Date
Nov. 28, 2024, 2:36 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.494805] ================================================================== [ 35.495509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.496351] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.496912] [ 35.497834] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.499173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.499878] Hardware name: linux,dummy-virt (DT) [ 35.500657] Call trace: [ 35.501254] show_stack+0x20/0x38 (C) [ 35.501964] dump_stack_lvl+0x8c/0xd0 [ 35.502696] print_report+0x118/0x5e0 [ 35.503232] kasan_report+0xc8/0x118 [ 35.503774] kasan_check_range+0x100/0x1a8 [ 35.504355] __kasan_check_write+0x20/0x30 [ 35.504997] kasan_atomics_helper+0xad4/0x4858 [ 35.505571] kasan_atomics+0x198/0x2e8 [ 35.506182] kunit_try_run_case+0x14c/0x3d0 [ 35.506769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.507523] kthread+0x24c/0x2d0 [ 35.508048] ret_from_fork+0x10/0x20 [ 35.508638] [ 35.508997] Allocated by task 253: [ 35.509533] kasan_save_stack+0x3c/0x68 [ 35.510014] kasan_save_track+0x20/0x40 [ 35.510617] kasan_save_alloc_info+0x40/0x58 [ 35.511229] __kasan_kmalloc+0xd4/0xd8 [ 35.511824] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.512486] kasan_atomics+0xb8/0x2e8 [ 35.513019] kunit_try_run_case+0x14c/0x3d0 [ 35.513661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.514342] kthread+0x24c/0x2d0 [ 35.514831] ret_from_fork+0x10/0x20 [ 35.515380] [ 35.515682] The buggy address belongs to the object at fff00000c63df000 [ 35.515682] which belongs to the cache kmalloc-64 of size 64 [ 35.516906] The buggy address is located 0 bytes to the right of [ 35.516906] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.518099] [ 35.518426] The buggy address belongs to the physical page: [ 35.519046] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.519998] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.520715] page_type: f5(slab) [ 35.521224] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.522047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.522865] page dumped because: kasan: bad access detected [ 35.523404] [ 35.523749] Memory state around the buggy address: [ 35.524428] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.525141] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.526031] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.526806] ^ [ 35.527432] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.528169] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.529031] ================================================================== [ 35.564570] ================================================================== [ 35.565316] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 35.566061] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.566892] [ 35.567247] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.568361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.568904] Hardware name: linux,dummy-virt (DT) [ 35.569527] Call trace: [ 35.569924] show_stack+0x20/0x38 (C) [ 35.571679] dump_stack_lvl+0x8c/0xd0 [ 35.572148] print_report+0x118/0x5e0 [ 35.573010] kasan_report+0xc8/0x118 [ 35.573556] kasan_check_range+0x100/0x1a8 [ 35.574103] __kasan_check_write+0x20/0x30 [ 35.574757] kasan_atomics_helper+0xb70/0x4858 [ 35.575357] kasan_atomics+0x198/0x2e8 [ 35.575965] kunit_try_run_case+0x14c/0x3d0 [ 35.576607] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.577218] kthread+0x24c/0x2d0 [ 35.577814] ret_from_fork+0x10/0x20 [ 35.578429] [ 35.578773] Allocated by task 253: [ 35.579279] kasan_save_stack+0x3c/0x68 [ 35.579827] kasan_save_track+0x20/0x40 [ 35.580319] kasan_save_alloc_info+0x40/0x58 [ 35.580951] __kasan_kmalloc+0xd4/0xd8 [ 35.581484] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.582156] kasan_atomics+0xb8/0x2e8 [ 35.582723] kunit_try_run_case+0x14c/0x3d0 [ 35.583281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.583924] kthread+0x24c/0x2d0 [ 35.584475] ret_from_fork+0x10/0x20 [ 35.585038] [ 35.585878] The buggy address belongs to the object at fff00000c63df000 [ 35.585878] which belongs to the cache kmalloc-64 of size 64 [ 35.587002] The buggy address is located 0 bytes to the right of [ 35.587002] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.588259] [ 35.588624] The buggy address belongs to the physical page: [ 35.589280] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.590243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.591026] page_type: f5(slab) [ 35.591577] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.592453] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.593236] page dumped because: kasan: bad access detected [ 35.593918] [ 35.594265] Memory state around the buggy address: [ 35.594921] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.595701] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.596555] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.597379] ^ [ 35.598051] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.598817] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.599510] ================================================================== [ 35.278513] ================================================================== [ 35.279825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.280715] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.281725] [ 35.282073] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.283054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.283639] Hardware name: linux,dummy-virt (DT) [ 35.284203] Call trace: [ 35.284609] show_stack+0x20/0x38 (C) [ 35.285166] dump_stack_lvl+0x8c/0xd0 [ 35.285785] print_report+0x118/0x5e0 [ 35.286402] kasan_report+0xc8/0x118 [ 35.286980] kasan_check_range+0x100/0x1a8 [ 35.287627] __kasan_check_write+0x20/0x30 [ 35.288240] kasan_atomics_helper+0x894/0x4858 [ 35.288913] kasan_atomics+0x198/0x2e8 [ 35.289534] kunit_try_run_case+0x14c/0x3d0 [ 35.290348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.291071] kthread+0x24c/0x2d0 [ 35.291555] ret_from_fork+0x10/0x20 [ 35.292054] [ 35.292461] Allocated by task 253: [ 35.292985] kasan_save_stack+0x3c/0x68 [ 35.293685] kasan_save_track+0x20/0x40 [ 35.294355] kasan_save_alloc_info+0x40/0x58 [ 35.295038] __kasan_kmalloc+0xd4/0xd8 [ 35.295699] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.296434] kasan_atomics+0xb8/0x2e8 [ 35.297020] kunit_try_run_case+0x14c/0x3d0 [ 35.297742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.298506] kthread+0x24c/0x2d0 [ 35.299103] ret_from_fork+0x10/0x20 [ 35.299726] [ 35.300144] The buggy address belongs to the object at fff00000c63df000 [ 35.300144] which belongs to the cache kmalloc-64 of size 64 [ 35.301433] The buggy address is located 0 bytes to the right of [ 35.301433] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.302801] [ 35.303201] The buggy address belongs to the physical page: [ 35.303857] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.304853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.305691] page_type: f5(slab) [ 35.306267] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.307213] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.308133] page dumped because: kasan: bad access detected [ 35.308844] [ 35.309233] Memory state around the buggy address: [ 35.309891] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.310798] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.311659] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.312390] ^ [ 35.312919] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.313663] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.314588] ================================================================== [ 35.846720] ================================================================== [ 35.847523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.849212] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.850389] [ 35.850966] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.852195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.852661] Hardware name: linux,dummy-virt (DT) [ 35.853230] Call trace: [ 35.853617] show_stack+0x20/0x38 (C) [ 35.854205] dump_stack_lvl+0x8c/0xd0 [ 35.854753] print_report+0x118/0x5e0 [ 35.855327] kasan_report+0xc8/0x118 [ 35.855921] kasan_check_range+0x100/0x1a8 [ 35.856507] __kasan_check_read+0x20/0x30 [ 35.857100] kasan_atomics_helper+0xdd4/0x4858 [ 35.857731] kasan_atomics+0x198/0x2e8 [ 35.858346] kunit_try_run_case+0x14c/0x3d0 [ 35.858921] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.859684] kthread+0x24c/0x2d0 [ 35.860225] ret_from_fork+0x10/0x20 [ 35.860768] [ 35.861107] Allocated by task 253: [ 35.861594] kasan_save_stack+0x3c/0x68 [ 35.862187] kasan_save_track+0x20/0x40 [ 35.862734] kasan_save_alloc_info+0x40/0x58 [ 35.863345] __kasan_kmalloc+0xd4/0xd8 [ 35.863934] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.864609] kasan_atomics+0xb8/0x2e8 [ 35.865107] kunit_try_run_case+0x14c/0x3d0 [ 35.865678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.866425] kthread+0x24c/0x2d0 [ 35.866858] ret_from_fork+0x10/0x20 [ 35.867437] [ 35.867804] The buggy address belongs to the object at fff00000c63df000 [ 35.867804] which belongs to the cache kmalloc-64 of size 64 [ 35.868873] The buggy address is located 0 bytes to the right of [ 35.868873] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.870130] [ 35.870493] The buggy address belongs to the physical page: [ 35.871137] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.872025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.872859] page_type: f5(slab) [ 35.873346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.874212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.875056] page dumped because: kasan: bad access detected [ 35.875660] [ 35.876009] Memory state around the buggy address: [ 35.876587] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.877373] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.878196] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.878946] ^ [ 35.879525] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.880340] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.881041] ================================================================== [ 36.666244] ================================================================== [ 36.667105] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.667907] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.668846] [ 36.669293] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.670465] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.671075] Hardware name: linux,dummy-virt (DT) [ 36.671756] Call trace: [ 36.672263] show_stack+0x20/0x38 (C) [ 36.672939] dump_stack_lvl+0x8c/0xd0 [ 36.673528] print_report+0x118/0x5e0 [ 36.674214] kasan_report+0xc8/0x118 [ 36.674842] kasan_check_range+0x100/0x1a8 [ 36.675525] __kasan_check_write+0x20/0x30 [ 36.676209] kasan_atomics_helper+0x1644/0x4858 [ 36.676923] kasan_atomics+0x198/0x2e8 [ 36.677595] kunit_try_run_case+0x14c/0x3d0 [ 36.678299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.679086] kthread+0x24c/0x2d0 [ 36.679698] ret_from_fork+0x10/0x20 [ 36.680360] [ 36.680747] Allocated by task 253: [ 36.681300] kasan_save_stack+0x3c/0x68 [ 36.681941] kasan_save_track+0x20/0x40 [ 36.682533] kasan_save_alloc_info+0x40/0x58 [ 36.683225] __kasan_kmalloc+0xd4/0xd8 [ 36.683832] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.684500] kasan_atomics+0xb8/0x2e8 [ 36.685090] kunit_try_run_case+0x14c/0x3d0 [ 36.685741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.686482] kthread+0x24c/0x2d0 [ 36.687034] ret_from_fork+0x10/0x20 [ 36.687619] [ 36.688023] The buggy address belongs to the object at fff00000c63df000 [ 36.688023] which belongs to the cache kmalloc-64 of size 64 [ 36.689245] The buggy address is located 0 bytes to the right of [ 36.689245] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.690565] [ 36.690885] The buggy address belongs to the physical page: [ 36.691610] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.692569] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.693399] page_type: f5(slab) [ 36.693932] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.694878] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.695769] page dumped because: kasan: bad access detected [ 36.696479] [ 36.696865] Memory state around the buggy address: [ 36.697562] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.698479] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.699292] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.700152] ^ [ 36.700803] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.701664] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.702468] ================================================================== [ 36.590889] ================================================================== [ 36.591559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.592415] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.594392] [ 36.594782] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.596138] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.596886] Hardware name: linux,dummy-virt (DT) [ 36.597448] Call trace: [ 36.597815] show_stack+0x20/0x38 (C) [ 36.598647] dump_stack_lvl+0x8c/0xd0 [ 36.599247] print_report+0x118/0x5e0 [ 36.600035] kasan_report+0xc8/0x118 [ 36.600608] kasan_check_range+0x100/0x1a8 [ 36.601457] __kasan_check_write+0x20/0x30 [ 36.602222] kasan_atomics_helper+0x15b4/0x4858 [ 36.603003] kasan_atomics+0x198/0x2e8 [ 36.603588] kunit_try_run_case+0x14c/0x3d0 [ 36.604445] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.605317] kthread+0x24c/0x2d0 [ 36.606028] ret_from_fork+0x10/0x20 [ 36.606629] [ 36.607195] Allocated by task 253: [ 36.607819] kasan_save_stack+0x3c/0x68 [ 36.608564] kasan_save_track+0x20/0x40 [ 36.609098] kasan_save_alloc_info+0x40/0x58 [ 36.609944] __kasan_kmalloc+0xd4/0xd8 [ 36.610661] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.611432] kasan_atomics+0xb8/0x2e8 [ 36.611984] kunit_try_run_case+0x14c/0x3d0 [ 36.612769] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.613463] kthread+0x24c/0x2d0 [ 36.613958] ret_from_fork+0x10/0x20 [ 36.614569] [ 36.614903] The buggy address belongs to the object at fff00000c63df000 [ 36.614903] which belongs to the cache kmalloc-64 of size 64 [ 36.616151] The buggy address is located 0 bytes to the right of [ 36.616151] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.617410] [ 36.617770] The buggy address belongs to the physical page: [ 36.618414] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.619309] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.620094] page_type: f5(slab) [ 36.620694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.621571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.622428] page dumped because: kasan: bad access detected [ 36.623078] [ 36.623461] Memory state around the buggy address: [ 36.624082] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.624856] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.625789] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.626700] ^ [ 36.627252] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.628152] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.628933] ================================================================== [ 35.459642] ================================================================== [ 35.460446] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.461096] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.462108] [ 35.462664] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.463709] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.464320] Hardware name: linux,dummy-virt (DT) [ 35.464904] Call trace: [ 35.465858] show_stack+0x20/0x38 (C) [ 35.466429] dump_stack_lvl+0x8c/0xd0 [ 35.467017] print_report+0x118/0x5e0 [ 35.467595] kasan_report+0xc8/0x118 [ 35.468096] kasan_check_range+0x100/0x1a8 [ 35.468643] __kasan_check_write+0x20/0x30 [ 35.469280] kasan_atomics_helper+0xa6c/0x4858 [ 35.469889] kasan_atomics+0x198/0x2e8 [ 35.470385] kunit_try_run_case+0x14c/0x3d0 [ 35.471031] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.471796] kthread+0x24c/0x2d0 [ 35.472380] ret_from_fork+0x10/0x20 [ 35.472924] [ 35.473285] Allocated by task 253: [ 35.473809] kasan_save_stack+0x3c/0x68 [ 35.474393] kasan_save_track+0x20/0x40 [ 35.474920] kasan_save_alloc_info+0x40/0x58 [ 35.475504] __kasan_kmalloc+0xd4/0xd8 [ 35.476013] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.476557] kasan_atomics+0xb8/0x2e8 [ 35.477147] kunit_try_run_case+0x14c/0x3d0 [ 35.477764] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.478367] kthread+0x24c/0x2d0 [ 35.478915] ret_from_fork+0x10/0x20 [ 35.479493] [ 35.479842] The buggy address belongs to the object at fff00000c63df000 [ 35.479842] which belongs to the cache kmalloc-64 of size 64 [ 35.480922] The buggy address is located 0 bytes to the right of [ 35.480922] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.482165] [ 35.482514] The buggy address belongs to the physical page: [ 35.483204] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.484131] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.484942] page_type: f5(slab) [ 35.485449] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.486228] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.486980] page dumped because: kasan: bad access detected [ 35.487695] [ 35.488009] Memory state around the buggy address: [ 35.488681] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.489487] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.490225] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.490959] ^ [ 35.491542] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.492287] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.493024] ================================================================== [ 35.742170] ================================================================== [ 35.742946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.743731] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.745554] [ 35.745989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.746986] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.747598] Hardware name: linux,dummy-virt (DT) [ 35.748128] Call trace: [ 35.748564] show_stack+0x20/0x38 (C) [ 35.749161] dump_stack_lvl+0x8c/0xd0 [ 35.749769] print_report+0x118/0x5e0 [ 35.750392] kasan_report+0xc8/0x118 [ 35.750899] __asan_report_load4_noabort+0x20/0x30 [ 35.751604] kasan_atomics_helper+0x3dd8/0x4858 [ 35.752288] kasan_atomics+0x198/0x2e8 [ 35.752822] kunit_try_run_case+0x14c/0x3d0 [ 35.753459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.754211] kthread+0x24c/0x2d0 [ 35.754776] ret_from_fork+0x10/0x20 [ 35.755341] [ 35.755694] Allocated by task 253: [ 35.756193] kasan_save_stack+0x3c/0x68 [ 35.756678] kasan_save_track+0x20/0x40 [ 35.757261] kasan_save_alloc_info+0x40/0x58 [ 35.757940] __kasan_kmalloc+0xd4/0xd8 [ 35.758532] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.759212] kasan_atomics+0xb8/0x2e8 [ 35.759739] kunit_try_run_case+0x14c/0x3d0 [ 35.760408] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.761162] kthread+0x24c/0x2d0 [ 35.761607] ret_from_fork+0x10/0x20 [ 35.762194] [ 35.762501] The buggy address belongs to the object at fff00000c63df000 [ 35.762501] which belongs to the cache kmalloc-64 of size 64 [ 35.763700] The buggy address is located 0 bytes to the right of [ 35.763700] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.764812] [ 35.765186] The buggy address belongs to the physical page: [ 35.765860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.766688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.767356] page_type: f5(slab) [ 35.767911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.768820] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.769618] page dumped because: kasan: bad access detected [ 35.770332] [ 35.770637] Memory state around the buggy address: [ 35.771156] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.771998] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.772777] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.773414] ^ [ 35.774057] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.774845] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.775649] ================================================================== [ 36.704511] ================================================================== [ 36.705300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.706316] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.706898] [ 36.708088] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.709293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.709743] Hardware name: linux,dummy-virt (DT) [ 36.710362] Call trace: [ 36.710733] show_stack+0x20/0x38 (C) [ 36.711304] dump_stack_lvl+0x8c/0xd0 [ 36.711846] print_report+0x118/0x5e0 [ 36.712426] kasan_report+0xc8/0x118 [ 36.712898] __asan_report_load8_noabort+0x20/0x30 [ 36.713722] kasan_atomics_helper+0x3df4/0x4858 [ 36.714377] kasan_atomics+0x198/0x2e8 [ 36.714968] kunit_try_run_case+0x14c/0x3d0 [ 36.715549] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.716250] kthread+0x24c/0x2d0 [ 36.716820] ret_from_fork+0x10/0x20 [ 36.717356] [ 36.717711] Allocated by task 253: [ 36.718237] kasan_save_stack+0x3c/0x68 [ 36.718820] kasan_save_track+0x20/0x40 [ 36.719330] kasan_save_alloc_info+0x40/0x58 [ 36.719974] __kasan_kmalloc+0xd4/0xd8 [ 36.720526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.721095] kasan_atomics+0xb8/0x2e8 [ 36.721625] kunit_try_run_case+0x14c/0x3d0 [ 36.722131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.722873] kthread+0x24c/0x2d0 [ 36.723384] ret_from_fork+0x10/0x20 [ 36.723861] [ 36.724216] The buggy address belongs to the object at fff00000c63df000 [ 36.724216] which belongs to the cache kmalloc-64 of size 64 [ 36.725272] The buggy address is located 0 bytes to the right of [ 36.725272] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.726627] [ 36.726978] The buggy address belongs to the physical page: [ 36.727588] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.728341] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.729171] page_type: f5(slab) [ 36.729706] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.730641] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.731423] page dumped because: kasan: bad access detected [ 36.732076] [ 36.732872] Memory state around the buggy address: [ 36.733506] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.734475] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.735415] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.736335] ^ [ 36.736913] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.737677] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.738410] ================================================================== [ 36.230826] ================================================================== [ 36.231693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.232535] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.233358] [ 36.233720] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.234624] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.235219] Hardware name: linux,dummy-virt (DT) [ 36.235831] Call trace: [ 36.236250] show_stack+0x20/0x38 (C) [ 36.236847] dump_stack_lvl+0x8c/0xd0 [ 36.237413] print_report+0x118/0x5e0 [ 36.238054] kasan_report+0xc8/0x118 [ 36.238649] kasan_check_range+0x100/0x1a8 [ 36.239323] __kasan_check_write+0x20/0x30 [ 36.239986] kasan_atomics_helper+0x1190/0x4858 [ 36.240621] kasan_atomics+0x198/0x2e8 [ 36.241238] kunit_try_run_case+0x14c/0x3d0 [ 36.241806] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.242463] kthread+0x24c/0x2d0 [ 36.243031] ret_from_fork+0x10/0x20 [ 36.243591] [ 36.243938] Allocated by task 253: [ 36.244462] kasan_save_stack+0x3c/0x68 [ 36.244997] kasan_save_track+0x20/0x40 [ 36.245539] kasan_save_alloc_info+0x40/0x58 [ 36.246088] __kasan_kmalloc+0xd4/0xd8 [ 36.246662] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.247228] kasan_atomics+0xb8/0x2e8 [ 36.247830] kunit_try_run_case+0x14c/0x3d0 [ 36.248464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.249223] kthread+0x24c/0x2d0 [ 36.249763] ret_from_fork+0x10/0x20 [ 36.250256] [ 36.250607] The buggy address belongs to the object at fff00000c63df000 [ 36.250607] which belongs to the cache kmalloc-64 of size 64 [ 36.251625] The buggy address is located 0 bytes to the right of [ 36.251625] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.252950] [ 36.253324] The buggy address belongs to the physical page: [ 36.253945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.254790] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.255621] page_type: f5(slab) [ 36.256040] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.256937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.257706] page dumped because: kasan: bad access detected [ 36.258427] [ 36.258745] Memory state around the buggy address: [ 36.259300] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.260088] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.260968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.261628] ^ [ 36.262297] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.263078] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.263891] ================================================================== [ 35.530817] ================================================================== [ 35.531551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.533645] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.534415] [ 35.534776] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.535837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.536440] Hardware name: linux,dummy-virt (DT) [ 35.536993] Call trace: [ 35.537217] show_stack+0x20/0x38 (C) [ 35.537493] dump_stack_lvl+0x8c/0xd0 [ 35.537761] print_report+0x118/0x5e0 [ 35.538013] kasan_report+0xc8/0x118 [ 35.538280] __asan_report_load4_noabort+0x20/0x30 [ 35.538577] kasan_atomics_helper+0x3dcc/0x4858 [ 35.538857] kasan_atomics+0x198/0x2e8 [ 35.539110] kunit_try_run_case+0x14c/0x3d0 [ 35.539402] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.539712] kthread+0x24c/0x2d0 [ 35.539952] ret_from_fork+0x10/0x20 [ 35.540326] [ 35.540628] Allocated by task 253: [ 35.541033] kasan_save_stack+0x3c/0x68 [ 35.541589] kasan_save_track+0x20/0x40 [ 35.542213] kasan_save_alloc_info+0x40/0x58 [ 35.542908] __kasan_kmalloc+0xd4/0xd8 [ 35.543547] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.544256] kasan_atomics+0xb8/0x2e8 [ 35.544854] kunit_try_run_case+0x14c/0x3d0 [ 35.545560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.546241] kthread+0x24c/0x2d0 [ 35.546691] ret_from_fork+0x10/0x20 [ 35.547156] [ 35.547504] The buggy address belongs to the object at fff00000c63df000 [ 35.547504] which belongs to the cache kmalloc-64 of size 64 [ 35.548917] The buggy address is located 0 bytes to the right of [ 35.548917] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.550355] [ 35.550719] The buggy address belongs to the physical page: [ 35.551750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.552806] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.553660] page_type: f5(slab) [ 35.554149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.555004] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.555866] page dumped because: kasan: bad access detected [ 35.556658] [ 35.556970] Memory state around the buggy address: [ 35.557578] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.558323] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.559134] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.560021] ^ [ 35.560690] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.561595] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.562332] ================================================================== [ 36.160875] ================================================================== [ 36.161619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.162513] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.163373] [ 36.163668] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.164600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.165256] Hardware name: linux,dummy-virt (DT) [ 36.165746] Call trace: [ 36.166226] show_stack+0x20/0x38 (C) [ 36.166840] dump_stack_lvl+0x8c/0xd0 [ 36.167380] print_report+0x118/0x5e0 [ 36.168021] kasan_report+0xc8/0x118 [ 36.168633] kasan_check_range+0x100/0x1a8 [ 36.169277] __kasan_check_write+0x20/0x30 [ 36.169914] kasan_atomics_helper+0x10c0/0x4858 [ 36.170676] kasan_atomics+0x198/0x2e8 [ 36.171193] kunit_try_run_case+0x14c/0x3d0 [ 36.171855] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.172647] kthread+0x24c/0x2d0 [ 36.173226] ret_from_fork+0x10/0x20 [ 36.173785] [ 36.174082] Allocated by task 253: [ 36.174662] kasan_save_stack+0x3c/0x68 [ 36.175261] kasan_save_track+0x20/0x40 [ 36.175858] kasan_save_alloc_info+0x40/0x58 [ 36.176496] __kasan_kmalloc+0xd4/0xd8 [ 36.177084] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.177640] kasan_atomics+0xb8/0x2e8 [ 36.178220] kunit_try_run_case+0x14c/0x3d0 [ 36.178834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.179568] kthread+0x24c/0x2d0 [ 36.180030] ret_from_fork+0x10/0x20 [ 36.180618] [ 36.180965] The buggy address belongs to the object at fff00000c63df000 [ 36.180965] which belongs to the cache kmalloc-64 of size 64 [ 36.181957] The buggy address is located 0 bytes to the right of [ 36.181957] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.183337] [ 36.183692] The buggy address belongs to the physical page: [ 36.184288] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.185205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.185892] page_type: f5(slab) [ 36.186441] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.187268] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.187963] page dumped because: kasan: bad access detected [ 36.188671] [ 36.189008] Memory state around the buggy address: [ 36.189648] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.190457] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.191168] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.192000] ^ [ 36.192671] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.193452] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.194141] ================================================================== [ 36.844717] ================================================================== [ 36.845502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 36.846522] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.847412] [ 36.847864] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.849095] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.849756] Hardware name: linux,dummy-virt (DT) [ 36.850432] Call trace: [ 36.850928] show_stack+0x20/0x38 (C) [ 36.851597] dump_stack_lvl+0x8c/0xd0 [ 36.852247] print_report+0x118/0x5e0 [ 36.852922] kasan_report+0xc8/0x118 [ 36.853569] __asan_report_load8_noabort+0x20/0x30 [ 36.854313] kasan_atomics_helper+0x3e20/0x4858 [ 36.855016] kasan_atomics+0x198/0x2e8 [ 36.855655] kunit_try_run_case+0x14c/0x3d0 [ 36.856363] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.857142] kthread+0x24c/0x2d0 [ 36.857784] ret_from_fork+0x10/0x20 [ 36.858432] [ 36.858792] Allocated by task 253: [ 36.859403] kasan_save_stack+0x3c/0x68 [ 36.860049] kasan_save_track+0x20/0x40 [ 36.860694] kasan_save_alloc_info+0x40/0x58 [ 36.861367] __kasan_kmalloc+0xd4/0xd8 [ 36.861974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.862653] kasan_atomics+0xb8/0x2e8 [ 36.863266] kunit_try_run_case+0x14c/0x3d0 [ 36.863978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.864735] kthread+0x24c/0x2d0 [ 36.865302] ret_from_fork+0x10/0x20 [ 36.865770] [ 36.866077] The buggy address belongs to the object at fff00000c63df000 [ 36.866077] which belongs to the cache kmalloc-64 of size 64 [ 36.867225] The buggy address is located 0 bytes to the right of [ 36.867225] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.868732] [ 36.869093] The buggy address belongs to the physical page: [ 36.869746] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.870759] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.871656] page_type: f5(slab) [ 36.872293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.873239] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.874164] page dumped because: kasan: bad access detected [ 36.874866] [ 36.875272] Memory state around the buggy address: [ 36.875916] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.876822] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.877672] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.878564] ^ [ 36.879218] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.880171] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.881006] ================================================================== [ 34.808196] ================================================================== [ 34.808893] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.809646] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.810538] [ 34.810927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.813366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.813851] Hardware name: linux,dummy-virt (DT) [ 34.814478] Call trace: [ 34.814915] show_stack+0x20/0x38 (C) [ 34.815445] dump_stack_lvl+0x8c/0xd0 [ 34.816040] print_report+0x118/0x5e0 [ 34.816663] kasan_report+0xc8/0x118 [ 34.817523] __asan_report_store4_noabort+0x20/0x30 [ 34.818147] kasan_atomics_helper+0x3f94/0x4858 [ 34.818716] kasan_atomics+0x198/0x2e8 [ 34.819775] kunit_try_run_case+0x14c/0x3d0 [ 34.820140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.820603] kthread+0x24c/0x2d0 [ 34.821197] ret_from_fork+0x10/0x20 [ 34.822224] [ 34.822619] Allocated by task 253: [ 34.823129] kasan_save_stack+0x3c/0x68 [ 34.823798] kasan_save_track+0x20/0x40 [ 34.824419] kasan_save_alloc_info+0x40/0x58 [ 34.825348] __kasan_kmalloc+0xd4/0xd8 [ 34.826263] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.826842] kasan_atomics+0xb8/0x2e8 [ 34.827356] kunit_try_run_case+0x14c/0x3d0 [ 34.827980] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.828831] kthread+0x24c/0x2d0 [ 34.829610] ret_from_fork+0x10/0x20 [ 34.830193] [ 34.830535] The buggy address belongs to the object at fff00000c63df000 [ 34.830535] which belongs to the cache kmalloc-64 of size 64 [ 34.831669] The buggy address is located 0 bytes to the right of [ 34.831669] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.832846] [ 34.833983] The buggy address belongs to the physical page: [ 34.834758] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.835579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.836299] page_type: f5(slab) [ 34.836827] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.838144] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.839076] page dumped because: kasan: bad access detected [ 34.839766] [ 34.840087] Memory state around the buggy address: [ 34.840742] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.842631] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.843434] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.844199] ^ [ 34.844735] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.845939] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.846639] ================================================================== [ 35.811652] ================================================================== [ 35.812454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.813249] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.814012] [ 35.814409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.815367] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.815930] Hardware name: linux,dummy-virt (DT) [ 35.816531] Call trace: [ 35.816895] show_stack+0x20/0x38 (C) [ 35.817524] dump_stack_lvl+0x8c/0xd0 [ 35.818158] print_report+0x118/0x5e0 [ 35.818691] kasan_report+0xc8/0x118 [ 35.819431] __asan_report_load4_noabort+0x20/0x30 [ 35.820070] kasan_atomics_helper+0x3e04/0x4858 [ 35.820846] kasan_atomics+0x198/0x2e8 [ 35.821542] kunit_try_run_case+0x14c/0x3d0 [ 35.822270] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.823077] kthread+0x24c/0x2d0 [ 35.823629] ret_from_fork+0x10/0x20 [ 35.824201] [ 35.824568] Allocated by task 253: [ 35.825147] kasan_save_stack+0x3c/0x68 [ 35.825703] kasan_save_track+0x20/0x40 [ 35.826368] kasan_save_alloc_info+0x40/0x58 [ 35.826948] __kasan_kmalloc+0xd4/0xd8 [ 35.827618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.828262] kasan_atomics+0xb8/0x2e8 [ 35.828813] kunit_try_run_case+0x14c/0x3d0 [ 35.829492] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.830243] kthread+0x24c/0x2d0 [ 35.830775] ret_from_fork+0x10/0x20 [ 35.831295] [ 35.831678] The buggy address belongs to the object at fff00000c63df000 [ 35.831678] which belongs to the cache kmalloc-64 of size 64 [ 35.832897] The buggy address is located 0 bytes to the right of [ 35.832897] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.834179] [ 35.834561] The buggy address belongs to the physical page: [ 35.835149] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.836107] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.836901] page_type: f5(slab) [ 35.837511] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.838407] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.839095] page dumped because: kasan: bad access detected [ 35.839720] [ 35.840079] Memory state around the buggy address: [ 35.840615] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.841404] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.842167] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.842859] ^ [ 35.843519] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.844257] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.844950] ================================================================== [ 34.648131] ================================================================== [ 34.649240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 34.650003] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.650690] [ 34.651077] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.652366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.652874] Hardware name: linux,dummy-virt (DT) [ 34.654338] Call trace: [ 34.654805] show_stack+0x20/0x38 (C) [ 34.655449] dump_stack_lvl+0x8c/0xd0 [ 34.656095] print_report+0x118/0x5e0 [ 34.656730] kasan_report+0xc8/0x118 [ 34.657659] kasan_check_range+0x100/0x1a8 [ 34.658278] __kasan_check_write+0x20/0x30 [ 34.658829] kasan_atomics_helper+0x24c/0x4858 [ 34.659391] kasan_atomics+0x198/0x2e8 [ 34.660032] kunit_try_run_case+0x14c/0x3d0 [ 34.660618] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.661466] kthread+0x24c/0x2d0 [ 34.661955] ret_from_fork+0x10/0x20 [ 34.662721] [ 34.663058] Allocated by task 253: [ 34.664263] kasan_save_stack+0x3c/0x68 [ 34.664762] kasan_save_track+0x20/0x40 [ 34.665694] kasan_save_alloc_info+0x40/0x58 [ 34.666278] __kasan_kmalloc+0xd4/0xd8 [ 34.666897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.667535] kasan_atomics+0xb8/0x2e8 [ 34.668152] kunit_try_run_case+0x14c/0x3d0 [ 34.668774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.670242] kthread+0x24c/0x2d0 [ 34.670798] ret_from_fork+0x10/0x20 [ 34.671410] [ 34.671786] The buggy address belongs to the object at fff00000c63df000 [ 34.671786] which belongs to the cache kmalloc-64 of size 64 [ 34.673076] The buggy address is located 0 bytes to the right of [ 34.673076] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.674672] [ 34.675052] The buggy address belongs to the physical page: [ 34.675747] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.676638] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.678366] page_type: f5(slab) [ 34.678874] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.679741] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.680630] page dumped because: kasan: bad access detected [ 34.681644] [ 34.681992] Memory state around the buggy address: [ 34.682791] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.683549] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.684367] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.685162] ^ [ 34.686393] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.687182] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.688294] ================================================================== [ 34.972140] ================================================================== [ 34.973018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 34.973892] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.975039] [ 34.975438] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.976720] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.977552] Hardware name: linux,dummy-virt (DT) [ 34.978106] Call trace: [ 34.978481] show_stack+0x20/0x38 (C) [ 34.978988] dump_stack_lvl+0x8c/0xd0 [ 34.979607] print_report+0x118/0x5e0 [ 34.980203] kasan_report+0xc8/0x118 [ 34.980747] kasan_check_range+0x100/0x1a8 [ 34.982271] __kasan_check_write+0x20/0x30 [ 34.982923] kasan_atomics_helper+0x4e4/0x4858 [ 34.983633] kasan_atomics+0x198/0x2e8 [ 34.984231] kunit_try_run_case+0x14c/0x3d0 [ 34.984870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.985645] kthread+0x24c/0x2d0 [ 34.986554] ret_from_fork+0x10/0x20 [ 34.987167] [ 34.987535] Allocated by task 253: [ 34.987982] kasan_save_stack+0x3c/0x68 [ 34.988640] kasan_save_track+0x20/0x40 [ 34.989405] kasan_save_alloc_info+0x40/0x58 [ 34.990622] __kasan_kmalloc+0xd4/0xd8 [ 34.991181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.991854] kasan_atomics+0xb8/0x2e8 [ 34.992461] kunit_try_run_case+0x14c/0x3d0 [ 34.992991] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.993967] kthread+0x24c/0x2d0 [ 34.994537] ret_from_fork+0x10/0x20 [ 34.995132] [ 34.995536] The buggy address belongs to the object at fff00000c63df000 [ 34.995536] which belongs to the cache kmalloc-64 of size 64 [ 34.996850] The buggy address is located 0 bytes to the right of [ 34.996850] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.998998] [ 34.999366] The buggy address belongs to the physical page: [ 35.000014] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.000852] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.002077] page_type: f5(slab) [ 35.002701] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.003651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.004479] page dumped because: kasan: bad access detected [ 35.005286] [ 35.005670] Memory state around the buggy address: [ 35.006580] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.007407] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.008488] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.009685] ^ [ 35.010280] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.011004] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.011931] ================================================================== [ 36.630357] ================================================================== [ 36.631238] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.632180] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.632828] [ 