 [ 31.125522] ret_from_fork+0x41/0x80 [ 31.125977] ret_from_fork_asm+0x1a/0x30 [ 31.126312] [ 31.126551] The buggy address belongs to the object at ffff888101aba780 [ 31.126551] which belongs to the cache kmalloc-64 of size 64 [ 31.127624] The buggy address is located 0 bytes to the right of [ 31.127624] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.128963] [ 31.129144] The buggy address belongs to the physical page: [ 31.129803] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.130377] flags: 0x200000000000000(node=0|zone=2) [ 31.130934] page_type: f5(slab) [ 31.131200] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.132033] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.133201] page dumped because: kasan: bad access detected [ 31.133758] [ 31.133925] Memory state around the buggy address: [ 31.134540] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.135149] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.135959] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.136605] ^ [ 31.137171] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.137695] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.138661] ================================================================== [ 31.654734] ================================================================== [ 31.655206] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 31.656049] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.656831] [ 31.657020] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.658678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.659024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.659801] Call Trace: [ 31.660277] <TASK> [ 31.660626] dump_stack_lvl+0x73/0xb0 [ 31.661109] print_report+0xd1/0x640 [ 31.661465] ? __virt_addr_valid+0x1db/0x2d0 [ 31.661962] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.662716] kasan_report+0x102/0x140 [ 31.663255] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.663870] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.664391] kasan_check_range+0x10c/0x1c0 [ 31.664917] __kasan_check_write+0x18/0x20 [ 31.665359] kasan_atomics_helper+0x18b2/0x5450 [ 31.666011] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.666576] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.667266] ? kasan_atomics+0x153/0x310 [ 31.667598] kasan_atomics+0x1dd/0x310 [ 31.668144] ? __pfx_kasan_atomics+0x10/0x10 [ 31.668687] ? __pfx_read_tsc+0x10/0x10 [ 31.669243] ? ktime_get_ts64+0x84/0x230 [ 31.669686] kunit_try_run_case+0x1b3/0x490 [ 31.670295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.670852] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.671479] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.672083] ? __kthread_parkme+0x82/0x160 [ 31.672530] ? preempt_count_sub+0x50/0x80 [ 31.672960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.673543] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.674211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.674836] kthread+0x257/0x310 [ 31.675279] ? __pfx_kthread+0x10/0x10 [ 31.675710] ret_from_fork+0x41/0x80 [ 31.676005] ? __pfx_kthread+0x10/0x10 [ 31.676453] ret_from_fork_asm+0x1a/0x30 [ 31.677065] </TASK> [ 31.677377] [ 31.677638] Allocated by task 273: [ 31.678074] kasan_save_stack+0x3d/0x60 [ 31.678471] kasan_save_track+0x18/0x40 [ 31.678999] kasan_save_alloc_info+0x3b/0x50 [ 31.679512] __kasan_kmalloc+0xb7/0xc0 [ 31.680026] __kmalloc_cache_noprof+0x184/0x410 [ 31.680537] kasan_atomics+0x96/0x310 [ 31.680882] kunit_try_run_case+0x1b3/0x490 [ 31.681207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.682146] kthread+0x257/0x310 [ 31.682668] ret_from_fork+0x41/0x80 [ 31.683027] ret_from_fork_asm+0x1a/0x30 [ 31.683463] [ 31.683741] The buggy address belongs to the object at ffff888101aba780 [ 31.683741] which belongs to the cache kmalloc-64 of size 64 [ 31.684926] The buggy address is located 0 bytes to the right of [ 31.684926] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.686216] [ 31.686436] The buggy address belongs to the physical page: [ 31.686778] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.687640] flags: 0x200000000000000(node=0|zone=2) [ 31.688096] page_type: f5(slab) [ 31.688336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.689401] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.690102] page dumped because: kasan: bad access detected [ 31.690538] [ 31.690697] Memory state around the buggy address: [ 31.691307] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.691976] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.692686] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.693447] ^ [ 31.694023] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.694587] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.695523] ================================================================== [ 30.429584] ================================================================== [ 30.430209] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 30.430924] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.431718] [ 30.431905] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.432832] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.433367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.434172] Call Trace: [ 30.434520] <TASK> [ 30.434743] dump_stack_lvl+0x73/0xb0 [ 30.435275] print_report+0xd1/0x640 [ 30.435572] ? __virt_addr_valid+0x1db/0x2d0 [ 30.436123] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.436683] kasan_report+0x102/0x140 [ 30.437049] ? kasan_atomics_helper+0xb6b/0x5450 [ 30.437590] ? kasan_atomics_helper+0xb6b/0x5450 [ 30.438205] kasan_check_range+0x10c/0x1c0 [ 30.438664] __kasan_check_write+0x18/0x20 [ 30.439242] kasan_atomics_helper+0xb6b/0x5450 [ 30.439615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.440214] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.440732] ? kasan_atomics+0x153/0x310 [ 30.441138] kasan_atomics+0x1dd/0x310 [ 30.441662] ? __pfx_kasan_atomics+0x10/0x10 [ 30.442187] ? __pfx_read_tsc+0x10/0x10 [ 30.442564] ? ktime_get_ts64+0x84/0x230 [ 30.443747] kunit_try_run_case+0x1b3/0x490 [ 30.444337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.444771] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.445247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.445690] ? __kthread_parkme+0x82/0x160 [ 30.446557] ? preempt_count_sub+0x50/0x80 [ 30.447023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.447557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.448164] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.448700] kthread+0x257/0x310 [ 30.449225] ? __pfx_kthread+0x10/0x10 [ 30.449617] ret_from_fork+0x41/0x80 [ 30.450295] ? __pfx_kthread+0x10/0x10 [ 30.450699] ret_from_fork_asm+0x1a/0x30 [ 30.451451] </TASK> [ 30.451636] [ 30.451793] Allocated by task 273: [ 30.452174] kasan_save_stack+0x3d/0x60 [ 30.452647] kasan_save_track+0x18/0x40 [ 30.453642] kasan_save_alloc_info+0x3b/0x50 [ 30.454213] __kasan_kmalloc+0xb7/0xc0 [ 30.454689] __kmalloc_cache_noprof+0x184/0x410 [ 30.455210] kasan_atomics+0x96/0x310 [ 30.455487] kunit_try_run_case+0x1b3/0x490 [ 30.456003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.456619] kthread+0x257/0x310 [ 30.456965] ret_from_fork+0x41/0x80 [ 30.457304] ret_from_fork_asm+0x1a/0x30 [ 30.457794] [ 30.458097] The buggy address belongs to the object at ffff888101aba780 [ 30.458097] which belongs to the cache kmalloc-64 of size 64 [ 30.459124] The buggy address is located 0 bytes to the right of [ 30.459124] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.459941] [ 30.460248] The buggy address belongs to the physical page: [ 30.460796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.461589] flags: 0x200000000000000(node=0|zone=2) [ 30.462062] page_type: f5(slab) [ 30.462318] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.463170] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.463776] page dumped because: kasan: bad access detected [ 30.464337] [ 30.464567] Memory state around the buggy address: [ 30.464869] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.465664] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.466394] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.466820] ^ [ 30.467402] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.467954] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.468585] ================================================================== [ 29.905596] ================================================================== [ 29.906448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 29.907831] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.908369] [ 