36.633216] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.634307] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.634825] Hardware name: linux,dummy-virt (DT) [ 36.635334] Call trace: [ 36.635685] show_stack+0x20/0x38 (C) [ 36.636345] dump_stack_lvl+0x8c/0xd0 [ 36.637002] print_report+0x118/0x5e0 [ 36.637600] kasan_report+0xc8/0x118 [ 36.638264] __asan_report_load8_noabort+0x20/0x30 [ 36.638990] kasan_atomics_helper+0x3db0/0x4858 [ 36.639707] kasan_atomics+0x198/0x2e8 [ 36.640367] kunit_try_run_case+0x14c/0x3d0 [ 36.640955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.641690] kthread+0x24c/0x2d0 [ 36.642307] ret_from_fork+0x10/0x20 [ 36.642845] [ 36.643237] Allocated by task 253: [ 36.643717] kasan_save_stack+0x3c/0x68 [ 36.644334] kasan_save_track+0x20/0x40 [ 36.644932] kasan_save_alloc_info+0x40/0x58 [ 36.645614] __kasan_kmalloc+0xd4/0xd8 [ 36.646206] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.646889] kasan_atomics+0xb8/0x2e8 [ 36.647464] kunit_try_run_case+0x14c/0x3d0 [ 36.648131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.648804] kthread+0x24c/0x2d0 [ 36.649398] ret_from_fork+0x10/0x20 [ 36.649915] [ 36.650314] The buggy address belongs to the object at fff00000c63df000 [ 36.650314] which belongs to the cache kmalloc-64 of size 64 [ 36.651631] The buggy address is located 0 bytes to the right of [ 36.651631] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.652938] [ 36.653312] The buggy address belongs to the physical page: [ 36.653937] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.654766] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.655567] page_type: f5(slab) [ 36.655990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.657032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.657972] page dumped because: kasan: bad access detected [ 36.658702] [ 36.659128] Memory state around the buggy address: [ 36.659683] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.660611] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.661470] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.662267] ^ [ 36.662870] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.663624] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.664541] ================================================================== [ 36.334827] ================================================================== [ 36.335547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.336201] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.337130] [ 36.337550] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.338605] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.339185] Hardware name: linux,dummy-virt (DT) [ 36.339748] Call trace: [ 36.340184] show_stack+0x20/0x38 (C) [ 36.340803] dump_stack_lvl+0x8c/0xd0 [ 36.341337] print_report+0x118/0x5e0 [ 36.341937] kasan_report+0xc8/0x118 [ 36.342508] kasan_check_range+0x100/0x1a8 [ 36.343027] __kasan_check_write+0x20/0x30 [ 36.343684] kasan_atomics_helper+0x12d8/0x4858 [ 36.344373] kasan_atomics+0x198/0x2e8 [ 36.345025] kunit_try_run_case+0x14c/0x3d0 [ 36.345653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.346401] kthread+0x24c/0x2d0 [ 36.346996] ret_from_fork+0x10/0x20 [ 36.347561] [ 36.347914] Allocated by task 253: [ 36.348460] kasan_save_stack+0x3c/0x68 [ 36.349039] kasan_save_track+0x20/0x40 [ 36.349842] kasan_save_alloc_info+0x40/0x58 [ 36.350354] __kasan_kmalloc+0xd4/0xd8 [ 36.350929] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.351562] kasan_atomics+0xb8/0x2e8 [ 36.352084] kunit_try_run_case+0x14c/0x3d0 [ 36.352656] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.353277] kthread+0x24c/0x2d0 [ 36.353816] ret_from_fork+0x10/0x20 [ 36.354391] [ 36.354721] The buggy address belongs to the object at fff00000c63df000 [ 36.354721] which belongs to the cache kmalloc-64 of size 64 [ 36.355854] The buggy address is located 0 bytes to the right of [ 36.355854] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.357043] [ 36.357401] The buggy address belongs to the physical page: [ 36.358131] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.358910] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.359730] page_type: f5(slab) [ 36.360293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.361045] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.361929] page dumped because: kasan: bad access detected [ 36.362539] [ 36.362879] Memory state around the buggy address: [ 36.363475] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.364300] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.364968] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.365815] ^ [ 36.366345] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.367142] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.367972] ================================================================== [ 34.889715] ================================================================== [ 34.890361] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.891059] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.892698] [ 34.893159] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.894684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.895074] Hardware name: linux,dummy-virt (DT) [ 34.895708] Call trace: [ 34.896194] show_stack+0x20/0x38 (C) [ 34.896791] dump_stack_lvl+0x8c/0xd0 [ 34.897841] print_report+0x118/0x5e0 [ 34.898853] kasan_report+0xc8/0x118 [ 34.899176] kasan_check_range+0x100/0x1a8 [ 34.899785] __kasan_check_write+0x20/0x30 [ 34.900392] kasan_atomics_helper+0x414/0x4858 [ 34.901015] kasan_atomics+0x198/0x2e8 [ 34.901580] kunit_try_run_case+0x14c/0x3d0 [ 34.902156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.902846] kthread+0x24c/0x2d0 [ 34.903463] ret_from_fork+0x10/0x20 [ 34.904350] [ 34.904699] Allocated by task 253: [ 34.905279] kasan_save_stack+0x3c/0x68 [ 34.905779] kasan_save_track+0x20/0x40 [ 34.906775] kasan_save_alloc_info+0x40/0x58 [ 34.907792] __kasan_kmalloc+0xd4/0xd8 [ 34.908520] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.909595] kasan_atomics+0xb8/0x2e8 [ 34.910309] kunit_try_run_case+0x14c/0x3d0 [ 34.910922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.911816] kthread+0x24c/0x2d0 [ 34.912510] ret_from_fork+0x10/0x20 [ 34.913422] [ 34.914197] The buggy address belongs to the object at fff00000c63df000 [ 34.914197] which belongs to the cache kmalloc-64 of size 64 [ 34.915358] The buggy address is located 0 bytes to the right of [ 34.915358] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.917554] [ 34.917964] The buggy address belongs to the physical page: [ 34.918636] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.919497] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.920177] page_type: f5(slab) [ 34.920686] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.921620] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.923323] page dumped because: kasan: bad access detected [ 34.923922] [ 34.924287] Memory state around the buggy address: [ 34.924864] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.926149] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.926881] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.927639] ^ [ 34.928227] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.929436] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.930103] ================================================================== [ 35.388679] ================================================================== [ 35.389928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.390722] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.391521] [ 35.391860] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.392941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.393526] Hardware name: linux,dummy-virt (DT) [ 35.394045] Call trace: [ 35.394504] show_stack+0x20/0x38 (C) [ 35.395140] dump_stack_lvl+0x8c/0xd0 [ 35.395755] print_report+0x118/0x5e0 [ 35.396273] kasan_report+0xc8/0x118 [ 35.396885] kasan_check_range+0x100/0x1a8 [ 35.397568] __kasan_check_write+0x20/0x30 [ 35.398172] kasan_atomics_helper+0x99c/0x4858 [ 35.398755] kasan_atomics+0x198/0x2e8 [ 35.399384] kunit_try_run_case+0x14c/0x3d0 [ 35.399958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.400729] kthread+0x24c/0x2d0 [ 35.401238] ret_from_fork+0x10/0x20 [ 35.401801] [ 35.402097] Allocated by task 253: [ 35.402633] kasan_save_stack+0x3c/0x68 [ 35.403229] kasan_save_track+0x20/0x40 [ 35.403797] kasan_save_alloc_info+0x40/0x58 [ 35.404456] __kasan_kmalloc+0xd4/0xd8 [ 35.404980] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.405585] kasan_atomics+0xb8/0x2e8 [ 35.406181] kunit_try_run_case+0x14c/0x3d0 [ 35.406798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.407414] kthread+0x24c/0x2d0 [ 35.407985] ret_from_fork+0x10/0x20 [ 35.408565] [ 35.408909] The buggy address belongs to the object at fff00000c63df000 [ 35.408909] which belongs to the cache kmalloc-64 of size 64 [ 35.410097] The buggy address is located 0 bytes to the right of [ 35.410097] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.411188] [ 35.411538] The buggy address belongs to the physical page: [ 35.412233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.413156] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.413798] page_type: f5(slab) [ 35.414348] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.415165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.416054] page dumped because: kasan: bad access detected [ 35.416584] [ 35.416929] Memory state around the buggy address: [ 35.417610] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.418387] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.419160] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.419988] ^ [ 35.420549] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.421407] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.422150] ================================================================== [ 36.369566] ================================================================== [ 36.370381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.371317] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.372070] [ 36.372470] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.373600] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.374063] Hardware name: linux,dummy-virt (DT) [ 36.374681] Call trace: [ 36.375013] show_stack+0x20/0x38 (C) [ 36.375612] dump_stack_lvl+0x8c/0xd0 [ 36.376254] print_report+0x118/0x5e0 [ 36.376875] kasan_report+0xc8/0x118 [ 36.377519] kasan_check_range+0x100/0x1a8 [ 36.378094] __kasan_check_write+0x20/0x30 [ 36.378734] kasan_atomics_helper+0x1384/0x4858 [ 36.379381] kasan_atomics+0x198/0x2e8 [ 36.379985] kunit_try_run_case+0x14c/0x3d0 [ 36.380741] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.381795] kthread+0x24c/0x2d0 [ 36.382971] ret_from_fork+0x10/0x20 [ 36.383753] [ 36.384189] Allocated by task 253: [ 36.384651] kasan_save_stack+0x3c/0x68 [ 36.384922] kasan_save_track+0x20/0x40 [ 36.385252] kasan_save_alloc_info+0x40/0x58 [ 36.386093] __kasan_kmalloc+0xd4/0xd8 [ 36.386786] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.387550] kasan_atomics+0xb8/0x2e8 [ 36.388102] kunit_try_run_case+0x14c/0x3d0 [ 36.388734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.389469] kthread+0x24c/0x2d0 [ 36.390031] ret_from_fork+0x10/0x20 [ 36.390522] [ 36.390872] The buggy address belongs to the object at fff00000c63df000 [ 36.390872] which belongs to the cache kmalloc-64 of size 64 [ 36.392096] The buggy address is located 0 bytes to the right of [ 36.392096] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.393390] [ 36.393743] The buggy address belongs to the physical page: [ 36.394466] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.395428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.396213] page_type: f5(slab) [ 36.396757] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.397614] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.398359] page dumped because: kasan: bad access detected [ 36.399081] [ 36.399434] Memory state around the buggy address: [ 36.400043] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.400897] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.401758] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.402591] ^ [ 36.403211] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.404044] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.404844] ================================================================== [ 35.777546] ================================================================== [ 35.778155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.779008] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.779860] [ 35.780239] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.781161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.781746] Hardware name: linux,dummy-virt (DT) [ 35.782394] Call trace: [ 35.782823] show_stack+0x20/0x38 (C) [ 35.783361] dump_stack_lvl+0x8c/0xd0 [ 35.783969] print_report+0x118/0x5e0 [ 35.784570] kasan_report+0xc8/0x118 [ 35.785076] kasan_check_range+0x100/0x1a8 [ 35.785738] __kasan_check_write+0x20/0x30 [ 35.786335] kasan_atomics_helper+0xd3c/0x4858 [ 35.786920] kasan_atomics+0x198/0x2e8 [ 35.787515] kunit_try_run_case+0x14c/0x3d0 [ 35.788417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.789126] kthread+0x24c/0x2d0 [ 35.789642] ret_from_fork+0x10/0x20 [ 35.790249] [ 35.790568] Allocated by task 253: [ 35.790972] kasan_save_stack+0x3c/0x68 [ 35.791572] kasan_save_track+0x20/0x40 [ 35.792098] kasan_save_alloc_info+0x40/0x58 [ 35.792732] __kasan_kmalloc+0xd4/0xd8 [ 35.793335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.793980] kasan_atomics+0xb8/0x2e8 [ 35.794506] kunit_try_run_case+0x14c/0x3d0 [ 35.795060] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.795808] kthread+0x24c/0x2d0 [ 35.796336] ret_from_fork+0x10/0x20 [ 35.796777] [ 35.797145] The buggy address belongs to the object at fff00000c63df000 [ 35.797145] which belongs to the cache kmalloc-64 of size 64 [ 35.798261] The buggy address is located 0 bytes to the right of [ 35.798261] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.799480] [ 35.799828] The buggy address belongs to the physical page: [ 35.800542] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.801332] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.802068] page_type: f5(slab) [ 35.802609] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.803402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.804230] page dumped because: kasan: bad access detected [ 35.804870] [ 35.805224] Memory state around the buggy address: [ 35.805795] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.806572] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.807325] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.808155] ^ [ 35.808799] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.809520] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.810316] ================================================================== [ 35.423778] ================================================================== [ 35.424586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.426596] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.427403] [ 35.427929] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.428972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.429497] Hardware name: linux,dummy-virt (DT) [ 35.430003] Call trace: [ 35.430451] show_stack+0x20/0x38 (C) [ 35.430962] dump_stack_lvl+0x8c/0xd0 [ 35.431588] print_report+0x118/0x5e0 [ 35.432127] kasan_report+0xc8/0x118 [ 35.432729] kasan_check_range+0x100/0x1a8 [ 35.433264] __kasan_check_write+0x20/0x30 [ 35.433871] kasan_atomics_helper+0xa04/0x4858 [ 35.434553] kasan_atomics+0x198/0x2e8 [ 35.435182] kunit_try_run_case+0x14c/0x3d0 [ 35.435789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.436410] kthread+0x24c/0x2d0 [ 35.436980] ret_from_fork+0x10/0x20 [ 35.437623] [ 35.437953] Allocated by task 253: [ 35.438396] kasan_save_stack+0x3c/0x68 [ 35.438983] kasan_save_track+0x20/0x40 [ 35.439567] kasan_save_alloc_info+0x40/0x58 [ 35.440215] __kasan_kmalloc+0xd4/0xd8 [ 35.440724] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.441357] kasan_atomics+0xb8/0x2e8 [ 35.441927] kunit_try_run_case+0x14c/0x3d0 [ 35.442470] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.443166] kthread+0x24c/0x2d0 [ 35.443709] ret_from_fork+0x10/0x20 [ 35.444190] [ 35.444549] The buggy address belongs to the object at fff00000c63df000 [ 35.444549] which belongs to the cache kmalloc-64 of size 64 [ 35.445656] The buggy address is located 0 bytes to the right of [ 35.445656] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.446811] [ 35.447175] The buggy address belongs to the physical page: [ 35.447877] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.448724] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.449550] page_type: f5(slab) [ 35.450076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.450920] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.451653] page dumped because: kasan: bad access detected [ 35.452334] [ 35.452681] Memory state around the buggy address: [ 35.453277] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.454053] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.454820] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.455470] ^ [ 35.456135] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.456884] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.457655] ================================================================== [ 36.808021] ================================================================== [ 36.808879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 36.809804] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.810710] [ 36.811110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.812107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.812590] Hardware name: linux,dummy-virt (DT) [ 36.813219] Call trace: [ 36.813564] show_stack+0x20/0x38 (C) [ 36.814251] dump_stack_lvl+0x8c/0xd0 [ 36.814901] print_report+0x118/0x5e0 [ 36.815515] kasan_report+0xc8/0x118 [ 36.816132] kasan_check_range+0x100/0x1a8 [ 36.816743] __kasan_check_write+0x20/0x30 [ 36.817448] kasan_atomics_helper+0x175c/0x4858 [ 36.818097] kasan_atomics+0x198/0x2e8 [ 36.818625] kunit_try_run_case+0x14c/0x3d0 [ 36.819276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.820038] kthread+0x24c/0x2d0 [ 36.820584] ret_from_fork+0x10/0x20 [ 36.821098] [ 36.821466] Allocated by task 253: [ 36.821997] kasan_save_stack+0x3c/0x68 [ 36.822525] kasan_save_track+0x20/0x40 [ 36.823051] kasan_save_alloc_info+0x40/0x58 [ 36.823681] __kasan_kmalloc+0xd4/0xd8 [ 36.824289] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.824934] kasan_atomics+0xb8/0x2e8 [ 36.825342] kunit_try_run_case+0x14c/0x3d0 [ 36.826316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.826896] kthread+0x24c/0x2d0 [ 36.827306] ret_from_fork+0x10/0x20 [ 36.827700] [ 36.827938] The buggy address belongs to the object at fff00000c63df000 [ 36.827938] which belongs to the cache kmalloc-64 of size 64 [ 36.829702] The buggy address is located 0 bytes to the right of [ 36.829702] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.831065] [ 36.831486] The buggy address belongs to the physical page: [ 36.832324] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.833349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.834026] page_type: f5(slab) [ 36.834472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.835307] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.836090] page dumped because: kasan: bad access detected [ 36.836879] [ 36.837241] Memory state around the buggy address: [ 36.837993] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.838811] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.839735] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.840609] ^ [ 36.841311] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.842237] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.843056] ================================================================== [ 35.052137] ================================================================== [ 35.053429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.054226] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.055126] [ 35.055581] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.056760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.057419] Hardware name: linux,dummy-virt (DT) [ 35.058174] Call trace: [ 35.058636] show_stack+0x20/0x38 (C) [ 35.059319] dump_stack_lvl+0x8c/0xd0 [ 35.060007] print_report+0x118/0x5e0 [ 35.060688] kasan_report+0xc8/0x118 [ 35.061334] kasan_check_range+0x100/0x1a8 [ 35.062064] __kasan_check_write+0x20/0x30 [ 35.062765] kasan_atomics_helper+0x5b4/0x4858 [ 35.063526] kasan_atomics+0x198/0x2e8 [ 35.064188] kunit_try_run_case+0x14c/0x3d0 [ 35.064925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.065732] kthread+0x24c/0x2d0 [ 35.066377] ret_from_fork+0x10/0x20 [ 35.067029] [ 35.067440] Allocated by task 253: [ 35.067965] kasan_save_stack+0x3c/0x68 [ 35.068642] kasan_save_track+0x20/0x40 [ 35.069275] kasan_save_alloc_info+0x40/0x58 [ 35.069925] __kasan_kmalloc+0xd4/0xd8 [ 35.070614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.071298] kasan_atomics+0xb8/0x2e8 [ 35.071889] kunit_try_run_case+0x14c/0x3d0 [ 35.072652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.073344] kthread+0x24c/0x2d0 [ 35.073919] ret_from_fork+0x10/0x20 [ 35.074481] [ 35.074877] The buggy address belongs to the object at fff00000c63df000 [ 35.074877] which belongs to the cache kmalloc-64 of size 64 [ 35.076214] The buggy address is located 0 bytes to the right of [ 35.076214] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.077579] [ 35.077962] The buggy address belongs to the physical page: [ 35.078711] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.079663] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.080501] page_type: f5(slab) [ 35.081060] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.082010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.082886] page dumped because: kasan: bad access detected [ 35.083495] [ 35.083804] Memory state around the buggy address: [ 35.084387] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.085102] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.085992] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.086902] ^ [ 35.087602] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.088547] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.089381] ================================================================== [ 35.202211] ================================================================== [ 35.203275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 35.203637] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.203983] [ 35.204187] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.206096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.206548] Hardware name: linux,dummy-virt (DT) [ 35.207181] Call trace: [ 35.207642] show_stack+0x20/0x38 (C) [ 35.208217] dump_stack_lvl+0x8c/0xd0 [ 35.208785] print_report+0x118/0x5e0 [ 35.209373] kasan_report+0xc8/0x118 [ 35.209960] kasan_check_range+0x100/0x1a8 [ 35.210547] __kasan_check_write+0x20/0x30 [ 35.211202] kasan_atomics_helper+0x760/0x4858 [ 35.211826] kasan_atomics+0x198/0x2e8 [ 35.212414] kunit_try_run_case+0x14c/0x3d0 [ 35.212995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.213748] kthread+0x24c/0x2d0 [ 35.214334] ret_from_fork+0x10/0x20 [ 35.214897] [ 35.215221] Allocated by task 253: [ 35.215750] kasan_save_stack+0x3c/0x68 [ 35.216305] kasan_save_track+0x20/0x40 [ 35.216902] kasan_save_alloc_info+0x40/0x58 [ 35.217575] __kasan_kmalloc+0xd4/0xd8 [ 35.218159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.218725] kasan_atomics+0xb8/0x2e8 [ 35.219284] kunit_try_run_case+0x14c/0x3d0 [ 35.219797] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.220499] kthread+0x24c/0x2d0 [ 35.221023] ret_from_fork+0x10/0x20 [ 35.221552] [ 35.221848] The buggy address belongs to the object at fff00000c63df000 [ 35.221848] which belongs to the cache kmalloc-64 of size 64 [ 35.223059] The buggy address is located 0 bytes to the right of [ 35.223059] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.224263] [ 35.224576] The buggy address belongs to the physical page: [ 35.225246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.226072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226802] page_type: f5(slab) [ 35.227360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.228076] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.228976] page dumped because: kasan: bad access detected [ 35.229637] [ 35.229953] Memory state around the buggy address: [ 35.230571] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.231374] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.232154] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.232911] ^ [ 35.233495] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234267] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234957] ================================================================== [ 36.091335] ================================================================== [ 36.092145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.093019] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.093765] [ 36.094165] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.095163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.095659] Hardware name: linux,dummy-virt (DT) [ 36.096222] Call trace: [ 36.096653] show_stack+0x20/0x38 (C) [ 36.097257] dump_stack_lvl+0x8c/0xd0 [ 36.097894] print_report+0x118/0x5e0 [ 36.098462] kasan_report+0xc8/0x118 [ 36.098969] kasan_check_range+0x100/0x1a8 [ 36.099634] __kasan_check_write+0x20/0x30 [ 36.100352] kasan_atomics_helper+0xff0/0x4858 [ 36.100960] kasan_atomics+0x198/0x2e8 [ 36.101573] kunit_try_run_case+0x14c/0x3d0 [ 36.102231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.102912] kthread+0x24c/0x2d0 [ 36.103401] ret_from_fork+0x10/0x20 [ 36.104004] [ 36.104366] Allocated by task 253: [ 36.104827] kasan_save_stack+0x3c/0x68 [ 36.105431] kasan_save_track+0x20/0x40 [ 36.105923] kasan_save_alloc_info+0x40/0x58 [ 36.106575] __kasan_kmalloc+0xd4/0xd8 [ 36.107162] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.107798] kasan_atomics+0xb8/0x2e8 [ 36.108396] kunit_try_run_case+0x14c/0x3d0 [ 36.109000] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.109710] kthread+0x24c/0x2d0 [ 36.110276] ret_from_fork+0x10/0x20 [ 36.110825] [ 36.111183] The buggy address belongs to the object at fff00000c63df000 [ 36.111183] which belongs to the cache kmalloc-64 of size 64 [ 36.112252] The buggy address is located 0 bytes to the right of [ 36.112252] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.113506] [ 36.113814] The buggy address belongs to the physical page: [ 36.114511] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.115294] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.116083] page_type: f5(slab) [ 36.116571] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.117527] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.118301] page dumped because: kasan: bad access detected [ 36.118927] [ 36.119297] Memory state around the buggy address: [ 36.119795] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.120625] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.121497] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.122214] ^ [ 36.122847] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.123578] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.124364] ================================================================== [ 34.604891] ================================================================== [ 34.605628] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 34.607129] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.608736] [ 34.609199] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.610614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.611169] Hardware name: linux,dummy-virt (DT) [ 34.611780] Call trace: [ 34.612222] show_stack+0x20/0x38 (C) [ 34.612864] dump_stack_lvl+0x8c/0xd0 [ 34.614193] print_report+0x118/0x5e0 [ 34.614789] kasan_report+0xc8/0x118 [ 34.615448] kasan_check_range+0x100/0x1a8 [ 34.616094] __kasan_check_read+0x20/0x30 [ 34.616745] kasan_atomics_helper+0x1ec/0x4858 [ 34.617746] kasan_atomics+0x198/0x2e8 [ 34.618369] kunit_try_run_case+0x14c/0x3d0 [ 34.619003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.619807] kthread+0x24c/0x2d0 [ 34.620298] ret_from_fork+0x10/0x20 [ 34.620893] [ 34.621256] Allocated by task 253: [ 34.622647] kasan_save_stack+0x3c/0x68 [ 34.623374] kasan_save_track+0x20/0x40 [ 34.623929] kasan_save_alloc_info+0x40/0x58 [ 34.624487] __kasan_kmalloc+0xd4/0xd8 [ 34.625635] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.626180] kasan_atomics+0xb8/0x2e8 [ 34.626902] kunit_try_run_case+0x14c/0x3d0 [ 34.627652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.628517] kthread+0x24c/0x2d0 [ 34.629280] ret_from_fork+0x10/0x20 [ 34.630069] [ 34.630406] The buggy address belongs to the object at fff00000c63df000 [ 34.630406] which belongs to the cache kmalloc-64 of size 64 [ 34.632108] The buggy address is located 0 bytes to the right of [ 34.632108] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.633940] [ 34.634306] The buggy address belongs to the physical page: [ 34.634845] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.635725] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.636557] page_type: f5(slab) [ 34.637303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.638311] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.639139] page dumped because: kasan: bad access detected [ 34.639766] [ 34.640162] Memory state around the buggy address: [ 34.640814] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.641496] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.642256] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.642937] ^ [ 34.643871] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.644659] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.645602] ================================================================== [ 35.601368] ================================================================== [ 35.602039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 35.602802] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.603648] [ 35.604056] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.605062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.605710] Hardware name: linux,dummy-virt (DT) [ 35.606246] Call trace: [ 35.606749] show_stack+0x20/0x38 (C) [ 35.607375] dump_stack_lvl+0x8c/0xd0 [ 35.608047] print_report+0x118/0x5e0 [ 35.608659] kasan_report+0xc8/0x118 [ 35.609303] __asan_report_load4_noabort+0x20/0x30 [ 35.609945] kasan_atomics_helper+0x3dbc/0x4858 [ 35.610638] kasan_atomics+0x198/0x2e8 [ 35.611261] kunit_try_run_case+0x14c/0x3d0 [ 35.611937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.612680] kthread+0x24c/0x2d0 [ 35.613257] ret_from_fork+0x10/0x20 [ 35.613845] [ 35.614198] Allocated by task 253: [ 35.614762] kasan_save_stack+0x3c/0x68 [ 35.615349] kasan_save_track+0x20/0x40 [ 35.615973] kasan_save_alloc_info+0x40/0x58 [ 35.616580] __kasan_kmalloc+0xd4/0xd8 [ 35.617214] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.617841] kasan_atomics+0xb8/0x2e8 [ 35.618444] kunit_try_run_case+0x14c/0x3d0 [ 35.619049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.619792] kthread+0x24c/0x2d0 [ 35.620353] ret_from_fork+0x10/0x20 [ 35.620922] [ 35.621308] The buggy address belongs to the object at fff00000c63df000 [ 35.621308] which belongs to the cache kmalloc-64 of size 64 [ 35.622506] The buggy address is located 0 bytes to the right of [ 35.622506] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.623819] [ 35.624237] The buggy address belongs to the physical page: [ 35.625059] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.625988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.626780] page_type: f5(slab) [ 35.627276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.628222] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.629067] page dumped because: kasan: bad access detected [ 35.629735] [ 35.630096] Memory state around the buggy address: [ 35.630795] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.631557] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.632423] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.633230] ^ [ 35.633834] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.634661] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.635433] ================================================================== [ 36.300339] ================================================================== [ 36.301229] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.302172] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.303050] [ 36.303433] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.304471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.305033] Hardware name: linux,dummy-virt (DT) [ 36.305673] Call trace: [ 36.306094] show_stack+0x20/0x38 (C) [ 36.306712] dump_stack_lvl+0x8c/0xd0 [ 36.307223] print_report+0x118/0x5e0 [ 36.307858] kasan_report+0xc8/0x118 [ 36.308417] kasan_check_range+0x100/0x1a8 [ 36.308963] __kasan_check_write+0x20/0x30 [ 36.309617] kasan_atomics_helper+0x126c/0x4858 [ 36.310220] kasan_atomics+0x198/0x2e8 [ 36.310814] kunit_try_run_case+0x14c/0x3d0 [ 36.311477] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.312101] kthread+0x24c/0x2d0 [ 36.312691] ret_from_fork+0x10/0x20 [ 36.313280] [ 36.313630] Allocated by task 253: [ 36.314134] kasan_save_stack+0x3c/0x68 [ 36.314719] kasan_save_track+0x20/0x40 [ 36.315261] kasan_save_alloc_info+0x40/0x58 [ 36.315901] __kasan_kmalloc+0xd4/0xd8 [ 36.316499] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.317048] kasan_atomics+0xb8/0x2e8 [ 36.317668] kunit_try_run_case+0x14c/0x3d0 [ 36.318246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.318864] kthread+0x24c/0x2d0 [ 36.319413] ret_from_fork+0x10/0x20 [ 36.319971] [ 36.320301] The buggy address belongs to the object at fff00000c63df000 [ 36.320301] which belongs to the cache kmalloc-64 of size 64 [ 36.321544] The buggy address is located 0 bytes to the right of [ 36.321544] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.322728] [ 36.323077] The buggy address belongs to the physical page: [ 36.323597] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.324541] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.325263] page_type: f5(slab) [ 36.325775] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.326624] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.327450] page dumped because: kasan: bad access detected [ 36.328082] [ 36.328434] Memory state around the buggy address: [ 36.328983] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.329755] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.330524] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.331285] ^ [ 36.331885] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.332692] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.333441] ================================================================== [ 34.566759] ================================================================== [ 34.567569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 34.568214] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.569000] [ 34.569404] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.570449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.571018] Hardware name: linux,dummy-virt (DT) [ 34.572646] Call trace: [ 34.573402] show_stack+0x20/0x38 (C) [ 34.573937] dump_stack_lvl+0x8c/0xd0 [ 34.574560] print_report+0x118/0x5e0 [ 34.575050] kasan_report+0xc8/0x118 [ 34.575654] __asan_report_store4_noabort+0x20/0x30 [ 34.576330] kasan_atomics_helper+0x3f7c/0x4858 [ 34.577020] kasan_atomics+0x198/0x2e8 [ 34.577611] kunit_try_run_case+0x14c/0x3d0 [ 34.578255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.578895] kthread+0x24c/0x2d0 [ 34.579694] ret_from_fork+0x10/0x20 [ 34.580285] [ 34.580580] Allocated by task 253: [ 34.581843] kasan_save_stack+0x3c/0x68 [ 34.582479] kasan_save_track+0x20/0x40 [ 34.583144] kasan_save_alloc_info+0x40/0x58 [ 34.583442] __kasan_kmalloc+0xd4/0xd8 [ 34.583691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.583961] kasan_atomics+0xb8/0x2e8 [ 34.584425] kunit_try_run_case+0x14c/0x3d0 [ 34.585768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.586731] kthread+0x24c/0x2d0 [ 34.587288] ret_from_fork+0x10/0x20 [ 34.587882] [ 34.588258] The buggy address belongs to the object at fff00000c63df000 [ 34.588258] which belongs to the cache kmalloc-64 of size 64 [ 34.589908] The buggy address is located 0 bytes to the right of [ 34.589908] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.591373] [ 34.591897] The buggy address belongs to the physical page: [ 34.592698] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.593518] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.594331] page_type: f5(slab) [ 34.594870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.595618] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.596493] page dumped because: kasan: bad access detected [ 34.597298] [ 34.597719] Memory state around the buggy address: [ 34.598302] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.599241] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.599945] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.600850] ^ [ 34.601516] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.602540] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.603368] ================================================================== [ 36.479005] ================================================================== [ 36.479661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.480561] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.482202] [ 36.482620] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.483727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.484360] Hardware name: linux,dummy-virt (DT) [ 36.484911] Call trace: [ 36.485392] show_stack+0x20/0x38 (C) [ 36.486071] dump_stack_lvl+0x8c/0xd0 [ 36.486678] print_report+0x118/0x5e0 [ 36.487328] kasan_report+0xc8/0x118 [ 36.487941] kasan_check_range+0x100/0x1a8 [ 36.488637] __kasan_check_write+0x20/0x30 [ 36.489238] kasan_atomics_helper+0x147c/0x4858 [ 36.489928] kasan_atomics+0x198/0x2e8 [ 36.490527] kunit_try_run_case+0x14c/0x3d0 [ 36.491192] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.491910] kthread+0x24c/0x2d0 [ 36.492504] ret_from_fork+0x10/0x20 [ 36.493092] [ 36.493527] Allocated by task 253: [ 36.494014] kasan_save_stack+0x3c/0x68 [ 36.494654] kasan_save_track+0x20/0x40 [ 36.495226] kasan_save_alloc_info+0x40/0x58 [ 36.495893] __kasan_kmalloc+0xd4/0xd8 [ 36.496400] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.497041] kasan_atomics+0xb8/0x2e8 [ 36.497637] kunit_try_run_case+0x14c/0x3d0 [ 36.498279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.498878] kthread+0x24c/0x2d0 [ 36.499471] ret_from_fork+0x10/0x20 [ 36.500032] [ 36.500439] The buggy address belongs to the object at fff00000c63df000 [ 36.500439] which belongs to the cache kmalloc-64 of size 64 [ 36.501678] The buggy address is located 0 bytes to the right of [ 36.501678] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.502953] [ 36.503324] The buggy address belongs to the physical page: [ 36.503973] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.504965] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.505758] page_type: f5(slab) [ 36.506291] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.507191] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.508019] page dumped because: kasan: bad access detected [ 36.508689] [ 36.509071] Memory state around the buggy address: [ 36.509704] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.510474] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.511314] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.512110] ^ [ 36.512720] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.513570] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.514367] ================================================================== [ 34.768825] ================================================================== [ 34.770575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 34.771425] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.772289] [ 34.772646] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.773784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.774771] Hardware name: linux,dummy-virt (DT) [ 34.775320] Call trace: [ 34.775742] show_stack+0x20/0x38 (C) [ 34.776340] dump_stack_lvl+0x8c/0xd0 [ 34.776949] print_report+0x118/0x5e0 [ 34.777862] kasan_report+0xc8/0x118 [ 34.778257] kasan_check_range+0x100/0x1a8 [ 34.778905] __kasan_check_write+0x20/0x30 [ 34.780053] kasan_atomics_helper+0x32c/0x4858 [ 34.780737] kasan_atomics+0x198/0x2e8 [ 34.781619] kunit_try_run_case+0x14c/0x3d0 [ 34.782033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.782814] kthread+0x24c/0x2d0 [ 34.783395] ret_from_fork+0x10/0x20 [ 34.783979] [ 34.784356] Allocated by task 253: [ 34.784887] kasan_save_stack+0x3c/0x68 [ 34.785531] kasan_save_track+0x20/0x40 [ 34.786351] kasan_save_alloc_info+0x40/0x58 [ 34.786975] __kasan_kmalloc+0xd4/0xd8 [ 34.787558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.788078] kasan_atomics+0xb8/0x2e8 [ 34.789343] kunit_try_run_case+0x14c/0x3d0 [ 34.789859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.790207] kthread+0x24c/0x2d0 [ 34.790444] ret_from_fork+0x10/0x20 [ 34.790681] [ 34.790834] The buggy address belongs to the object at fff00000c63df000 [ 34.790834] which belongs to the cache kmalloc-64 of size 64 [ 34.792834] The buggy address is located 0 bytes to the right of [ 34.792834] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.794017] [ 34.795092] The buggy address belongs to the physical page: [ 34.795720] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.796534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.797639] page_type: f5(slab) [ 34.798091] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.799018] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.799875] page dumped because: kasan: bad access detected [ 34.800465] [ 34.800801] Memory state around the buggy address: [ 34.802022] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.802941] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.803636] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.804428] ^ [ 34.805077] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.806270] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.807030] ================================================================== [ 34.931313] ================================================================== [ 34.932094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 34.932773] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.933855] [ 34.934798] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.935946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.936998] Hardware