29.908640] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.910182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.910941] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.912284] Call Trace: [ 29.912615] <TASK> [ 29.913056] dump_stack_lvl+0x73/0xb0 [ 29.913839] print_report+0xd1/0x640 [ 29.914434] ? __virt_addr_valid+0x1db/0x2d0 [ 29.914910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.915773] kasan_report+0x102/0x140 [ 29.916479] ? kasan_atomics_helper+0x4b3c/0x5450 [ 29.917070] ? kasan_atomics_helper+0x4b3c/0x5450 [ 29.918002] __asan_report_store4_noabort+0x1b/0x30 [ 29.918815] kasan_atomics_helper+0x4b3c/0x5450 [ 29.919525] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.920210] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.920779] ? kasan_atomics+0x153/0x310 [ 29.921433] kasan_atomics+0x1dd/0x310 [ 29.922336] ? __pfx_kasan_atomics+0x10/0x10 [ 29.922840] ? __pfx_read_tsc+0x10/0x10 [ 29.923466] ? ktime_get_ts64+0x84/0x230 [ 29.924593] kunit_try_run_case+0x1b3/0x490 [ 29.925585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.926091] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.926804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.927375] ? __kthread_parkme+0x82/0x160 [ 29.927828] ? preempt_count_sub+0x50/0x80 [ 29.928445] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.928836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.929576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.930333] kthread+0x257/0x310 [ 29.930865] ? __pfx_kthread+0x10/0x10 [ 29.931584] ret_from_fork+0x41/0x80 [ 29.931920] ? __pfx_kthread+0x10/0x10 [ 29.932500] ret_from_fork_asm+0x1a/0x30 [ 29.933250] </TASK> [ 29.933463] [ 29.933769] Allocated by task 273: [ 29.934152] kasan_save_stack+0x3d/0x60 [ 29.934745] kasan_save_track+0x18/0x40 [ 29.935237] kasan_save_alloc_info+0x3b/0x50 [ 29.935853] __kasan_kmalloc+0xb7/0xc0 [ 29.936662] __kmalloc_cache_noprof+0x184/0x410 [ 29.937126] kasan_atomics+0x96/0x310 [ 29.937411] kunit_try_run_case+0x1b3/0x490 [ 29.938131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.938941] kthread+0x257/0x310 [ 29.939520] ret_from_fork+0x41/0x80 [ 29.940201] ret_from_fork_asm+0x1a/0x30 [ 29.940638] [ 29.941024] The buggy address belongs to the object at ffff888101aba780 [ 29.941024] which belongs to the cache kmalloc-64 of size 64 [ 29.942314] The buggy address is located 0 bytes to the right of [ 29.942314] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.943844] [ 29.944291] The buggy address belongs to the physical page: [ 29.944811] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.945555] flags: 0x200000000000000(node=0|zone=2) [ 29.946210] page_type: f5(slab) [ 29.946806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.947919] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.948675] page dumped because: kasan: bad access detected [ 29.949080] [ 29.949309] Memory state around the buggy address: [ 29.949832] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.950516] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.951674] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.953077] ^ [ 29.953583] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.954273] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.955590] ================================================================== [ 32.276713] ================================================================== [ 32.277629] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 32.280121] Read of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.280562] [ 32.280782] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.281739] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.282220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.282939] Call Trace: [ 32.283389] <TASK> [ 32.283732] dump_stack_lvl+0x73/0xb0 [ 32.284212] print_report+0xd1/0x640 [ 32.284498] ? __virt_addr_valid+0x1db/0x2d0 [ 32.285142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.285815] kasan_report+0x102/0x140 [ 32.286269] ? kasan_atomics_helper+0x4f9a/0x5450 [ 32.286833] ? kasan_atomics_helper+0x4f9a/0x5450 [ 32.287306] __asan_report_load8_noabort+0x18/0x20 [ 32.287860] kasan_atomics_helper+0x4f9a/0x5450 [ 32.288358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.288741] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.289396] ? kasan_atomics+0x153/0x310 [ 32.289803] kasan_atomics+0x1dd/0x310 [ 32.290283] ? __pfx_kasan_atomics+0x10/0x10 [ 32.290645] ? __pfx_read_tsc+0x10/0x10 [ 32.291204] ? ktime_get_ts64+0x84/0x230 [ 32.291564] kunit_try_run_case+0x1b3/0x490 [ 32.292143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.292541] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.293007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.293432] ? __kthread_parkme+0x82/0x160 [ 32.293958] ? preempt_count_sub+0x50/0x80 [ 32.294404] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.294855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.295519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.296160] kthread+0x257/0x310 [ 32.296516] ? __pfx_kthread+0x10/0x10 [ 32.296971] ret_from_fork+0x41/0x80 [ 32.297361] ? __pfx_kthread+0x10/0x10 [ 32.297818] ret_from_fork_asm+0x1a/0x30 [ 32.298394] </TASK> [ 32.298652] [ 32.298810] Allocated by task 273: [ 32.299219] kasan_save_stack+0x3d/0x60 [ 32.299726] kasan_save_track+0x18/0x40 [ 32.300149] kasan_save_alloc_info+0x3b/0x50 [ 32.300549] __kasan_kmalloc+0xb7/0xc0 [ 32.300957] __kmalloc_cache_noprof+0x184/0x410 [ 32.301463] kasan_atomics+0x96/0x310 [ 32.301865] kunit_try_run_case+0x1b3/0x490 [ 32.302411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.302932] kthread+0x257/0x310 [ 32.303247] ret_from_fork+0x41/0x80 [ 32.303710] ret_from_fork_asm+0x1a/0x30 [ 32.304271] [ 32.304429] The buggy address belongs to the object at ffff888101aba780 [ 32.304429] which belongs to the cache kmalloc-64 of size 64 [ 32.305583] The buggy address is located 0 bytes to the right of [ 32.305583] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.306627] [ 32.306871] The buggy address belongs to the physical page: [ 32.307439] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.308086] flags: 0x200000000000000(node=0|zone=2) [ 32.308401] page_type: f5(slab) [ 32.308728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.309658] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.310425] page dumped because: kasan: bad access detected [ 32.310869] [ 32.311135] Memory state around the buggy address: [ 32.311530] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.312228] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.312793] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.313456] ^ [ 32.313875] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.314497] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.315160] ================================================================== [ 31.976078] ================================================================== [ 31.976566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 31.977502] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.978012] [ 31.978336] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.979540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.979950] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.980810] Call Trace: [ 31.981305] <TASK> [ 31.981654] dump_stack_lvl+0x73/0xb0 [ 31.982115] print_report+0xd1/0x640 [ 31.982611] ? __virt_addr_valid+0x1db/0x2d0 [ 31.983650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.984907] kasan_report+0x102/0x140 [ 31.985533] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.986248] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.986747] kasan_check_range+0x10c/0x1c0 [ 31.987215] __kasan_check_write+0x18/0x20 [ 31.987647] kasan_atomics_helper+0x1ce2/0x5450 [ 31.988606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.989338] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.989754] ? kasan_atomics+0x153/0x310 [ 31.990554] kasan_atomics+0x1dd/0x310 [ 31.991017] ? __pfx_kasan_atomics+0x10/0x10 [ 31.991766] ? __pfx_read_tsc+0x10/0x10 [ 31.992540] ? ktime_get_ts64+0x84/0x230 [ 31.993012] kunit_try_run_case+0x1b3/0x490 [ 31.993704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.994457] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.994917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.995800] ? __kthread_parkme+0x82/0x160 [ 31.996218] ? preempt_count_sub+0x50/0x80 [ 31.996423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.996638] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.996887] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.997338] kthread+0x257/0x310 [ 31.998011] ? __pfx_kthread+0x10/0x10 [ 31.998664] ret_from_fork+0x41/0x80 [ 