name: linux,dummy-virt (DT) [ 34.937544] Call trace: [ 34.937880] show_stack+0x20/0x38 (C) [ 34.939021] dump_stack_lvl+0x8c/0xd0 [ 34.939544] print_report+0x118/0x5e0 [ 34.939992] kasan_report+0xc8/0x118 [ 34.940452] kasan_check_range+0x100/0x1a8 [ 34.941529] __kasan_check_write+0x20/0x30 [ 34.942405] kasan_atomics_helper+0x47c/0x4858 [ 34.943109] kasan_atomics+0x198/0x2e8 [ 34.943633] kunit_try_run_case+0x14c/0x3d0 [ 34.944447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.945678] kthread+0x24c/0x2d0 [ 34.946141] ret_from_fork+0x10/0x20 [ 34.946868] [ 34.947196] Allocated by task 253: [ 34.947680] kasan_save_stack+0x3c/0x68 [ 34.948171] kasan_save_track+0x20/0x40 [ 34.948763] kasan_save_alloc_info+0x40/0x58 [ 34.949418] __kasan_kmalloc+0xd4/0xd8 [ 34.949867] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.950986] kasan_atomics+0xb8/0x2e8 [ 34.951402] kunit_try_run_case+0x14c/0x3d0 [ 34.951685] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.951983] kthread+0x24c/0x2d0 [ 34.952229] ret_from_fork+0x10/0x20 [ 34.952481] [ 34.952636] The buggy address belongs to the object at fff00000c63df000 [ 34.952636] which belongs to the cache kmalloc-64 of size 64 [ 34.955023] The buggy address is located 0 bytes to the right of [ 34.955023] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.956471] [ 34.956983] The buggy address belongs to the physical page: [ 34.957795] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.959181] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.960023] page_type: f5(slab) [ 34.960604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.961432] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.962169] page dumped because: kasan: bad access detected [ 34.963073] [ 34.963398] Memory state around the buggy address: [ 34.963960] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.965200] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.966199] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.967401] ^ [ 34.968203] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.969386] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.970657] ================================================================== [ 35.015245] ================================================================== [ 35.015946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.016801] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.017552] [ 35.017927] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.019093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.019652] Hardware name: linux,dummy-virt (DT) [ 35.020255] Call trace: [ 35.020612] show_stack+0x20/0x38 (C) [ 35.021296] dump_stack_lvl+0x8c/0xd0 [ 35.021956] print_report+0x118/0x5e0 [ 35.022620] kasan_report+0xc8/0x118 [ 35.023281] kasan_check_range+0x100/0x1a8 [ 35.023877] __kasan_check_write+0x20/0x30 [ 35.024572] kasan_atomics_helper+0x54c/0x4858 [ 35.025241] kasan_atomics+0x198/0x2e8 [ 35.025866] kunit_try_run_case+0x14c/0x3d0 [ 35.026495] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.027255] kthread+0x24c/0x2d0 [ 35.027898] ret_from_fork+0x10/0x20 [ 35.028499] [ 35.028880] Allocated by task 253: [ 35.029385] kasan_save_stack+0x3c/0x68 [ 35.029985] kasan_save_track+0x20/0x40 [ 35.030653] kasan_save_alloc_info+0x40/0x58 [ 35.031338] __kasan_kmalloc+0xd4/0xd8 [ 35.031935] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.032644] kasan_atomics+0xb8/0x2e8 [ 35.033214] kunit_try_run_case+0x14c/0x3d0 [ 35.033808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.034584] kthread+0x24c/0x2d0 [ 35.035073] ret_from_fork+0x10/0x20 [ 35.035690] [ 35.036068] The buggy address belongs to the object at fff00000c63df000 [ 35.036068] which belongs to the cache kmalloc-64 of size 64 [ 35.037281] The buggy address is located 0 bytes to the right of [ 35.037281] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.038623] [ 35.039017] The buggy address belongs to the physical page: [ 35.039686] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.040530] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.041394] page_type: f5(slab) [ 35.041895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.042834] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.043508] page dumped because: kasan: bad access detected [ 35.044375] [ 35.044878] Memory state around the buggy address: [ 35.045618] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.046357] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.047085] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.047922] ^ [ 35.048660] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.049540] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.050473] ================================================================== [ 35.951240] ================================================================== [ 35.952021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.952827] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.953973] [ 35.954322] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.956104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.957062] Hardware name: linux,dummy-virt (DT) [ 35.957747] Call trace: [ 35.958158] show_stack+0x20/0x38 (C) [ 35.958767] dump_stack_lvl+0x8c/0xd0 [ 35.959373] print_report+0x118/0x5e0 [ 35.959925] kasan_report+0xc8/0x118 [ 35.960422] __asan_report_store8_noabort+0x20/0x30 [ 35.961106] kasan_atomics_helper+0x3e5c/0x4858 [ 35.961782] kasan_atomics+0x198/0x2e8 [ 35.962345] kunit_try_run_case+0x14c/0x3d0 [ 35.962893] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.963568] kthread+0x24c/0x2d0 [ 35.964145] ret_from_fork+0x10/0x20 [ 35.964732] [ 35.965086] Allocated by task 253: [ 35.965622] kasan_save_stack+0x3c/0x68 [ 35.966163] kasan_save_track+0x20/0x40 [ 35.966765] kasan_save_alloc_info+0x40/0x58 [ 35.967420] __kasan_kmalloc+0xd4/0xd8 [ 35.967973] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.968625] kasan_atomics+0xb8/0x2e8 [ 35.969104] kunit_try_run_case+0x14c/0x3d0 [ 35.969752] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.970438] kthread+0x24c/0x2d0 [ 35.970889] ret_from_fork+0x10/0x20 [ 35.971475] [ 35.971824] The buggy address belongs to the object at fff00000c63df000 [ 35.971824] which belongs to the cache kmalloc-64 of size 64 [ 35.972908] The buggy address is located 0 bytes to the right of [ 35.972908] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.974153] [ 35.974520] The buggy address belongs to the physical page: [ 35.975080] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.976168] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.976872] page_type: f5(slab) [ 35.977363] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.978208] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.979025] page dumped because: kasan: bad access detected [ 35.979639] [ 35.979982] Memory state around the buggy address: [ 35.980542] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.981385] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.982100] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.982883] ^ [ 35.983542] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.984284] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.985089] ================================================================== [ 36.516532] ================================================================== [ 36.517183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.518048] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.518903] [ 36.519275] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.520436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.520921] Hardware name: linux,dummy-virt (DT) [ 36.521558] Call trace: [ 36.522029] show_stack+0x20/0x38 (C) [ 36.522609] dump_stack_lvl+0x8c/0xd0 [ 36.523292] print_report+0x118/0x5e0 [ 36.523874] kasan_report+0xc8/0x118 [ 36.524505] kasan_check_range+0x100/0x1a8 [ 36.525072] __kasan_check_write+0x20/0x30 [ 36.525773] kasan_atomics_helper+0x14e4/0x4858 [ 36.526471] kasan_atomics+0x198/0x2e8 [ 36.527140] kunit_try_run_case+0x14c/0x3d0 [ 36.527809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.528625] kthread+0x24c/0x2d0 [ 36.529188] ret_from_fork+0x10/0x20 [ 36.529829] [ 36.530130] Allocated by task 253: [ 36.530595] kasan_save_stack+0x3c/0x68 [ 36.531199] kasan_save_track+0x20/0x40 [ 36.531737] kasan_save_alloc_info+0x40/0x58 [ 36.532252] __kasan_kmalloc+0xd4/0xd8 [ 36.532836] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.533468] kasan_atomics+0xb8/0x2e8 [ 36.534038] kunit_try_run_case+0x14c/0x3d0 [ 36.534612] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.535355] kthread+0x24c/0x2d0 [ 36.535895] ret_from_fork+0x10/0x20 [ 36.536455] [ 36.536802] The buggy address belongs to the object at fff00000c63df000 [ 36.536802] which belongs to the cache kmalloc-64 of size 64 [ 36.537952] The buggy address is located 0 bytes to the right of [ 36.537952] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.539037] [ 36.539408] The buggy address belongs to the physical page: [ 36.540092] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.540905] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.541682] page_type: f5(slab) [ 36.542155] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.542997] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.544097] page dumped because: kasan: bad access detected [ 36.544735] [ 36.545041] Memory state around the buggy address: [ 36.546008] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.546795] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.547568] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.548342] ^ [ 36.548918] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.549672] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.550490] ================================================================== [ 35.986621] ================================================================== [ 35.987409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.988045] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.988959] [ 35.989353] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.990314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.990791] Hardware name: linux,dummy-virt (DT) [ 35.991425] Call trace: [ 35.991773] show_stack+0x20/0x38 (C) [ 35.992398] dump_stack_lvl+0x8c/0xd0 [ 35.993006] print_report+0x118/0x5e0 [ 35.993710] kasan_report+0xc8/0x118 [ 35.994315] kasan_check_range+0x100/0x1a8 [ 35.994837] __kasan_check_write+0x20/0x30 [ 35.995489] kasan_atomics_helper+0xeb8/0x4858 [ 35.996134] kasan_atomics+0x198/0x2e8 [ 35.996718] kunit_try_run_case+0x14c/0x3d0 [ 35.997258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.998039] kthread+0x24c/0x2d0 [ 35.998559] ret_from_fork+0x10/0x20 [ 35.999186] [ 35.999544] Allocated by task 253: [ 36.000063] kasan_save_stack+0x3c/0x68 [ 36.000648] kasan_save_track+0x20/0x40 [ 36.001226] kasan_save_alloc_info+0x40/0x58 [ 36.001851] __kasan_kmalloc+0xd4/0xd8 [ 36.002395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.003027] kasan_atomics+0xb8/0x2e8 [ 36.003548] kunit_try_run_case+0x14c/0x3d0 [ 36.004191] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.004938] kthread+0x24c/0x2d0 [ 36.005489] ret_from_fork+0x10/0x20 [ 36.006044] [ 36.006655] The buggy address belongs to the object at fff00000c63df000 [ 36.006655] which belongs to the cache kmalloc-64 of size 64 [ 36.007839] The buggy address is located 0 bytes to the right of [ 36.007839] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.009019] [ 36.009389] The buggy address belongs to the physical page: [ 36.009947] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.010836] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.011536] page_type: f5(slab) [ 36.012018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.012886] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.013682] page dumped because: kasan: bad access detected [ 36.014206] [ 36.014559] Memory state around the buggy address: [ 36.015207] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.015969] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.016853] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.017561] ^ [ 36.018213] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.018926] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.019746] ================================================================== [ 36.774151] ================================================================== [ 36.774979] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 36.775686] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.776449] [ 36.776813] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.777936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.778420] Hardware name: linux,dummy-virt (DT) [ 36.779035] Call trace: [ 36.779488] show_stack+0x20/0x38 (C) [ 36.780047] dump_stack_lvl+0x8c/0xd0 [ 36.780664] print_report+0x118/0x5e0 [ 36.781273] kasan_report+0xc8/0x118 [ 36.781860] __asan_report_load8_noabort+0x20/0x30 [ 36.782501] kasan_atomics_helper+0x3e10/0x4858 [ 36.783156] kasan_atomics+0x198/0x2e8 [ 36.783719] kunit_try_run_case+0x14c/0x3d0 [ 36.784389] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.785150] kthread+0x24c/0x2d0 [ 36.785639] ret_from_fork+0x10/0x20 [ 36.786251] [ 36.786561] Allocated by task 253: [ 36.787014] kasan_save_stack+0x3c/0x68 [ 36.787599] kasan_save_track+0x20/0x40 [ 36.788142] kasan_save_alloc_info+0x40/0x58 [ 36.788666] __kasan_kmalloc+0xd4/0xd8 [ 36.789267] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.789927] kasan_atomics+0xb8/0x2e8 [ 36.790483] kunit_try_run_case+0x14c/0x3d0 [ 36.791125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.791729] kthread+0x24c/0x2d0 [ 36.792308] ret_from_fork+0x10/0x20 [ 36.792794] [ 36.793162] The buggy address belongs to the object at fff00000c63df000 [ 36.793162] which belongs to the cache kmalloc-64 of size 64 [ 36.794287] The buggy address is located 0 bytes to the right of [ 36.794287] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.795551] [ 36.795897] The buggy address belongs to the physical page: [ 36.796509] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.797441] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.798058] page_type: f5(slab) [ 36.798612] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.799513] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.800250] page dumped because: kasan: bad access detected [ 36.800957] [ 36.801316] Memory state around the buggy address: [ 36.801806] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.802665] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.803405] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.804182] ^ [ 36.804758] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.805536] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.806290] ================================================================== [ 34.526854] ================================================================== [ 34.527999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 34.528714] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.530509] [ 34.531205] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.532422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.534174] Hardware name: linux,dummy-virt (DT) [ 34.534996] Call trace: [ 34.535533] show_stack+0x20/0x38 (C) [ 34.536180] dump_stack_lvl+0x8c/0xd0 [ 34.536736] print_report+0x118/0x5e0 [ 34.537314] kasan_report+0xc8/0x118 [ 34.537986] __asan_report_load4_noabort+0x20/0x30 [ 34.538526] kasan_atomics_helper+0x40a8/0x4858 [ 34.539052] kasan_atomics+0x198/0x2e8 [ 34.539782] kunit_try_run_case+0x14c/0x3d0 [ 34.540533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.541336] kthread+0x24c/0x2d0 [ 34.541934] ret_from_fork+0x10/0x20 [ 34.542607] [ 34.542960] Allocated by task 253: [ 34.543459] kasan_save_stack+0x3c/0x68 [ 34.544123] kasan_save_track+0x20/0x40 [ 34.544663] kasan_save_alloc_info+0x40/0x58 [ 34.545330] __kasan_kmalloc+0xd4/0xd8 [ 34.545862] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.546522] kasan_atomics+0xb8/0x2e8 [ 34.547096] kunit_try_run_case+0x14c/0x3d0 [ 34.547899] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.548685] kthread+0x24c/0x2d0 [ 34.549321] ret_from_fork+0x10/0x20 [ 34.549925] [ 34.550598] The buggy address belongs to the object at fff00000c63df000 [ 34.550598] which belongs to the cache kmalloc-64 of size 64 [ 34.551797] The buggy address is located 0 bytes to the right of [ 34.551797] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.553055] [ 34.553480] The buggy address belongs to the physical page: [ 34.554367] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.555110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.555944] page_type: f5(slab) [ 34.556527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.557398] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.558272] page dumped because: kasan: bad access detected [ 34.558927] [ 34.559334] Memory state around the buggy address: [ 34.559858] fff00000c63def00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.560721] fff00000c63def80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 34.561779] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.562931] ^ [ 34.563432] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.564168] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.564994] ================================================================== [ 35.882552] ================================================================== [ 35.883341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.884063] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.884964] [ 35.885359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.886403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.886979] Hardware name: linux,dummy-virt (DT) [ 35.887590] Call trace: [ 35.888020] show_stack+0x20/0x38 (C) [ 35.888613] dump_stack_lvl+0x8c/0xd0 [ 35.889130] print_report+0x118/0x5e0 [ 35.889726] kasan_report+0xc8/0x118 [ 35.890268] __asan_report_load8_noabort+0x20/0x30 [ 35.890969] kasan_atomics_helper+0x3f58/0x4858 [ 35.891578] kasan_atomics+0x198/0x2e8 [ 35.892064] kunit_try_run_case+0x14c/0x3d0 [ 35.892717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.893479] kthread+0x24c/0x2d0 [ 35.894054] ret_from_fork+0x10/0x20 [ 35.894664] [ 35.895003] Allocated by task 253: [ 35.895532] kasan_save_stack+0x3c/0x68 [ 35.896008] kasan_save_track+0x20/0x40 [ 35.896617] kasan_save_alloc_info+0x40/0x58 [ 35.897242] __kasan_kmalloc+0xd4/0xd8 [ 35.897863] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.898529] kasan_atomics+0xb8/0x2e8 [ 35.899126] kunit_try_run_case+0x14c/0x3d0 [ 35.899617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.900380] kthread+0x24c/0x2d0 [ 35.900928] ret_from_fork+0x10/0x20 [ 35.901511] [ 35.901852] The buggy address belongs to the object at fff00000c63df000 [ 35.901852] which belongs to the cache kmalloc-64 of size 64 [ 35.903007] The buggy address is located 0 bytes to the right of [ 35.903007] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.904177] [ 35.904541] The buggy address belongs to the physical page: [ 35.905179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.906137] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.906852] page_type: f5(slab) [ 35.907398] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.908189] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.909066] page dumped because: kasan: bad access detected [ 35.909666] [ 35.910022] Memory state around the buggy address: [ 35.910568] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.911403] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.912169] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.912891] ^ [ 35.913558] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.914292] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.915098] ================================================================== [ 35.638436] ================================================================== [ 35.639032] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 35.639693] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.640571] [ 35.640949] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.641840] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.642440] Hardware name: linux,dummy-virt (DT) [ 35.643062] Call trace: [ 35.643511] show_stack+0x20/0x38 (C) [ 35.644067] dump_stack_lvl+0x8c/0xd0 [ 35.644612] print_report+0x118/0x5e0 [ 35.645229] kasan_report+0xc8/0x118 [ 35.645816] kasan_check_range+0x100/0x1a8 [ 35.646428] __kasan_check_write+0x20/0x30 [ 35.647072] kasan_atomics_helper+0xc08/0x4858 [ 35.647778] kasan_atomics+0x198/0x2e8 [ 35.648361] kunit_try_run_case+0x14c/0x3d0 [ 35.648938] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.649709] kthread+0x24c/0x2d0 [ 35.650288] ret_from_fork+0x10/0x20 [ 35.650889] [ 35.651211] Allocated by task 253: [ 35.651720] kasan_save_stack+0x3c/0x68 [ 35.652316] kasan_save_track+0x20/0x40 [ 35.653067] kasan_save_alloc_info+0x40/0x58 [ 35.653715] __kasan_kmalloc+0xd4/0xd8 [ 35.654253] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.654767] kasan_atomics+0xb8/0x2e8 [ 35.655367] kunit_try_run_case+0x14c/0x3d0 [ 35.655883] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.656638] kthread+0x24c/0x2d0 [ 35.657183] ret_from_fork+0x10/0x20 [ 35.657756] [ 35.658071] The buggy address belongs to the object at fff00000c63df000 [ 35.658071] which belongs to the cache kmalloc-64 of size 64 [ 35.659191] The buggy address is located 0 bytes to the right of [ 35.659191] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.660362] [ 35.660721] The buggy address belongs to the physical page: [ 35.661297] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.662207] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.662973] page_type: f5(slab) [ 35.663470] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.664564] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.665379] page dumped because: kasan: bad access detected [ 35.665937] [ 35.666295] Memory state around the buggy address: [ 35.666923] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.667668] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.668538] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.669238] ^ [ 35.669881] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.670608] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.671310] ================================================================== [ 36.882856] ================================================================== [ 36.883475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 36.884410] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.885407] [ 36.885853] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.887011] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.887638] Hardware name: linux,dummy-virt (DT) [ 36.888296] Call trace: [ 36.888725] show_stack+0x20/0x38 (C) [ 36.889364] dump_stack_lvl+0x8c/0xd0 [ 36.890050] print_report+0x118/0x5e0 [ 36.890744] kasan_report+0xc8/0x118 [ 36.891415] kasan_check_range+0x100/0x1a8 [ 36.892142] __kasan_check_write+0x20/0x30 [ 36.892827] kasan_atomics_helper+0x17ec/0x4858 [ 36.893596] kasan_atomics+0x198/0x2e8 [ 36.894255] kunit_try_run_case+0x14c/0x3d0 [ 36.894982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.895756] kthread+0x24c/0x2d0 [ 36.896426] ret_from_fork+0x10/0x20 [ 36.897052] [ 36.897476] Allocated by task 253: [ 36.898016] kasan_save_stack+0x3c/0x68 [ 36.898660] kasan_save_track+0x20/0x40 [ 36.899328] kasan_save_alloc_info+0x40/0x58 [ 36.899974] __kasan_kmalloc+0xd4/0xd8 [ 36.900651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.901349] kasan_atomics+0xb8/0x2e8 [ 36.901944] kunit_try_run_case+0x14c/0x3d0 [ 36.902646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.903407] kthread+0x24c/0x2d0 [ 36.903969] ret_from_fork+0x10/0x20 [ 36.904636] [ 36.905007] The buggy address belongs to the object at fff00000c63df000 [ 36.905007] which belongs to the cache kmalloc-64 of size 64 [ 36.906333] The buggy address is located 0 bytes to the right of [ 36.906333] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.907666] [ 36.908020] The buggy address belongs to the physical page: [ 36.908786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.909787] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.910551] page_type: f5(slab) [ 36.910983] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.911692] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.912623] page dumped because: kasan: bad access detected [ 36.913361] [ 36.913737] Memory state around the buggy address: [ 36.914329] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.915131] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.915976] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.916799] ^ [ 36.917413] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.918208] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.918990] ================================================================== [ 35.092134] ================================================================== [ 35.092857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 35.093996] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.095188] [ 35.095661] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.096815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.097496] Hardware name: linux,dummy-virt (DT) [ 35.098090] Call trace: [ 35.098606] show_stack+0x20/0x38 (C) [ 35.099324] dump_stack_lvl+0x8c/0xd0 [ 35.099980] print_report+0x118/0x5e0 [ 35.100688] kasan_report+0xc8/0x118 [ 35.101347] kasan_check_range+0x100/0x1a8 [ 35.102032] __kasan_check_write+0x20/0x30 [ 35.102752] kasan_atomics_helper+0x61c/0x4858 [ 35.103395] kasan_atomics+0x198/0x2e8 [ 35.103955] kunit_try_run_case+0x14c/0x3d0 [ 35.104664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.105325] kthread+0x24c/0x2d0 [ 35.105945] ret_from_fork+0x10/0x20 [ 35.106601] [ 35.106961] Allocated by task 253: [ 35.107482] kasan_save_stack+0x3c/0x68 [ 35.108025] kasan_save_track+0x20/0x40 [ 35.108644] kasan_save_alloc_info+0x40/0x58 [ 35.109313] __kasan_kmalloc+0xd4/0xd8 [ 35.109888] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.110445] kasan_atomics+0xb8/0x2e8 [ 35.111064] kunit_try_run_case+0x14c/0x3d0 [ 35.111704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.112413] kthread+0x24c/0x2d0 [ 35.113000] ret_from_fork+0x10/0x20 [ 35.113534] [ 35.113915] The buggy address belongs to the object at fff00000c63df000 [ 35.113915] which belongs to the cache kmalloc-64 of size 64 [ 35.115163] The buggy address is located 0 bytes to the right of [ 35.115163] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.116447] [ 35.116809] The buggy address belongs to the physical page: [ 35.117467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.118447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.119216] page_type: f5(slab) [ 35.119729] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.120653] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.121453] page dumped because: kasan: bad access detected [ 35.122170] [ 35.122504] Memory state around the buggy address: [ 35.123215] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.124138] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.124971] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.125811] ^ [ 35.126452] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.127202] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.127884] ================================================================== [ 36.551799] ================================================================== [ 36.553472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.554183] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.555222] [ 36.555681] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.556882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.557509] Hardware name: linux,dummy-virt (DT) [ 36.558057] Call trace: [ 36.558434] show_stack+0x20/0x38 (C) [ 36.558934] dump_stack_lvl+0x8c/0xd0 [ 36.559449] print_report+0x118/0x5e0 [ 36.560056] kasan_report+0xc8/0x118 [ 36.560813] kasan_check_range+0x100/0x1a8 [ 36.561526] __kasan_check_write+0x20/0x30 [ 36.562299] kasan_atomics_helper+0x154c/0x4858 [ 36.562996] kasan_atomics+0x198/0x2e8 [ 36.563652] kunit_try_run_case+0x14c/0x3d0 [ 36.564366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.565163] kthread+0x24c/0x2d0 [ 36.565803] ret_from_fork+0x10/0x20 [ 36.566458] [ 36.566826] Allocated by task 253: [ 36.567446] kasan_save_stack+0x3c/0x68 [ 36.568021] kasan_save_track+0x20/0x40 [ 36.568680] kasan_save_alloc_info+0x40/0x58 [ 36.569361] __kasan_kmalloc+0xd4/0xd8 [ 36.570012] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.570701] kasan_atomics+0xb8/0x2e8 [ 36.571313] kunit_try_run_case+0x14c/0x3d0 [ 36.572021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.572781] kthread+0x24c/0x2d0 [ 36.573359] ret_from_fork+0x10/0x20 [ 36.573955] [ 36.574381] The buggy address belongs to the object at fff00000c63df000 [ 36.574381] which belongs to the cache kmalloc-64 of size 64 [ 36.575625] The buggy address is located 0 bytes to the right of [ 36.575625] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.576986] [ 36.577415] The buggy address belongs to the physical page: [ 36.577985] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.578991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.579844] page_type: f5(slab) [ 36.580413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.581350] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.582255] page dumped because: kasan: bad access detected [ 36.582932] [ 36.583302] Memory state around the buggy address: [ 36.584001] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.584806] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.585734] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.586574] ^ [ 36.587216] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.588079] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.588911] ================================================================== [ 34.689589] ================================================================== [ 34.691059] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 34.692012] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.693024] [ 34.693781] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.695301] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.695981] Hardware name: linux,dummy-virt (DT) [ 34.696823] Call trace: [ 34.697438] show_stack+0x20/0x38 (C) [ 34.698277] dump_stack_lvl+0x8c/0xd0 [ 34.698784] print_report+0x118/0x5e0 [ 34.699714] kasan_report+0xc8/0x118 [ 34.700342] kasan_check_range+0x100/0x1a8 [ 34.700970] __kasan_check_read+0x20/0x30 [ 34.701690] kasan_atomics_helper+0x2b0/0x4858 [ 34.702317] kasan_atomics+0x198/0x2e8 [ 34.702876] kunit_try_run_case+0x14c/0x3d0 [ 34.703802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.704462] kthread+0x24c/0x2d0 [ 34.705552] ret_from_fork+0x10/0x20 [ 34.706094] [ 34.706463] Allocated by task 253: [ 34.707000] kasan_save_stack+0x3c/0x68 [ 34.707514] kasan_save_track+0x20/0x40 [ 34.708109] kasan_save_alloc_info+0x40/0x58 [ 34.708825] __kasan_kmalloc+0xd4/0xd8 [ 34.709828] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.710364] kasan_atomics+0xb8/0x2e8 [ 34.710939] kunit_try_run_case+0x14c/0x3d0 [ 34.711569] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.712129] kthread+0x24c/0x2d0 [ 34.712667] ret_from_fork+0x10/0x20 [ 34.713672] [ 34.714038] The buggy address belongs to the object at fff00000c63df000 [ 34.714038] which belongs to the cache kmalloc-64 of size 64 [ 34.715054] The buggy address is located 0 bytes to the right of [ 34.715054] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.716143] [ 34.716505] The buggy address belongs to the physical page: [ 34.717549] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.718487] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.719091] page_type: f5(slab) [ 34.719651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.720553] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.721714] page dumped because: kasan: bad access detected [ 34.722260] [ 34.722542] Memory state around the buggy address: [ 34.723081] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.723878] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.724677] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.725432] ^ [ 34.726553] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.727327] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.728099] ================================================================== [ 36.021829] ================================================================== [ 36.022472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.023321] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.024074] [ 36.024420] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.025475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.026030] Hardware name: linux,dummy-virt (DT) [ 36.026525] Call trace: [ 36.026949] show_stack+0x20/0x38 (C) [ 36.027600] dump_stack_lvl+0x8c/0xd0 [ 36.028096] print_report+0x118/0x5e0 [ 36.028727] kasan_report+0xc8/0x118 [ 36.029328] kasan_check_range+0x100/0x1a8 [ 36.029883] __kasan_check_write+0x20/0x30 [ 36.030535] kasan_atomics_helper+0xf20/0x4858 [ 36.031178] kasan_atomics+0x198/0x2e8 [ 36.031773] kunit_try_run_case+0x14c/0x3d0 [ 36.032421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.033176] kthread+0x24c/0x2d0 [ 36.033747] ret_from_fork+0x10/0x20 [ 36.034269] [ 36.034618] Allocated by task 253: [ 36.035149] kasan_save_stack+0x3c/0x68 [ 36.035733] kasan_save_track+0x20/0x40 [ 36.036314] kasan_save_alloc_info+0x40/0x58 [ 36.036920] __kasan_kmalloc+0xd4/0xd8 [ 36.037560] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.038214] kasan_atomics+0xb8/0x2e8 [ 36.038710] kunit_try_run_case+0x14c/0x3d0 [ 36.039271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.039990] kthread+0x24c/0x2d0 [ 36.040552] ret_from_fork+0x10/0x20 [ 36.041070] [ 36.041414] The buggy address belongs to the object at fff00000c63df000 [ 36.041414] which belongs to the cache kmalloc-64 of size 64 [ 36.042624] The buggy address is located 0 bytes to the right of [ 36.042624] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.043749] [ 36.044105] The buggy address belongs to the physical page: [ 36.044781] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.045594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.046403] page_type: f5(slab) [ 36.046867] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.047819] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.048602] page dumped because: kasan: bad access detected [ 36.049224] [ 36.049524] Memory state around the buggy address: [ 36.050172] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.050809] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.051675] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.052429] ^ [ 36.053001] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.053714] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.054504] ================================================================== [ 36.125771] ================================================================== [ 36.126475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.127144] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.127995] [ 36.128352] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.129514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.129946] Hardware name: linux,dummy-virt (DT) [ 36.130592] Call trace: [ 36.131034] show_stack+0x20/0x38 (C) [ 36.132029] dump_stack_lvl+0x8c/0xd0 [ 36.132619] print_report+0x118/0x5e0 [ 36.133243] kasan_report+0xc8/0x118 [ 36.133847] kasan_check_range+0x100/0x1a8 [ 36.134403] __kasan_check_write+0x20/0x30 [ 36.135045] kasan_atomics_helper+0x1058/0x4858 [ 36.135720] kasan_atomics+0x198/0x2e8 [ 36.136353] kunit_try_run_case+0x14c/0x3d0 [ 36.136992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.137748] kthread+0x24c/0x2d0 [ 36.138262] ret_from_fork+0x10/0x20 [ 36.138813] [ 36.139164] Allocated by task 253: [ 36.139685] kasan_save_stack+0x3c/0x68 [ 36.140296] kasan_save_track+0x20/0x40 [ 36.140826] kasan_save_alloc_info+0x40/0x58 [ 36.141357] __kasan_kmalloc+0xd4/0xd8 [ 36.141936] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.142567] kasan_atomics+0xb8/0x2e8 [ 36.143097] kunit_try_run_case+0x14c/0x3d0 [ 36.143727] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.144453] kthread+0x24c/0x2d0 [ 36.144922] ret_from_fork+0x10/0x20 [ 36.145509] [ 36.145830] The buggy address belongs to the object at fff00000c63df000 [ 36.145830] which belongs to the cache kmalloc-64 of size 64 [ 36.147024] The buggy address is located 0 bytes to the right of [ 36.147024] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.148219] [ 36.148584] The buggy address belongs to the physical page: [ 36.149272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.150128] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.150753] page_type: f5(slab) [ 36.151298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.152137] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.153030] page dumped because: kasan: bad access detected [ 36.153631] [ 36.153974] Memory state around the buggy address: [ 36.154570] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.155353] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.156066] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.156849] ^ [ 36.157528] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.158215] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.159003] ================================================================== [ 36.739961] ================================================================== [ 36.740825] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.741685] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.742575] [ 36.742910] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.743942] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.744543] Hardware name: linux,dummy-virt (DT) [ 36.745032] Call trace: [ 36.745474] show_stack+0x20/0x38 (C) [ 36.746023] dump_stack_lvl+0x8c/0xd0 [ 36.746669] print_report+0x118/0x5e0 [ 36.747293] kasan_report+0xc8/0x118 [ 36.747885] kasan_check_range+0x100/0x1a8 [ 36.748496] __kasan_check_write+0x20/0x30 [ 36.749152] kasan_atomics_helper+0x16d0/0x4858 [ 36.749845] kasan_atomics+0x198/0x2e8 [ 36.750460] kunit_try_run_case+0x14c/0x3d0 [ 36.751125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.751741] kthread+0x24c/0x2d0 [ 36.752327] ret_from_fork+0x10/0x20 [ 36.752852] [ 36.753220] Allocated by task 253: [ 36.753714] kasan_save_stack+0x3c/0x68 [ 36.754321] kasan_save_track+0x20/0x40 [ 36.754897] kasan_save_alloc_info+0x40/0x58 [ 36.755490] __kasan_kmalloc+0xd4/0xd8 [ 36.755950] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.756621] kasan_atomics+0xb8/0x2e8 [ 36.757162] kunit_try_run_case+0x14c/0x3d0 [ 36.757794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.758422] kthread+0x24c/0x2d0 [ 36.758966] ret_from_fork+0x10/0x20 [ 36.759539] [ 36.759884] The buggy address belongs to the object at fff00000c63df000 [ 36.759884] which belongs to the cache kmalloc-64 of size 64 [ 36.760947] The buggy address is located 0 bytes to the right of [ 36.760947] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.762187] [ 36.762543] The buggy address belongs to the physical page: [ 36.763238] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.764098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.764792] page_type: f5(slab) [ 36.765334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.766169] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.766891] page dumped because: kasan: bad access detected [ 36.767579] [ 36.767930] Memory state around the buggy address: [ 36.768563] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.769335] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.770081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.770822] ^ [ 36.771431] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.772163] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.772966] ================================================================== [ 35.916464] ================================================================== [ 35.917252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.918167] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.919050] [ 35.919458] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.920466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.921028] Hardware name: linux,dummy-virt (DT) [ 35.921660] Call trace: [ 35.922073] show_stack+0x20/0x38 (C) [ 35.922691] dump_stack_lvl+0x8c/0xd0 [ 35.923328] print_report+0x118/0x5e0 [ 35.923916] kasan_report+0xc8/0x118 [ 35.924416] kasan_check_range+0x100/0x1a8 [ 35.925057] __kasan_check_write+0x20/0x30 [ 35.925658] kasan_atomics_helper+0xe44/0x4858 [ 35.926238] kasan_atomics+0x198/0x2e8 [ 35.926854] kunit_try_run_case+0x14c/0x3d0 [ 35.927551] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.928326] kthread+0x24c/0x2d0 [ 35.928802] ret_from_fork+0x10/0x20 [ 35.929414] [ 35.929761] Allocated by task 253: [ 35.930303] kasan_save_stack+0x3c/0x68 [ 35.930832] kasan_save_track+0x20/0x40 [ 35.931348] kasan_save_alloc_info+0x40/0x58 [ 35.931979] __kasan_kmalloc+0xd4/0xd8 [ 35.932577] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.933223] kasan_atomics+0xb8/0x2e8 [ 35.933710] kunit_try_run_case+0x14c/0x3d0 [ 35.934352] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.934948] kthread+0x24c/0x2d0 [ 35.935505] ret_from_fork+0x10/0x20 [ 35.936014] [ 35.936384] The buggy address belongs to the object at fff00000c63df000 [ 35.936384] which belongs to the cache kmalloc-64 of size 64 [ 35.937524] The buggy address is located 0 bytes to the right of [ 35.937524] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.938696] [ 35.939048] The buggy address belongs to the physical page: [ 35.939625] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.940520] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.941241] page_type: f5(slab) [ 35.941758] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.942668] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.943445] page dumped because: kasan: bad access detected [ 35.944045] [ 35.944428] Memory state around the buggy address: [ 35.945032] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.945828] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.946545] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.947321] ^ [ 35.948001] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.948717] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.949504] ================================================================== [ 36.406320] ================================================================== [ 36.406988] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.407912] Read of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.408754] [ 36.409224] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.410260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.410877] Hardware name: linux,dummy-virt (DT) [ 36.411437] Call trace: [ 36.411904] show_stack+0x20/0x38 (C) [ 36.412562] dump_stack_lvl+0x8c/0xd0 [ 36.413180] print_report+0x118/0x5e0 [ 36.413821] kasan_report+0xc8/0x118 [ 36.414449] __asan_report_load8_noabort+0x20/0x30 [ 36.415082] kasan_atomics_helper+0x3f04/0x4858 [ 36.415810] kasan_atomics+0x198/0x2e8 [ 36.416474] kunit_try_run_case+0x14c/0x3d0 [ 36.417009] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.417944] kthread+0x24c/0x2d0 [ 36.418480] ret_from_fork+0x10/0x20 [ 36.418972] [ 36.419280] Allocated by task 253: [ 36.419733] kasan_save_stack+0x3c/0x68 [ 36.420408] kasan_save_track+0x20/0x40 [ 36.421359] kasan_save_alloc_info+0x40/0x58 [ 36.421961] __kasan_kmalloc+0xd4/0xd8 [ 36.422576] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.423241] kasan_atomics+0xb8/0x2e8 [ 36.423846] kunit_try_run_case+0x14c/0x3d0 [ 36.424462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.425499] kthread+0x24c/0x2d0 [ 36.425849] ret_from_fork+0x10/0x20 [ 36.426499] [ 36.426856] The buggy address belongs to the object at fff00000c63df000 [ 36.426856] which belongs to the cache kmalloc-64 of size 64 [ 36.428129] The buggy address is located 0 bytes to the right of [ 36.428129] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.429388] [ 36.429787] The buggy address belongs to the physical page: [ 36.430539] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.431462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.432441] page_type: f5(slab) [ 36.433093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.433890] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.434648] page dumped because: kasan: bad access detected [ 36.435278] [ 36.435612] Memory state around the buggy address: [ 36.436312] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.437001] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.437930] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.438621] ^ [ 36.439326] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.440041] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.440898] ================================================================== [ 36.196302] ================================================================== [ 36.197132] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.198002] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.198711] [ 36.199093] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.200146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.200686] Hardware name: linux,dummy-virt (DT) [ 36.201205] Call trace: [ 36.201635] show_stack+0x20/0x38 (C) [ 36.202255] dump_stack_lvl+0x8c/0xd0 [ 36.202818] print_report+0x118/0x5e0 [ 36.203384] kasan_report+0xc8/0x118 [ 36.203892] kasan_check_range+0x100/0x1a8 [ 36.204569] __kasan_check_write+0x20/0x30 [ 36.205230] kasan_atomics_helper+0x1128/0x4858 [ 36.205907] kasan_atomics+0x198/0x2e8 [ 36.206474] kunit_try_run_case+0x14c/0x3d0 [ 36.207049] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.207745] kthread+0x24c/0x2d0 [ 36.208321] ret_from_fork+0x10/0x20 [ 36.208888] [ 36.209254] Allocated by task 253: [ 36.209761] kasan_save_stack+0x3c/0x68 [ 36.210307] kasan_save_track+0x20/0x40 [ 36.210890] kasan_save_alloc_info+0x40/0x58 [ 36.211510] __kasan_kmalloc+0xd4/0xd8 [ 36.212086] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.212688] kasan_atomics+0xb8/0x2e8 [ 36.213225] kunit_try_run_case+0x14c/0x3d0 [ 36.213851] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.214453] kthread+0x24c/0x2d0 [ 36.214998] ret_from_fork+0x10/0x20 [ 36.215499] [ 36.215851] The buggy address belongs to the object at fff00000c63df000 [ 36.215851] which belongs to the cache kmalloc-64 of size 64 [ 36.216913] The buggy address is located 0 bytes to the right of [ 36.216913] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.218270] [ 36.218630] The buggy address belongs to the physical page: [ 36.219183] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.220127] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.220873] page_type: f5(slab) [ 36.221330] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.222225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.223083] page dumped because: kasan: bad access detected [ 36.223607] [ 36.223948] Memory state around the buggy address: [ 36.224677] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.225489] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.226351] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.227161] ^ [ 36.227748] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.228516] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.229194] ================================================================== [ 35.166342] ================================================================== [ 35.167191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.167887] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.168797] [ 35.169228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.170128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.170709] Hardware name: linux,dummy-virt (DT) [ 35.171345] Call trace: [ 35.171780] show_stack+0x20/0x38 (C) [ 35.172343] dump_stack_lvl+0x8c/0xd0 [ 35.172963] print_report+0x118/0x5e0 [ 35.173484] kasan_report+0xc8/0x118 [ 35.174074] kasan_check_range+0x100/0x1a8 [ 35.174697] __kasan_check_write+0x20/0x30 [ 35.175272] kasan_atomics_helper+0x6ec/0x4858 [ 35.175932] kasan_atomics+0x198/0x2e8 [ 35.176552] kunit_try_run_case+0x14c/0x3d0 [ 35.177174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.177830] kthread+0x24c/0x2d0 [ 35.178403] ret_from_fork+0x10/0x20 [ 35.179012] [ 35.179326] Allocated by task 253: [ 35.179833] kasan_save_stack+0x3c/0x68 [ 35.180449] kasan_save_track+0x20/0x40 [ 35.181033] kasan_save_alloc_info+0x40/0x58 [ 35.181689] __kasan_kmalloc+0xd4/0xd8 [ 35.182212] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.182859] kasan_atomics+0xb8/0x2e8 [ 35.183441] kunit_try_run_case+0x14c/0x3d0 [ 35.184007] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184632] kthread+0x24c/0x2d0 [ 35.185202] ret_from_fork+0x10/0x20 [ 35.185678] [ 35.186033] The buggy address belongs to the object at fff00000c63df000 [ 35.186033] which belongs to the cache kmalloc-64 of size 64 [ 35.187146] The buggy address is located 0 bytes to the right of [ 35.187146] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.188356] [ 35.188704] The buggy address belongs to the physical page: [ 35.189401] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.190201] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.190963] page_type: f5(slab) [ 35.191503] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.192297] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.193194] page dumped because: kasan: bad access detected [ 35.193805] [ 35.194175] Memory state around the buggy address: [ 35.194733] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.195461] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.196299] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.196995] ^ [ 35.197681] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.198466] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.199156] ================================================================== [ 35.318392] ================================================================== [ 35.319289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.319654] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.319990] [ 35.320201] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.321585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.322083] Hardware name: linux,dummy-virt (DT) [ 35.322819] Call trace: [ 35.323319] show_stack+0x20/0x38 (C) [ 35.324036] dump_stack_lvl+0x8c/0xd0 [ 35.324779] print_report+0x118/0x5e0 [ 35.325716] kasan_report+0xc8/0x118 [ 35.326255] __asan_report_load4_noabort+0x20/0x30 [ 35.326985] kasan_atomics_helper+0x42d8/0x4858 [ 35.327684] kasan_atomics+0x198/0x2e8 [ 35.328298] kunit_try_run_case+0x14c/0x3d0 [ 35.328931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.329625] kthread+0x24c/0x2d0 [ 35.330107] ret_from_fork+0x10/0x20 [ 35.330680] [ 35.331028] Allocated by task 253: [ 35.331541] kasan_save_stack+0x3c/0x68 [ 35.332028] kasan_save_track+0x20/0x40 [ 35.332634] kasan_save_alloc_info+0x40/0x58 [ 35.333155] __kasan_kmalloc+0xd4/0xd8 [ 35.333740] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.334345] kasan_atomics+0xb8/0x2e8 [ 35.334861] kunit_try_run_case+0x14c/0x3d0 [ 35.335432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.336173] kthread+0x24c/0x2d0 [ 35.336634] ret_from_fork+0x10/0x20 [ 35.337220] [ 35.337529] The buggy address belongs to the object at fff00000c63df000 [ 35.337529] which belongs to the cache kmalloc-64 of size 64 [ 35.338730] The buggy address is located 0 bytes to the right of [ 35.338730] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.339985] [ 35.340354] The buggy address belongs to the physical page: [ 35.340954] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.341767] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.342554] page_type: f5(slab) [ 35.343051] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.343921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.344722] page dumped because: kasan: bad access detected [ 35.345355] [ 35.345662] Memory state around the buggy address: [ 35.346190] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.347011] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.347822] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.348604] ^ [ 35.349260] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349981] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350732] ================================================================== [ 34.848735] ================================================================== [ 34.849627] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 34.851035] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.852352] [ 34.852818] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.853782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.854431] Hardware name: linux,dummy-virt (DT) [ 34.854908] Call trace: [ 34.855334] show_stack+0x20/0x38 (C) [ 34.855940] dump_stack_lvl+0x8c/0xd0 [ 34.857384] print_report+0x118/0x5e0 [ 34.857906] kasan_report+0xc8/0x118 [ 34.858866] kasan_check_range+0x100/0x1a8 [ 34.859604] __kasan_check_write+0x20/0x30 [ 34.860218] kasan_atomics_helper+0x3ac/0x4858 [ 34.860832] kasan_atomics+0x198/0x2e8 [ 34.861605] kunit_try_run_case+0x14c/0x3d0 [ 34.862218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.862973] kthread+0x24c/0x2d0 [ 34.863757] ret_from_fork+0x10/0x20 [ 34.864259] [ 34.864607] Allocated by task 253: [ 34.866088] kasan_save_stack+0x3c/0x68 [ 34.866703] kasan_save_track+0x20/0x40 [ 34.867251] kasan_save_alloc_info+0x40/0x58 [ 34.867841] __kasan_kmalloc+0xd4/0xd8 [ 34.868437] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.869422] kasan_atomics+0xb8/0x2e8 [ 34.869909] kunit_try_run_case+0x14c/0x3d0 [ 34.870497] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.871154] kthread+0x24c/0x2d0 [ 34.871688] ret_from_fork+0x10/0x20 [ 34.872217] [ 34.872576] The buggy address belongs to the object at fff00000c63df000 [ 34.872576] which belongs to the cache kmalloc-64 of size 64 [ 34.874561] The buggy address is located 0 bytes to the right of [ 34.874561] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.875808] [ 34.876177] The buggy address belongs to the physical page: [ 34.876707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.878053] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.878802] page_type: f5(slab) [ 34.879302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.880099] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.880929] page dumped because: kasan: bad access detected [ 34.881585] [ 34.881927] Memory state around the buggy address: [ 34.882564] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.883851] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.884769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.885511] ^ [ 34.886168] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.886888] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.888051] ================================================================== [ 35.352426] ================================================================== [ 35.354021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 35.354869] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.355594] [ 35.355850] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.357707] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.358320] Hardware name: linux,dummy-virt (DT) [ 35.358936] Call trace: [ 35.359474] show_stack+0x20/0x38 (C) [ 35.360016] dump_stack_lvl+0x8c/0xd0 [ 35.360606] print_report+0x118/0x5e0 [ 35.361253] kasan_report+0xc8/0x118 [ 35.361828] kasan_check_range+0x100/0x1a8 [ 35.362559] __kasan_check_write+0x20/0x30 [ 35.363092] kasan_atomics_helper+0x934/0x4858 [ 35.363772] kasan_atomics+0x198/0x2e8 [ 35.364291] kunit_try_run_case+0x14c/0x3d0 [ 35.364937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.365611] kthread+0x24c/0x2d0 [ 35.366200] ret_from_fork+0x10/0x20 [ 35.366724] [ 35.367079] Allocated by task 253: [ 35.367654] kasan_save_stack+0x3c/0x68 [ 35.368150] kasan_save_track+0x20/0x40 [ 35.368733] kasan_save_alloc_info+0x40/0x58 [ 35.369292] __kasan_kmalloc+0xd4/0xd8 [ 35.369874] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.370441] kasan_atomics+0xb8/0x2e8 [ 35.370984] kunit_try_run_case+0x14c/0x3d0 [ 35.371537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.372282] kthread+0x24c/0x2d0 [ 35.372820] ret_from_fork+0x10/0x20 [ 35.373404] [ 35.373754] The buggy address belongs to the object at fff00000c63df000 [ 35.373754] which belongs to the cache kmalloc-64 of size 64 [ 35.374901] The buggy address is located 0 bytes to the right of [ 35.374901] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.376070] [ 35.376446] The buggy address belongs to the physical page: [ 35.377065] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.378004] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.378704] page_type: f5(slab) [ 35.379262] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.380077] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.380884] page dumped because: kasan: bad access detected [ 35.381483] [ 35.381837] Memory state around the buggy address: [ 35.382422] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.383292] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.384081] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.384898] ^ [ 35.385559] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.386280] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.387092] ================================================================== [ 35.707180] ================================================================== [ 35.708170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 35.709023] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.709766] [ 35.710156] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.711133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.711718] Hardware name: linux,dummy-virt (DT) [ 35.712335] Call trace: [ 35.712726] show_stack+0x20/0x38 (C) [ 35.713353] dump_stack_lvl+0x8c/0xd0 [ 35.713967] print_report+0x118/0x5e0 [ 35.714580] kasan_report+0xc8/0x118 [ 35.715165] kasan_check_range+0x100/0x1a8 [ 35.715807] __kasan_check_write+0x20/0x30 [ 35.716367] kasan_atomics_helper+0xca0/0x4858 [ 35.717027] kasan_atomics+0x198/0x2e8 [ 35.717620] kunit_try_run_case+0x14c/0x3d0 [ 35.718285] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.719044] kthread+0x24c/0x2d0 [ 35.719580] ret_from_fork+0x10/0x20 [ 35.720150] [ 35.720495] Allocated by task 253: [ 35.721022] kasan_save_stack+0x3c/0x68 [ 35.721621] kasan_save_track+0x20/0x40 [ 35.722167] kasan_save_alloc_info+0x40/0x58 [ 35.722729] __kasan_kmalloc+0xd4/0xd8 [ 35.723324] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.723968] kasan_atomics+0xb8/0x2e8 [ 35.724489] kunit_try_run_case+0x14c/0x3d0 [ 35.725072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.725704] kthread+0x24c/0x2d0 [ 35.726320] ret_from_fork+0x10/0x20 [ 35.726861] [ 35.727208] The buggy address belongs to the object at fff00000c63df000 [ 35.727208] which belongs to the cache kmalloc-64 of size 64 [ 35.728492] The buggy address is located 0 bytes to the right of [ 35.728492] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.729606] [ 35.729957] The buggy address belongs to the physical page: [ 35.730656] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.731612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.732271] page_type: f5(slab) [ 35.732801] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.733629] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.734478] page dumped because: kasan: bad access detected [ 35.735042] [ 35.735406] Memory state around the buggy address: [ 35.736039] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.736787] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.737531] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.738325] ^ [ 35.738954] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.739678] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.740466] ================================================================== [ 35.130595] ================================================================== [ 35.131803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.132554] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.133890] [ 35.134409] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.135154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.135597] Hardware name: linux,dummy-virt (DT) [ 35.136226] Call trace: [ 35.136639] show_stack+0x20/0x38 (C) [ 35.137141] dump_stack_lvl+0x8c/0xd0 [ 35.137784] print_report+0x118/0x5e0 [ 35.138367] kasan_report+0xc8/0x118 [ 35.138963] kasan_check_range+0x100/0x1a8 [ 35.139562] __kasan_check_write+0x20/0x30 [ 35.140095] kasan_atomics_helper+0x684/0x4858 [ 35.140776] kasan_atomics+0x198/0x2e8 [ 35.141372] kunit_try_run_case+0x14c/0x3d0 [ 35.141890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142662] kthread+0x24c/0x2d0 [ 35.143245] ret_from_fork+0x10/0x20 [ 35.143780] [ 35.144100] Allocated by task 253: [ 35.144599] kasan_save_stack+0x3c/0x68 [ 35.145130] kasan_save_track+0x20/0x40 [ 35.145715] kasan_save_alloc_info+0x40/0x58 [ 35.146241] __kasan_kmalloc+0xd4/0xd8 [ 35.146820] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.147426] kasan_atomics+0xb8/0x2e8 [ 35.147951] kunit_try_run_case+0x14c/0x3d0 [ 35.148598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.149177] kthread+0x24c/0x2d0 [ 35.149709] ret_from_fork+0x10/0x20 [ 35.150275] [ 35.150620] The buggy address belongs to the object at fff00000c63df000 [ 35.150620] which belongs to the cache kmalloc-64 of size 64 [ 35.151738] The buggy address is located 0 bytes to the right of [ 35.151738] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.152874] [ 35.153240] The buggy address belongs to the physical page: [ 35.153915] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.154741] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.155602] page_type: f5(slab) [ 35.156184] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.157047] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.157991] page dumped because: kasan: bad access detected [ 35.158611] [ 35.158987] Memory state around the buggy address: [ 35.159676] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.160430] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.161331] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.162054] ^ [ 35.162752] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.163525] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.164356] ================================================================== [ 35.672910] ================================================================== [ 35.674006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 35.674918] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.675657] [ 35.676034] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.677059] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.677626] Hardware name: linux,dummy-virt (DT) [ 35.678159] Call trace: [ 35.678574] show_stack+0x20/0x38 (C) [ 35.679190] dump_stack_lvl+0x8c/0xd0 [ 35.679788] print_report+0x118/0x5e0 [ 35.680325] kasan_report+0xc8/0x118 [ 35.680908] __asan_report_load4_noabort+0x20/0x30 [ 35.681574] kasan_atomics_helper+0x3de4/0x4858 [ 35.682256] kasan_atomics+0x198/0x2e8 [ 35.682786] kunit_try_run_case+0x14c/0x3d0 [ 35.683448] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.684127] kthread+0x24c/0x2d0 [ 35.684687] ret_from_fork+0x10/0x20 [ 35.685271] [ 35.685572] Allocated by task 253: [ 35.686091] kasan_save_stack+0x3c/0x68 [ 35.686622] kasan_save_track+0x20/0x40 [ 35.687224] kasan_save_alloc_info+0x40/0x58 [ 35.687755] __kasan_kmalloc+0xd4/0xd8 [ 35.688362] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.688957] kasan_atomics+0xb8/0x2e8 [ 35.689463] kunit_try_run_case+0x14c/0x3d0 [ 35.690081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.690776] kthread+0x24c/0x2d0 [ 35.691278] ret_from_fork+0x10/0x20 [ 35.691859] [ 35.692229] The buggy address belongs to the object at fff00000c63df000 [ 35.692229] which belongs to the cache kmalloc-64 of size 64 [ 35.693371] The buggy address is located 0 bytes to the right of [ 35.693371] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.694565] [ 35.694911] The buggy address belongs to the physical page: [ 35.695618] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.696460] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.697331] page_type: f5(slab) [ 35.697928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.698816] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.699667] page dumped because: kasan: bad access detected [ 35.700343] [ 35.700649] Memory state around the buggy address: [ 35.701162] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.702005] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.702769] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.703473] ^ [ 35.704141] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.704892] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.705642] ================================================================== [ 35.238084] ================================================================== [ 35.238810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 35.239552] Write of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 35.240106] [ 35.240989] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 35.242283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.242994] Hardware name: linux,dummy-virt (DT) [ 35.243710] Call trace: [ 35.244070] show_stack+0x20/0x38 (C) [ 35.244594] dump_stack_lvl+0x8c/0xd0 [ 35.245093] print_report+0x118/0x5e0 [ 35.246014] kasan_report+0xc8/0x118 [ 35.246768] kasan_check_range+0x100/0x1a8 [ 35.247517] __kasan_check_write+0x20/0x30 [ 35.248299] kasan_atomics_helper+0x7cc/0x4858 [ 35.249067] kasan_atomics+0x198/0x2e8 [ 35.249799] kunit_try_run_case+0x14c/0x3d0 [ 35.250570] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.251404] kthread+0x24c/0x2d0 [ 35.251883] ret_from_fork+0x10/0x20 [ 35.252713] [ 35.253207] Allocated by task 253: [ 35.253810] kasan_save_stack+0x3c/0x68 [ 35.254539] kasan_save_track+0x20/0x40 [ 35.255247] kasan_save_alloc_info+0x40/0x58 [ 35.255991] __kasan_kmalloc+0xd4/0xd8 [ 35.256700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.257271] kasan_atomics+0xb8/0x2e8 [ 35.257713] kunit_try_run_case+0x14c/0x3d0 [ 35.258246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.258868] kthread+0x24c/0x2d0 [ 35.259854] ret_from_fork+0x10/0x20 [ 35.260603] [ 35.261100] The buggy address belongs to the object at fff00000c63df000 [ 35.261100] which belongs to the cache kmalloc-64 of size 64 [ 35.262579] The buggy address is located 0 bytes to the right of [ 35.262579] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 35.264096] [ 35.264646] The buggy address belongs to the physical page: [ 35.265402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 35.266411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.267262] page_type: f5(slab) [ 35.267774] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.268855] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 35.269822] page dumped because: kasan: bad access detected [ 35.270624] [ 35.270942] Memory state around the buggy address: [ 35.271779] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.272723] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.273543] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.274461] ^ [ 35.275015] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.276034] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.276959] ================================================================== [ 36.056159] ================================================================== [ 36.056907] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.057851] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.058571] [ 36.058936] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.060063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.060678] Hardware name: linux,dummy-virt (DT) [ 36.061356] Call trace: [ 36.061784] show_stack+0x20/0x38 (C) [ 36.062408] dump_stack_lvl+0x8c/0xd0 [ 36.063005] print_report+0x118/0x5e0 [ 36.063602] kasan_report+0xc8/0x118 [ 36.064211] kasan_check_range+0x100/0x1a8 [ 36.064853] __kasan_check_write+0x20/0x30 [ 36.065508] kasan_atomics_helper+0xf88/0x4858 [ 36.066090] kasan_atomics+0x198/0x2e8 [ 36.066737] kunit_try_run_case+0x14c/0x3d0 [ 36.067315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.068033] kthread+0x24c/0x2d0 [ 36.068634] ret_from_fork+0x10/0x20 [ 36.069240] [ 36.069583] Allocated by task 253: [ 36.070087] kasan_save_stack+0x3c/0x68 [ 36.070708] kasan_save_track+0x20/0x40 [ 36.071269] kasan_save_alloc_info+0x40/0x58 [ 36.071896] __kasan_kmalloc+0xd4/0xd8 [ 36.072497] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.073087] kasan_atomics+0xb8/0x2e8 [ 36.073675] kunit_try_run_case+0x14c/0x3d0 [ 36.074274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.075009] kthread+0x24c/0x2d0 [ 36.075562] ret_from_fork+0x10/0x20 [ 36.076130] [ 36.076467] The buggy address belongs to the object at fff00000c63df000 [ 36.076467] which belongs to the cache kmalloc-64 of size 64 [ 36.077579] The buggy address is located 0 bytes to the right of [ 36.077579] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.078737] [ 36.079091] The buggy address belongs to the physical page: [ 36.079654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.080550] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.081376] page_type: f5(slab) [ 36.081915] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.082730] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.083586] page dumped because: kasan: bad access detected [ 36.084318] [ 36.084667] Memory state around the buggy address: [ 36.085166] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.086031] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.086796] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.087600] ^ [ 36.088143] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.088965] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.089796] ================================================================== [ 36.265156] ================================================================== [ 36.265897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.266758] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.267678] [ 36.268070] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.269064] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.269632] Hardware name: linux,dummy-virt (DT) [ 36.270213] Call trace: [ 36.270568] show_stack+0x20/0x38 (C) [ 36.271207] dump_stack_lvl+0x8c/0xd0 [ 36.271816] print_report+0x118/0x5e0 [ 36.272374] kasan_report+0xc8/0x118 [ 36.272994] kasan_check_range+0x100/0x1a8 [ 36.273562] __kasan_check_write+0x20/0x30 [ 36.274252] kasan_atomics_helper+0x11f8/0x4858 [ 36.274981] kasan_atomics+0x198/0x2e8 [ 36.275606] kunit_try_run_case+0x14c/0x3d0 [ 36.276171] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.276987] kthread+0x24c/0x2d0 [ 36.277631] ret_from_fork+0x10/0x20 [ 36.278295] [ 36.278631] Allocated by task 253: [ 36.279091] kasan_save_stack+0x3c/0x68 [ 36.279697] kasan_save_track+0x20/0x40 [ 36.280212] kasan_save_alloc_info+0x40/0x58 [ 36.280839] __kasan_kmalloc+0xd4/0xd8 [ 36.281445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.282023] kasan_atomics+0xb8/0x2e8 [ 36.282580] kunit_try_run_case+0x14c/0x3d0 [ 36.283147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.283764] kthread+0x24c/0x2d0 [ 36.284331] ret_from_fork+0x10/0x20 [ 36.284913] [ 36.285277] The buggy address belongs to the object at fff00000c63df000 [ 36.285277] which belongs to the cache kmalloc-64 of size 64 [ 36.286351] The buggy address is located 0 bytes to the right of [ 36.286351] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.287726] [ 36.288026] The buggy address belongs to the physical page: [ 36.288740] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.289549] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.290368] page_type: f5(slab) [ 36.290910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.291796] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.292443] page dumped because: kasan: bad access detected [ 36.293154] [ 36.293495] Memory state around the buggy address: [ 36.294164] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.294831] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.295715] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.296561] ^ [ 36.297215] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.298011] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.298856] ================================================================== [ 34.729502] ================================================================== [ 34.730876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.731598] Read of size 4 at addr fff00000c63df030 by task kunit_try_catch/253 [ 34.732469] [ 34.732870] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 34.734436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.734996] Hardware name: linux,dummy-virt (DT) [ 34.735661] Call trace: [ 34.736109] show_stack+0x20/0x38 (C) [ 34.736702] dump_stack_lvl+0x8c/0xd0 [ 34.737664] print_report+0x118/0x5e0 [ 34.738153] kasan_report+0xc8/0x118 [ 34.738764] __asan_report_load4_noabort+0x20/0x30 [ 34.739893] kasan_atomics_helper+0x40fc/0x4858 [ 34.740375] kasan_atomics+0x198/0x2e8 [ 34.741474] kunit_try_run_case+0x14c/0x3d0 [ 34.742062] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.742870] kthread+0x24c/0x2d0 [ 34.743486] ret_from_fork+0x10/0x20 [ 34.744135] [ 34.744472] Allocated by task 253: [ 34.745488] kasan_save_stack+0x3c/0x68 [ 34.745983] kasan_save_track+0x20/0x40 [ 34.746508] kasan_save_alloc_info+0x40/0x58 [ 34.747047] __kasan_kmalloc+0xd4/0xd8 [ 34.748091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.748732] kasan_atomics+0xb8/0x2e8 [ 34.749790] kunit_try_run_case+0x14c/0x3d0 [ 34.750380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.751166] kthread+0x24c/0x2d0 [ 34.751787] ret_from_fork+0x10/0x20 [ 34.752391] [ 34.752882] The buggy address belongs to the object at fff00000c63df000 [ 34.752882] which belongs to the cache kmalloc-64 of size 64 [ 34.754061] The buggy address is located 0 bytes to the right of [ 34.754061] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 34.755615] [ 34.756224] The buggy address belongs to the physical page: [ 34.757394] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 34.758354] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.758941] page_type: f5(slab) [ 34.759527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.760392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 34.761721] page dumped because: kasan: bad access detected [ 34.762737] [ 34.763142] Memory state around the buggy address: [ 34.763451] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.763802] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 34.764184] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.764782] ^ [ 34.765445] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.766663] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.767359] ================================================================== [ 36.442389] ================================================================== [ 36.442903] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.443854] Write of size 8 at addr fff00000c63df030 by task kunit_try_catch/253 [ 36.444658] [ 36.444996] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 36.446311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.446908] Hardware name: linux,dummy-virt (DT) [ 36.447559] Call trace: [ 36.447863] show_stack+0x20/0x38 (C) [ 36.448552] dump_stack_lvl+0x8c/0xd0 [ 36.449191] print_report+0x118/0x5e0 [ 36.449765] kasan_report+0xc8/0x118 [ 36.450406] kasan_check_range+0x100/0x1a8 [ 36.451051] __kasan_check_write+0x20/0x30 [ 36.451694] kasan_atomics_helper+0x1414/0x4858 [ 36.452381] kasan_atomics+0x198/0x2e8 [ 36.452988] kunit_try_run_case+0x14c/0x3d0 [ 36.453620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.454363] kthread+0x24c/0x2d0 [ 36.454974] ret_from_fork+0x10/0x20 [ 36.455578] [ 36.455966] Allocated by task 253: [ 36.456495] kasan_save_stack+0x3c/0x68 [ 36.457148] kasan_save_track+0x20/0x40 [ 36.457686] kasan_save_alloc_info+0x40/0x58 [ 36.458401] __kasan_kmalloc+0xd4/0xd8 [ 36.458944] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.459644] kasan_atomics+0xb8/0x2e8 [ 36.460223] kunit_try_run_case+0x14c/0x3d0 [ 36.460884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.461584] kthread+0x24c/0x2d0 [ 36.462085] ret_from_fork+0x10/0x20 [ 36.462716] [ 36.463105] The buggy address belongs to the object at fff00000c63df000 [ 36.463105] which belongs to the cache kmalloc-64 of size 64 [ 36.464420] The buggy address is located 0 bytes to the right of [ 36.464420] allocated 48-byte region [fff00000c63df000, fff00000c63df030) [ 36.465662] [ 36.466069] The buggy address belongs to the physical page: [ 36.466818] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1063df [ 36.467710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.468553] page_type: f5(slab) [ 36.469072] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.469992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 36.470823] page dumped because: kasan: bad access detected [ 36.471497] [ 36.471852] Memory state around the buggy address: [ 36.472504] fff00000c63def00: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.473364] fff00000c63def80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.474155] >fff00000c63df000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.474968] ^ [ 36.475546] fff00000c63df080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.476422] fff00000c63df100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.477281] ==================================================================
[ 27.633859] ================================================================== [ 27.634954] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 27.636134] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.637737] [ 27.637932] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.638917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.639360] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.640482] Call Trace: [ 27.640775] <TASK> [ 27.641037] dump_stack_lvl+0x73/0xb0 [ 27.641831] print_report+0xd1/0x640 [ 27.642274] ? __virt_addr_valid+0x1db/0x2d0 [ 27.642789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.643274] kasan_report+0x102/0x140 [ 27.643771] ? kasan_atomics_helper+0x19e4/0x5450 [ 27.644397] ? kasan_atomics_helper+0x19e4/0x5450 [ 27.644820] kasan_check_range+0x10c/0x1c0 [ 27.645468] __kasan_check_write+0x18/0x20 [ 27.646032] kasan_atomics_helper+0x19e4/0x5450 [ 27.646605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.647140] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.647770] ? kasan_atomics+0x153/0x310 [ 27.648265] kasan_atomics+0x1dd/0x310 [ 27.648800] ? __pfx_kasan_atomics+0x10/0x10 [ 27.649438] ? __pfx_read_tsc+0x10/0x10 [ 27.649864] ? ktime_get_ts64+0x84/0x230 [ 27.650430] kunit_try_run_case+0x1b3/0x490 [ 27.650866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.651491] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.652125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.652658] ? __kthread_parkme+0x82/0x160 [ 27.653168] ? preempt_count_sub+0x50/0x80 [ 27.653682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.654291] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.654810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.655566] kthread+0x257/0x310 [ 27.656226] ? __pfx_kthread+0x10/0x10 [ 27.656906] ret_from_fork+0x41/0x80 [ 27.657485] ? __pfx_kthread+0x10/0x10 [ 27.657883] ret_from_fork_asm+0x1a/0x30 [ 27.658373] </TASK> [ 27.658627] [ 27.658888] Allocated by task 273: [ 27.659301] kasan_save_stack+0x3d/0x60 [ 27.659821] kasan_save_track+0x18/0x40 [ 27.660378] kasan_save_alloc_info+0x3b/0x50 [ 27.660940] __kasan_kmalloc+0xb7/0xc0 [ 27.661327] __kmalloc_cache_noprof+0x184/0x410 [ 27.661903] kasan_atomics+0x96/0x310 [ 27.662323] kunit_try_run_case+0x1b3/0x490 [ 27.662859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.663490] kthread+0x257/0x310 [ 27.663833] ret_from_fork+0x41/0x80 [ 27.664320] ret_from_fork_asm+0x1a/0x30 [ 27.664875] [ 27.665197] The buggy address belongs to the object at ffff888102a32500 [ 27.665197] which belongs to the cache kmalloc-64 of size 64 [ 27.666423] The buggy address is located 0 bytes to the right of [ 27.666423] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.667419] [ 27.667578] The buggy address belongs to the physical page: [ 27.668248] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.669124] flags: 0x200000000000000(node=0|zone=2) [ 27.669540] page_type: f5(slab) [ 27.669817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.670854] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.671527] page dumped because: kasan: bad access detected [ 27.672006] [ 27.672377] Memory state around the buggy address: [ 27.672891] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.673497] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.674397] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.675046] ^ [ 27.675586] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.676182] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.676786] ================================================================== [ 26.392478] ================================================================== [ 26.393479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 26.394097] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.394673] [ 26.394901] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.396143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.396676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.397534] Call Trace: [ 26.397821] <TASK> [ 26.398150] dump_stack_lvl+0x73/0xb0 [ 26.398746] print_report+0xd1/0x640 [ 26.399119] ? __virt_addr_valid+0x1db/0x2d0 [ 26.399740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.400245] kasan_report+0x102/0x140 [ 26.400785] ? kasan_atomics_helper+0xc71/0x5450 [ 26.401459] ? kasan_atomics_helper+0xc71/0x5450 [ 26.402002] kasan_check_range+0x10c/0x1c0 [ 26.402603] __kasan_check_write+0x18/0x20 [ 26.403148] kasan_atomics_helper+0xc71/0x5450 [ 26.403592] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.404271] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.404690] ? kasan_atomics+0x153/0x310 [ 26.405285] kasan_atomics+0x1dd/0x310 [ 26.405642] ? __pfx_kasan_atomics+0x10/0x10 [ 26.406310] ? __pfx_read_tsc+0x10/0x10 [ 26.406847] ? ktime_get_ts64+0x84/0x230 [ 26.407210] kunit_try_run_case+0x1b3/0x490 [ 26.407817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.408380] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.408789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.409431] ? __kthread_parkme+0x82/0x160 [ 26.409999] ? preempt_count_sub+0x50/0x80 [ 26.410547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.410913] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.411598] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.412195] kthread+0x257/0x310 [ 26.412499] ? __pfx_kthread+0x10/0x10 [ 26.412968] ret_from_fork+0x41/0x80 [ 26.413321] ? __pfx_kthread+0x10/0x10 [ 26.413889] ret_from_fork_asm+0x1a/0x30 [ 26.414501] </TASK> [ 26.414761] [ 26.415038] Allocated by task 273: [ 26.415422] kasan_save_stack+0x3d/0x60 [ 26.415928] kasan_save_track+0x18/0x40 [ 26.416388] kasan_save_alloc_info+0x3b/0x50 [ 26.416753] __kasan_kmalloc+0xb7/0xc0 [ 26.417367] __kmalloc_cache_noprof+0x184/0x410 [ 26.417759] kasan_atomics+0x96/0x310 [ 26.418330] kunit_try_run_case+0x1b3/0x490 [ 26.418738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.419452] kthread+0x257/0x310 [ 26.419771] ret_from_fork+0x41/0x80 [ 26.420258] ret_from_fork_asm+0x1a/0x30 [ 26.420670] [ 26.420974] The buggy address belongs to the object at ffff888102a32500 [ 26.420974] which belongs to the cache kmalloc-64 of size 64 [ 26.422126] The buggy address is located 0 bytes to the right of [ 26.422126] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.423531] [ 26.423759] The buggy address belongs to the physical page: [ 26.424285] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.425006] flags: 0x200000000000000(node=0|zone=2) [ 26.425675] page_type: f5(slab) [ 26.426130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.426888] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.427668] page dumped because: kasan: bad access detected [ 26.428274] [ 26.428499] Memory state around the buggy address: [ 26.428993] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.429754] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.430495] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.431109] ^ [ 26.431565] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.432281] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.432980] ================================================================== [ 25.609557] ================================================================== [ 25.610353] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 25.610875] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.611773] [ 25.612087] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.612889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.613161] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.614598] Call Trace: [ 25.614953] <TASK> [ 25.615205] dump_stack_lvl+0x73/0xb0 [ 25.615874] print_report+0xd1/0x640 [ 25.616602] ? __virt_addr_valid+0x1db/0x2d0 [ 25.616997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.617740] kasan_report+0x102/0x140 [ 25.618391] ? kasan_atomics_helper+0x4ba4/0x5450 [ 25.619011] ? kasan_atomics_helper+0x4ba4/0x5450 [ 25.619545] __asan_report_store4_noabort+0x1b/0x30 [ 25.620157] kasan_atomics_helper+0x4ba4/0x5450 [ 