31.999458] ? __pfx_kthread+0x10/0x10 [ 32.000309] ret_from_fork_asm+0x1a/0x30 [ 32.001234] </TASK> [ 32.001438] [ 32.001797] Allocated by task 273: [ 32.002649] kasan_save_stack+0x3d/0x60 [ 32.003137] kasan_save_track+0x18/0x40 [ 32.003955] kasan_save_alloc_info+0x3b/0x50 [ 32.004858] __kasan_kmalloc+0xb7/0xc0 [ 32.005174] __kmalloc_cache_noprof+0x184/0x410 [ 32.005939] kasan_atomics+0x96/0x310 [ 32.006431] kunit_try_run_case+0x1b3/0x490 [ 32.006795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.007736] kthread+0x257/0x310 [ 32.008447] ret_from_fork+0x41/0x80 [ 32.008815] ret_from_fork_asm+0x1a/0x30 [ 32.009410] [ 32.009614] The buggy address belongs to the object at ffff888101aba780 [ 32.009614] which belongs to the cache kmalloc-64 of size 64 [ 32.011498] The buggy address is located 0 bytes to the right of [ 32.011498] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.012034] [ 32.012348] The buggy address belongs to the physical page: [ 32.013656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.014407] flags: 0x200000000000000(node=0|zone=2) [ 32.014849] page_type: f5(slab) [ 32.015183] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.015820] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.017071] page dumped because: kasan: bad access detected [ 32.017928] [ 32.018308] Memory state around the buggy address: [ 32.018809] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.019816] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.020969] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.021925] ^ [ 32.022570] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.023442] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.024186] ================================================================== [ 31.884652] ================================================================== [ 31.886241] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 31.886867] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.887791] [ 31.888066] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.889937] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.890468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.892143] Call Trace: [ 31.892376] <TASK> [ 31.892802] dump_stack_lvl+0x73/0xb0 [ 31.893348] print_report+0xd1/0x640 [ 31.893842] ? __virt_addr_valid+0x1db/0x2d0 [ 31.894309] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.895172] kasan_report+0x102/0x140 [ 31.896260] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.896776] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.897500] kasan_check_range+0x10c/0x1c0 [ 31.898030] __kasan_check_write+0x18/0x20 [ 31.898808] kasan_atomics_helper+0x1c19/0x5450 [ 31.899228] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.899804] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.900343] ? kasan_atomics+0x153/0x310 [ 31.900660] kasan_atomics+0x1dd/0x310 [ 31.901209] ? __pfx_kasan_atomics+0x10/0x10 [ 31.901864] ? __pfx_read_tsc+0x10/0x10 [ 31.902360] ? ktime_get_ts64+0x84/0x230 [ 31.902665] kunit_try_run_case+0x1b3/0x490 [ 31.903382] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.903927] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.904454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.904809] ? __kthread_parkme+0x82/0x160 [ 31.905550] ? preempt_count_sub+0x50/0x80 [ 31.906080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.906640] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.907524] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.907909] kthread+0x257/0x310 [ 31.908432] ? __pfx_kthread+0x10/0x10 [ 31.908813] ret_from_fork+0x41/0x80 [ 31.909371] ? __pfx_kthread+0x10/0x10 [ 31.909851] ret_from_fork_asm+0x1a/0x30 [ 31.910448] </TASK> [ 31.910832] [ 31.911239] Allocated by task 273: [ 31.911795] kasan_save_stack+0x3d/0x60 [ 31.912225] kasan_save_track+0x18/0x40 [ 31.912814] kasan_save_alloc_info+0x3b/0x50 [ 31.913262] __kasan_kmalloc+0xb7/0xc0 [ 31.913657] __kmalloc_cache_noprof+0x184/0x410 [ 31.914189] kasan_atomics+0x96/0x310 [ 31.914692] kunit_try_run_case+0x1b3/0x490 [ 31.915258] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.915853] kthread+0x257/0x310 [ 31.916394] ret_from_fork+0x41/0x80 [ 31.916673] ret_from_fork_asm+0x1a/0x30 [ 31.917254] [ 31.917675] The buggy address belongs to the object at ffff888101aba780 [ 31.917675] which belongs to the cache kmalloc-64 of size 64 [ 31.918575] The buggy address is located 0 bytes to the right of [ 31.918575] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.919927] [ 31.920534] The buggy address belongs to the physical page: [ 31.920873] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.921828] flags: 0x200000000000000(node=0|zone=2) [ 31.922370] page_type: f5(slab) [ 31.922854] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.923663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.924606] page dumped because: kasan: bad access detected [ 31.925146] [ 31.925462] Memory state around the buggy address: [ 31.926099] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.926759] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.927707] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.928405] ^ [ 31.929001] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.929636] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.930319] ================================================================== [ 32.066773] ================================================================== [ 32.067469] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 32.068267] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.068876] [ 32.069372] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.070072] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.070514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.072254] Call Trace: [ 32.072617] <TASK> [ 32.072942] dump_stack_lvl+0x73/0xb0 [ 32.073613] print_report+0xd1/0x640 [ 32.073804] ? __virt_addr_valid+0x1db/0x2d0 [ 32.074078] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.075210] kasan_report+0x102/0x140 [ 32.076096] ? kasan_atomics_helper+0x1e13/0x5450 [ 32.077064] ? kasan_atomics_helper+0x1e13/0x5450 [ 32.077406] kasan_check_range+0x10c/0x1c0 [ 32.077710] __kasan_check_write+0x18/0x20 [ 32.078082] kasan_atomics_helper+0x1e13/0x5450 [ 32.078804] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.079632] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.080430] ? kasan_atomics+0x153/0x310 [ 32.080811] kasan_atomics+0x1dd/0x310 [ 32.081737] ? __pfx_kasan_atomics+0x10/0x10 [ 32.082925] ? __pfx_read_tsc+0x10/0x10 [ 32.083382] ? ktime_get_ts64+0x84/0x230 [ 32.083834] kunit_try_run_case+0x1b3/0x490 [ 32.084267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.084604] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.085154] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.085626] ? __kthread_parkme+0x82/0x160 [ 32.086014] ? preempt_count_sub+0x50/0x80 [ 32.086428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.086875] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.087485] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.088134] kthread+0x257/0x310 [ 32.088553] ? __pfx_kthread+0x10/0x10 [ 32.088977] ret_from_fork+0x41/0x80 [ 32.089499] ? __pfx_kthread+0x10/0x10 [ 32.089808] ret_from_fork_asm+0x1a/0x30 [ 32.090376] </TASK> [ 32.090678] [ 32.090921] Allocated by task 273: [ 32.091314] kasan_save_stack+0x3d/0x60 [ 32.091694] kasan_save_track+0x18/0x40 [ 32.092061] kasan_save_alloc_info+0x3b/0x50 [ 32.092597] __kasan_kmalloc+0xb7/0xc0 [ 32.093072] __kmalloc_cache_noprof+0x184/0x410 [ 32.093379] kasan_atomics+0x96/0x310 [ 32.093845] kunit_try_run_case+0x1b3/0x490 [ 32.094301] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.094775] kthread+0x257/0x310 [ 32.095261] ret_from_fork+0x41/0x80 [ 32.095745] ret_from_fork_asm+0x1a/0x30 [ 32.096224] [ 32.096459] The buggy address belongs to the object at ffff888101aba780 [ 32.096459] which belongs to the cache kmalloc-64 of size 64 [ 32.097178] The buggy address is located 0 bytes to the right of [ 32.097178] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.098427] [ 32.098587] The buggy address belongs to the physical page: [ 32.099196] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.100046] flags: 0x200000000000000(node=0|zone=2) [ 32.100453] page_type: f5(slab) [ 32.100799] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.101353] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.102266] page dumped because: kasan: bad access detected [ 32.102784] [ 32.103046] Memory state around the buggy address: [ 32.103459] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.104077] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.104592] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.105276] ^ [ 32.105793] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.106455] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.106979] ================================================================== [ 32.481874] ================================================================== [ 32.482864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 32.483625] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.484571] [ 32.484796] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.486501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.486855] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.487864] Call Trace: [ 32.488278] <TASK> [ 32.488514] dump_stack_lvl+0x73/0xb0 [ 32.488943] print_report+0xd1/0x640 [ 32.489523] ? __virt_addr_valid+0x1db/0x2d0 [ 32.490524] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.491357] kasan_report+0x102/0x140 [ 32.491964] ? kasan_atomics_helper+0x224d/0x5450 [ 32.492529] ? kasan_atomics_helper+0x224d/0x5450 [ 32.493371] kasan_check_range+0x10c/0x1c0 [ 32.493881] __kasan_check_write+0x18/0x20 [ 32.494865] kasan_atomics_helper+0x224d/0x5450 [ 32.495928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.496526] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.496965] ? kasan_atomics+0x153/0x310 [ 32.497872] kasan_atomics+0x1dd/0x310 [ 32.498623] ? __pfx_kasan_atomics+0x10/0x10 [ 32.499039] ? __pfx_read_tsc+0x10/0x10 [ 32.499658] ? ktime_get_ts64+0x84/0x230 [ 32.500608] kunit_try_run_case+0x1b3/0x490 [ 32.501036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.501782] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.502550] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.503020] ? __kthread_parkme+0x82/0x160 [ 32.503722] ? preempt_count_sub+0x50/0x80 [ 32.504526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.505594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.506266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.506522] kthread+0x257/0x310 [ 32.506690] ? __pfx_kthread+0x10/0x10 [ 32.506873] ret_from_fork+0x41/0x80 [ 32.507122] ? __pfx_kthread+0x10/0x10 [ 32.507409] ret_from_fork_asm+0x1a/0x30 [ 32.508003] </TASK> [ 32.508814] [ 32.509223] Allocated by task 273: [ 32.509483] kasan_save_stack+0x3d/0x60 [ 32.509869] kasan_save_track+0x18/0x40 [ 32.510564] kasan_save_alloc_info+0x3b/0x50 [ 32.511282] __kasan_kmalloc+0xb7/0xc0 [ 32.511679] __kmalloc_cache_noprof+0x184/0x410 [ 32.512952] kasan_atomics+0x96/0x310 [ 32.513372] kunit_try_run_case+0x1b3/0x490 [ 32.514029] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.514858] kthread+0x257/0x310 [ 32.515788] ret_from_fork+0x41/0x80 [ 32.516244] ret_from_fork_asm+0x1a/0x30 [ 32.516525] [ 32.517036] The buggy address belongs to the object at ffff888101aba780 [ 32.517036] which belongs to the cache kmalloc-64 of size 64 [ 32.518202] The buggy address is located 0 bytes to the right of [ 32.518202] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.519275] [ 32.519558] The buggy address belongs to the physical page: [ 32.520135] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.521001] flags: 0x200000000000000(node=0|zone=2) [ 32.521943] page_type: f5(slab) [ 32.522649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.523889] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.524923] page dumped because: kasan: bad access detected [ 32.525474] [ 32.525709] Memory state around the buggy address: [ 32.526921] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.527760] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.528824] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.529810] ^ [ 32.530127] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.530953] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.531875] ================================================================== [ 31.052697] ================================================================== [ 31.053461] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 31.054209] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.054747] [ 31.054915] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.056203] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.056617] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.057459] Call Trace: [ 31.057669] <TASK> [ 31.057956] dump_stack_lvl+0x73/0xb0 [ 31.058627] print_report+0xd1/0x640 [ 31.059180] ? __virt_addr_valid+0x1db/0x2d0 [ 31.059582] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.060387] kasan_report+0x102/0x140 [ 31.060833] ? kasan_atomics_helper+0x49ea/0x5450 [ 31.061748] ? kasan_atomics_helper+0x49ea/0x5450 [ 31.062478] __asan_report_load4_noabort+0x18/0x20 [ 31.063088] kasan_atomics_helper+0x49ea/0x5450 [ 31.063605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.064240] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.064658] ? kasan_atomics+0x153/0x310 [ 31.065308] kasan_atomics+0x1dd/0x310 [ 31.065691] ? __pfx_kasan_atomics+0x10/0x10 [ 31.066327] ? __pfx_read_tsc+0x10/0x10 [ 31.066903] ? ktime_get_ts64+0x84/0x230 [ 31.067498] kunit_try_run_case+0x1b3/0x490 [ 31.067996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.068665] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.069141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.069806] ? __kthread_parkme+0x82/0x160 [ 31.070206] ? preempt_count_sub+0x50/0x80 [ 31.070820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.071266] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.071850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.072461] kthread+0x257/0x310 [ 31.072835] ? __pfx_kthread+0x10/0x10 [ 31.073415] ret_from_fork+0x41/0x80 [ 31.073887] ? __pfx_kthread+0x10/0x10 [ 31.074357] ret_from_fork_asm+0x1a/0x30 [ 31.074915] </TASK> [ 31.075319] [ 31.075481] Allocated by task 273: [ 31.075894] kasan_save_stack+0x3d/0x60 [ 31.076380] kasan_save_track+0x18/0x40 [ 31.076733] kasan_save_alloc_info+0x3b/0x50 [ 31.077365] __kasan_kmalloc+0xb7/0xc0 [ 31.077701] __kmalloc_cache_noprof+0x184/0x410 [ 31.078437] kasan_atomics+0x96/0x310 [ 31.078761] kunit_try_run_case+0x1b3/0x490 [ 31.079265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.079801] kthread+0x257/0x310 [ 31.080338] ret_from_fork+0x41/0x80 [ 31.080673] ret_from_fork_asm+0x1a/0x30 [ 31.081227] [ 31.081507] The buggy address belongs to the object at ffff888101aba780 [ 31.081507] which belongs to the cache kmalloc-64 of size 64 [ 31.082589] The buggy address is located 0 bytes to the right of [ 31.082589] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.083778] [ 31.084094] The buggy address belongs to the physical page: [ 31.084649] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.085437] flags: 0x200000000000000(node=0|zone=2) [ 31.085976] page_type: f5(slab) [ 31.086437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.087186] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.087958] page dumped because: kasan: bad access detected [ 31.088548] [ 31.088814] Memory state around the buggy address: [ 31.089301] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.090073] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.090771] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.091577] ^ [ 31.092235] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.092769] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.093426] ================================================================== [ 29.750913] ================================================================== [ 29.751515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 29.752594] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.754011] [ 29.754288] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.756225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.757363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.758111] Call Trace: [ 29.759244] <TASK> [ 29.759461] dump_stack_lvl+0x73/0xb0 [ 29.759873] print_report+0xd1/0x640 [ 29.760310] ? __virt_addr_valid+0x1db/0x2d0 [ 29.760719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.761507] kasan_report+0x102/0x140 [ 29.762513] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.763617] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.764466] kasan_check_range+0x10c/0x1c0 [ 29.765006] __kasan_check_read+0x15/0x20 [ 29.765808] kasan_atomics_helper+0x3e0/0x5450 [ 29.766584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.767529] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.768545] ? kasan_atomics+0x153/0x310 [ 29.769223] kasan_atomics+0x1dd/0x310 [ 29.770262] ? __pfx_kasan_atomics+0x10/0x10 [ 29.770928] ? __pfx_read_tsc+0x10/0x10 [ 29.771485] ? ktime_get_ts64+0x84/0x230 [ 29.771885] kunit_try_run_case+0x1b3/0x490 [ 