25.620857] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.621967] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.622866] ? kasan_atomics+0x153/0x310 [ 25.623590] kasan_atomics+0x1dd/0x310 [ 25.623987] ? __pfx_kasan_atomics+0x10/0x10 [ 25.625041] ? __pfx_read_tsc+0x10/0x10 [ 25.626031] ? ktime_get_ts64+0x84/0x230 [ 25.626622] kunit_try_run_case+0x1b3/0x490 [ 25.627028] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.627467] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.627879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.629422] ? __kthread_parkme+0x82/0x160 [ 25.629856] ? preempt_count_sub+0x50/0x80 [ 25.630544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.631145] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.631695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.632694] kthread+0x257/0x310 [ 25.632997] ? __pfx_kthread+0x10/0x10 [ 25.633591] ret_from_fork+0x41/0x80 [ 25.634872] ? __pfx_kthread+0x10/0x10 [ 25.635356] ret_from_fork_asm+0x1a/0x30 [ 25.635751] </TASK> [ 25.636448] [ 25.636766] Allocated by task 273: [ 25.637021] kasan_save_stack+0x3d/0x60 [ 25.638060] kasan_save_track+0x18/0x40 [ 25.638801] kasan_save_alloc_info+0x3b/0x50 [ 25.639350] __kasan_kmalloc+0xb7/0xc0 [ 25.639830] __kmalloc_cache_noprof+0x184/0x410 [ 25.640781] kasan_atomics+0x96/0x310 [ 25.641272] kunit_try_run_case+0x1b3/0x490 [ 25.641864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.643300] kthread+0x257/0x310 [ 25.643890] ret_from_fork+0x41/0x80 [ 25.644523] ret_from_fork_asm+0x1a/0x30 [ 25.645155] [ 25.645413] The buggy address belongs to the object at ffff888102a32500 [ 25.645413] which belongs to the cache kmalloc-64 of size 64 [ 25.647460] The buggy address is located 0 bytes to the right of [ 25.647460] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.648737] [ 25.649002] The buggy address belongs to the physical page: [ 25.649546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.650457] flags: 0x200000000000000(node=0|zone=2) [ 25.651494] page_type: f5(slab) [ 25.651816] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.652567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.653244] page dumped because: kasan: bad access detected [ 25.654798] [ 25.655101] Memory state around the buggy address: [ 25.655615] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.656483] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.657291] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.658122] ^ [ 25.659234] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.659859] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.660752] ================================================================== [ 27.318971] ================================================================== [ 27.319652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 27.320554] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.321320] [ 27.321964] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.322955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.323494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.324730] Call Trace: [ 27.325025] <TASK> [ 27.325305] dump_stack_lvl+0x73/0xb0 [ 27.325646] print_report+0xd1/0x640 [ 27.326119] ? __virt_addr_valid+0x1db/0x2d0 [ 27.326631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.326997] kasan_report+0x102/0x140 [ 27.327627] ? kasan_atomics_helper+0x15b7/0x5450 [ 27.328354] ? kasan_atomics_helper+0x15b7/0x5450 [ 27.328974] kasan_check_range+0x10c/0x1c0 [ 27.329616] __kasan_check_write+0x18/0x20 [ 27.330118] kasan_atomics_helper+0x15b7/0x5450 [ 27.330763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.331443] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.332123] ? kasan_atomics+0x153/0x310 [ 27.332541] kasan_atomics+0x1dd/0x310 [ 27.333052] ? __pfx_kasan_atomics+0x10/0x10 [ 27.333607] ? __pfx_read_tsc+0x10/0x10 [ 27.333989] ? ktime_get_ts64+0x84/0x230 [ 27.334677] kunit_try_run_case+0x1b3/0x490 [ 27.335192] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.335788] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.336415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.336994] ? __kthread_parkme+0x82/0x160 [ 27.337610] ? preempt_count_sub+0x50/0x80 [ 27.337995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.338753] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.339400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.340000] kthread+0x257/0x310 [ 27.340481] ? __pfx_kthread+0x10/0x10 [ 27.341023] ret_from_fork+0x41/0x80 [ 27.341545] ? __pfx_kthread+0x10/0x10 [ 27.341958] ret_from_fork_asm+0x1a/0x30 [ 27.342658] </TASK> [ 27.342957] [ 27.343323] Allocated by task 273: [ 27.343730] kasan_save_stack+0x3d/0x60 [ 27.344197] kasan_save_track+0x18/0x40 [ 27.344676] kasan_save_alloc_info+0x3b/0x50 [ 27.345028] __kasan_kmalloc+0xb7/0xc0 [ 27.345660] __kmalloc_cache_noprof+0x184/0x410 [ 27.346284] kasan_atomics+0x96/0x310 [ 27.346599] kunit_try_run_case+0x1b3/0x490 [ 27.346935] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.347777] kthread+0x257/0x310 [ 27.348317] ret_from_fork+0x41/0x80 [ 27.348670] ret_from_fork_asm+0x1a/0x30 [ 27.349275] [ 27.349610] The buggy address belongs to the object at ffff888102a32500 [ 27.349610] which belongs to the cache kmalloc-64 of size 64 [ 27.350743] The buggy address is located 0 bytes to the right of [ 27.350743] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.351792] [ 27.352055] The buggy address belongs to the physical page: [ 27.352793] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.353906] flags: 0x200000000000000(node=0|zone=2) [ 27.354736] page_type: f5(slab) [ 27.355399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.356074] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.356743] page dumped because: kasan: bad access detected [ 27.357236] [ 27.358017] Memory state around the buggy address: [ 27.358606] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.358891] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.359417] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.360373] ^ [ 27.361140] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.361809] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.362543] ================================================================== [ 27.501490] ================================================================== [ 27.502402] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 27.503184] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.503852] [ 27.504039] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.504802] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.505348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.506313] Call Trace: [ 27.506562] <TASK> [ 27.506773] dump_stack_lvl+0x73/0xb0 [ 27.507294] print_report+0xd1/0x640 [ 27.508050] ? __virt_addr_valid+0x1db/0x2d0 [ 27.508391] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.509028] kasan_report+0x102/0x140 [ 27.509445] ? kasan_atomics_helper+0x1819/0x5450 [ 27.509973] ? kasan_atomics_helper+0x1819/0x5450 [ 27.510510] kasan_check_range+0x10c/0x1c0 [ 27.510875] __kasan_check_write+0x18/0x20 [ 27.511442] kasan_atomics_helper+0x1819/0x5450 [ 27.511805] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.512371] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.512969] ? kasan_atomics+0x153/0x310 [ 27.513470] kasan_atomics+0x1dd/0x310 [ 27.513800] ? __pfx_kasan_atomics+0x10/0x10 [ 27.514261] ? __pfx_read_tsc+0x10/0x10 [ 27.514762] ? ktime_get_ts64+0x84/0x230 [ 27.515356] kunit_try_run_case+0x1b3/0x490 [ 27.515892] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.516485] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.516820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.517474] ? __kthread_parkme+0x82/0x160 [ 27.518025] ? preempt_count_sub+0x50/0x80 [ 27.518533] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.518956] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.519659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.520286] kthread+0x257/0x310 [ 27.520680] ? __pfx_kthread+0x10/0x10 [ 27.521036] ret_from_fork+0x41/0x80 [ 27.521379] ? __pfx_kthread+0x10/0x10 [ 27.521673] ret_from_fork_asm+0x1a/0x30 [ 27.521994] </TASK> [ 27.522243] [ 27.522465] Allocated by task 273: [ 27.522898] kasan_save_stack+0x3d/0x60 [ 27.523497] kasan_save_track+0x18/0x40 [ 27.523980] kasan_save_alloc_info+0x3b/0x50 [ 27.524561] __kasan_kmalloc+0xb7/0xc0 [ 27.525060] __kmalloc_cache_noprof+0x184/0x410 [ 27.525533] kasan_atomics+0x96/0x310 [ 27.525922] kunit_try_run_case+0x1b3/0x490 [ 27.526286] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.526839] kthread+0x257/0x310 [ 27.527260] ret_from_fork+0x41/0x80 [ 27.527595] ret_from_fork_asm+0x1a/0x30 [ 27.528000] [ 27.528188] The buggy address belongs to the object at ffff888102a32500 [ 27.528188] which belongs to the cache kmalloc-64 of size 64 [ 27.529211] The buggy address is located 0 bytes to the right of [ 27.529211] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.530325] [ 27.530571] The buggy address belongs to the physical page: [ 27.531111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.531825] flags: 0x200000000000000(node=0|zone=2) [ 27.532206] page_type: f5(slab) [ 27.532541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.533449] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.534195] page dumped because: kasan: bad access detected [ 27.534754] [ 27.534998] Memory state around the buggy address: [ 27.535481] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.536144] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.536599] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.537006] ^ [ 27.537599] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.538383] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.539008] ================================================================== [ 26.999771] ================================================================== [ 27.000939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 27.001744] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.002402] [ 27.002705] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.003730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.004266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.005127] Call Trace: [ 27.005583] <TASK> [ 27.005813] dump_stack_lvl+0x73/0xb0 [ 27.006321] print_report+0xd1/0x640 [ 27.006804] ? __virt_addr_valid+0x1db/0x2d0 [ 27.007285] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.007741] kasan_report+0x102/0x140 [ 27.008309] ? kasan_atomics_helper+0x12e7/0x5450 [ 27.008939] ? kasan_atomics_helper+0x12e7/0x5450 [ 27.009381] kasan_check_range+0x10c/0x1c0 [ 27.009987] __kasan_check_write+0x18/0x20 [ 27.010404] kasan_atomics_helper+0x12e7/0x5450 [ 27.010995] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.011496] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.012110] ? kasan_atomics+0x153/0x310 [ 27.012549] kasan_atomics+0x1dd/0x310 [ 27.013051] ? __pfx_kasan_atomics+0x10/0x10 [ 27.013769] ? __pfx_read_tsc+0x10/0x10 [ 27.014246] ? ktime_get_ts64+0x84/0x230 [ 27.014702] kunit_try_run_case+0x1b3/0x490 [ 27.015311] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.015745] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.016283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.016885] ? __kthread_parkme+0x82/0x160 [ 27.017322] ? preempt_count_sub+0x50/0x80 [ 27.017969] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.018534] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.019173] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.019722] kthread+0x257/0x310 [ 27.020163] ? __pfx_kthread+0x10/0x10 [ 27.020574] ret_from_fork+0x41/0x80 [ 27.021118] ? __pfx_kthread+0x10/0x10 [ 27.021489] ret_from_fork_asm+0x1a/0x30 [ 27.022016] </TASK> [ 27.022732] [ 27.023312] Allocated by task 273: [ 27.023640] kasan_save_stack+0x3d/0x60 [ 27.024085] kasan_save_track+0x18/0x40 [ 27.024641] kasan_save_alloc_info+0x3b/0x50 [ 27.025355] __kasan_kmalloc+0xb7/0xc0 [ 27.025884] __kmalloc_cache_noprof+0x184/0x410 [ 27.026401] kasan_atomics+0x96/0x310 [ 27.026839] kunit_try_run_case+0x1b3/0x490 [ 27.027772] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.028322] kthread+0x257/0x310 [ 27.028700] ret_from_fork+0x41/0x80 [ 27.029122] ret_from_fork_asm+0x1a/0x30 [ 27.029711] [ 27.029983] The buggy address belongs to the object at ffff888102a32500 [ 27.029983] which belongs to the cache kmalloc-64 of size 64 [ 27.031253] The buggy address is located 0 bytes to the right of [ 27.031253] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.032390] [ 27.032683] The buggy address belongs to the physical page: [ 27.033615] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.034545] flags: 0x200000000000000(node=0|zone=2) [ 27.035043] page_type: f5(slab) [ 27.035632] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.036550] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.037315] page dumped because: kasan: bad access detected [ 27.037859] [ 27.038169] Memory state around the buggy address: [ 27.038621] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.039410] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.040150] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.040829] ^ [ 27.041447] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.042112] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.042761] ================================================================== [ 27.585489] ================================================================== [ 27.586392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 27.587376] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.588048] [ 27.588251] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.588808] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.589324] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.590671] Call Trace: [ 27.591153] <TASK> [ 27.591371] dump_stack_lvl+0x73/0xb0 [ 27.592172] print_report+0xd1/0x640 [ 27.593087] ? __virt_addr_valid+0x1db/0x2d0 [ 27.593749] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.594488] kasan_report+0x102/0x140 [ 27.595083] ? kasan_atomics_helper+0x194b/0x5450 [ 27.595755] ? kasan_atomics_helper+0x194b/0x5450 [ 27.596491] kasan_check_range+0x10c/0x1c0 [ 27.596954] __kasan_check_write+0x18/0x20 [ 27.597511] kasan_atomics_helper+0x194b/0x5450 [ 27.597994] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.598663] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.599139] ? kasan_atomics+0x153/0x310 [ 27.599954] kasan_atomics+0x1dd/0x310 [ 27.600595] ? __pfx_kasan_atomics+0x10/0x10 [ 27.601070] ? __pfx_read_tsc+0x10/0x10 [ 27.601720] ? ktime_get_ts64+0x84/0x230 [ 27.602149] kunit_try_run_case+0x1b3/0x490 [ 27.602690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.603502] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.604052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.604628] ? __kthread_parkme+0x82/0x160 [ 27.605222] ? preempt_count_sub+0x50/0x80 [ 27.605720] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.606419] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.607017] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.607774] kthread+0x257/0x310 [ 27.608272] ? __pfx_kthread+0x10/0x10 [ 27.608753] ret_from_fork+0x41/0x80 [ 27.609162] ? __pfx_kthread+0x10/0x10 [ 27.609900] ret_from_fork_asm+0x1a/0x30 [ 27.610560] </TASK> [ 27.611049] [ 27.611309] Allocated by task 273: [ 27.611739] kasan_save_stack+0x3d/0x60 [ 27.612405] kasan_save_track+0x18/0x40 [ 27.612883] kasan_save_alloc_info+0x3b/0x50 [ 27.613459] __kasan_kmalloc+0xb7/0xc0 [ 27.614155] __kmalloc_cache_noprof+0x184/0x410 [ 27.614646] kasan_atomics+0x96/0x310 [ 27.615059] kunit_try_run_case+0x1b3/0x490 [ 27.615732] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.616442] kthread+0x257/0x310 [ 27.616822] ret_from_fork+0x41/0x80 [ 27.617307] ret_from_fork_asm+0x1a/0x30 [ 27.618051] [ 27.618261] The buggy address belongs to the object at ffff888102a32500 [ 27.618261] which belongs to the cache kmalloc-64 of size 64 [ 27.619686] The buggy address is located 0 bytes to the right of [ 27.619686] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.621111] [ 27.621291] The buggy address belongs to the physical page: [ 27.621952] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.622773] flags: 0x200000000000000(node=0|zone=2) [ 27.623516] page_type: f5(slab) [ 27.624000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.624736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.625643] page dumped because: kasan: bad access detected [ 27.626475] [ 27.626693] Memory state around the buggy address: [ 27.627138] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.627828] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.628408] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.629135] ^ [ 27.629930] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.630738] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.631586] ================================================================== [ 25.801869] ================================================================== [ 25.803569] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 25.804063] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.804861] [ 25.805151] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.805837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.806380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.807203] Call Trace: [ 25.807464] <TASK> [ 25.807726] dump_stack_lvl+0x73/0xb0 [ 25.808282] print_report+0xd1/0x640 [ 25.808696] ? __virt_addr_valid+0x1db/0x2d0 [ 25.809146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.809741] kasan_report+0x102/0x140 [ 25.810254] ? kasan_atomics_helper+0x4b56/0x5450 [ 25.810638] ? kasan_atomics_helper+0x4b56/0x5450 [ 25.811236] __asan_report_load4_noabort+0x18/0x20 [ 25.811667] kasan_atomics_helper+0x4b56/0x5450 [ 25.812199] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.812795] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.813182] ? kasan_atomics+0x153/0x310 [ 25.813670] kasan_atomics+0x1dd/0x310 [ 25.814136] ? __pfx_kasan_atomics+0x10/0x10 [ 25.814581] ? __pfx_read_tsc+0x10/0x10 [ 25.814895] ? ktime_get_ts64+0x84/0x230 [ 25.815383] kunit_try_run_case+0x1b3/0x490 [ 25.815900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.816416] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.816932] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.817504] ? __kthread_parkme+0x82/0x160 [ 25.818005] ? preempt_count_sub+0x50/0x80 [ 25.818431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.818951] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.819565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.819932] kthread+0x257/0x310 [ 25.820389] ? __pfx_kthread+0x10/0x10 [ 25.820856] ret_from_fork+0x41/0x80 [ 25.821225] ? __pfx_kthread+0x10/0x10 [ 25.821738] ret_from_fork_asm+0x1a/0x30 [ 25.822269] </TASK> [ 25.822516] [ 25.822772] Allocated by task 273: [ 25.823133] kasan_save_stack+0x3d/0x60 [ 25.823601] kasan_save_track+0x18/0x40 [ 25.823894] kasan_save_alloc_info+0x3b/0x50 [ 25.824412] __kasan_kmalloc+0xb7/0xc0 [ 25.824733] __kmalloc_cache_noprof+0x184/0x410 [ 25.825301] kasan_atomics+0x96/0x310 [ 25.825705] kunit_try_run_case+0x1b3/0x490 [ 25.826250] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.826646] kthread+0x257/0x310 [ 25.826899] ret_from_fork+0x41/0x80 [ 25.827309] ret_from_fork_asm+0x1a/0x30 [ 25.827810] [ 25.828057] The buggy address belongs to the object at ffff888102a32500 [ 25.828057] which belongs to the cache kmalloc-64 of size 64 [ 25.829007] The buggy address is located 0 bytes to the right of [ 25.829007] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.830330] [ 25.830554] The buggy address belongs to the physical page: [ 25.831011] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.831710] flags: 0x200000000000000(node=0|zone=2) [ 25.832361] page_type: f5(slab) [ 25.832656] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.833212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.833849] page dumped because: kasan: bad access detected [ 25.834258] [ 25.834533] Memory state around the buggy address: [ 25.836134] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.837028] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.837566] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.837837] ^ [ 25.838035] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.839266] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.840355] ================================================================== [ 26.604684] ================================================================== [ 26.605828] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 26.606479] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.607181] [ 26.607478] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.608293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.608761] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.609509] Call Trace: [ 26.609859] <TASK> [ 26.610197] dump_stack_lvl+0x73/0xb0 [ 26.610702] print_report+0xd1/0x640 [ 26.611049] ? __virt_addr_valid+0x1db/0x2d0 [ 26.611596] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.612053] kasan_report+0x102/0x140 [ 26.612533] ? kasan_atomics_helper+0xf11/0x5450 [ 26.613015] ? kasan_atomics_helper+0xf11/0x5450 [ 26.613442] kasan_check_range+0x10c/0x1c0 [ 26.613989] __kasan_check_write+0x18/0x20 [ 26.614450] kasan_atomics_helper+0xf11/0x5450 [ 26.614780] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.615273] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.615840] ? kasan_atomics+0x153/0x310 [ 26.616358] kasan_atomics+0x1dd/0x310 [ 26.616778] ? __pfx_kasan_atomics+0x10/0x10 [ 26.617349] ? __pfx_read_tsc+0x10/0x10 [ 26.617737] ? ktime_get_ts64+0x84/0x230 [ 26.618123] kunit_try_run_case+0x1b3/0x490 [ 26.618630] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.619218] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.619582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.619960] ? __kthread_parkme+0x82/0x160 [ 26.620561] ? preempt_count_sub+0x50/0x80 [ 26.621130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.621648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.622210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.622678] kthread+0x257/0x310 [ 26.623063] ? __pfx_kthread+0x10/0x10 [ 26.623462] ret_from_fork+0x41/0x80 [ 26.623823] ? __pfx_kthread+0x10/0x10 [ 26.624323] ret_from_fork_asm+0x1a/0x30 [ 26.624862] </TASK> [ 26.625187] [ 26.625364] Allocated by task 273: [ 26.625703] kasan_save_stack+0x3d/0x60 [ 26.626223] kasan_save_track+0x18/0x40 [ 26.626648] kasan_save_alloc_info+0x3b/0x50 [ 26.627036] __kasan_kmalloc+0xb7/0xc0 [ 26.627377] __kmalloc_cache_noprof+0x184/0x410 [ 26.627882] kasan_atomics+0x96/0x310 [ 26.628407] kunit_try_run_case+0x1b3/0x490 [ 26.628840] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.629238] kthread+0x257/0x310 [ 26.629680] ret_from_fork+0x41/0x80 [ 26.630199] ret_from_fork_asm+0x1a/0x30 [ 26.630635] [ 26.630794] The buggy address belongs to the object at ffff888102a32500 [ 26.630794] which belongs to the cache kmalloc-64 of size 64 [ 26.631974] The buggy address is located 0 bytes to the right of [ 26.631974] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.633013] [ 26.633284] The buggy address belongs to the physical page: [ 26.633750] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.634392] flags: 0x200000000000000(node=0|zone=2) [ 26.634844] page_type: f5(slab) [ 26.635184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.635641] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.636459] page dumped because: kasan: bad access detected [ 26.637442] [ 26.637729] Memory state around the buggy address: [ 26.638317] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.639021] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.639939] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.640556] ^ [ 26.640931] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.641712] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.642568] ================================================================== [ 27.226640] ================================================================== [ 27.227312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 27.228579] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.229955] [ 27.230208] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.231170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.231973] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.233191] Call Trace: [ 27.233594] <TASK> [ 27.233873] dump_stack_lvl+0x73/0xb0 [ 27.234490] print_report+0xd1/0x640 [ 27.234885] ? __virt_addr_valid+0x1db/0x2d0 [ 27.235358] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.235734] kasan_report+0x102/0x140 [ 27.236210] ? kasan_atomics_helper+0x50d6/0x5450 [ 27.236760] ? kasan_atomics_helper+0x50d6/0x5450 [ 27.237281] __asan_report_store8_noabort+0x1b/0x30 [ 27.237669] kasan_atomics_helper+0x50d6/0x5450 [ 27.238275] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.238972] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.240033] ? kasan_atomics+0x153/0x310 [ 27.240654] kasan_atomics+0x1dd/0x310 [ 27.241089] ? __pfx_kasan_atomics+0x10/0x10 [ 27.241786] ? __pfx_read_tsc+0x10/0x10 [ 27.242366] ? ktime_get_ts64+0x84/0x230 [ 27.243143] kunit_try_run_case+0x1b3/0x490 [ 27.243797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.244268] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.244793] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.245375] ? __kthread_parkme+0x82/0x160 [ 27.245824] ? preempt_count_sub+0x50/0x80 [ 27.246608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.247139] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.247748] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.248588] kthread+0x257/0x310 [ 27.249137] ? __pfx_kthread+0x10/0x10 [ 27.249602] ret_from_fork+0x41/0x80 [ 27.250219] ? __pfx_kthread+0x10/0x10 [ 27.250626] ret_from_fork_asm+0x1a/0x30 [ 27.251118] </TASK> [ 27.251484] [ 27.251753] Allocated by task 273: [ 27.252270] kasan_save_stack+0x3d/0x60 [ 27.252918] kasan_save_track+0x18/0x40 [ 27.253756] kasan_save_alloc_info+0x3b/0x50 [ 27.254264] __kasan_kmalloc+0xb7/0xc0 [ 27.254965] __kmalloc_cache_noprof+0x184/0x410 [ 27.255587] kasan_atomics+0x96/0x310 [ 27.255983] kunit_try_run_case+0x1b3/0x490 [ 27.256509] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.257055] kthread+0x257/0x310 [ 27.257461] ret_from_fork+0x41/0x80 [ 27.257911] ret_from_fork_asm+0x1a/0x30 [ 27.258595] [ 27.258853] The buggy address belongs to the object at ffff888102a32500 [ 27.258853] which belongs to the cache kmalloc-64 of size 64 [ 27.260806] The buggy address is located 0 bytes to the right of [ 27.260806] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.261752] [ 27.261987] The buggy address belongs to the physical page: [ 27.262495] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.263128] flags: 0x200000000000000(node=0|zone=2) [ 27.264049] page_type: f5(slab) [ 27.264449] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.265473] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.266523] page dumped because: kasan: bad access detected [ 27.267555] [ 27.267764] Memory state around the buggy address: [ 27.268317] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.268659] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.268930] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.269305] ^ [ 27.270063] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271059] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271689] ================================================================== [ 26.739547] ================================================================== [ 26.740246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 26.741127] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.741880] [ 26.742253] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.743172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.743538] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.744522] Call Trace: [ 26.744856] <TASK> [ 26.745059] dump_stack_lvl+0x73/0xb0 [ 26.745675] print_report+0xd1/0x640 [ 26.746293] ? __virt_addr_valid+0x1db/0x2d0 [ 26.746768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.747367] kasan_report+0x102/0x140 [ 26.747828] ? kasan_atomics_helper+0x107a/0x5450 [ 26.748422] ? kasan_atomics_helper+0x107a/0x5450 [ 26.748905] kasan_check_range+0x10c/0x1c0 [ 26.749421] __kasan_check_write+0x18/0x20 [ 26.749940] kasan_atomics_helper+0x107a/0x5450 [ 26.750716] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.751170] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.751723] ? kasan_atomics+0x153/0x310 [ 26.752160] kasan_atomics+0x1dd/0x310 [ 26.752587] ? __pfx_kasan_atomics+0x10/0x10 [ 26.753034] ? __pfx_read_tsc+0x10/0x10 [ 26.753510] ? ktime_get_ts64+0x84/0x230 [ 26.754012] kunit_try_run_case+0x1b3/0x490 [ 26.754524] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.754927] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.755489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.756007] ? __kthread_parkme+0x82/0x160 [ 26.756461] ? preempt_count_sub+0x50/0x80 [ 26.756766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.757400] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.758051] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.758667] kthread+0x257/0x310 [ 26.758934] ? __pfx_kthread+0x10/0x10 [ 26.759427] ret_from_fork+0x41/0x80 [ 26.759906] ? __pfx_kthread+0x10/0x10 [ 26.760387] ret_from_fork_asm+0x1a/0x30 [ 26.760845] </TASK> [ 26.761098] [ 26.761277] Allocated by task 273: [ 26.761727] kasan_save_stack+0x3d/0x60 [ 26.762253] kasan_save_track+0x18/0x40 [ 26.762703] kasan_save_alloc_info+0x3b/0x50 [ 26.763155] __kasan_kmalloc+0xb7/0xc0 [ 26.763654] __kmalloc_cache_noprof+0x184/0x410 [ 26.763994] kasan_atomics+0x96/0x310 [ 26.764331] kunit_try_run_case+0x1b3/0x490 [ 26.764650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.764994] kthread+0x257/0x310 [ 26.765516] ret_from_fork+0x41/0x80 [ 26.766025] ret_from_fork_asm+0x1a/0x30 [ 26.766591] [ 26.766845] The buggy address belongs to the object at ffff888102a32500 [ 26.766845] which belongs to the cache kmalloc-64 of size 64 [ 26.768040] The buggy address is located 0 bytes to the right of [ 26.768040] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.769225] [ 26.769454] The buggy address belongs to the physical page: [ 26.770198] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.770867] flags: 0x200000000000000(node=0|zone=2) [ 26.771258] page_type: f5(slab) [ 26.771690] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.772475] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.772904] page dumped because: kasan: bad access detected [ 26.773310] [ 26.773597] Memory state around the buggy address: [ 26.774228] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.775117] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.775930] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.776727] ^ [ 26.777041] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.777697] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.778584] ================================================================== [ 27.457689] ================================================================== [ 27.458703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 27.460499] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.461203] [ 27.461450] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.463664] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.464049] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.465136] Call Trace: [ 27.465678] <TASK> [ 27.466284] dump_stack_lvl+0x73/0xb0 [ 27.466957] print_report+0xd1/0x640 [ 27.467378] ? __virt_addr_valid+0x1db/0x2d0 [ 27.467837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.468475] kasan_report+0x102/0x140 [ 27.468776] ? kasan_atomics_helper+0x1780/0x5450 [ 27.469929] ? kasan_atomics_helper+0x1780/0x5450 [ 27.470612] kasan_check_range+0x10c/0x1c0 [ 27.471071] __kasan_check_write+0x18/0x20 [ 27.472011] kasan_atomics_helper+0x1780/0x5450 [ 27.472698] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.473385] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.473869] ? kasan_atomics+0x153/0x310 [ 27.474298] kasan_atomics+0x1dd/0x310 [ 27.474666] ? __pfx_kasan_atomics+0x10/0x10 [ 27.475158] ? __pfx_read_tsc+0x10/0x10 [ 27.475600] ? ktime_get_ts64+0x84/0x230 [ 27.476043] kunit_try_run_case+0x1b3/0x490 [ 27.476669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.477055] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.478123] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.478725] ? __kthread_parkme+0x82/0x160 [ 27.479132] ? preempt_count_sub+0x50/0x80 [ 27.479587] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.480169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.480664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.481415] kthread+0x257/0x310 [ 27.481710] ? __pfx_kthread+0x10/0x10 [ 27.482397] ret_from_fork+0x41/0x80 [ 27.482871] ? __pfx_kthread+0x10/0x10 [ 27.483221] ret_from_fork_asm+0x1a/0x30 [ 27.483751] </TASK> [ 27.483985] [ 27.484230] Allocated by task 273: [ 27.484638] kasan_save_stack+0x3d/0x60 [ 27.485002] kasan_save_track+0x18/0x40 [ 27.485527] kasan_save_alloc_info+0x3b/0x50 [ 27.485960] __kasan_kmalloc+0xb7/0xc0 [ 27.486372] __kmalloc_cache_noprof+0x184/0x410 [ 27.486872] kasan_atomics+0x96/0x310 [ 27.487277] kunit_try_run_case+0x1b3/0x490 [ 27.487791] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.488395] kthread+0x257/0x310 [ 27.488742] ret_from_fork+0x41/0x80 [ 27.489209] ret_from_fork_asm+0x1a/0x30 [ 27.489610] [ 27.489852] The buggy address belongs to the object at ffff888102a32500 [ 27.489852] which belongs to the cache kmalloc-64 of size 64 [ 27.490867] The buggy address is located 0 bytes to the right of [ 27.490867] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.491842] [ 27.492090] The buggy address belongs to the physical page: [ 27.492654] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.493306] flags: 0x200000000000000(node=0|zone=2) [ 27.493786] page_type: f5(slab) [ 27.494041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.494846] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.495359] page dumped because: kasan: bad access detected [ 27.495840] [ 27.496106] Memory state around the buggy address: [ 27.496683] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.497488] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.497917] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.498703] ^ [ 27.499206] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.499790] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.500241] ================================================================== [ 26.825459] ================================================================== [ 26.826290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 26.828527] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.829305] [ 26.829737] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.830856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.831237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.832324] Call Trace: [ 26.832695] <TASK> [ 26.833076] dump_stack_lvl+0x73/0xb0 [ 26.833487] print_report+0xd1/0x640 [ 26.834021] ? __virt_addr_valid+0x1db/0x2d0 [ 26.834612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.835202] kasan_report+0x102/0x140 [ 26.835811] ? kasan_atomics_helper+0x1149/0x5450 [ 26.836472] ? kasan_atomics_helper+0x1149/0x5450 [ 26.837249] kasan_check_range+0x10c/0x1c0 [ 26.837777] __kasan_check_write+0x18/0x20 [ 26.838269] kasan_atomics_helper+0x1149/0x5450 [ 26.838612] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.839150] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.839799] ? kasan_atomics+0x153/0x310 [ 26.840562] kasan_atomics+0x1dd/0x310 [ 26.841498] ? __pfx_kasan_atomics+0x10/0x10 [ 26.841934] ? __pfx_read_tsc+0x10/0x10 [ 26.842959] ? ktime_get_ts64+0x84/0x230 [ 26.843609] kunit_try_run_case+0x1b3/0x490 [ 26.843995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.844665] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.845168] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.845707] ? __kthread_parkme+0x82/0x160 [ 26.846399] ? preempt_count_sub+0x50/0x80 [ 26.846827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.847444] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.847957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.848707] kthread+0x257/0x310 [ 26.849202] ? __pfx_kthread+0x10/0x10 [ 26.849788] ret_from_fork+0x41/0x80 [ 26.850280] ? __pfx_kthread+0x10/0x10 [ 26.850778] ret_from_fork_asm+0x1a/0x30 [ 26.851383] </TASK> [ 26.851688] [ 26.851927] Allocated by task 273: [ 26.852298] kasan_save_stack+0x3d/0x60 [ 26.852855] kasan_save_track+0x18/0x40 [ 26.853314] kasan_save_alloc_info+0x3b/0x50 [ 26.853840] __kasan_kmalloc+0xb7/0xc0 [ 26.854368] __kmalloc_cache_noprof+0x184/0x410 [ 26.854810] kasan_atomics+0x96/0x310 [ 26.855309] kunit_try_run_case+0x1b3/0x490 [ 26.855925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.856528] kthread+0x257/0x310 [ 26.856936] ret_from_fork+0x41/0x80 [ 26.857514] ret_from_fork_asm+0x1a/0x30 [ 26.857961] [ 26.858238] The buggy address belongs to the object at ffff888102a32500 [ 26.858238] which belongs to the cache kmalloc-64 of size 64 [ 26.859400] The buggy address is located 0 bytes to the right of [ 26.859400] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.860570] [ 26.860827] The buggy address belongs to the physical page: [ 26.861515] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.862400] flags: 0x200000000000000(node=0|zone=2) [ 26.862837] page_type: f5(slab) [ 26.863377] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.864167] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.864852] page dumped because: kasan: bad access detected [ 26.865450] [ 26.865669] Memory state around the buggy address: [ 26.866236] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.867017] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.867768] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.868468] ^ [ 26.868922] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.869689] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.870317] ================================================================== [ 27.678307] ================================================================== [ 27.678803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 27.679662] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.680393] [ 27.680690] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.681614] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.681903] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.682700] Call Trace: [ 27.683012] <TASK> [ 27.683382] dump_stack_lvl+0x73/0xb0 [ 27.683789] print_report+0xd1/0x640 [ 27.684234] ? __virt_addr_valid+0x1db/0x2d0 [ 27.684613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.685251] kasan_report+0x102/0x140 [ 27.685706] ? kasan_atomics_helper+0x1a80/0x5450 [ 27.686138] ? kasan_atomics_helper+0x1a80/0x5450 [ 27.686734] kasan_check_range+0x10c/0x1c0 [ 27.687230] __kasan_check_write+0x18/0x20 [ 27.687666] kasan_atomics_helper+0x1a80/0x5450 [ 27.688155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.688755] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.689141] ? kasan_atomics+0x153/0x310 [ 27.689777] kasan_atomics+0x1dd/0x310 [ 27.690243] ? __pfx_kasan_atomics+0x10/0x10 [ 27.690782] ? __pfx_read_tsc+0x10/0x10 [ 27.691191] ? ktime_get_ts64+0x84/0x230 [ 27.691553] kunit_try_run_case+0x1b3/0x490 [ 27.692114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.692626] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.693196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.693642] ? __kthread_parkme+0x82/0x160 [ 27.694033] ? preempt_count_sub+0x50/0x80 [ 27.694546] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.695012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.695577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.696142] kthread+0x257/0x310 [ 27.696535] ? __pfx_kthread+0x10/0x10 [ 27.696920] ret_from_fork+0x41/0x80 [ 27.697450] ? __pfx_kthread+0x10/0x10 [ 27.697844] ret_from_fork_asm+0x1a/0x30 [ 27.698217] </TASK> [ 27.698466] [ 27.698725] Allocated by task 273: [ 27.699217] kasan_save_stack+0x3d/0x60 [ 27.699663] kasan_save_track+0x18/0x40 [ 27.700175] kasan_save_alloc_info+0x3b/0x50 [ 27.700609] __kasan_kmalloc+0xb7/0xc0 [ 27.700953] __kmalloc_cache_noprof+0x184/0x410 [ 27.701456] kasan_atomics+0x96/0x310 [ 27.701909] kunit_try_run_case+0x1b3/0x490 [ 27.702319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.702810] kthread+0x257/0x310 [ 27.703183] ret_from_fork+0x41/0x80 [ 27.703474] ret_from_fork_asm+0x1a/0x30 [ 27.703760] [ 27.704003] The buggy address belongs to the object at ffff888102a32500 [ 27.704003] which belongs to the cache kmalloc-64 of size 64 [ 27.705421] The buggy address is located 0 bytes to the right of [ 27.705421] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.706459] [ 27.706636] The buggy address belongs to the physical page: [ 27.707127] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.707802] flags: 0x200000000000000(node=0|zone=2) [ 27.708377] page_type: f5(slab) [ 27.708693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.709391] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.710026] page dumped because: kasan: bad access detected [ 27.710556] [ 27.710784] Memory state around the buggy address: [ 27.711152] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.711827] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.712509] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.712997] ^ [ 27.713626] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.714315] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.714867] ================================================================== [ 25.931697] ================================================================== [ 25.932731] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 25.933855] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.934896] [ 25.935547] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.936770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.937199] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.938081] Call Trace: [ 25.938489] <TASK> [ 25.938868] dump_stack_lvl+0x73/0xb0 [ 25.939475] print_report+0xd1/0x640 [ 25.939954] ? __virt_addr_valid+0x1db/0x2d0 [ 25.940627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.941383] kasan_report+0x102/0x140 [ 25.941896] ? kasan_atomics_helper+0x566/0x5450 [ 25.942549] ? kasan_atomics_helper+0x566/0x5450 [ 25.943118] kasan_check_range+0x10c/0x1c0 [ 25.943678] __kasan_check_write+0x18/0x20 [ 25.944259] kasan_atomics_helper+0x566/0x5450 [ 25.944850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.945443] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.945993] ? kasan_atomics+0x153/0x310 [ 25.946586] kasan_atomics+0x1dd/0x310 [ 25.947047] ? __pfx_kasan_atomics+0x10/0x10 [ 25.947640] ? __pfx_read_tsc+0x10/0x10 [ 25.948263] ? ktime_get_ts64+0x84/0x230 [ 25.948736] kunit_try_run_case+0x1b3/0x490 [ 25.949349] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.949938] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.950481] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.950947] ? __kthread_parkme+0x82/0x160 [ 25.951648] ? preempt_count_sub+0x50/0x80 [ 25.952237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.952764] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.953559] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.954197] kthread+0x257/0x310 [ 25.954735] ? __pfx_kthread+0x10/0x10 [ 25.955281] ret_from_fork+0x41/0x80 [ 25.955602] ? __pfx_kthread+0x10/0x10 [ 25.955967] ret_from_fork_asm+0x1a/0x30 [ 25.956562] </TASK> [ 25.956830] [ 25.957280] Allocated by task 273: [ 25.957728] kasan_save_stack+0x3d/0x60 [ 25.958405] kasan_save_track+0x18/0x40 [ 25.958761] kasan_save_alloc_info+0x3b/0x50 [ 25.959541] __kasan_kmalloc+0xb7/0xc0 [ 25.959869] __kmalloc_cache_noprof+0x184/0x410 [ 25.960617] kasan_atomics+0x96/0x310 [ 25.960909] kunit_try_run_case+0x1b3/0x490 [ 25.961471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.961988] kthread+0x257/0x310 [ 25.962331] ret_from_fork+0x41/0x80 [ 25.962962] ret_from_fork_asm+0x1a/0x30 [ 25.963582] [ 25.963771] The buggy address belongs to the object at ffff888102a32500 [ 25.963771] which belongs to the cache kmalloc-64 of size 64 [ 25.965153] The buggy address is located 0 bytes to the right of [ 25.965153] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.966473] [ 25.966828] The buggy address belongs to the physical page: [ 25.967363] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.968301] flags: 0x200000000000000(node=0|zone=2) [ 25.968833] page_type: f5(slab) [ 25.969311] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.970135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.970876] page dumped because: kasan: bad access detected [ 25.971487] [ 25.971856] Memory state around the buggy address: [ 25.972436] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.973217] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.974029] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.974825] ^ [ 25.975359] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.976015] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.976639] ================================================================== [ 25.841975] ================================================================== [ 25.842648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 25.843461] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.844367] [ 25.844710] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.845818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.846468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.847368] Call Trace: [ 25.847967] <TASK> [ 25.848276] dump_stack_lvl+0x73/0xb0 [ 25.848867] print_report+0xd1/0x640 [ 25.849302] ? __virt_addr_valid+0x1db/0x2d0 [ 25.849768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.850295] kasan_report+0x102/0x140 [ 25.850798] ? kasan_atomics_helper+0x4a1/0x5450 [ 25.851187] ? kasan_atomics_helper+0x4a1/0x5450 [ 25.851999] kasan_check_range+0x10c/0x1c0 [ 25.852654] __kasan_check_write+0x18/0x20 [ 25.853162] kasan_atomics_helper+0x4a1/0x5450 [ 25.853789] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.854435] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.855194] ? kasan_atomics+0x153/0x310 [ 25.855582] kasan_atomics+0x1dd/0x310 [ 25.856190] ? __pfx_kasan_atomics+0x10/0x10 [ 25.856608] ? __pfx_read_tsc+0x10/0x10 [ 25.857252] ? ktime_get_ts64+0x84/0x230 [ 25.857908] kunit_try_run_case+0x1b3/0x490 [ 25.858549] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.859031] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.859666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.860315] ? __kthread_parkme+0x82/0x160 [ 25.860769] ? preempt_count_sub+0x50/0x80 [ 25.861467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.862047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.862790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.863475] kthread+0x257/0x310 [ 25.863935] ? __pfx_kthread+0x10/0x10 [ 25.864594] ret_from_fork+0x41/0x80 [ 25.865210] ? __pfx_kthread+0x10/0x10 [ 25.865605] ret_from_fork_asm+0x1a/0x30 [ 25.866187] </TASK> [ 25.866616] [ 25.866849] Allocated by task 273: [ 25.867451] kasan_save_stack+0x3d/0x60 [ 25.867950] kasan_save_track+0x18/0x40 [ 25.868594] kasan_save_alloc_info+0x3b/0x50 [ 25.869035] __kasan_kmalloc+0xb7/0xc0 [ 25.869710] __kmalloc_cache_noprof+0x184/0x410 [ 25.870297] kasan_atomics+0x96/0x310 [ 25.870758] kunit_try_run_case+0x1b3/0x490 [ 25.871423] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.872135] kthread+0x257/0x310 [ 25.872719] ret_from_fork+0x41/0x80 [ 25.873000] ret_from_fork_asm+0x1a/0x30 [ 25.873803] [ 25.874021] The buggy address belongs to the object at ffff888102a32500 [ 25.874021] which belongs to the cache kmalloc-64 of size 64 [ 25.875542] The buggy address is located 0 bytes to the right of [ 25.875542] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.876898] [ 25.877122] The buggy address belongs to the physical page: [ 25.877730] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.878501] flags: 0x200000000000000(node=0|zone=2) [ 25.878917] page_type: f5(slab) [ 25.879563] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.880323] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.881150] page dumped because: kasan: bad access detected [ 25.881772] [ 25.882131] Memory state around the buggy address: [ 25.882651] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.883507] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.884258] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.884962] ^ [ 25.885489] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.886408] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.887061] ================================================================== [ 25.757868] ================================================================== [ 25.759479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 25.760504] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.761509] [ 25.761823] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.762632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.763110] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.764156] Call Trace: [ 25.764476] <TASK> [ 25.764781] dump_stack_lvl+0x73/0xb0 [ 25.765163] print_report+0xd1/0x640 [ 25.765655] ? __virt_addr_valid+0x1db/0x2d0 [ 25.766563] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.767101] kasan_report+0x102/0x140 [ 25.767746] ? kasan_atomics_helper+0x3e0/0x5450 [ 25.768571] ? kasan_atomics_helper+0x3e0/0x5450 [ 25.769402] kasan_check_range+0x10c/0x1c0 [ 25.770035] __kasan_check_read+0x15/0x20 [ 25.770396] kasan_atomics_helper+0x3e0/0x5450 [ 25.770973] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.771486] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.771880] ? kasan_atomics+0x153/0x310 [ 25.772262] kasan_atomics+0x1dd/0x310 [ 25.772934] ? __pfx_kasan_atomics+0x10/0x10 [ 25.773593] ? __pfx_read_tsc+0x10/0x10 [ 25.773972] ? ktime_get_ts64+0x84/0x230 [ 25.774504] kunit_try_run_case+0x1b3/0x490 [ 25.775110] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.775651] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.776189] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.776752] ? __kthread_parkme+0x82/0x160 [ 25.777294] ? preempt_count_sub+0x50/0x80 [ 25.777762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.778277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.778793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.779453] kthread+0x257/0x310 [ 25.779796] ? __pfx_kthread+0x10/0x10 [ 25.780436] ret_from_fork+0x41/0x80 [ 25.780875] ? __pfx_kthread+0x10/0x10 [ 25.781320] ret_from_fork_asm+0x1a/0x30 [ 25.781957] </TASK> [ 25.782226] [ 25.782403] Allocated by task 273: [ 25.782871] kasan_save_stack+0x3d/0x60 [ 25.783519] kasan_save_track+0x18/0x40 [ 25.783847] kasan_save_alloc_info+0x3b/0x50 [ 25.784308] __kasan_kmalloc+0xb7/0xc0 [ 25.784772] __kmalloc_cache_noprof+0x184/0x410 [ 25.785301] kasan_atomics+0x96/0x310 [ 25.785804] kunit_try_run_case+0x1b3/0x490 [ 25.786240] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.786599] kthread+0x257/0x310 [ 25.786943] ret_from_fork+0x41/0x80 [ 25.787570] ret_from_fork_asm+0x1a/0x30 [ 25.788200] [ 25.788417] The buggy address belongs to the object at ffff888102a32500 [ 25.788417] which belongs to the cache kmalloc-64 of size 64 [ 25.789440] The buggy address is located 0 bytes to the right of [ 25.789440] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.790853] [ 25.791233] The buggy address belongs to the physical page: [ 25.791731] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.792397] flags: 0x200000000000000(node=0|zone=2) [ 25.793045] page_type: f5(slab) [ 25.793606] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.794374] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.794960] page dumped because: kasan: bad access detected [ 25.795550] [ 25.795697] Memory state around the buggy address: [ 25.796355] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.797190] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.797943] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.798592] ^ [ 25.799235] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.799869] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.800703] ================================================================== [ 26.688987] ================================================================== [ 26.690816] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 26.691801] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.692329] [ 26.693199] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.694278] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.694745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.695737] Call Trace: [ 26.696045] <TASK> [ 26.696421] dump_stack_lvl+0x73/0xb0 [ 26.697004] print_report+0xd1/0x640 [ 26.697409] ? __virt_addr_valid+0x1db/0x2d0 [ 26.697949] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.698681] kasan_report+0x102/0x140 [ 26.699423] ? kasan_atomics_helper+0x4a38/0x5450 [ 26.699915] ? kasan_atomics_helper+0x4a38/0x5450 [ 26.700718] __asan_report_load4_noabort+0x18/0x20 [ 26.701848] kasan_atomics_helper+0x4a38/0x5450 [ 26.702391] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.703127] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.704136] ? kasan_atomics+0x153/0x310 [ 26.704570] kasan_atomics+0x1dd/0x310 [ 26.705212] ? __pfx_kasan_atomics+0x10/0x10 [ 26.705741] ? __pfx_read_tsc+0x10/0x10 [ 26.706125] ? ktime_get_ts64+0x84/0x230 [ 26.707216] kunit_try_run_case+0x1b3/0x490 [ 26.707648] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.708307] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.708806] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.709604] ? __kthread_parkme+0x82/0x160 [ 26.710035] ? preempt_count_sub+0x50/0x80 [ 26.711360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.711830] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.712547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.713480] kthread+0x257/0x310 [ 26.714011] ? __pfx_kthread+0x10/0x10 [ 26.714578] ret_from_fork+0x41/0x80 [ 26.714979] ? __pfx_kthread+0x10/0x10 [ 26.715768] ret_from_fork_asm+0x1a/0x30 [ 26.716629] </TASK> [ 26.716872] [ 26.717012] Allocated by task 273: [ 26.717872] kasan_save_stack+0x3d/0x60 [ 26.718429] kasan_save_track+0x18/0x40 [ 26.718840] kasan_save_alloc_info+0x3b/0x50 [ 26.719764] __kasan_kmalloc+0xb7/0xc0 [ 26.720906] __kmalloc_cache_noprof+0x184/0x410 [ 26.721381] kasan_atomics+0x96/0x310 [ 26.721800] kunit_try_run_case+0x1b3/0x490 [ 26.722264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.722922] kthread+0x257/0x310 [ 26.723193] ret_from_fork+0x41/0x80 [ 26.723707] ret_from_fork_asm+0x1a/0x30 [ 26.724179] [ 26.724536] The buggy address belongs to the object at ffff888102a32500 [ 26.724536] which belongs to the cache kmalloc-64 of size 64 [ 26.725186] The buggy address is located 0 bytes to the right of [ 26.725186] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.727074] [ 26.727403] The buggy address belongs to the physical page: [ 26.727942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.729233] flags: 0x200000000000000(node=0|zone=2) [ 26.730299] page_type: f5(slab) [ 26.730734] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.731759] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.732393] page dumped because: kasan: bad access detected [ 26.732882] [ 26.733111] Memory state around the buggy address: [ 26.733631] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.734387] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.735023] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.735676] ^ [ 26.736302] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.736915] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.737677] ================================================================== [ 27.043954] ================================================================== [ 27.044641] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 27.045325] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.047012] [ 27.047366] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.047967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.048593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.049374] Call Trace: [ 27.049793] <TASK> [ 27.050178] dump_stack_lvl+0x73/0xb0 [ 27.050599] print_report+0xd1/0x640 [ 27.051251] ? __virt_addr_valid+0x1db/0x2d0 [ 27.051868] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.052617] kasan_report+0x102/0x140 [ 27.053016] ? kasan_atomics_helper+0x49d0/0x5450 [ 27.053664] ? kasan_atomics_helper+0x49d0/0x5450 [ 27.054312] __asan_report_load4_noabort+0x18/0x20 [ 27.054928] kasan_atomics_helper+0x49d0/0x5450 [ 27.055487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.055937] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.056627] ? kasan_atomics+0x153/0x310 [ 27.057010] kasan_atomics+0x1dd/0x310 [ 27.057552] ? __pfx_kasan_atomics+0x10/0x10 [ 27.058184] ? __pfx_read_tsc+0x10/0x10 [ 27.058705] ? ktime_get_ts64+0x84/0x230 [ 27.059307] kunit_try_run_case+0x1b3/0x490 [ 27.059912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.060673] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.061282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.061855] ? __kthread_parkme+0x82/0x160 [ 27.062391] ? preempt_count_sub+0x50/0x80 [ 27.062857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.063396] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.063921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.064563] kthread+0x257/0x310 [ 27.064899] ? __pfx_kthread+0x10/0x10 [ 27.065457] ret_from_fork+0x41/0x80 [ 27.065885] ? __pfx_kthread+0x10/0x10 [ 27.066404] ret_from_fork_asm+0x1a/0x30 [ 27.066872] </TASK> [ 27.067229] [ 27.067556] Allocated by task 273: [ 27.067989] kasan_save_stack+0x3d/0x60 [ 27.068526] kasan_save_track+0x18/0x40 [ 27.068953] kasan_save_alloc_info+0x3b/0x50 [ 27.069582] __kasan_kmalloc+0xb7/0xc0 [ 27.069983] __kmalloc_cache_noprof+0x184/0x410 [ 27.070585] kasan_atomics+0x96/0x310 [ 27.071185] kunit_try_run_case+0x1b3/0x490 [ 27.071723] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.072370] kthread+0x257/0x310 [ 27.072768] ret_from_fork+0x41/0x80 [ 27.073234] ret_from_fork_asm+0x1a/0x30 [ 27.073750] [ 27.073923] The buggy address belongs to the object at ffff888102a32500 [ 27.073923] which belongs to the cache kmalloc-64 of size 64 [ 27.075059] The buggy address is located 0 bytes to the right of [ 27.075059] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.076390] [ 27.076698] The buggy address belongs to the physical page: [ 27.077126] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.077988] flags: 0x200000000000000(node=0|zone=2) [ 27.078516] page_type: f5(slab) [ 27.079008] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.079660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.080487] page dumped because: kasan: bad access detected [ 27.080960] [ 27.081192] Memory state around the buggy address: [ 27.081703] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.082510] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.083150] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.083878] ^ [ 27.084508] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.085173] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.085628] ================================================================== [ 26.064962] ================================================================== [ 26.065949] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 26.068293] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.069275] [ 26.069639] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.070833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.071320] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.072235] Call Trace: [ 26.072568] <TASK> [ 26.072884] dump_stack_lvl+0x73/0xb0 [ 26.073354] print_report+0xd1/0x640 [ 26.073753] ? __virt_addr_valid+0x1db/0x2d0 [ 26.074160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.074888] kasan_report+0x102/0x140 [ 26.075312] ? kasan_atomics_helper+0x730/0x5450 [ 26.075626] ? kasan_atomics_helper+0x730/0x5450 [ 26.075925] kasan_check_range+0x10c/0x1c0 [ 26.076396] __kasan_check_write+0x18/0x20 [ 26.076697] kasan_atomics_helper+0x730/0x5450 [ 26.077328] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.077989] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.078448] ? kasan_atomics+0x153/0x310 [ 26.078869] kasan_atomics+0x1dd/0x310 [ 26.079520] ? __pfx_kasan_atomics+0x10/0x10 [ 26.080158] ? __pfx_read_tsc+0x10/0x10 [ 26.080576] ? ktime_get_ts64+0x84/0x230 [ 26.081147] kunit_try_run_case+0x1b3/0x490 [ 26.081731] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.082231] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.082676] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.084295] ? __kthread_parkme+0x82/0x160 [ 26.084727] ? preempt_count_sub+0x50/0x80 [ 26.085173] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.085646] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.086143] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.086723] kthread+0x257/0x310 [ 26.087116] ? __pfx_kthread+0x10/0x10 [ 26.087591] ret_from_fork+0x41/0x80 [ 26.087959] ? __pfx_kthread+0x10/0x10 [ 26.088462] ret_from_fork_asm+0x1a/0x30 [ 26.088828] </TASK> [ 26.089121] [ 26.089368] Allocated by task 273: [ 26.089800] kasan_save_stack+0x3d/0x60 [ 26.090178] kasan_save_track+0x18/0x40 [ 26.090631] kasan_save_alloc_info+0x3b/0x50 [ 26.091118] __kasan_kmalloc+0xb7/0xc0 [ 26.091431] __kmalloc_cache_noprof+0x184/0x410 [ 26.091949] kasan_atomics+0x96/0x310 [ 26.092475] kunit_try_run_case+0x1b3/0x490 [ 26.092936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.093508] kthread+0x257/0x310 [ 26.093795] ret_from_fork+0x41/0x80 [ 26.094323] ret_from_fork_asm+0x1a/0x30 [ 26.094747] [ 26.094909] The buggy address belongs to the object at ffff888102a32500 [ 26.094909] which belongs to the cache kmalloc-64 of size 64 [ 26.095971] The buggy address is located 0 bytes to the right of [ 26.095971] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.097130] [ 26.097310] The buggy address belongs to the physical page: [ 26.097860] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.098570] flags: 0x200000000000000(node=0|zone=2) [ 26.098894] page_type: f5(slab) [ 26.099434] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.100196] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.100942] page dumped because: kasan: bad access detected [ 26.101485] [ 26.101728] Memory state around the buggy address: [ 26.102227] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.102762] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.103429] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.104023] ^ [ 26.104487] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.105271] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.105720] ================================================================== [ 27.087039] ================================================================== [ 27.087805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 27.088667] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.089401] [ 27.089721] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.090594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.091235] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.092386] Call Trace: [ 27.092607] <TASK> [ 27.092800] dump_stack_lvl+0x73/0xb0 [ 27.093246] print_report+0xd1/0x640 [ 27.093688] ? __virt_addr_valid+0x1db/0x2d0 [ 27.094146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.096011] kasan_report+0x102/0x140 [ 27.096777] ? kasan_atomics_helper+0x13b6/0x5450 [ 27.097152] ? kasan_atomics_helper+0x13b6/0x5450 [ 27.097696] kasan_check_range+0x10c/0x1c0 [ 27.098143] __kasan_check_read+0x15/0x20 [ 27.098622] kasan_atomics_helper+0x13b6/0x5450 [ 27.099024] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.099576] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.099957] ? kasan_atomics+0x153/0x310 [ 27.100479] kasan_atomics+0x1dd/0x310 [ 27.100813] ? __pfx_kasan_atomics+0x10/0x10 [ 27.101423] ? __pfx_read_tsc+0x10/0x10 [ 27.101836] ? ktime_get_ts64+0x84/0x230 [ 27.102371] kunit_try_run_case+0x1b3/0x490 [ 27.102743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.103372] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.103818] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.104281] ? __kthread_parkme+0x82/0x160 [ 27.104832] ? preempt_count_sub+0x50/0x80 [ 27.105425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.105811] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.106430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.106894] kthread+0x257/0x310 [ 27.107400] ? __pfx_kthread+0x10/0x10 [ 27.107771] ret_from_fork+0x41/0x80 [ 27.108265] ? __pfx_kthread+0x10/0x10 [ 27.108643] ret_from_fork_asm+0x1a/0x30 [ 27.109210] </TASK> [ 27.109511] [ 27.109686] Allocated by task 273: [ 27.110162] kasan_save_stack+0x3d/0x60 [ 27.110654] kasan_save_track+0x18/0x40 [ 27.110934] kasan_save_alloc_info+0x3b/0x50 [ 27.111489] __kasan_kmalloc+0xb7/0xc0 [ 27.111773] __kmalloc_cache_noprof+0x184/0x410 [ 27.112395] kasan_atomics+0x96/0x310 [ 27.112761] kunit_try_run_case+0x1b3/0x490 [ 27.113291] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.113816] kthread+0x257/0x310 [ 27.115141] ret_from_fork+0x41/0x80 [ 27.115542] ret_from_fork_asm+0x1a/0x30 [ 27.115795] [ 27.115896] The buggy address belongs to the object at ffff888102a32500 [ 27.115896] which belongs to the cache kmalloc-64 of size 64 [ 27.117407] The buggy address is located 0 bytes to the right of [ 27.117407] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.119614] [ 27.119784] The buggy address belongs to the physical page: [ 27.120708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.121630] flags: 0x200000000000000(node=0|zone=2) [ 27.122153] page_type: f5(slab) [ 27.122694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.123352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.123995] page dumped because: kasan: bad access detected [ 27.124627] [ 27.124864] Memory state around the buggy address: [ 27.125638] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.126581] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.127452] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.128201] ^ [ 27.128545] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.129510] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.130273] ================================================================== [ 26.146518] ================================================================== [ 26.147667] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 26.148324] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.148767] [ 26.148948] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.150123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.150627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.151419] Call Trace: [ 26.151637] <TASK> [ 26.151838] dump_stack_lvl+0x73/0xb0 [ 26.152207] print_report+0xd1/0x640 [ 26.152687] ? __virt_addr_valid+0x1db/0x2d0 [ 26.153274] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.153952] kasan_report+0x102/0x140 [ 26.154492] ? kasan_atomics_helper+0x861/0x5450 [ 26.154856] ? kasan_atomics_helper+0x861/0x5450 [ 26.155475] kasan_check_range+0x10c/0x1c0 [ 26.155863] __kasan_check_write+0x18/0x20 [ 26.156351] kasan_atomics_helper+0x861/0x5450 [ 26.156726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.157205] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.157792] ? kasan_atomics+0x153/0x310 [ 26.158326] kasan_atomics+0x1dd/0x310 [ 26.158676] ? __pfx_kasan_atomics+0x10/0x10 [ 26.159049] ? __pfx_read_tsc+0x10/0x10 [ 26.159611] ? ktime_get_ts64+0x84/0x230 [ 26.160047] kunit_try_run_case+0x1b3/0x490 [ 26.160513] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.161053] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.161618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.162115] ? __kthread_parkme+0x82/0x160 [ 26.162642] ? preempt_count_sub+0x50/0x80 [ 26.163143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.163627] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.164274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.164710] kthread+0x257/0x310 [ 26.164984] ? __pfx_kthread+0x10/0x10 [ 26.165571] ret_from_fork+0x41/0x80 [ 26.166004] ? __pfx_kthread+0x10/0x10 [ 26.166359] ret_from_fork_asm+0x1a/0x30 [ 26.166880] </TASK> [ 26.167234] [ 26.167483] Allocated by task 273: [ 26.167866] kasan_save_stack+0x3d/0x60 [ 26.168219] kasan_save_track+0x18/0x40 [ 26.168696] kasan_save_alloc_info+0x3b/0x50 [ 26.169207] __kasan_kmalloc+0xb7/0xc0 [ 26.169731] __kmalloc_cache_noprof+0x184/0x410 [ 26.170041] kasan_atomics+0x96/0x310 [ 26.170413] kunit_try_run_case+0x1b3/0x490 [ 26.170879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.171556] kthread+0x257/0x310 [ 26.171842] ret_from_fork+0x41/0x80 [ 26.172323] ret_from_fork_asm+0x1a/0x30 [ 26.172727] [ 26.172961] The buggy address belongs to the object at ffff888102a32500 [ 26.172961] which belongs to the cache kmalloc-64 of size 64 [ 26.173834] The buggy address is located 0 bytes to the right of [ 26.173834] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.174914] [ 26.175220] The buggy address belongs to the physical page: [ 26.175879] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.176526] flags: 0x200000000000000(node=0|zone=2) [ 26.178168] page_type: f5(slab) [ 26.178598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.179198] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.179841] page dumped because: kasan: bad access detected [ 26.180412] [ 26.180635] Memory state around the buggy address: [ 26.181111] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.181756] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.182437] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.183038] ^ [ 26.183530] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.184000] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.184792] ================================================================== [ 28.385390] ================================================================== [ 28.387284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 28.388193] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.388618] [ 28.389521] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.390221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.390646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.391487] Call Trace: [ 28.391724] <TASK> [ 28.391926] dump_stack_lvl+0x73/0xb0 [ 28.392597] print_report+0xd1/0x640 [ 28.393079] ? __virt_addr_valid+0x1db/0x2d0 [ 28.393719] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.394566] kasan_report+0x102/0x140 [ 28.395346] ? kasan_atomics_helper+0x5117/0x5450 [ 28.395763] ? kasan_atomics_helper+0x5117/0x5450 [ 28.396203] __asan_report_load8_noabort+0x18/0x20 [ 28.396634] kasan_atomics_helper+0x5117/0x5450 [ 28.397048] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.397608] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.398022] ? kasan_atomics+0x153/0x310 [ 28.398500] kasan_atomics+0x1dd/0x310 [ 28.398839] ? __pfx_kasan_atomics+0x10/0x10 [ 28.399369] ? __pfx_read_tsc+0x10/0x10 [ 28.400008] ? ktime_get_ts64+0x84/0x230 [ 28.400948] kunit_try_run_case+0x1b3/0x490 [ 28.401709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.402032] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.402659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.403531] ? __kthread_parkme+0x82/0x160 [ 28.403967] ? preempt_count_sub+0x50/0x80 [ 28.404632] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.404999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.405632] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.406300] kthread+0x257/0x310 [ 28.406789] ? __pfx_kthread+0x10/0x10 [ 28.407215] ret_from_fork+0x41/0x80 [ 28.407698] ? __pfx_kthread+0x10/0x10 [ 28.408140] ret_from_fork_asm+0x1a/0x30 [ 28.408634] </TASK> [ 28.408951] [ 28.409263] Allocated by task 273: [ 28.409586] kasan_save_stack+0x3d/0x60 [ 28.410145] kasan_save_track+0x18/0x40 [ 28.410517] kasan_save_alloc_info+0x3b/0x50 [ 28.411045] __kasan_kmalloc+0xb7/0xc0 [ 28.411484] __kmalloc_cache_noprof+0x184/0x410 [ 28.412005] kasan_atomics+0x96/0x310 [ 28.412425] kunit_try_run_case+0x1b3/0x490 [ 28.412854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.413628] kthread+0x257/0x310 [ 28.414049] ret_from_fork+0x41/0x80 [ 28.414600] ret_from_fork_asm+0x1a/0x30 [ 28.414998] [ 28.415303] The buggy address belongs to the object at ffff888102a32500 [ 28.415303] which belongs to the cache kmalloc-64 of size 64 [ 28.416510] The buggy address is located 0 bytes to the right of [ 28.416510] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.417637] [ 28.417901] The buggy address belongs to the physical page: [ 28.418633] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.419444] flags: 0x200000000000000(node=0|zone=2) [ 28.419919] page_type: f5(slab) [ 28.420291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.421019] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.421809] page dumped because: kasan: bad access detected [ 28.422480] [ 28.422695] Memory state around the buggy address: [ 28.423242] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.423952] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.424701] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.425460] ^ [ 28.425883] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.426551] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.427102] ================================================================== [ 26.309816] ================================================================== [ 26.310613] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 26.311237] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.311842] [ 26.312124] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.312932] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.313376] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.314114] Call Trace: [ 26.314407] <TASK> [ 26.314724] dump_stack_lvl+0x73/0xb0 [ 26.315142] print_report+0xd1/0x640 [ 26.315622] ? __virt_addr_valid+0x1db/0x2d0 [ 26.315942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.316474] kasan_report+0x102/0x140 [ 26.316772] ? kasan_atomics_helper+0xac8/0x5450 [ 26.317389] ? kasan_atomics_helper+0xac8/0x5450 [ 26.318001] kasan_check_range+0x10c/0x1c0 [ 26.318469] __kasan_check_write+0x18/0x20 [ 26.318958] kasan_atomics_helper+0xac8/0x5450 [ 26.319409] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.319934] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.320405] ? kasan_atomics+0x153/0x310 [ 26.320836] kasan_atomics+0x1dd/0x310 [ 26.321356] ? __pfx_kasan_atomics+0x10/0x10 [ 26.321774] ? __pfx_read_tsc+0x10/0x10 [ 26.322303] ? ktime_get_ts64+0x84/0x230 [ 26.322734] kunit_try_run_case+0x1b3/0x490 [ 26.323146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.323653] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.324137] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.324591] ? __kthread_parkme+0x82/0x160 [ 26.325021] ? preempt_count_sub+0x50/0x80 [ 26.325424] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.325952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.326661] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.327260] kthread+0x257/0x310 [ 26.327705] ? __pfx_kthread+0x10/0x10 [ 26.328060] ret_from_fork+0x41/0x80 [ 26.328589] ? __pfx_kthread+0x10/0x10 [ 26.328975] ret_from_fork_asm+0x1a/0x30 [ 26.329420] </TASK> [ 26.329670] [ 26.329913] Allocated by task 273: [ 26.330299] kasan_save_stack+0x3d/0x60 [ 26.330712] kasan_save_track+0x18/0x40 [ 26.331187] kasan_save_alloc_info+0x3b/0x50 [ 26.331534] __kasan_kmalloc+0xb7/0xc0 [ 26.331811] __kmalloc_cache_noprof+0x184/0x410 [ 26.332227] kasan_atomics+0x96/0x310 [ 26.332679] kunit_try_run_case+0x1b3/0x490 [ 26.333860] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.334805] kthread+0x257/0x310 [ 26.335618] ret_from_fork+0x41/0x80 [ 26.336111] ret_from_fork_asm+0x1a/0x30 [ 26.336565] [ 26.336745] The buggy address belongs to the object at ffff888102a32500 [ 26.336745] which belongs to the cache kmalloc-64 of size 64 [ 26.337811] The buggy address is located 0 bytes to the right of [ 26.337811] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.338843] [ 26.339047] The buggy address belongs to the physical page: [ 26.339441] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.340282] flags: 0x200000000000000(node=0|zone=2) [ 26.340715] page_type: f5(slab) [ 26.341121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.341912] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.342581] page dumped because: kasan: bad access detected [ 26.343041] [ 26.343314] Memory state around the buggy address: [ 26.343804] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.344410] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.345175] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.345733] ^ [ 26.346243] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.346917] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.347522] ================================================================== [ 26.957026] ================================================================== [ 26.958115] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 26.959396] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.960093] [ 26.960229] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.960946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.961239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.962215] Call Trace: [ 26.962731] <TASK> [ 26.963106] dump_stack_lvl+0x73/0xb0 [ 26.963622] print_report+0xd1/0x640 [ 26.964111] ? __virt_addr_valid+0x1db/0x2d0 [ 26.964725] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.965086] kasan_report+0x102/0x140 [ 26.965657] ? kasan_atomics_helper+0x49ea/0x5450 [ 26.966369] ? kasan_atomics_helper+0x49ea/0x5450 [ 26.966860] __asan_report_load4_noabort+0x18/0x20 [ 26.967720] kasan_atomics_helper+0x49ea/0x5450 [ 26.968393] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.968949] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.969512] ? kasan_atomics+0x153/0x310 [ 26.970028] kasan_atomics+0x1dd/0x310 [ 26.970585] ? __pfx_kasan_atomics+0x10/0x10 [ 26.971009] ? __pfx_read_tsc+0x10/0x10 [ 26.971538] ? ktime_get_ts64+0x84/0x230 [ 26.972144] kunit_try_run_case+0x1b3/0x490 [ 26.972808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.973291] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.973807] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.974361] ? __kthread_parkme+0x82/0x160 [ 26.974948] ? preempt_count_sub+0x50/0x80 [ 26.975386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.975878] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.976597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.977170] kthread+0x257/0x310 [ 26.977587] ? __pfx_kthread+0x10/0x10 [ 26.978133] ret_from_fork+0x41/0x80 [ 26.978536] ? __pfx_kthread+0x10/0x10 [ 26.979065] ret_from_fork_asm+0x1a/0x30 [ 26.979613] </TASK> [ 26.979920] [ 26.980250] Allocated by task 273: [ 26.980671] kasan_save_stack+0x3d/0x60 [ 26.981172] kasan_save_track+0x18/0x40 [ 26.981747] kasan_save_alloc_info+0x3b/0x50 [ 26.982325] __kasan_kmalloc+0xb7/0xc0 [ 26.982825] __kmalloc_cache_noprof+0x184/0x410 [ 26.983237] kasan_atomics+0x96/0x310 [ 26.983790] kunit_try_run_case+0x1b3/0x490 [ 26.984267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.984826] kthread+0x257/0x310 [ 26.985402] ret_from_fork+0x41/0x80 [ 26.985776] ret_from_fork_asm+0x1a/0x30 [ 26.986230] [ 26.986538] The buggy address belongs to the object at ffff888102a32500 [ 26.986538] which belongs to the cache kmalloc-64 of size 64 [ 26.987520] The buggy address is located 0 bytes to the right of [ 26.987520] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.988529] [ 26.988769] The buggy address belongs to the physical page: [ 26.989422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.990202] flags: 0x200000000000000(node=0|zone=2) [ 26.990718] page_type: f5(slab) [ 26.991226] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.992023] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.992802] page dumped because: kasan: bad access detected [ 26.993362] [ 26.993617] Memory state around the buggy address: [ 26.994154] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.994813] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.995528] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.996380] ^ [ 26.996905] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.997575] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.998311] ================================================================== [ 27.796499] ================================================================== [ 27.797740] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 27.799006] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.799578] [ 27.799887] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.800730] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.801188] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.801882] Call Trace: [ 27.802274] <TASK> [ 27.802521] dump_stack_lvl+0x73/0xb0 [ 27.802964] print_report+0xd1/0x640 [ 27.803309] ? __virt_addr_valid+0x1db/0x2d0 [ 27.803649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.804105] kasan_report+0x102/0x140 [ 27.804580] ? kasan_atomics_helper+0x4f32/0x5450 [ 27.805222] ? kasan_atomics_helper+0x4f32/0x5450 [ 27.805818] __asan_report_load8_noabort+0x18/0x20 [ 27.806444] kasan_atomics_helper+0x4f32/0x5450 [ 27.806980] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.807559] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.807982] ? kasan_atomics+0x153/0x310 [ 27.808350] kasan_atomics+0x1dd/0x310 [ 27.808647] ? __pfx_kasan_atomics+0x10/0x10 [ 27.808962] ? __pfx_read_tsc+0x10/0x10 [ 27.809249] ? ktime_get_ts64+0x84/0x230 [ 27.809751] kunit_try_run_case+0x1b3/0x490 [ 27.810271] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.810885] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.811520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.812125] ? __kthread_parkme+0x82/0x160 [ 27.812480] ? preempt_count_sub+0x50/0x80 [ 27.812783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.813163] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.813785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.814535] kthread+0x257/0x310 [ 27.814966] ? __pfx_kthread+0x10/0x10 [ 27.815546] ret_from_fork+0x41/0x80 [ 27.816004] ? __pfx_kthread+0x10/0x10 [ 27.816372] ret_from_fork_asm+0x1a/0x30 [ 27.816852] </TASK> [ 27.817208] [ 27.817438] Allocated by task 273: [ 27.817782] kasan_save_stack+0x3d/0x60 [ 27.818186] kasan_save_track+0x18/0x40 [ 27.818585] kasan_save_alloc_info+0x3b/0x50 [ 27.818991] __kasan_kmalloc+0xb7/0xc0 [ 27.819490] __kmalloc_cache_noprof+0x184/0x410 [ 27.819899] kasan_atomics+0x96/0x310 [ 27.820306] kunit_try_run_case+0x1b3/0x490 [ 27.820722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.821263] kthread+0x257/0x310 [ 27.821697] ret_from_fork+0x41/0x80 [ 27.822038] ret_from_fork_asm+0x1a/0x30 [ 27.822422] [ 27.822581] The buggy address belongs to the object at ffff888102a32500 [ 27.822581] which belongs to the cache kmalloc-64 of size 64 [ 27.823629] The buggy address is located 0 bytes to the right of [ 27.823629] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.824358] [ 27.824622] The buggy address belongs to the physical page: [ 27.825307] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.826273] flags: 0x200000000000000(node=0|zone=2) [ 27.826620] page_type: f5(slab) [ 27.826866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.827751] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.828625] page dumped because: kasan: bad access detected [ 27.829042] [ 27.829314] Memory state around the buggy address: [ 27.829765] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.830436] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.830945] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.831521] ^ [ 27.831831] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.832293] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.832831] ================================================================== [ 28.089373] ================================================================== [ 28.090248] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 28.090779] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.091536] [ 28.091749] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.092554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.093046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.093744] Call Trace: [ 28.094118] <TASK> [ 28.094798] dump_stack_lvl+0x73/0xb0 [ 28.095378] print_report+0xd1/0x640 [ 28.095758] ? __virt_addr_valid+0x1db/0x2d0 [ 28.096114] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.096495] kasan_report+0x102/0x140 [ 28.096961] ? kasan_atomics_helper+0x2007/0x5450 [ 28.097648] ? kasan_atomics_helper+0x2007/0x5450 [ 28.098246] kasan_check_range+0x10c/0x1c0 [ 28.098643] __kasan_check_write+0x18/0x20 [ 28.098936] kasan_atomics_helper+0x2007/0x5450 [ 28.099529] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.100145] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.100739] ? kasan_atomics+0x153/0x310 [ 28.101112] kasan_atomics+0x1dd/0x310 [ 28.101427] ? __pfx_kasan_atomics+0x10/0x10 [ 28.101974] ? __pfx_read_tsc+0x10/0x10 [ 28.102551] ? ktime_get_ts64+0x84/0x230 [ 28.103114] kunit_try_run_case+0x1b3/0x490 [ 28.103576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.104006] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.104525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.104929] ? __kthread_parkme+0x82/0x160 [ 28.105443] ? preempt_count_sub+0x50/0x80 [ 28.105929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.106324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.106778] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.107488] kthread+0x257/0x310 [ 