29.772263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.772796] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.773352] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.774406] ? __kthread_parkme+0x82/0x160 [ 29.774686] ? preempt_count_sub+0x50/0x80 [ 29.775488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.776104] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.776722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.777481] kthread+0x257/0x310 [ 29.777812] ? __pfx_kthread+0x10/0x10 [ 29.778623] ret_from_fork+0x41/0x80 [ 29.779103] ? __pfx_kthread+0x10/0x10 [ 29.779647] ret_from_fork_asm+0x1a/0x30 [ 29.780281] </TASK> [ 29.780666] [ 29.780845] Allocated by task 273: [ 29.781430] kasan_save_stack+0x3d/0x60 [ 29.781846] kasan_save_track+0x18/0x40 [ 29.782466] kasan_save_alloc_info+0x3b/0x50 [ 29.783356] __kasan_kmalloc+0xb7/0xc0 [ 29.783854] __kmalloc_cache_noprof+0x184/0x410 [ 29.784550] kasan_atomics+0x96/0x310 [ 29.785217] kunit_try_run_case+0x1b3/0x490 [ 29.785611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.786439] kthread+0x257/0x310 [ 29.786805] ret_from_fork+0x41/0x80 [ 29.787545] ret_from_fork_asm+0x1a/0x30 [ 29.788121] [ 29.788301] The buggy address belongs to the object at ffff888101aba780 [ 29.788301] which belongs to the cache kmalloc-64 of size 64 [ 29.789462] The buggy address is located 0 bytes to the right of [ 29.789462] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.790819] [ 29.791279] The buggy address belongs to the physical page: [ 29.791770] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.792772] flags: 0x200000000000000(node=0|zone=2) [ 29.793508] page_type: f5(slab) [ 29.793879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.795107] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.795759] page dumped because: kasan: bad access detected [ 29.796550] [ 29.796769] Memory state around the buggy address: [ 29.797457] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.798115] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.798751] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.799357] ^ [ 29.799879] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.800937] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.801669] ================================================================== [ 31.408243] ================================================================== [ 31.409380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 31.410227] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 31.410855] [ 31.411215] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 31.412077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.412436] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.413462] Call Trace: [ 31.413753] <TASK> [ 31.413962] dump_stack_lvl+0x73/0xb0 [ 31.414542] print_report+0xd1/0x640 [ 31.414956] ? __virt_addr_valid+0x1db/0x2d0 [ 31.415432] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.416100] kasan_report+0x102/0x140 [ 31.416514] ? kasan_atomics_helper+0x15b7/0x5450 [ 31.417145] ? kasan_atomics_helper+0x15b7/0x5450 [ 31.417658] kasan_check_range+0x10c/0x1c0 [ 31.418083] __kasan_check_write+0x18/0x20 [ 31.418827] kasan_atomics_helper+0x15b7/0x5450 [ 31.419460] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.419924] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.420522] ? kasan_atomics+0x153/0x310 [ 31.421102] kasan_atomics+0x1dd/0x310 [ 31.421444] ? __pfx_kasan_atomics+0x10/0x10 [ 31.421905] ? __pfx_read_tsc+0x10/0x10 [ 31.422444] ? ktime_get_ts64+0x84/0x230 [ 31.422895] kunit_try_run_case+0x1b3/0x490 [ 31.423631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.424312] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.424657] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.425501] ? __kthread_parkme+0x82/0x160 [ 31.425807] ? preempt_count_sub+0x50/0x80 [ 31.426467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.426967] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.427668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.428765] kthread+0x257/0x310 [ 31.429656] ? __pfx_kthread+0x10/0x10 [ 31.430087] ret_from_fork+0x41/0x80 [ 31.430570] ? __pfx_kthread+0x10/0x10 [ 31.431212] ret_from_fork_asm+0x1a/0x30 [ 31.432177] </TASK> [ 31.432401] [ 31.432597] Allocated by task 273: [ 31.433283] kasan_save_stack+0x3d/0x60 [ 31.433718] kasan_save_track+0x18/0x40 [ 31.434648] kasan_save_alloc_info+0x3b/0x50 [ 31.435259] __kasan_kmalloc+0xb7/0xc0 [ 31.435755] __kmalloc_cache_noprof+0x184/0x410 [ 31.436586] kasan_atomics+0x96/0x310 [ 31.437292] kunit_try_run_case+0x1b3/0x490 [ 31.437707] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.438529] kthread+0x257/0x310 [ 31.439147] ret_from_fork+0x41/0x80 [ 31.439717] ret_from_fork_asm+0x1a/0x30 [ 31.440124] [ 31.440689] The buggy address belongs to the object at ffff888101aba780 [ 31.440689] which belongs to the cache kmalloc-64 of size 64 [ 31.441758] The buggy address is located 0 bytes to the right of [ 31.441758] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 31.443633] [ 31.443852] The buggy address belongs to the physical page: [ 31.444893] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 31.445801] flags: 0x200000000000000(node=0|zone=2) [ 31.446591] page_type: f5(slab) [ 31.446963] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.447816] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 31.448896] page dumped because: kasan: bad access detected [ 31.449315] [ 31.449419] Memory state around the buggy address: [ 31.449617] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.449888] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.450216] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.450498] ^ [ 31.450701] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.450968] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.452382] ================================================================== [ 29.702687] ================================================================== [ 29.703235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 29.704112] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.705084] [ 29.705299] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.706688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.707056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.708406] Call Trace: [ 29.708755] <TASK> [ 29.709125] dump_stack_lvl+0x73/0xb0 [ 29.709738] print_report+0xd1/0x640 [ 29.710197] ? __virt_addr_valid+0x1db/0x2d0 [ 29.710821] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.711484] kasan_report+0x102/0x140 [ 29.712356] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.712843] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.713401] __asan_report_store4_noabort+0x1b/0x30 [ 29.714112] kasan_atomics_helper+0x4b70/0x5450 [ 29.714672] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.715159] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.715818] ? kasan_atomics+0x153/0x310 [ 29.716944] kasan_atomics+0x1dd/0x310 [ 29.717374] ? __pfx_kasan_atomics+0x10/0x10 [ 29.717790] ? __pfx_read_tsc+0x10/0x10 [ 29.719089] ? ktime_get_ts64+0x84/0x230 [ 29.719743] kunit_try_run_case+0x1b3/0x490 [ 29.720760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.721448] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.722061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.722543] ? __kthread_parkme+0x82/0x160 [ 29.722956] ? preempt_count_sub+0x50/0x80 [ 29.723469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.724246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.725048] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.725624] kthread+0x257/0x310 [ 29.726107] ? __pfx_kthread+0x10/0x10 [ 29.726538] ret_from_fork+0x41/0x80 [ 29.727054] ? __pfx_kthread+0x10/0x10 [ 29.727748] ret_from_fork_asm+0x1a/0x30 [ 29.728305] </TASK> [ 29.728706] [ 29.728937] Allocated by task 273: [ 29.729655] kasan_save_stack+0x3d/0x60 [ 29.729932] kasan_save_track+0x18/0x40 [ 29.730489] kasan_save_alloc_info+0x3b/0x50 [ 29.731347] __kasan_kmalloc+0xb7/0xc0 [ 29.731620] __kmalloc_cache_noprof+0x184/0x410 [ 29.732474] kasan_atomics+0x96/0x310 [ 29.733344] kunit_try_run_case+0x1b3/0x490 [ 29.733698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.734500] kthread+0x257/0x310 [ 29.734760] ret_from_fork+0x41/0x80 [ 29.735440] ret_from_fork_asm+0x1a/0x30 [ 29.735883] [ 29.736060] The buggy address belongs to the object at ffff888101aba780 [ 29.736060] which belongs to the cache kmalloc-64 of size 64 [ 29.737553] The buggy address is located 0 bytes to the right of [ 29.737553] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.738637] [ 29.738890] The buggy address belongs to the physical page: [ 29.739280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.740550] flags: 0x200000000000000(node=0|zone=2) [ 29.740865] page_type: f5(slab) [ 29.741607] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.742463] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.743179] page dumped because: kasan: bad access detected [ 29.743976] [ 29.744179] Memory state around the buggy address: [ 29.744830] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745850] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.746840] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.747557] ^ [ 29.748136] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.748923] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749906] ================================================================== [ 30.155229] ================================================================== [ 30.155783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 30.156616] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.157779] [ 30.157955] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.158804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.159318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.160021] Call Trace: [ 30.160364] <TASK> [ 30.160581] dump_stack_lvl+0x73/0xb0 [ 30.160917] print_report+0xd1/0x640 [ 30.161646] ? __virt_addr_valid+0x1db/0x2d0 [ 30.162018] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.162400] kasan_report+0x102/0x140 [ 30.162693] ? kasan_atomics_helper+0x7c8/0x5450 [ 30.163229] ? kasan_atomics_helper+0x7c8/0x5450 [ 30.163834] kasan_check_range+0x10c/0x1c0 [ 30.164575] __kasan_check_write+0x18/0x20 [ 30.164876] kasan_atomics_helper+0x7c8/0x5450 [ 30.165223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.165784] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.166558] ? kasan_atomics+0x153/0x310 [ 30.167120] kasan_atomics+0x1dd/0x310 [ 30.167586] ? __pfx_kasan_atomics+0x10/0x10 [ 30.168016] ? __pfx_read_tsc+0x10/0x10 [ 30.168482] ? ktime_get_ts64+0x84/0x230 [ 30.168781] kunit_try_run_case+0x1b3/0x490 [ 30.169532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.169910] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.170504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.171088] ? __kthread_parkme+0x82/0x160 [ 30.171551] ? preempt_count_sub+0x50/0x80 [ 30.171862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.172521] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.173227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.173591] kthread+0x257/0x310 [ 30.174196] ? __pfx_kthread+0x10/0x10 [ 30.174670] ret_from_fork+0x41/0x80 [ 30.175241] ? __pfx_kthread+0x10/0x10 [ 30.175553] ret_from_fork_asm+0x1a/0x30 [ 30.176014] </TASK> [ 30.176305] [ 30.176618] Allocated by task 273: [ 30.176968] kasan_save_stack+0x3d/0x60 [ 30.177300] kasan_save_track+0x18/0x40 [ 30.177582] kasan_save_alloc_info+0x3b/0x50 [ 30.178116] __kasan_kmalloc+0xb7/0xc0 [ 30.178652] __kmalloc_cache_noprof+0x184/0x410 [ 30.178965] kasan_atomics+0x96/0x310 [ 30.179263] kunit_try_run_case+0x1b3/0x490 [ 30.179943] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.180578] kthread+0x257/0x310 [ 30.181015] ret_from_fork+0x41/0x80 [ 30.181292] ret_from_fork_asm+0x1a/0x30 [ 30.181576] [ 30.181737] The buggy address belongs to the object at ffff888101aba780 [ 30.181737] which belongs to the cache kmalloc-64 of size 64 [ 30.183328] The buggy address is located 0 bytes to the right of [ 30.183328] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.184229] [ 30.184488] The buggy address belongs to the physical page: [ 30.185108] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.185713] flags: 0x200000000000000(node=0|zone=2) [ 30.186337] page_type: f5(slab) [ 30.186638] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.187136] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.187961] page dumped because: kasan: bad access detected [ 30.188620] [ 30.188857] Memory state around the buggy address: [ 30.189290] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.189711] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.190146] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.190934] ^ [ 30.191538] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.192563] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.193178] ================================================================== [ 29.851620] ================================================================== [ 29.852338] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 29.853327] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.854016] [ 29.854677] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.855892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.856782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.857783] Call Trace: [ 29.858553] <TASK> [ 29.858874] dump_stack_lvl+0x73/0xb0 [ 29.859473] print_report+0xd1/0x640 [ 29.860113] ? __virt_addr_valid+0x1db/0x2d0 [ 29.860522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.861339] kasan_report+0x102/0x140 [ 29.862040] ? kasan_atomics_helper+0x4a1/0x5450 [ 29.862713] ? kasan_atomics_helper+0x4a1/0x5450 [ 29.863537] kasan_check_range+0x10c/0x1c0 [ 29.864199] __kasan_check_write+0x18/0x20 [ 29.865142] kasan_atomics_helper+0x4a1/0x5450 [ 29.865716] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.866583] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.867242] ? kasan_atomics+0x153/0x310 [ 29.868088] kasan_atomics+0x1dd/0x310 [ 29.868568] ? __pfx_kasan_atomics+0x10/0x10 [ 29.869306] ? __pfx_read_tsc+0x10/0x10 [ 29.869767] ? ktime_get_ts64+0x84/0x230 [ 29.870380] kunit_try_run_case+0x1b3/0x490 [ 29.870946] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.871764] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.872316] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.872906] ? __kthread_parkme+0x82/0x160 [ 29.873603] ? preempt_count_sub+0x50/0x80 [ 29.874138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.875286] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.876114] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.876721] kthread+0x257/0x310 [ 29.877216] ? __pfx_kthread+0x10/0x10 [ 29.877738] ret_from_fork+0x41/0x80 [ 29.878269] ? __pfx_kthread+0x10/0x10 [ 29.878980] ret_from_fork_asm+0x1a/0x30 [ 29.880014] </TASK> [ 29.880251] [ 29.880691] Allocated by task 273: [ 29.881119] kasan_save_stack+0x3d/0x60 [ 29.881810] kasan_save_track+0x18/0x40 [ 29.882306] kasan_save_alloc_info+0x3b/0x50 [ 29.883567] __kasan_kmalloc+0xb7/0xc0 [ 29.884066] __kmalloc_cache_noprof+0x184/0x410 [ 29.884920] kasan_atomics+0x96/0x310 [ 29.885471] kunit_try_run_case+0x1b3/0x490 [ 29.886194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.886740] kthread+0x257/0x310 [ 29.887217] ret_from_fork+0x41/0x80 [ 29.887669] ret_from_fork_asm+0x1a/0x30 [ 29.888646] [ 29.888804] The buggy address belongs to the object at ffff888101aba780 [ 29.888804] which belongs to the cache kmalloc-64 of size 64 [ 29.890262] The buggy address is located 0 bytes to the right of [ 29.890262] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.891904] [ 29.892480] The buggy address belongs to the physical page: [ 29.893481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.894179] flags: 0x200000000000000(node=0|zone=2) [ 29.894906] page_type: f5(slab) [ 29.895410] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.896372] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.897709] page dumped because: kasan: bad access detected [ 29.898311] [ 29.898584] Memory state around the buggy address: [ 29.899134] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.900009] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.900939] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.902073] ^ [ 29.902814] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.903695] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.904604] ================================================================== [ 29.652953] ================================================================== [ 29.654250] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 29.654952] Read of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 29.655998] [ 29.656301] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 29.657372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.657907] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.658855] Call Trace: [ 29.659321] <TASK> [ 29.659725] dump_stack_lvl+0x73/0xb0 [ 29.660469] print_report+0xd1/0x640 [ 29.660951] ? __virt_addr_valid+0x1db/0x2d0 [ 29.661400] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.662394] kasan_report+0x102/0x140 [ 29.662779] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.663404] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.664458] __asan_report_load4_noabort+0x18/0x20 [ 29.665081] kasan_atomics_helper+0x4b8a/0x5450 [ 29.665626] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.666302] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.666764] ? kasan_atomics+0x153/0x310 [ 29.667613] kasan_atomics+0x1dd/0x310 [ 29.667909] ? __pfx_kasan_atomics+0x10/0x10 [ 29.668411] ? __pfx_read_tsc+0x10/0x10 [ 29.669314] ? ktime_get_ts64+0x84/0x230 [ 29.669829] kunit_try_run_case+0x1b3/0x490 [ 29.670285] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.670779] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.671310] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.672194] ? __kthread_parkme+0x82/0x160 [ 29.672568] ? preempt_count_sub+0x50/0x80 [ 29.673193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.673698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.674715] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.675593] kthread+0x257/0x310 [ 29.676093] ? __pfx_kthread+0x10/0x10 [ 29.676776] ret_from_fork+0x41/0x80 [ 29.677476] ? __pfx_kthread+0x10/0x10 [ 29.677881] ret_from_fork_asm+0x1a/0x30 [ 29.679274] </TASK> [ 29.679503] [ 29.679646] Allocated by task 273: [ 29.680092] kasan_save_stack+0x3d/0x60 [ 29.680638] kasan_save_track+0x18/0x40 [ 29.681204] kasan_save_alloc_info+0x3b/0x50 [ 29.681882] __kasan_kmalloc+0xb7/0xc0 [ 29.682396] __kmalloc_cache_noprof+0x184/0x410 [ 29.683351] kasan_atomics+0x96/0x310 [ 29.683812] kunit_try_run_case+0x1b3/0x490 [ 29.684287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.685195] kthread+0x257/0x310 [ 29.685559] ret_from_fork+0x41/0x80 [ 29.686296] ret_from_fork_asm+0x1a/0x30 [ 29.686657] [ 29.687196] The buggy address belongs to the object at ffff888101aba780 [ 29.687196] which belongs to the cache kmalloc-64 of size 64 [ 29.688331] The buggy address is located 0 bytes to the right of [ 29.688331] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 29.689602] [ 29.690139] The buggy address belongs to the physical page: [ 29.690510] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 29.691569] flags: 0x200000000000000(node=0|zone=2) [ 29.692510] page_type: f5(slab) [ 29.692891] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.693703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 29.694766] page dumped because: kasan: bad access detected [ 29.695485] [ 29.695661] Memory state around the buggy address: [ 29.696524] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.697556] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.698430] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.699117] ^ [ 29.699799] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.700790] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.701777] ================================================================== [ 30.238560] ================================================================== [ 30.240272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 30.240865] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.241450] [ 30.241656] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.242285] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.242978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.243910] Call Trace: [ 30.244399] <TASK> [ 30.244783] dump_stack_lvl+0x73/0xb0 [ 30.245322] print_report+0xd1/0x640 [ 30.245692] ? __virt_addr_valid+0x1db/0x2d0 [ 30.246250] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.246942] kasan_report+0x102/0x140 [ 30.247331] ? kasan_atomics_helper+0x8fa/0x5450 [ 30.247894] ? kasan_atomics_helper+0x8fa/0x5450 [ 30.248597] kasan_check_range+0x10c/0x1c0 [ 30.249084] __kasan_check_write+0x18/0x20 [ 30.249441] kasan_atomics_helper+0x8fa/0x5450 [ 30.249869] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.250865] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.251619] ? kasan_atomics+0x153/0x310 [ 30.252607] kasan_atomics+0x1dd/0x310 [ 30.252810] ? __pfx_kasan_atomics+0x10/0x10 [ 30.253120] ? __pfx_read_tsc+0x10/0x10 [ 30.254004] ? ktime_get_ts64+0x84/0x230 [ 30.254358] kunit_try_run_case+0x1b3/0x490 [ 30.254570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.254783] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.255230] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.255884] ? __kthread_parkme+0x82/0x160 [ 30.256935] ? preempt_count_sub+0x50/0x80 [ 30.257353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.258165] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.258896] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.259667] kthread+0x257/0x310 [ 30.259931] ? __pfx_kthread+0x10/0x10 [ 30.260496] ret_from_fork+0x41/0x80 [ 30.261192] ? __pfx_kthread+0x10/0x10 [ 30.261806] ret_from_fork_asm+0x1a/0x30 [ 30.262481] </TASK> [ 30.262792] [ 30.263196] Allocated by task 273: [ 30.263613] kasan_save_stack+0x3d/0x60 [ 30.264002] kasan_save_track+0x18/0x40 [ 30.264660] kasan_save_alloc_info+0x3b/0x50 [ 30.265161] __kasan_kmalloc+0xb7/0xc0 [ 30.265673] __kmalloc_cache_noprof+0x184/0x410 [ 30.266568] kasan_atomics+0x96/0x310 [ 30.267198] kunit_try_run_case+0x1b3/0x490 [ 30.267752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.268216] kthread+0x257/0x310 [ 30.268752] ret_from_fork+0x41/0x80 [ 30.269361] ret_from_fork_asm+0x1a/0x30 [ 30.269888] [ 30.270363] The buggy address belongs to the object at ffff888101aba780 [ 30.270363] which belongs to the cache kmalloc-64 of size 64 [ 30.271739] The buggy address is located 0 bytes to the right of [ 30.271739] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.273283] [ 30.273507] The buggy address belongs to the physical page: [ 30.274078] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.275637] flags: 0x200000000000000(node=0|zone=2) [ 30.276061] page_type: f5(slab) [ 30.276478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.277538] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.278486] page dumped because: kasan: bad access detected [ 30.279355] [ 30.279564] Memory state around the buggy address: [ 30.279860] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.280751] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.281377] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.281651] ^ [ 30.281850] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.282223] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.283372] ================================================================== [ 32.392309] ================================================================== [ 32.393053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 32.393725] Write of size 8 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 32.396635] [ 32.396835] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 32.398338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.398649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.399556] Call Trace: [ 32.399899] <TASK> [ 32.400325] dump_stack_lvl+0x73/0xb0 [ 32.400872] print_report+0xd1/0x640 [ 32.401306] ? __virt_addr_valid+0x1db/0x2d0 [ 32.401795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.402227] kasan_report+0x102/0x140 [ 32.403042] ? kasan_atomics_helper+0x218b/0x5450 [ 32.403693] ? kasan_atomics_helper+0x218b/0x5450 [ 32.404218] kasan_check_range+0x10c/0x1c0 [ 32.404834] __kasan_check_write+0x18/0x20 [ 32.405297] kasan_atomics_helper+0x218b/0x5450 [ 32.406024] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.406636] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.407171] ? kasan_atomics+0x153/0x310 [ 32.407378] kasan_atomics+0x1dd/0x310 [ 32.407567] ? __pfx_kasan_atomics+0x10/0x10 [ 32.407771] ? __pfx_read_tsc+0x10/0x10 [ 32.407950] ? ktime_get_ts64+0x84/0x230 [ 32.408422] kunit_try_run_case+0x1b3/0x490 [ 32.409191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.410015] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.410624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.411147] ? __kthread_parkme+0x82/0x160 [ 32.411778] ? preempt_count_sub+0x50/0x80 [ 32.412376] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.412945] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.413559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.414319] kthread+0x257/0x310 [ 32.414636] ? __pfx_kthread+0x10/0x10 [ 32.415078] ret_from_fork+0x41/0x80 [ 32.415473] ? __pfx_kthread+0x10/0x10 [ 32.415845] ret_from_fork_asm+0x1a/0x30 [ 32.416387] </TASK> [ 32.416580] [ 32.416737] Allocated by task 273: [ 32.417312] kasan_save_stack+0x3d/0x60 [ 32.417874] kasan_save_track+0x18/0x40 [ 32.418398] kasan_save_alloc_info+0x3b/0x50 [ 32.418855] __kasan_kmalloc+0xb7/0xc0 [ 32.419203] __kmalloc_cache_noprof+0x184/0x410 [ 32.419856] kasan_atomics+0x96/0x310 [ 32.420457] kunit_try_run_case+0x1b3/0x490 [ 32.421119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.421811] kthread+0x257/0x310 [ 32.422262] ret_from_fork+0x41/0x80 [ 32.422767] ret_from_fork_asm+0x1a/0x30 [ 32.423386] [ 32.423564] The buggy address belongs to the object at ffff888101aba780 [ 32.423564] which belongs to the cache kmalloc-64 of size 64 [ 32.424870] The buggy address is located 0 bytes to the right of [ 32.424870] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 32.426175] [ 32.426340] The buggy address belongs to the physical page: [ 32.427162] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 32.428079] flags: 0x200000000000000(node=0|zone=2) [ 32.428633] page_type: f5(slab) [ 32.429138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.429839] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 32.430653] page dumped because: kasan: bad access detected [ 32.431297] [ 32.431636] Memory state around the buggy address: [ 32.432201] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.432906] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.433718] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.434499] ^ [ 32.434975] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.435661] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.436449] ================================================================== [ 30.340905] ================================================================== [ 30.341582] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 30.343377] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.343938] [ 30.344279] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.345547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.345902] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.347423] Call Trace: [ 30.347577] <TASK> [ 30.347702] dump_stack_lvl+0x73/0xb0 [ 30.347891] print_report+0xd1/0x640 [ 30.348263] ? __virt_addr_valid+0x1db/0x2d0 [ 30.349316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.350005] kasan_report+0x102/0x140 [ 30.350887] ? kasan_atomics_helper+0xa2c/0x5450 [ 30.351585] ? kasan_atomics_helper+0xa2c/0x5450 [ 30.352239] kasan_check_range+0x10c/0x1c0 [ 30.352680] __kasan_check_write+0x18/0x20 [ 30.353110] kasan_atomics_helper+0xa2c/0x5450 [ 30.354014] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.354768] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.355578] ? kasan_atomics+0x153/0x310 [ 30.356199] kasan_atomics+0x1dd/0x310 [ 30.356640] ? __pfx_kasan_atomics+0x10/0x10 [ 30.357422] ? __pfx_read_tsc+0x10/0x10 [ 30.357822] ? ktime_get_ts64+0x84/0x230 [ 30.358286] kunit_try_run_case+0x1b3/0x490 [ 30.358728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.359273] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.359634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.360462] ? __kthread_parkme+0x82/0x160 [ 30.360865] ? preempt_count_sub+0x50/0x80 [ 30.361570] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.361974] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.362676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.363343] kthread+0x257/0x310 [ 30.363808] ? __pfx_kthread+0x10/0x10 [ 30.364382] ret_from_fork+0x41/0x80 [ 30.364866] ? __pfx_kthread+0x10/0x10 [ 30.365353] ret_from_fork_asm+0x1a/0x30 [ 30.365952] </TASK> [ 30.366443] [ 30.366644] Allocated by task 273: [ 30.367191] kasan_save_stack+0x3d/0x60 [ 30.367668] kasan_save_track+0x18/0x40 [ 30.368255] kasan_save_alloc_info+0x3b/0x50 [ 30.368763] __kasan_kmalloc+0xb7/0xc0 [ 30.369123] __kmalloc_cache_noprof+0x184/0x410 [ 30.369719] kasan_atomics+0x96/0x310 [ 30.370285] kunit_try_run_case+0x1b3/0x490 [ 30.370682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.371314] kthread+0x257/0x310 [ 30.371745] ret_from_fork+0x41/0x80 [ 30.372300] ret_from_fork_asm+0x1a/0x30 [ 30.372596] [ 30.372951] The buggy address belongs to the object at ffff888101aba780 [ 30.372951] which belongs to the cache kmalloc-64 of size 64 [ 30.374196] The buggy address is located 0 bytes to the right of [ 30.374196] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.375542] [ 30.375741] The buggy address belongs to the physical page: [ 30.376408] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.377206] flags: 0x200000000000000(node=0|zone=2) [ 30.377638] page_type: f5(slab) [ 30.378099] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.379184] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.379766] page dumped because: kasan: bad access detected [ 30.380050] [ 30.380233] Memory state around the buggy address: [ 30.380588] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.381936] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.382735] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.383951] ^ [ 30.384654] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.385891] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.387247] ================================================================== [ 30.060826] ================================================================== [ 30.062411] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 30.063916] Write of size 4 at addr ffff888101aba7b0 by task kunit_try_catch/273 [ 30.064887] [ 30.065234] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241127 #1 [ 30.066232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.066711] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.067607] Call Trace: [ 30.067939] <TASK> [ 30.068227] dump_stack_lvl+0x73/0xb0 [ 30.068768] print_report+0xd1/0x640 [ 30.069187] ? __virt_addr_valid+0x1db/0x2d0 [ 30.069760] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.070464] kasan_report+0x102/0x140 [ 30.070789] ? kasan_atomics_helper+0x698/0x5450 [ 30.071567] ? kasan_atomics_helper+0x698/0x5450 [ 30.072319] kasan_check_range+0x10c/0x1c0 [ 30.072844] __kasan_check_write+0x18/0x20 [ 30.073394] kasan_atomics_helper+0x698/0x5450 [ 30.073945] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.074669] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.075196] ? kasan_atomics+0x153/0x310 [ 30.075779] kasan_atomics+0x1dd/0x310 [ 30.076231] ? __pfx_kasan_atomics+0x10/0x10 [ 30.076765] ? __pfx_read_tsc+0x10/0x10 [ 30.077381] ? ktime_get_ts64+0x84/0x230 [ 30.077903] kunit_try_run_case+0x1b3/0x490 [ 30.078572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.079136] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.079634] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.080312] ? __kthread_parkme+0x82/0x160 [ 30.080873] ? preempt_count_sub+0x50/0x80 [ 30.081412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.082085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.082747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.083459] kthread+0x257/0x310 [ 30.083823] ? __pfx_kthread+0x10/0x10 [ 30.084266] ret_from_fork+0x41/0x80 [ 30.084643] ? __pfx_kthread+0x10/0x10 [ 30.085130] ret_from_fork_asm+0x1a/0x30 [ 30.085743] </TASK> [ 30.086275] [ 30.086505] Allocated by task 273: [ 30.087027] kasan_save_stack+0x3d/0x60 [ 30.087526] kasan_save_track+0x18/0x40 [ 30.088061] kasan_save_alloc_info+0x3b/0x50 [ 30.088592] __kasan_kmalloc+0xb7/0xc0 [ 30.089410] __kmalloc_cache_noprof+0x184/0x410 [ 30.089861] kasan_atomics+0x96/0x310 [ 30.090885] kunit_try_run_case+0x1b3/0x490 [ 30.091429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.092326] kthread+0x257/0x310 [ 30.092903] ret_from_fork+0x41/0x80 [ 30.093480] ret_from_fork_asm+0x1a/0x30 [ 30.094088] [ 30.094531] The buggy address belongs to the object at ffff888101aba780 [ 30.094531] which belongs to the cache kmalloc-64 of size 64 [ 30.095633] The buggy address is located 0 bytes to the right of [ 30.095633] allocated 48-byte region [ffff888101aba780, ffff888101aba7b0) [ 30.096662] [ 30.096851] The buggy address belongs to the physical page: [ 30.097823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101aba [ 30.099055] flags: 0x200000000000000(node=0|zone=2) [ 30.099659] page_type: f5(slab) [ 30.100272] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.100972] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 30.102182] page dumped because: kasan: bad access detected [ 30.102639] [ 30.102893] Memory state around the buggy address: [ 30.103719] ffff888101aba680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.104962] ffff888101aba700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.105736] >ffff888101aba780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.106827] ^ [ 30.107494] ffff888101aba800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.108445] ffff888101aba880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.109721] ==================================================================