28.107937] ? __pfx_kthread+0x10/0x10 [ 28.108465] ret_from_fork+0x41/0x80 [ 28.108789] ? __pfx_kthread+0x10/0x10 [ 28.109266] ret_from_fork_asm+0x1a/0x30 [ 28.109692] </TASK> [ 28.109919] [ 28.110210] Allocated by task 273: [ 28.110477] kasan_save_stack+0x3d/0x60 [ 28.110904] kasan_save_track+0x18/0x40 [ 28.111385] kasan_save_alloc_info+0x3b/0x50 [ 28.111690] __kasan_kmalloc+0xb7/0xc0 [ 28.112200] __kmalloc_cache_noprof+0x184/0x410 [ 28.112735] kasan_atomics+0x96/0x310 [ 28.113223] kunit_try_run_case+0x1b3/0x490 [ 28.113543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.114254] kthread+0x257/0x310 [ 28.114588] ret_from_fork+0x41/0x80 [ 28.114874] ret_from_fork_asm+0x1a/0x30 [ 28.115355] [ 28.115612] The buggy address belongs to the object at ffff888102a32500 [ 28.115612] which belongs to the cache kmalloc-64 of size 64 [ 28.116386] The buggy address is located 0 bytes to the right of [ 28.116386] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.117717] [ 28.117985] The buggy address belongs to the physical page: [ 28.118523] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.119297] flags: 0x200000000000000(node=0|zone=2) [ 28.119762] page_type: f5(slab) [ 28.120149] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.120786] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.121507] page dumped because: kasan: bad access detected [ 28.122000] [ 28.122224] Memory state around the buggy address: [ 28.122651] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.123294] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.123877] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.124420] ^ [ 28.124726] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.125528] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.126061] ================================================================== [ 28.339619] ================================================================== [ 28.340476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 28.341704] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.342724] [ 28.343129] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.345325] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.346012] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.346897] Call Trace: [ 28.347224] <TASK> [ 28.347509] dump_stack_lvl+0x73/0xb0 [ 28.347976] print_report+0xd1/0x640 [ 28.348458] ? __virt_addr_valid+0x1db/0x2d0 [ 28.348991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.349457] kasan_report+0x102/0x140 [ 28.349918] ? kasan_atomics_helper+0x224d/0x5450 [ 28.350635] ? kasan_atomics_helper+0x224d/0x5450 [ 28.351190] kasan_check_range+0x10c/0x1c0 [ 28.351611] __kasan_check_write+0x18/0x20 [ 28.352261] kasan_atomics_helper+0x224d/0x5450 [ 28.352901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.353405] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.353840] ? kasan_atomics+0x153/0x310 [ 28.354245] kasan_atomics+0x1dd/0x310 [ 28.354705] ? __pfx_kasan_atomics+0x10/0x10 [ 28.355041] ? __pfx_read_tsc+0x10/0x10 [ 28.355370] ? ktime_get_ts64+0x84/0x230 [ 28.355891] kunit_try_run_case+0x1b3/0x490 [ 28.356304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.356886] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.357273] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.357962] ? __kthread_parkme+0x82/0x160 [ 28.358660] ? preempt_count_sub+0x50/0x80 [ 28.359303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.359872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.360597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.361311] kthread+0x257/0x310 [ 28.361854] ? __pfx_kthread+0x10/0x10 [ 28.362397] ret_from_fork+0x41/0x80 [ 28.362689] ? __pfx_kthread+0x10/0x10 [ 28.363414] ret_from_fork_asm+0x1a/0x30 [ 28.363880] </TASK> [ 28.364327] [ 28.364570] Allocated by task 273: [ 28.364946] kasan_save_stack+0x3d/0x60 [ 28.365491] kasan_save_track+0x18/0x40 [ 28.366202] kasan_save_alloc_info+0x3b/0x50 [ 28.366650] __kasan_kmalloc+0xb7/0xc0 [ 28.367110] __kmalloc_cache_noprof+0x184/0x410 [ 28.367820] kasan_atomics+0x96/0x310 [ 28.368290] kunit_try_run_case+0x1b3/0x490 [ 28.368733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.369491] kthread+0x257/0x310 [ 28.369859] ret_from_fork+0x41/0x80 [ 28.370492] ret_from_fork_asm+0x1a/0x30 [ 28.370845] [ 28.371155] The buggy address belongs to the object at ffff888102a32500 [ 28.371155] which belongs to the cache kmalloc-64 of size 64 [ 28.372413] The buggy address is located 0 bytes to the right of [ 28.372413] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.373614] [ 28.373911] The buggy address belongs to the physical page: [ 28.374837] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.375588] flags: 0x200000000000000(node=0|zone=2) [ 28.376031] page_type: f5(slab) [ 28.376496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.377277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.377963] page dumped because: kasan: bad access detected [ 28.378571] [ 28.378797] Memory state around the buggy address: [ 28.379434] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.379998] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.380755] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.381355] ^ [ 28.381910] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.383134] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.383954] ================================================================== [ 25.978003] ================================================================== [ 25.978897] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 25.979759] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.980981] [ 25.981229] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.982364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.982964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.984054] Call Trace: [ 25.984241] <TASK> [ 25.984433] dump_stack_lvl+0x73/0xb0 [ 25.984839] print_report+0xd1/0x640 [ 25.985447] ? __virt_addr_valid+0x1db/0x2d0 [ 25.985923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.986317] kasan_report+0x102/0x140 [ 25.987040] ? kasan_atomics_helper+0x5ff/0x5450 [ 25.987756] ? kasan_atomics_helper+0x5ff/0x5450 [ 25.988364] kasan_check_range+0x10c/0x1c0 [ 25.988936] __kasan_check_write+0x18/0x20 [ 25.989526] kasan_atomics_helper+0x5ff/0x5450 [ 25.989946] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.990593] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.991030] ? kasan_atomics+0x153/0x310 [ 25.991779] kasan_atomics+0x1dd/0x310 [ 25.992627] ? __pfx_kasan_atomics+0x10/0x10 [ 25.993033] ? __pfx_read_tsc+0x10/0x10 [ 25.993669] ? ktime_get_ts64+0x84/0x230 [ 25.994093] kunit_try_run_case+0x1b3/0x490 [ 25.994508] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.994927] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.995452] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.995927] ? __kthread_parkme+0x82/0x160 [ 25.996425] ? preempt_count_sub+0x50/0x80 [ 25.996940] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.997584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.998293] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.998848] kthread+0x257/0x310 [ 25.999294] ? __pfx_kthread+0x10/0x10 [ 25.999694] ret_from_fork+0x41/0x80 [ 26.000250] ? __pfx_kthread+0x10/0x10 [ 26.000629] ret_from_fork_asm+0x1a/0x30 [ 26.001178] </TASK> [ 26.001525] [ 26.001801] Allocated by task 273: [ 26.002359] kasan_save_stack+0x3d/0x60 [ 26.002773] kasan_save_track+0x18/0x40 [ 26.003287] kasan_save_alloc_info+0x3b/0x50 [ 26.003724] __kasan_kmalloc+0xb7/0xc0 [ 26.003991] __kmalloc_cache_noprof+0x184/0x410 [ 26.004647] kasan_atomics+0x96/0x310 [ 26.005209] kunit_try_run_case+0x1b3/0x490 [ 26.005555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.006249] kthread+0x257/0x310 [ 26.006699] ret_from_fork+0x41/0x80 [ 26.007182] ret_from_fork_asm+0x1a/0x30 [ 26.007622] [ 26.007917] The buggy address belongs to the object at ffff888102a32500 [ 26.007917] which belongs to the cache kmalloc-64 of size 64 [ 26.008872] The buggy address is located 0 bytes to the right of [ 26.008872] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.009993] [ 26.010264] The buggy address belongs to the physical page: [ 26.010858] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.011550] flags: 0x200000000000000(node=0|zone=2) [ 26.012124] page_type: f5(slab) [ 26.012621] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.013361] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.013996] page dumped because: kasan: bad access detected [ 26.014641] [ 26.014868] Memory state around the buggy address: [ 26.015472] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.016123] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.016926] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.017596] ^ [ 26.018118] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.018796] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.019441] ================================================================== [ 28.127260] ================================================================== [ 28.128382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 28.130238] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.131642] [ 28.131828] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.132814] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.133497] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.134256] Call Trace: [ 28.134505] <TASK> [ 28.134808] dump_stack_lvl+0x73/0xb0 [ 28.135208] print_report+0xd1/0x640 [ 28.135698] ? __virt_addr_valid+0x1db/0x2d0 [ 28.136409] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.137195] kasan_report+0x102/0x140 [ 28.137759] ? kasan_atomics_helper+0x4f9a/0x5450 [ 28.138584] ? kasan_atomics_helper+0x4f9a/0x5450 [ 28.139164] __asan_report_load8_noabort+0x18/0x20 [ 28.139743] kasan_atomics_helper+0x4f9a/0x5450 [ 28.140387] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.140976] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.141689] ? kasan_atomics+0x153/0x310 [ 28.142287] kasan_atomics+0x1dd/0x310 [ 28.142764] ? __pfx_kasan_atomics+0x10/0x10 [ 28.143374] ? __pfx_read_tsc+0x10/0x10 [ 28.143881] ? ktime_get_ts64+0x84/0x230 [ 28.144478] kunit_try_run_case+0x1b3/0x490 [ 28.145015] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.145740] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.146401] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.146984] ? __kthread_parkme+0x82/0x160 [ 28.147598] ? preempt_count_sub+0x50/0x80 [ 28.148170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.148665] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.149418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.150025] kthread+0x257/0x310 [ 28.150636] ? __pfx_kthread+0x10/0x10 [ 28.151033] ret_from_fork+0x41/0x80 [ 28.151532] ? __pfx_kthread+0x10/0x10 [ 28.151979] ret_from_fork_asm+0x1a/0x30 [ 28.152437] </TASK> [ 28.152628] [ 28.152870] Allocated by task 273: [ 28.153885] kasan_save_stack+0x3d/0x60 [ 28.154780] kasan_save_track+0x18/0x40 [ 28.155175] kasan_save_alloc_info+0x3b/0x50 [ 28.155482] __kasan_kmalloc+0xb7/0xc0 [ 28.155953] __kmalloc_cache_noprof+0x184/0x410 [ 28.156598] kasan_atomics+0x96/0x310 [ 28.157256] kunit_try_run_case+0x1b3/0x490 [ 28.157692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.158996] kthread+0x257/0x310 [ 28.159591] ret_from_fork+0x41/0x80 [ 28.159899] ret_from_fork_asm+0x1a/0x30 [ 28.160356] [ 28.160940] The buggy address belongs to the object at ffff888102a32500 [ 28.160940] which belongs to the cache kmalloc-64 of size 64 [ 28.162053] The buggy address is located 0 bytes to the right of [ 28.162053] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.163614] [ 28.164043] The buggy address belongs to the physical page: [ 28.165066] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.165899] flags: 0x200000000000000(node=0|zone=2) [ 28.166894] page_type: f5(slab) [ 28.167775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.168711] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.169300] page dumped because: kasan: bad access detected [ 28.169799] [ 28.169991] Memory state around the buggy address: [ 28.170575] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.171707] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.172495] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.173190] ^ [ 28.173491] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.174312] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.175052] ================================================================== [ 27.132030] ================================================================== [ 27.132764] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 27.133744] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.134940] [ 27.135278] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.136427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.136894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.137879] Call Trace: [ 27.138285] <TASK> [ 27.138727] dump_stack_lvl+0x73/0xb0 [ 27.139295] print_report+0xd1/0x640 [ 27.139789] ? __virt_addr_valid+0x1db/0x2d0 [ 27.140269] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.140805] kasan_report+0x102/0x140 [ 27.141188] ? kasan_atomics_helper+0x4eb0/0x5450 [ 27.141763] ? kasan_atomics_helper+0x4eb0/0x5450 [ 27.142148] __asan_report_load8_noabort+0x18/0x20 [ 27.142653] kasan_atomics_helper+0x4eb0/0x5450 [ 27.143487] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.144250] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.144888] ? kasan_atomics+0x153/0x310 [ 27.145485] kasan_atomics+0x1dd/0x310 [ 27.146155] ? __pfx_kasan_atomics+0x10/0x10 [ 27.146691] ? __pfx_read_tsc+0x10/0x10 [ 27.147110] ? ktime_get_ts64+0x84/0x230 [ 27.147630] kunit_try_run_case+0x1b3/0x490 [ 27.148189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.148686] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.149176] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.149766] ? __kthread_parkme+0x82/0x160 [ 27.150301] ? preempt_count_sub+0x50/0x80 [ 27.150797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.151498] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.152639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.153112] kthread+0x257/0x310 [ 27.153705] ? __pfx_kthread+0x10/0x10 [ 27.154222] ret_from_fork+0x41/0x80 [ 27.154577] ? __pfx_kthread+0x10/0x10 [ 27.155114] ret_from_fork_asm+0x1a/0x30 [ 27.155509] </TASK> [ 27.155879] [ 27.156177] Allocated by task 273: [ 27.156474] kasan_save_stack+0x3d/0x60 [ 27.156968] kasan_save_track+0x18/0x40 [ 27.157386] kasan_save_alloc_info+0x3b/0x50 [ 27.157927] __kasan_kmalloc+0xb7/0xc0 [ 27.158489] __kmalloc_cache_noprof+0x184/0x410 [ 27.159869] kasan_atomics+0x96/0x310 [ 27.160273] kunit_try_run_case+0x1b3/0x490 [ 27.160925] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.161443] kthread+0x257/0x310 [ 27.162034] ret_from_fork+0x41/0x80 [ 27.162534] ret_from_fork_asm+0x1a/0x30 [ 27.163110] [ 27.163350] The buggy address belongs to the object at ffff888102a32500 [ 27.163350] which belongs to the cache kmalloc-64 of size 64 [ 27.164671] The buggy address is located 0 bytes to the right of [ 27.164671] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.166003] [ 27.166247] The buggy address belongs to the physical page: [ 27.167507] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.168219] flags: 0x200000000000000(node=0|zone=2) [ 27.168799] page_type: f5(slab) [ 27.169375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.170014] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.170659] page dumped because: kasan: bad access detected [ 27.171105] [ 27.171398] Memory state around the buggy address: [ 27.171862] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.172623] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.173666] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.174418] ^ [ 27.174916] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.175572] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.176747] ================================================================== [ 26.476794] ================================================================== [ 26.477483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 26.478393] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.478971] [ 26.479378] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.480327] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.480622] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.481618] Call Trace: [ 26.481885] <TASK> [ 26.482307] dump_stack_lvl+0x73/0xb0 [ 26.482704] print_report+0xd1/0x640 [ 26.483262] ? __virt_addr_valid+0x1db/0x2d0 [ 26.483870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.484526] kasan_report+0x102/0x140 [ 26.484926] ? kasan_atomics_helper+0xd48/0x5450 [ 26.485579] ? kasan_atomics_helper+0xd48/0x5450 [ 26.486046] kasan_check_range+0x10c/0x1c0 [ 26.486607] __kasan_check_write+0x18/0x20 [ 26.487266] kasan_atomics_helper+0xd48/0x5450 [ 26.487711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.488423] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.488911] ? kasan_atomics+0x153/0x310 [ 26.489522] kasan_atomics+0x1dd/0x310 [ 26.490036] ? __pfx_kasan_atomics+0x10/0x10 [ 26.490666] ? __pfx_read_tsc+0x10/0x10 [ 26.491167] ? ktime_get_ts64+0x84/0x230 [ 26.491754] kunit_try_run_case+0x1b3/0x490 [ 26.492224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.492734] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.493443] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.494046] ? __kthread_parkme+0x82/0x160 [ 26.494549] ? preempt_count_sub+0x50/0x80 [ 26.495138] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.495662] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.496413] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.497028] kthread+0x257/0x310 [ 26.497390] ? __pfx_kthread+0x10/0x10 [ 26.497848] ret_from_fork+0x41/0x80 [ 26.498308] ? __pfx_kthread+0x10/0x10 [ 26.498791] ret_from_fork_asm+0x1a/0x30 [ 26.499295] </TASK> [ 26.499628] [ 26.499881] Allocated by task 273: [ 26.500387] kasan_save_stack+0x3d/0x60 [ 26.500719] kasan_save_track+0x18/0x40 [ 26.501236] kasan_save_alloc_info+0x3b/0x50 [ 26.501716] __kasan_kmalloc+0xb7/0xc0 [ 26.502369] __kmalloc_cache_noprof+0x184/0x410 [ 26.502785] kasan_atomics+0x96/0x310 [ 26.503063] kunit_try_run_case+0x1b3/0x490 [ 26.503600] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.504108] kthread+0x257/0x310 [ 26.504452] ret_from_fork+0x41/0x80 [ 26.504922] ret_from_fork_asm+0x1a/0x30 [ 26.505450] [ 26.505629] The buggy address belongs to the object at ffff888102a32500 [ 26.505629] which belongs to the cache kmalloc-64 of size 64 [ 26.506985] The buggy address is located 0 bytes to the right of [ 26.506985] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.508951] [ 26.509282] The buggy address belongs to the physical page: [ 26.509786] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.510575] flags: 0x200000000000000(node=0|zone=2) [ 26.511170] page_type: f5(slab) [ 26.511651] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.512373] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.513121] page dumped because: kasan: bad access detected [ 26.513650] [ 26.513875] Memory state around the buggy address: [ 26.514385] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.515147] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.515812] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.516517] ^ [ 26.516991] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.517755] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.518492] ================================================================== [ 27.364565] ================================================================== [ 27.365468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 27.365801] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.366105] [ 27.366834] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.368429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.368849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.369604] Call Trace: [ 27.369885] <TASK> [ 27.370111] dump_stack_lvl+0x73/0xb0 [ 27.371051] print_report+0xd1/0x640 [ 27.371637] ? __virt_addr_valid+0x1db/0x2d0 [ 27.371971] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.372538] kasan_report+0x102/0x140 [ 27.372854] ? kasan_atomics_helper+0x1650/0x5450 [ 27.373283] ? kasan_atomics_helper+0x1650/0x5450 [ 27.373908] kasan_check_range+0x10c/0x1c0 [ 27.374366] __kasan_check_write+0x18/0x20 [ 27.374746] kasan_atomics_helper+0x1650/0x5450 [ 27.375230] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.375692] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.376265] ? kasan_atomics+0x153/0x310 [ 27.376612] kasan_atomics+0x1dd/0x310 [ 27.377133] ? __pfx_kasan_atomics+0x10/0x10 [ 27.377665] ? __pfx_read_tsc+0x10/0x10 [ 27.378026] ? ktime_get_ts64+0x84/0x230 [ 27.378486] kunit_try_run_case+0x1b3/0x490 [ 27.378829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.379309] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.379893] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.380525] ? __kthread_parkme+0x82/0x160 [ 27.380988] ? preempt_count_sub+0x50/0x80 [ 27.381478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.381944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.382596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.383148] kthread+0x257/0x310 [ 27.383581] ? __pfx_kthread+0x10/0x10 [ 27.383906] ret_from_fork+0x41/0x80 [ 27.384446] ? __pfx_kthread+0x10/0x10 [ 27.384821] ret_from_fork_asm+0x1a/0x30 [ 27.385424] </TASK> [ 27.385701] [ 27.385922] Allocated by task 273: [ 27.386329] kasan_save_stack+0x3d/0x60 [ 27.386660] kasan_save_track+0x18/0x40 [ 27.387212] kasan_save_alloc_info+0x3b/0x50 [ 27.387786] __kasan_kmalloc+0xb7/0xc0 [ 27.388991] __kmalloc_cache_noprof+0x184/0x410 [ 27.389907] kasan_atomics+0x96/0x310 [ 27.390427] kunit_try_run_case+0x1b3/0x490 [ 27.391098] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.391852] kthread+0x257/0x310 [ 27.392677] ret_from_fork+0x41/0x80 [ 27.393123] ret_from_fork_asm+0x1a/0x30 [ 27.393461] [ 27.393961] The buggy address belongs to the object at ffff888102a32500 [ 27.393961] which belongs to the cache kmalloc-64 of size 64 [ 27.395497] The buggy address is located 0 bytes to the right of [ 27.395497] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.396918] [ 27.397089] The buggy address belongs to the physical page: [ 27.398128] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.398968] flags: 0x200000000000000(node=0|zone=2) [ 27.399601] page_type: f5(slab) [ 27.400025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.400959] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.401620] page dumped because: kasan: bad access detected [ 27.402490] [ 27.402662] Memory state around the buggy address: [ 27.403537] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.404201] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.404874] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.405701] ^ [ 27.406375] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.407166] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.408106] ================================================================== [ 27.758776] ================================================================== [ 27.759380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 27.759956] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.760807] [ 27.761124] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.761957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.762501] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.763169] Call Trace: [ 27.763509] <TASK> [ 27.763849] dump_stack_lvl+0x73/0xb0 [ 27.764356] print_report+0xd1/0x640 [ 27.764713] ? __virt_addr_valid+0x1db/0x2d0 [ 27.765247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.765660] kasan_report+0x102/0x140 [ 27.765946] ? kasan_atomics_helper+0x1c19/0x5450 [ 27.766607] ? kasan_atomics_helper+0x1c19/0x5450 [ 27.767134] kasan_check_range+0x10c/0x1c0 [ 27.767545] __kasan_check_write+0x18/0x20 [ 27.768039] kasan_atomics_helper+0x1c19/0x5450 [ 27.768502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.768963] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.769505] ? kasan_atomics+0x153/0x310 [ 27.769982] kasan_atomics+0x1dd/0x310 [ 27.770403] ? __pfx_kasan_atomics+0x10/0x10 [ 27.770808] ? __pfx_read_tsc+0x10/0x10 [ 27.771271] ? ktime_get_ts64+0x84/0x230 [ 27.771743] kunit_try_run_case+0x1b3/0x490 [ 27.772058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.772685] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.773284] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.773737] ? __kthread_parkme+0x82/0x160 [ 27.774252] ? preempt_count_sub+0x50/0x80 [ 27.774576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.774907] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.775372] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.776042] kthread+0x257/0x310 [ 27.776571] ? __pfx_kthread+0x10/0x10 [ 27.777123] ret_from_fork+0x41/0x80 [ 27.777595] ? __pfx_kthread+0x10/0x10 [ 27.777880] ret_from_fork_asm+0x1a/0x30 [ 27.778434] </TASK> [ 27.778717] [ 27.778943] Allocated by task 273: [ 27.779434] kasan_save_stack+0x3d/0x60 [ 27.779860] kasan_save_track+0x18/0x40 [ 27.780360] kasan_save_alloc_info+0x3b/0x50 [ 27.780765] __kasan_kmalloc+0xb7/0xc0 [ 27.781182] __kmalloc_cache_noprof+0x184/0x410 [ 27.781713] kasan_atomics+0x96/0x310 [ 27.781990] kunit_try_run_case+0x1b3/0x490 [ 27.782353] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.782964] kthread+0x257/0x310 [ 27.783475] ret_from_fork+0x41/0x80 [ 27.783921] ret_from_fork_asm+0x1a/0x30 [ 27.784465] [ 27.784647] The buggy address belongs to the object at ffff888102a32500 [ 27.784647] which belongs to the cache kmalloc-64 of size 64 [ 27.785658] The buggy address is located 0 bytes to the right of [ 27.785658] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.786790] [ 27.787053] The buggy address belongs to the physical page: [ 27.787546] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.788153] flags: 0x200000000000000(node=0|zone=2) [ 27.788635] page_type: f5(slab) [ 27.789130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.789835] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.790317] page dumped because: kasan: bad access detected [ 27.790919] [ 27.791197] Memory state around the buggy address: [ 27.791772] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.792491] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.793192] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.793853] ^ [ 27.794275] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.795027] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.795618] ================================================================== [ 28.218765] ================================================================== [ 28.219468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 28.220320] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.221138] [ 28.221427] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.222323] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.222827] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.223646] Call Trace: [ 28.223999] <TASK> [ 28.224390] dump_stack_lvl+0x73/0xb0 [ 28.224853] print_report+0xd1/0x640 [ 28.225409] ? __virt_addr_valid+0x1db/0x2d0 [ 28.226456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.227036] kasan_report+0x102/0x140 [ 28.227980] ? kasan_atomics_helper+0x4fb4/0x5450 [ 28.229260] ? kasan_atomics_helper+0x4fb4/0x5450 [ 28.229842] __asan_report_load8_noabort+0x18/0x20 [ 28.230626] kasan_atomics_helper+0x4fb4/0x5450 [ 28.231086] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.231579] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.232138] ? kasan_atomics+0x153/0x310 [ 28.232915] kasan_atomics+0x1dd/0x310 [ 28.233470] ? __pfx_kasan_atomics+0x10/0x10 [ 28.233918] ? __pfx_read_tsc+0x10/0x10 [ 28.234758] ? ktime_get_ts64+0x84/0x230 [ 28.235490] kunit_try_run_case+0x1b3/0x490 [ 28.236142] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.236648] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.237120] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.238011] ? __kthread_parkme+0x82/0x160 [ 28.238662] ? preempt_count_sub+0x50/0x80 [ 28.238988] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.239861] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.240782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.241375] kthread+0x257/0x310 [ 28.241668] ? __pfx_kthread+0x10/0x10 [ 28.242124] ret_from_fork+0x41/0x80 [ 28.242533] ? __pfx_kthread+0x10/0x10 [ 28.242971] ret_from_fork_asm+0x1a/0x30 [ 28.243354] </TASK> [ 28.243608] [ 28.243764] Allocated by task 273: [ 28.244128] kasan_save_stack+0x3d/0x60 [ 28.244726] kasan_save_track+0x18/0x40 [ 28.245003] kasan_save_alloc_info+0x3b/0x50 [ 28.246235] __kasan_kmalloc+0xb7/0xc0 [ 28.246975] __kmalloc_cache_noprof+0x184/0x410 [ 28.247457] kasan_atomics+0x96/0x310 [ 28.247643] kunit_try_run_case+0x1b3/0x490 [ 28.247833] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.248055] kthread+0x257/0x310 [ 28.248751] ret_from_fork+0x41/0x80 [ 28.249472] ret_from_fork_asm+0x1a/0x30 [ 28.250421] [ 28.250795] The buggy address belongs to the object at ffff888102a32500 [ 28.250795] which belongs to the cache kmalloc-64 of size 64 [ 28.251740] The buggy address is located 0 bytes to the right of [ 28.251740] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.252754] [ 28.252965] The buggy address belongs to the physical page: [ 28.253467] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.254316] flags: 0x200000000000000(node=0|zone=2) [ 28.254709] page_type: f5(slab) [ 28.255145] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.255826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.256578] page dumped because: kasan: bad access detected [ 28.257283] [ 28.257524] Memory state around the buggy address: [ 28.257920] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.258563] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.259124] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.259804] ^ [ 28.260287] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.260908] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.261538] ================================================================== [ 28.302502] ================================================================== [ 28.303026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 28.303870] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.304431] [ 28.304699] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.305536] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.305818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.306567] Call Trace: [ 28.306932] <TASK> [ 28.307321] dump_stack_lvl+0x73/0xb0 [ 28.307828] print_report+0xd1/0x640 [ 28.308224] ? __virt_addr_valid+0x1db/0x2d0 [ 28.308772] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.309281] kasan_report+0x102/0x140 [ 28.309710] ? kasan_atomics_helper+0x4fa7/0x5450 [ 28.310186] ? kasan_atomics_helper+0x4fa7/0x5450 [ 28.310732] __asan_report_load8_noabort+0x18/0x20 [ 28.311207] kasan_atomics_helper+0x4fa7/0x5450 [ 28.311577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.312152] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.312531] ? kasan_atomics+0x153/0x310 [ 28.312844] kasan_atomics+0x1dd/0x310 [ 28.313317] ? __pfx_kasan_atomics+0x10/0x10 [ 28.313916] ? __pfx_read_tsc+0x10/0x10 [ 28.314506] ? ktime_get_ts64+0x84/0x230 [ 28.314931] kunit_try_run_case+0x1b3/0x490 [ 28.315402] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.315952] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.316436] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.316861] ? __kthread_parkme+0x82/0x160 [ 28.317361] ? preempt_count_sub+0x50/0x80 [ 28.317797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.318275] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.318880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.319366] kthread+0x257/0x310 [ 28.319804] ? __pfx_kthread+0x10/0x10 [ 28.320284] ret_from_fork+0x41/0x80 [ 28.320635] ? __pfx_kthread+0x10/0x10 [ 28.320987] ret_from_fork_asm+0x1a/0x30 [ 28.321465] </TASK> [ 28.321741] [ 28.321972] Allocated by task 273: [ 28.322359] kasan_save_stack+0x3d/0x60 [ 28.322833] kasan_save_track+0x18/0x40 [ 28.323221] kasan_save_alloc_info+0x3b/0x50 [ 28.323744] __kasan_kmalloc+0xb7/0xc0 [ 28.324176] __kmalloc_cache_noprof+0x184/0x410 [ 28.324669] kasan_atomics+0x96/0x310 [ 28.324945] kunit_try_run_case+0x1b3/0x490 [ 28.325287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.325975] kthread+0x257/0x310 [ 28.326496] ret_from_fork+0x41/0x80 [ 28.326944] ret_from_fork_asm+0x1a/0x30 [ 28.327286] [ 28.327475] The buggy address belongs to the object at ffff888102a32500 [ 28.327475] which belongs to the cache kmalloc-64 of size 64 [ 28.328773] The buggy address is located 0 bytes to the right of [ 28.328773] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.329883] [ 28.330143] The buggy address belongs to the physical page: [ 28.330709] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.331212] flags: 0x200000000000000(node=0|zone=2) [ 28.331764] page_type: f5(slab) [ 28.332254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.332843] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.333568] page dumped because: kasan: bad access detected [ 28.334013] [ 28.334248] Memory state around the buggy address: [ 28.334717] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.335378] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.335789] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.336431] ^ [ 28.336994] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.337699] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.338309] ================================================================== [ 27.178123] ================================================================== [ 27.179220] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 27.180622] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.182219] [ 27.182604] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.183770] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.184395] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.185330] Call Trace: [ 27.185652] <TASK> [ 27.185917] dump_stack_lvl+0x73/0xb0 [ 27.186370] print_report+0xd1/0x640 [ 27.186664] ? __virt_addr_valid+0x1db/0x2d0 [ 27.187506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.188088] kasan_report+0x102/0x140 [ 27.188809] ? kasan_atomics_helper+0x1468/0x5450 [ 27.189270] ? kasan_atomics_helper+0x1468/0x5450 [ 27.190308] kasan_check_range+0x10c/0x1c0 [ 27.190992] __kasan_check_write+0x18/0x20 [ 27.191519] kasan_atomics_helper+0x1468/0x5450 [ 27.191959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.193062] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.193515] ? kasan_atomics+0x153/0x310 [ 27.194183] kasan_atomics+0x1dd/0x310 [ 27.194625] ? __pfx_kasan_atomics+0x10/0x10 [ 27.195354] ? __pfx_read_tsc+0x10/0x10 [ 27.195950] ? ktime_get_ts64+0x84/0x230 [ 27.196708] kunit_try_run_case+0x1b3/0x490 [ 27.197115] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.198172] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.198995] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.199634] ? __kthread_parkme+0x82/0x160 [ 27.200185] ? preempt_count_sub+0x50/0x80 [ 27.200838] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.201296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.201861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.202516] kthread+0x257/0x310 [ 27.203279] ? __pfx_kthread+0x10/0x10 [ 27.203906] ret_from_fork+0x41/0x80 [ 27.204456] ? __pfx_kthread+0x10/0x10 [ 27.205011] ret_from_fork_asm+0x1a/0x30 [ 27.205578] </TASK> [ 27.205886] [ 27.206239] Allocated by task 273: [ 27.206747] kasan_save_stack+0x3d/0x60 [ 27.207317] kasan_save_track+0x18/0x40 [ 27.207732] kasan_save_alloc_info+0x3b/0x50 [ 27.208277] __kasan_kmalloc+0xb7/0xc0 [ 27.208663] __kmalloc_cache_noprof+0x184/0x410 [ 27.209319] kasan_atomics+0x96/0x310 [ 27.209785] kunit_try_run_case+0x1b3/0x490 [ 27.210420] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.210839] kthread+0x257/0x310 [ 27.211474] ret_from_fork+0x41/0x80 [ 27.211799] ret_from_fork_asm+0x1a/0x30 [ 27.212451] [ 27.212672] The buggy address belongs to the object at ffff888102a32500 [ 27.212672] which belongs to the cache kmalloc-64 of size 64 [ 27.213877] The buggy address is located 0 bytes to the right of [ 27.213877] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.215063] [ 27.215480] The buggy address belongs to the physical page: [ 27.215884] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.216934] flags: 0x200000000000000(node=0|zone=2) [ 27.217548] page_type: f5(slab) [ 27.217936] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.218725] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.219501] page dumped because: kasan: bad access detected [ 27.220056] [ 27.220279] Memory state around the buggy address: [ 27.220821] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.221632] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.222312] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.222923] ^ [ 27.223473] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.224209] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.224817] ================================================================== [ 26.519839] ================================================================== [ 26.520597] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 26.521371] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.521992] [ 26.522393] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.523379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.523854] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.524691] Call Trace: [ 26.525063] <TASK> [ 26.525404] dump_stack_lvl+0x73/0xb0 [ 26.525875] print_report+0xd1/0x640 [ 26.526491] ? __virt_addr_valid+0x1db/0x2d0 [ 26.526959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.527522] kasan_report+0x102/0x140 [ 26.527982] ? kasan_atomics_helper+0xde1/0x5450 [ 26.528514] ? kasan_atomics_helper+0xde1/0x5450 [ 26.529037] kasan_check_range+0x10c/0x1c0 [ 26.529534] __kasan_check_write+0x18/0x20 [ 26.530037] kasan_atomics_helper+0xde1/0x5450 [ 26.530600] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.531287] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.531757] ? kasan_atomics+0x153/0x310 [ 26.532297] kasan_atomics+0x1dd/0x310 [ 26.532817] ? __pfx_kasan_atomics+0x10/0x10 [ 26.533235] ? __pfx_read_tsc+0x10/0x10 [ 26.533774] ? ktime_get_ts64+0x84/0x230 [ 26.534275] kunit_try_run_case+0x1b3/0x490 [ 26.534724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.535273] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.535723] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.536305] ? __kthread_parkme+0x82/0x160 [ 26.536801] ? preempt_count_sub+0x50/0x80 [ 26.537286] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.537856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.538577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.539156] kthread+0x257/0x310 [ 26.539614] ? __pfx_kthread+0x10/0x10 [ 26.539972] ret_from_fork+0x41/0x80 [ 26.540482] ? __pfx_kthread+0x10/0x10 [ 26.540919] ret_from_fork_asm+0x1a/0x30 [ 26.541465] </TASK> [ 26.541862] [ 26.542135] Allocated by task 273: [ 26.542523] kasan_save_stack+0x3d/0x60 [ 26.543037] kasan_save_track+0x18/0x40 [ 26.543548] kasan_save_alloc_info+0x3b/0x50 [ 26.544018] __kasan_kmalloc+0xb7/0xc0 [ 26.544517] __kmalloc_cache_noprof+0x184/0x410 [ 26.545144] kasan_atomics+0x96/0x310 [ 26.545475] kunit_try_run_case+0x1b3/0x490 [ 26.545974] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.546703] kthread+0x257/0x310 [ 26.547149] ret_from_fork+0x41/0x80 [ 26.547648] ret_from_fork_asm+0x1a/0x30 [ 26.548146] [ 26.548393] The buggy address belongs to the object at ffff888102a32500 [ 26.548393] which belongs to the cache kmalloc-64 of size 64 [ 26.549574] The buggy address is located 0 bytes to the right of [ 26.549574] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.550642] [ 26.550947] The buggy address belongs to the physical page: [ 26.551481] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.552228] flags: 0x200000000000000(node=0|zone=2) [ 26.552846] page_type: f5(slab) [ 26.553233] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.554029] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.554673] page dumped because: kasan: bad access detected [ 26.555263] [ 26.555422] Memory state around the buggy address: [ 26.555938] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.556636] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.557354] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.558200] ^ [ 26.558796] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.559451] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.560142] ================================================================== [ 26.107379] ================================================================== [ 26.107888] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 26.108609] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.109411] [ 26.109702] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.110539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.111127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.111866] Call Trace: [ 26.112188] <TASK> [ 26.112412] dump_stack_lvl+0x73/0xb0 [ 26.112907] print_report+0xd1/0x640 [ 26.113457] ? __virt_addr_valid+0x1db/0x2d0 [ 26.113916] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.114793] kasan_report+0x102/0x140 [ 26.115184] ? kasan_atomics_helper+0x7c8/0x5450 [ 26.116015] ? kasan_atomics_helper+0x7c8/0x5450 [ 26.116644] kasan_check_range+0x10c/0x1c0 [ 26.117026] __kasan_check_write+0x18/0x20 [ 26.117466] kasan_atomics_helper+0x7c8/0x5450 [ 26.117915] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.118301] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.118761] ? kasan_atomics+0x153/0x310 [ 26.119320] kasan_atomics+0x1dd/0x310 [ 26.119805] ? __pfx_kasan_atomics+0x10/0x10 [ 26.120369] ? __pfx_read_tsc+0x10/0x10 [ 26.120676] ? ktime_get_ts64+0x84/0x230 [ 26.121149] kunit_try_run_case+0x1b3/0x490 [ 26.121602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.122209] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.122593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.123217] ? __kthread_parkme+0x82/0x160 [ 26.123668] ? preempt_count_sub+0x50/0x80 [ 26.123976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.124581] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.125262] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.125962] kthread+0x257/0x310 [ 26.126403] ? __pfx_kthread+0x10/0x10 [ 26.126859] ret_from_fork+0x41/0x80 [ 26.127283] ? __pfx_kthread+0x10/0x10 [ 26.127720] ret_from_fork_asm+0x1a/0x30 [ 26.128036] </TASK> [ 26.128427] [ 26.128657] Allocated by task 273: [ 26.129131] kasan_save_stack+0x3d/0x60 [ 26.129640] kasan_save_track+0x18/0x40 [ 26.129969] kasan_save_alloc_info+0x3b/0x50 [ 26.130455] __kasan_kmalloc+0xb7/0xc0 [ 26.130772] __kmalloc_cache_noprof+0x184/0x410 [ 26.131382] kasan_atomics+0x96/0x310 [ 26.131726] kunit_try_run_case+0x1b3/0x490 [ 26.132213] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.132585] kthread+0x257/0x310 [ 26.133003] ret_from_fork+0x41/0x80 [ 26.133539] ret_from_fork_asm+0x1a/0x30 [ 26.134060] [ 26.134362] The buggy address belongs to the object at ffff888102a32500 [ 26.134362] which belongs to the cache kmalloc-64 of size 64 [ 26.135221] The buggy address is located 0 bytes to the right of [ 26.135221] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.136272] [ 26.136528] The buggy address belongs to the physical page: [ 26.137145] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.137955] flags: 0x200000000000000(node=0|zone=2) [ 26.138564] page_type: f5(slab) [ 26.138904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.139617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.140225] page dumped because: kasan: bad access detected [ 26.140836] [ 26.141138] Memory state around the buggy address: [ 26.141663] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.142234] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.142926] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.143471] ^ [ 26.143786] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.144245] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.145010] ================================================================== [ 26.643729] ================================================================== [ 26.644905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 26.645806] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.646903] [ 26.647157] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.648427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.648823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.649818] Call Trace: [ 26.650245] <TASK> [ 26.650485] dump_stack_lvl+0x73/0xb0 [ 26.651015] print_report+0xd1/0x640 [ 26.651557] ? __virt_addr_valid+0x1db/0x2d0 [ 26.652031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.652872] kasan_report+0x102/0x140 [ 26.653474] ? kasan_atomics_helper+0xfaa/0x5450 [ 26.654153] ? kasan_atomics_helper+0xfaa/0x5450 [ 26.654730] kasan_check_range+0x10c/0x1c0 [ 26.655130] __kasan_check_write+0x18/0x20 [ 26.655569] kasan_atomics_helper+0xfaa/0x5450 [ 26.656206] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.656668] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.657135] ? kasan_atomics+0x153/0x310 [ 26.657687] kasan_atomics+0x1dd/0x310 [ 26.658238] ? __pfx_kasan_atomics+0x10/0x10 [ 26.658728] ? __pfx_read_tsc+0x10/0x10 [ 26.659725] ? ktime_get_ts64+0x84/0x230 [ 26.660170] kunit_try_run_case+0x1b3/0x490 [ 26.660614] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.661026] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.661968] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.662458] ? __kthread_parkme+0x82/0x160 [ 26.662867] ? preempt_count_sub+0x50/0x80 [ 26.663292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.663813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.664281] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.664916] kthread+0x257/0x310 [ 26.665274] ? __pfx_kthread+0x10/0x10 [ 26.665610] ret_from_fork+0x41/0x80 [ 26.666073] ? __pfx_kthread+0x10/0x10 [ 26.666955] ret_from_fork_asm+0x1a/0x30 [ 26.667617] </TASK> [ 26.667918] [ 26.668124] Allocated by task 273: [ 26.668479] kasan_save_stack+0x3d/0x60 [ 26.669178] kasan_save_track+0x18/0x40 [ 26.669983] kasan_save_alloc_info+0x3b/0x50 [ 26.670459] __kasan_kmalloc+0xb7/0xc0 [ 26.671013] __kmalloc_cache_noprof+0x184/0x410 [ 26.671778] kasan_atomics+0x96/0x310 [ 26.672355] kunit_try_run_case+0x1b3/0x490 [ 26.672867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.673476] kthread+0x257/0x310 [ 26.673905] ret_from_fork+0x41/0x80 [ 26.674406] ret_from_fork_asm+0x1a/0x30 [ 26.674910] [ 26.675260] The buggy address belongs to the object at ffff888102a32500 [ 26.675260] which belongs to the cache kmalloc-64 of size 64 [ 26.676382] The buggy address is located 0 bytes to the right of [ 26.676382] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.677520] [ 26.677810] The buggy address belongs to the physical page: [ 26.678469] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.679230] flags: 0x200000000000000(node=0|zone=2) [ 26.679733] page_type: f5(slab) [ 26.680169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.680921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.681678] page dumped because: kasan: bad access detected [ 26.682264] [ 26.682523] Memory state around the buggy address: [ 26.683005] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.683786] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.684488] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.684945] ^ [ 26.685652] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.686297] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.686974] ================================================================== [ 27.716160] ================================================================== [ 27.716685] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 27.717829] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.718893] [ 27.719280] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.720733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.721434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.722721] Call Trace: [ 27.723013] <TASK> [ 27.723424] dump_stack_lvl+0x73/0xb0 [ 27.724226] print_report+0xd1/0x640 [ 27.724832] ? __virt_addr_valid+0x1db/0x2d0 [ 27.725406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.726705] kasan_report+0x102/0x140 [ 27.727103] ? kasan_atomics_helper+0x1b23/0x5450 [ 27.727872] ? kasan_atomics_helper+0x1b23/0x5450 [ 27.728610] kasan_check_range+0x10c/0x1c0 [ 27.728823] __kasan_check_write+0x18/0x20 [ 27.729014] kasan_atomics_helper+0x1b23/0x5450 [ 27.729357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.730168] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.730641] ? kasan_atomics+0x153/0x310 [ 27.731034] kasan_atomics+0x1dd/0x310 [ 27.731782] ? __pfx_kasan_atomics+0x10/0x10 [ 27.732364] ? __pfx_read_tsc+0x10/0x10 [ 27.732744] ? ktime_get_ts64+0x84/0x230 [ 27.733596] kunit_try_run_case+0x1b3/0x490 [ 27.734154] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.734641] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.735130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.735802] ? __kthread_parkme+0x82/0x160 [ 27.736274] ? preempt_count_sub+0x50/0x80 [ 27.736818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.737364] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.737957] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.738518] kthread+0x257/0x310 [ 27.738840] ? __pfx_kthread+0x10/0x10 [ 27.739369] ret_from_fork+0x41/0x80 [ 27.739753] ? __pfx_kthread+0x10/0x10 [ 27.740045] ret_from_fork_asm+0x1a/0x30 [ 27.740588] </TASK> [ 27.740880] [ 27.741112] Allocated by task 273: [ 27.741539] kasan_save_stack+0x3d/0x60 [ 27.741892] kasan_save_track+0x18/0x40 [ 27.742238] kasan_save_alloc_info+0x3b/0x50 [ 27.742725] __kasan_kmalloc+0xb7/0xc0 [ 27.743159] __kmalloc_cache_noprof+0x184/0x410 [ 27.743652] kasan_atomics+0x96/0x310 [ 27.744131] kunit_try_run_case+0x1b3/0x490 [ 27.744584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.745214] kthread+0x257/0x310 [ 27.745545] ret_from_fork+0x41/0x80 [ 27.745977] ret_from_fork_asm+0x1a/0x30 [ 27.746316] [ 27.746549] The buggy address belongs to the object at ffff888102a32500 [ 27.746549] which belongs to the cache kmalloc-64 of size 64 [ 27.747598] The buggy address is located 0 bytes to the right of [ 27.747598] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.748697] [ 27.748857] The buggy address belongs to the physical page: [ 27.749472] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.750216] flags: 0x200000000000000(node=0|zone=2) [ 27.750713] page_type: f5(slab) [ 27.751025] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.751770] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.752470] page dumped because: kasan: bad access detected [ 27.752894] [ 27.753054] Memory state around the buggy address: [ 27.753668] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.754125] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.754846] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.755594] ^ [ 27.755964] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.756721] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.757418] ================================================================== [ 26.186954] ================================================================== [ 26.187591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 26.188743] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.189405] [ 26.189688] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.190490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.190945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.191722] Call Trace: [ 26.192053] <TASK> [ 26.192412] dump_stack_lvl+0x73/0xb0 [ 26.192746] print_report+0xd1/0x640 [ 26.193238] ? __virt_addr_valid+0x1db/0x2d0 [ 26.193665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.194208] kasan_report+0x102/0x140 [ 26.194601] ? kasan_atomics_helper+0x8fa/0x5450 [ 26.195182] ? kasan_atomics_helper+0x8fa/0x5450 [ 26.195716] kasan_check_range+0x10c/0x1c0 [ 26.196228] __kasan_check_write+0x18/0x20 [ 26.196685] kasan_atomics_helper+0x8fa/0x5450 [ 26.197058] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.197618] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.197998] ? kasan_atomics+0x153/0x310 [ 26.198562] kasan_atomics+0x1dd/0x310 [ 26.198989] ? __pfx_kasan_atomics+0x10/0x10 [ 26.199421] ? __pfx_read_tsc+0x10/0x10 [ 26.199852] ? ktime_get_ts64+0x84/0x230 [ 26.200293] kunit_try_run_case+0x1b3/0x490 [ 26.200821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.201240] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.201727] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.202088] ? __kthread_parkme+0x82/0x160 [ 26.202474] ? preempt_count_sub+0x50/0x80 [ 26.202984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.203587] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.204188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.204576] kthread+0x257/0x310 [ 26.205027] ? __pfx_kthread+0x10/0x10 [ 26.205592] ret_from_fork+0x41/0x80 [ 26.205945] ? __pfx_kthread+0x10/0x10 [ 26.206293] ret_from_fork_asm+0x1a/0x30 [ 26.206739] </TASK> [ 26.207050] [ 26.207429] Allocated by task 273: [ 26.207865] kasan_save_stack+0x3d/0x60 [ 26.208933] kasan_save_track+0x18/0x40 [ 26.209818] kasan_save_alloc_info+0x3b/0x50 [ 26.210878] __kasan_kmalloc+0xb7/0xc0 [ 26.211424] __kmalloc_cache_noprof+0x184/0x410 [ 26.211970] kasan_atomics+0x96/0x310 [ 26.212793] kunit_try_run_case+0x1b3/0x490 [ 26.213450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.213911] kthread+0x257/0x310 [ 26.214625] ret_from_fork+0x41/0x80 [ 26.215108] ret_from_fork_asm+0x1a/0x30 [ 26.215441] [ 26.215694] The buggy address belongs to the object at ffff888102a32500 [ 26.215694] which belongs to the cache kmalloc-64 of size 64 [ 26.217331] The buggy address is located 0 bytes to the right of [ 26.217331] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.218670] [ 26.219127] The buggy address belongs to the physical page: [ 26.219580] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.220720] flags: 0x200000000000000(node=0|zone=2) [ 26.220952] page_type: f5(slab) [ 26.221127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.221626] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.222491] page dumped because: kasan: bad access detected [ 26.222849] [ 26.223046] Memory state around the buggy address: [ 26.223376] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.224134] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.224799] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.225594] ^ [ 26.225907] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.226655] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.227856] ================================================================== [ 26.561831] ================================================================== [ 26.562424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 26.563227] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.565007] [ 26.565371] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.566389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.566782] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.567484] Call Trace: [ 26.567923] <TASK> [ 26.568239] dump_stack_lvl+0x73/0xb0 [ 26.568750] print_report+0xd1/0x640 [ 26.569234] ? __virt_addr_valid+0x1db/0x2d0 [ 26.569892] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.570419] kasan_report+0x102/0x140 [ 26.570963] ? kasan_atomics_helper+0xe79/0x5450 [ 26.571543] ? kasan_atomics_helper+0xe79/0x5450 [ 26.571926] kasan_check_range+0x10c/0x1c0 [ 26.572501] __kasan_check_write+0x18/0x20 [ 26.572889] kasan_atomics_helper+0xe79/0x5450 [ 26.573537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.573967] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.574616] ? kasan_atomics+0x153/0x310 [ 26.575007] kasan_atomics+0x1dd/0x310 [ 26.575525] ? __pfx_kasan_atomics+0x10/0x10 [ 26.576126] ? __pfx_read_tsc+0x10/0x10 [ 26.576498] ? ktime_get_ts64+0x84/0x230 [ 26.577120] kunit_try_run_case+0x1b3/0x490 [ 26.577577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.578115] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.578599] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.579243] ? __kthread_parkme+0x82/0x160 [ 26.579718] ? preempt_count_sub+0x50/0x80 [ 26.580179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.580798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.581504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.582183] kthread+0x257/0x310 [ 26.582594] ? __pfx_kthread+0x10/0x10 [ 26.582974] ret_from_fork+0x41/0x80 [ 26.583576] ? __pfx_kthread+0x10/0x10 [ 26.584000] ret_from_fork_asm+0x1a/0x30 [ 26.584643] </TASK> [ 26.584839] [ 26.585146] Allocated by task 273: [ 26.585530] kasan_save_stack+0x3d/0x60 [ 26.585964] kasan_save_track+0x18/0x40 [ 26.586467] kasan_save_alloc_info+0x3b/0x50 [ 26.586776] __kasan_kmalloc+0xb7/0xc0 [ 26.587245] __kmalloc_cache_noprof+0x184/0x410 [ 26.587873] kasan_atomics+0x96/0x310 [ 26.588283] kunit_try_run_case+0x1b3/0x490 [ 26.588898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.589478] kthread+0x257/0x310 [ 26.589941] ret_from_fork+0x41/0x80 [ 26.590504] ret_from_fork_asm+0x1a/0x30 [ 26.591052] [ 26.591317] The buggy address belongs to the object at ffff888102a32500 [ 26.591317] which belongs to the cache kmalloc-64 of size 64 [ 26.592476] The buggy address is located 0 bytes to the right of [ 26.592476] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.593685] [ 26.593974] The buggy address belongs to the physical page: [ 26.594550] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.595399] flags: 0x200000000000000(node=0|zone=2) [ 26.595889] page_type: f5(slab) [ 26.596330] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.597008] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.597779] page dumped because: kasan: bad access detected [ 26.598377] [ 26.598628] Memory state around the buggy address: [ 26.599110] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.599865] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.600546] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.601278] ^ [ 26.601760] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.602476] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.603141] ================================================================== [ 27.409817] ================================================================== [ 27.410975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 27.411706] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.412330] [ 27.412588] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.413486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.413837] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.414522] Call Trace: [ 27.414876] <TASK> [ 27.415261] dump_stack_lvl+0x73/0xb0 [ 27.415733] print_report+0xd1/0x640 [ 27.416171] ? __virt_addr_valid+0x1db/0x2d0 [ 27.416649] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.417056] kasan_report+0x102/0x140 [ 27.417576] ? kasan_atomics_helper+0x16e8/0x5450 [ 27.418051] ? kasan_atomics_helper+0x16e8/0x5450 [ 27.418705] kasan_check_range+0x10c/0x1c0 [ 27.419028] __kasan_check_write+0x18/0x20 [ 27.419615] kasan_atomics_helper+0x16e8/0x5450 [ 27.420327] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.420686] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.420993] ? kasan_atomics+0x153/0x310 [ 27.421431] kasan_atomics+0x1dd/0x310 [ 27.422080] ? __pfx_kasan_atomics+0x10/0x10 [ 27.422897] ? __pfx_read_tsc+0x10/0x10 [ 27.423564] ? ktime_get_ts64+0x84/0x230 [ 27.424213] kunit_try_run_case+0x1b3/0x490 [ 27.424955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.425496] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.426298] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.427130] ? __kthread_parkme+0x82/0x160 [ 27.428032] ? preempt_count_sub+0x50/0x80 [ 27.428623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.429532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.430662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.431371] kthread+0x257/0x310 [ 27.431744] ? __pfx_kthread+0x10/0x10 [ 27.432206] ret_from_fork+0x41/0x80 [ 27.433354] ? __pfx_kthread+0x10/0x10 [ 27.433872] ret_from_fork_asm+0x1a/0x30 [ 27.434730] </TASK> [ 27.434962] [ 27.435229] Allocated by task 273: [ 27.436189] kasan_save_stack+0x3d/0x60 [ 27.437029] kasan_save_track+0x18/0x40 [ 27.437808] kasan_save_alloc_info+0x3b/0x50 [ 27.438241] __kasan_kmalloc+0xb7/0xc0 [ 27.438537] __kmalloc_cache_noprof+0x184/0x410 [ 27.439440] kasan_atomics+0x96/0x310 [ 27.439834] kunit_try_run_case+0x1b3/0x490 [ 27.440621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.441440] kthread+0x257/0x310 [ 27.441988] ret_from_fork+0x41/0x80 [ 27.442380] ret_from_fork_asm+0x1a/0x30 [ 27.442748] [ 27.443005] The buggy address belongs to the object at ffff888102a32500 [ 27.443005] which belongs to the cache kmalloc-64 of size 64 [ 27.444026] The buggy address is located 0 bytes to the right of [ 27.444026] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.445506] [ 27.445756] The buggy address belongs to the physical page: [ 27.446493] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.447436] flags: 0x200000000000000(node=0|zone=2) [ 27.448027] page_type: f5(slab) [ 27.448577] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.449427] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.450162] page dumped because: kasan: bad access detected [ 27.450799] [ 27.451127] Memory state around the buggy address: [ 27.451694] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.452525] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.453378] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.454159] ^ [ 27.454556] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.455505] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.456248] ================================================================== [ 26.871604] ================================================================== [ 26.872217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 26.872904] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.873714] [ 26.873931] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.874875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.875264] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.876084] Call Trace: [ 26.877204] <TASK> [ 26.877528] dump_stack_lvl+0x73/0xb0 [ 26.877935] print_report+0xd1/0x640 [ 26.878529] ? __virt_addr_valid+0x1db/0x2d0 [ 26.879004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.879564] kasan_report+0x102/0x140 [ 26.879944] ? kasan_atomics_helper+0x4a04/0x5450 [ 26.880573] ? kasan_atomics_helper+0x4a04/0x5450 [ 26.880961] __asan_report_load4_noabort+0x18/0x20 [ 26.881749] kasan_atomics_helper+0x4a04/0x5450 [ 26.882255] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.883029] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.883672] ? kasan_atomics+0x153/0x310 [ 26.884181] kasan_atomics+0x1dd/0x310 [ 26.884701] ? __pfx_kasan_atomics+0x10/0x10 [ 26.885277] ? __pfx_read_tsc+0x10/0x10 [ 26.885649] ? ktime_get_ts64+0x84/0x230 [ 26.886216] kunit_try_run_case+0x1b3/0x490 [ 26.886643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.887194] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.887842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.888399] ? __kthread_parkme+0x82/0x160 [ 26.888836] ? preempt_count_sub+0x50/0x80 [ 26.889390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.889833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.890425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.891166] kthread+0x257/0x310 [ 26.891523] ? __pfx_kthread+0x10/0x10 [ 26.892057] ret_from_fork+0x41/0x80 [ 26.892527] ? __pfx_kthread+0x10/0x10 [ 26.892951] ret_from_fork_asm+0x1a/0x30 [ 26.893436] </TASK> [ 26.893772] [ 26.893951] Allocated by task 273: [ 26.894419] kasan_save_stack+0x3d/0x60 [ 26.894783] kasan_save_track+0x18/0x40 [ 26.895397] kasan_save_alloc_info+0x3b/0x50 [ 26.895886] __kasan_kmalloc+0xb7/0xc0 [ 26.896300] __kmalloc_cache_noprof+0x184/0x410 [ 26.896834] kasan_atomics+0x96/0x310 [ 26.897262] kunit_try_run_case+0x1b3/0x490 [ 26.897879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.898574] kthread+0x257/0x310 [ 26.898946] ret_from_fork+0x41/0x80 [ 26.899382] ret_from_fork_asm+0x1a/0x30 [ 26.899913] [ 26.900212] The buggy address belongs to the object at ffff888102a32500 [ 26.900212] which belongs to the cache kmalloc-64 of size 64 [ 26.901243] The buggy address is located 0 bytes to the right of [ 26.901243] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.902397] [ 26.902655] The buggy address belongs to the physical page: [ 26.903181] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.903909] flags: 0x200000000000000(node=0|zone=2) [ 26.904461] page_type: f5(slab) [ 26.904831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.905325] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.906060] page dumped because: kasan: bad access detected [ 26.906776] [ 26.907029] Memory state around the buggy address: [ 26.907491] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.908208] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.908871] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.909605] ^ [ 26.909922] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.911225] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.911920] ================================================================== [ 27.834431] ================================================================== [ 27.835479] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 27.836165] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.836917] [ 27.837200] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.837969] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.838505] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.839258] Call Trace: [ 27.839636] <TASK> [ 27.839867] dump_stack_lvl+0x73/0xb0 [ 27.840421] print_report+0xd1/0x640 [ 27.840797] ? __virt_addr_valid+0x1db/0x2d0 [ 27.841213] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.841877] kasan_report+0x102/0x140 [ 27.842322] ? kasan_atomics_helper+0x1ce2/0x5450 [ 27.842785] ? kasan_atomics_helper+0x1ce2/0x5450 [ 27.843476] kasan_check_range+0x10c/0x1c0 [ 27.843841] __kasan_check_write+0x18/0x20 [ 27.844380] kasan_atomics_helper+0x1ce2/0x5450 [ 27.844950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.845490] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.845959] ? kasan_atomics+0x153/0x310 [ 27.846581] kasan_atomics+0x1dd/0x310 [ 27.846971] ? __pfx_kasan_atomics+0x10/0x10 [ 27.847626] ? __pfx_read_tsc+0x10/0x10 [ 27.848005] ? ktime_get_ts64+0x84/0x230 [ 27.848550] kunit_try_run_case+0x1b3/0x490 [ 27.848949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.849609] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.850033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.850700] ? __kthread_parkme+0x82/0x160 [ 27.851279] ? preempt_count_sub+0x50/0x80 [ 27.851799] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.852357] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.853052] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.853804] kthread+0x257/0x310 [ 27.854322] ? __pfx_kthread+0x10/0x10 [ 27.854836] ret_from_fork+0x41/0x80 [ 27.855296] ? __pfx_kthread+0x10/0x10 [ 27.855854] ret_from_fork_asm+0x1a/0x30 [ 27.856417] </TASK> [ 27.856717] [ 27.856957] Allocated by task 273: [ 27.857439] kasan_save_stack+0x3d/0x60 [ 27.857914] kasan_save_track+0x18/0x40 [ 27.858491] kasan_save_alloc_info+0x3b/0x50 [ 27.859042] __kasan_kmalloc+0xb7/0xc0 [ 27.859601] __kmalloc_cache_noprof+0x184/0x410 [ 27.860269] kasan_atomics+0x96/0x310 [ 27.860825] kunit_try_run_case+0x1b3/0x490 [ 27.861272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.862021] kthread+0x257/0x310 [ 27.862442] ret_from_fork+0x41/0x80 [ 27.862814] ret_from_fork_asm+0x1a/0x30 [ 27.863290] [ 27.863552] The buggy address belongs to the object at ffff888102a32500 [ 27.863552] which belongs to the cache kmalloc-64 of size 64 [ 27.864209] The buggy address is located 0 bytes to the right of [ 27.864209] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.865739] [ 27.866010] The buggy address belongs to the physical page: [ 27.866465] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.867427] flags: 0x200000000000000(node=0|zone=2) [ 27.867909] page_type: f5(slab) [ 27.868378] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.869230] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.870006] page dumped because: kasan: bad access detected [ 27.870606] [ 27.870761] Memory state around the buggy address: [ 27.871398] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.871938] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.872763] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.873467] ^ [ 27.874036] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.874983] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.875662] ================================================================== [ 27.921307] ================================================================== [ 27.921956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 27.922836] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.923618] [ 27.923740] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.924115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.924290] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.924759] Call Trace: [ 27.924975] <TASK> [ 27.925380] dump_stack_lvl+0x73/0xb0 [ 27.926292] print_report+0xd1/0x640 [ 27.926906] ? __virt_addr_valid+0x1db/0x2d0 [ 27.927830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.929021] kasan_report+0x102/0x140 [ 27.929807] ? kasan_atomics_helper+0x1e13/0x5450 [ 27.930262] ? kasan_atomics_helper+0x1e13/0x5450 [ 27.930955] kasan_check_range+0x10c/0x1c0 [ 27.931731] __kasan_check_write+0x18/0x20 [ 27.932229] kasan_atomics_helper+0x1e13/0x5450 [ 27.932750] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.933280] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.933935] ? kasan_atomics+0x153/0x310 [ 27.934526] kasan_atomics+0x1dd/0x310 [ 27.934919] ? __pfx_kasan_atomics+0x10/0x10 [ 27.935365] ? __pfx_read_tsc+0x10/0x10 [ 27.935767] ? ktime_get_ts64+0x84/0x230 [ 27.936162] kunit_try_run_case+0x1b3/0x490 [ 27.936670] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.936998] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.937687] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.938350] ? __kthread_parkme+0x82/0x160 [ 27.938729] ? preempt_count_sub+0x50/0x80 [ 27.939198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.939863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.940551] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.941048] kthread+0x257/0x310 [ 27.941465] ? __pfx_kthread+0x10/0x10 [ 27.941998] ret_from_fork+0x41/0x80 [ 27.942432] ? __pfx_kthread+0x10/0x10 [ 27.942935] ret_from_fork_asm+0x1a/0x30 [ 27.943461] </TASK> [ 27.943759] [ 27.944043] Allocated by task 273: [ 27.944479] kasan_save_stack+0x3d/0x60 [ 27.945003] kasan_save_track+0x18/0x40 [ 27.945403] kasan_save_alloc_info+0x3b/0x50 [ 27.945965] __kasan_kmalloc+0xb7/0xc0 [ 27.946383] __kmalloc_cache_noprof+0x184/0x410 [ 27.946707] kasan_atomics+0x96/0x310 [ 27.947265] kunit_try_run_case+0x1b3/0x490 [ 27.947630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.948437] kthread+0x257/0x310 [ 27.948741] ret_from_fork+0x41/0x80 [ 27.949155] ret_from_fork_asm+0x1a/0x30 [ 27.949735] [ 27.949936] The buggy address belongs to the object at ffff888102a32500 [ 27.949936] which belongs to the cache kmalloc-64 of size 64 [ 27.951150] The buggy address is located 0 bytes to the right of [ 27.951150] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.952319] [ 27.952605] The buggy address belongs to the physical page: [ 27.953111] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.953900] flags: 0x200000000000000(node=0|zone=2) [ 27.954489] page_type: f5(slab) [ 27.954873] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.955672] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.957031] page dumped because: kasan: bad access detected [ 27.957702] [ 27.957895] Memory state around the buggy address: [ 27.958320] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.958798] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.959636] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.960294] ^ [ 27.960794] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.961610] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.962306] ================================================================== [ 28.004999] ================================================================== [ 28.005958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 28.006417] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.006853] [ 28.006974] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.007442] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.008244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.009761] Call Trace: [ 28.010277] <TASK> [ 28.010728] dump_stack_lvl+0x73/0xb0 [ 28.011522] print_report+0xd1/0x640 [ 28.012211] ? __virt_addr_valid+0x1db/0x2d0 [ 28.012948] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.013523] kasan_report+0x102/0x140 [ 28.013983] ? kasan_atomics_helper+0x1f44/0x5450 [ 28.014477] ? kasan_atomics_helper+0x1f44/0x5450 [ 28.014933] kasan_check_range+0x10c/0x1c0 [ 28.015519] __kasan_check_write+0x18/0x20 [ 28.015839] kasan_atomics_helper+0x1f44/0x5450 [ 28.016353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.016877] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.017312] ? kasan_atomics+0x153/0x310 [ 28.017794] kasan_atomics+0x1dd/0x310 [ 28.018265] ? __pfx_kasan_atomics+0x10/0x10 [ 28.018739] ? __pfx_read_tsc+0x10/0x10 [ 28.019190] ? ktime_get_ts64+0x84/0x230 [ 28.019665] kunit_try_run_case+0x1b3/0x490 [ 28.020016] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.020484] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.021024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.021645] ? __kthread_parkme+0x82/0x160 [ 28.022029] ? preempt_count_sub+0x50/0x80 [ 28.022423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.023018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.023540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.023899] kthread+0x257/0x310 [ 28.024386] ? __pfx_kthread+0x10/0x10 [ 28.024871] ret_from_fork+0x41/0x80 [ 28.025303] ? __pfx_kthread+0x10/0x10 [ 28.025704] ret_from_fork_asm+0x1a/0x30 [ 28.026025] </TASK> [ 28.026415] [ 28.026659] Allocated by task 273: [ 28.027154] kasan_save_stack+0x3d/0x60 [ 28.027624] kasan_save_track+0x18/0x40 [ 28.027906] kasan_save_alloc_info+0x3b/0x50 [ 28.028279] __kasan_kmalloc+0xb7/0xc0 [ 28.028767] __kmalloc_cache_noprof+0x184/0x410 [ 28.029320] kasan_atomics+0x96/0x310 [ 28.029783] kunit_try_run_case+0x1b3/0x490 [ 28.030171] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.030716] kthread+0x257/0x310 [ 28.031192] ret_from_fork+0x41/0x80 [ 28.031595] ret_from_fork_asm+0x1a/0x30 [ 28.032033] [ 28.032286] The buggy address belongs to the object at ffff888102a32500 [ 28.032286] which belongs to the cache kmalloc-64 of size 64 [ 28.033928] The buggy address is located 0 bytes to the right of [ 28.033928] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.035186] [ 28.035688] The buggy address belongs to the physical page: [ 28.036311] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.036996] flags: 0x200000000000000(node=0|zone=2) [ 28.037773] page_type: f5(slab) [ 28.038169] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.038963] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.039890] page dumped because: kasan: bad access detected [ 28.040386] [ 28.040586] Memory state around the buggy address: [ 28.041082] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.041752] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.042310] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.043369] ^ [ 28.044047] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.044934] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045812] ================================================================== [ 26.228771] ================================================================== [ 26.229596] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 26.230758] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.231672] [ 26.231864] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.233316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.233756] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.234612] Call Trace: [ 26.234994] <TASK> [ 26.235254] dump_stack_lvl+0x73/0xb0 [ 26.235714] print_report+0xd1/0x640 [ 26.236394] ? __virt_addr_valid+0x1db/0x2d0 [ 26.237019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.237749] kasan_report+0x102/0x140 [ 26.238153] ? kasan_atomics_helper+0x993/0x5450 [ 26.238542] ? kasan_atomics_helper+0x993/0x5450 [ 26.239107] kasan_check_range+0x10c/0x1c0 [ 26.239851] __kasan_check_write+0x18/0x20 [ 26.240242] kasan_atomics_helper+0x993/0x5450 [ 26.240904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.241389] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.241830] ? kasan_atomics+0x153/0x310 [ 26.242312] kasan_atomics+0x1dd/0x310 [ 26.242755] ? __pfx_kasan_atomics+0x10/0x10 [ 26.243282] ? __pfx_read_tsc+0x10/0x10 [ 26.243656] ? ktime_get_ts64+0x84/0x230 [ 26.244118] kunit_try_run_case+0x1b3/0x490 [ 26.244634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.244972] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.245586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.246121] ? __kthread_parkme+0x82/0x160 [ 26.246567] ? preempt_count_sub+0x50/0x80 [ 26.246960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.247451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.248111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.248536] kthread+0x257/0x310 [ 26.248801] ? __pfx_kthread+0x10/0x10 [ 26.249330] ret_from_fork+0x41/0x80 [ 26.249830] ? __pfx_kthread+0x10/0x10 [ 26.250199] ret_from_fork_asm+0x1a/0x30 [ 26.250699] </TASK> [ 26.251009] [ 26.251351] Allocated by task 273: [ 26.251776] kasan_save_stack+0x3d/0x60 [ 26.252204] kasan_save_track+0x18/0x40 [ 26.252520] kasan_save_alloc_info+0x3b/0x50 [ 26.253033] __kasan_kmalloc+0xb7/0xc0 [ 26.253608] __kmalloc_cache_noprof+0x184/0x410 [ 26.254125] kasan_atomics+0x96/0x310 [ 26.254482] kunit_try_run_case+0x1b3/0x490 [ 26.254782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.255409] kthread+0x257/0x310 [ 26.255845] ret_from_fork+0x41/0x80 [ 26.256357] ret_from_fork_asm+0x1a/0x30 [ 26.256827] [ 26.257029] The buggy address belongs to the object at ffff888102a32500 [ 26.257029] which belongs to the cache kmalloc-64 of size 64 [ 26.257987] The buggy address is located 0 bytes to the right of [ 26.257987] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.259005] [ 26.259303] The buggy address belongs to the physical page: [ 26.259935] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.260649] flags: 0x200000000000000(node=0|zone=2) [ 26.260972] page_type: f5(slab) [ 26.261436] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.262231] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.262712] page dumped because: kasan: bad access detected [ 26.263364] [ 26.263613] Memory state around the buggy address: [ 26.264026] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.264684] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.265384] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.265929] ^ [ 26.266292] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.267139] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.267871] ================================================================== [ 25.663513] ================================================================== [ 25.664674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 25.665268] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.665953] [ 25.666314] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.667330] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.667703] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.668594] Call Trace: [ 25.668814] <TASK> [ 25.669089] dump_stack_lvl+0x73/0xb0 [ 25.669670] print_report+0xd1/0x640 [ 25.670203] ? __virt_addr_valid+0x1db/0x2d0 [ 25.671035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.671603] kasan_report+0x102/0x140 [ 25.672103] ? kasan_atomics_helper+0x4b8a/0x5450 [ 25.672746] ? kasan_atomics_helper+0x4b8a/0x5450 [ 25.673615] __asan_report_load4_noabort+0x18/0x20 [ 25.674150] kasan_atomics_helper+0x4b8a/0x5450 [ 25.674724] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.675276] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.675788] ? kasan_atomics+0x153/0x310 [ 25.676420] kasan_atomics+0x1dd/0x310 [ 25.676925] ? __pfx_kasan_atomics+0x10/0x10 [ 25.677492] ? __pfx_read_tsc+0x10/0x10 [ 25.677859] ? ktime_get_ts64+0x84/0x230 [ 25.678202] kunit_try_run_case+0x1b3/0x490 [ 25.678848] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.679578] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.680281] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.680965] ? __kthread_parkme+0x82/0x160 [ 25.681423] ? preempt_count_sub+0x50/0x80 [ 25.682038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.682698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.683325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.683767] kthread+0x257/0x310 [ 25.684367] ? __pfx_kthread+0x10/0x10 [ 25.684999] ret_from_fork+0x41/0x80 [ 25.685574] ? __pfx_kthread+0x10/0x10 [ 25.686174] ret_from_fork_asm+0x1a/0x30 [ 25.686839] </TASK> [ 25.687231] [ 25.687491] Allocated by task 273: [ 25.687990] kasan_save_stack+0x3d/0x60 [ 25.688601] kasan_save_track+0x18/0x40 [ 25.689042] kasan_save_alloc_info+0x3b/0x50 [ 25.689773] __kasan_kmalloc+0xb7/0xc0 [ 25.690285] __kmalloc_cache_noprof+0x184/0x410 [ 25.690895] kasan_atomics+0x96/0x310 [ 25.691317] kunit_try_run_case+0x1b3/0x490 [ 25.691914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.692764] kthread+0x257/0x310 [ 25.693294] ret_from_fork+0x41/0x80 [ 25.693637] ret_from_fork_asm+0x1a/0x30 [ 25.694246] [ 25.694575] The buggy address belongs to the object at ffff888102a32500 [ 25.694575] which belongs to the cache kmalloc-64 of size 64 [ 25.695725] The buggy address is located 0 bytes to the right of [ 25.695725] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.696981] [ 25.697408] The buggy address belongs to the physical page: [ 25.697899] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.698547] flags: 0x200000000000000(node=0|zone=2) [ 25.699169] page_type: f5(slab) [ 25.699871] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.700467] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.701484] page dumped because: kasan: bad access detected [ 25.702155] [ 25.702497] Memory state around the buggy address: [ 25.702934] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.703782] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.704649] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.705441] ^ [ 25.706066] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.706891] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.707592] ================================================================== [ 28.176473] ================================================================== [ 28.177021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 28.177902] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.178576] [ 28.178762] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.179841] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.180442] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.181154] Call Trace: [ 28.181596] <TASK> [ 28.181830] dump_stack_lvl+0x73/0xb0 [ 28.182290] print_report+0xd1/0x640 [ 28.182733] ? __virt_addr_valid+0x1db/0x2d0 [ 28.183288] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.183732] kasan_report+0x102/0x140 [ 28.184161] ? kasan_atomics_helper+0x20c9/0x5450 [ 28.184899] ? kasan_atomics_helper+0x20c9/0x5450 [ 28.185303] kasan_check_range+0x10c/0x1c0 [ 28.185649] __kasan_check_write+0x18/0x20 [ 28.186234] kasan_atomics_helper+0x20c9/0x5450 [ 28.187511] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.187843] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.188654] ? kasan_atomics+0x153/0x310 [ 28.189307] kasan_atomics+0x1dd/0x310 [ 28.189657] ? __pfx_kasan_atomics+0x10/0x10 [ 28.190350] ? __pfx_read_tsc+0x10/0x10 [ 28.190962] ? ktime_get_ts64+0x84/0x230 [ 28.191482] kunit_try_run_case+0x1b3/0x490 [ 28.192386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.193019] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.193611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.194173] ? __kthread_parkme+0x82/0x160 [ 28.194730] ? preempt_count_sub+0x50/0x80 [ 28.195238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.195762] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.196401] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.196972] kthread+0x257/0x310 [ 28.197505] ? __pfx_kthread+0x10/0x10 [ 28.197895] ret_from_fork+0x41/0x80 [ 28.198444] ? __pfx_kthread+0x10/0x10 [ 28.198810] ret_from_fork_asm+0x1a/0x30 [ 28.199373] </TASK> [ 28.199719] [ 28.199994] Allocated by task 273: [ 28.200394] kasan_save_stack+0x3d/0x60 [ 28.200903] kasan_save_track+0x18/0x40 [ 28.201429] kasan_save_alloc_info+0x3b/0x50 [ 28.201971] __kasan_kmalloc+0xb7/0xc0 [ 28.202415] __kmalloc_cache_noprof+0x184/0x410 [ 28.202927] kasan_atomics+0x96/0x310 [ 28.203412] kunit_try_run_case+0x1b3/0x490 [ 28.203928] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.204429] kthread+0x257/0x310 [ 28.204907] ret_from_fork+0x41/0x80 [ 28.205277] ret_from_fork_asm+0x1a/0x30 [ 28.205813] [ 28.205997] The buggy address belongs to the object at ffff888102a32500 [ 28.205997] which belongs to the cache kmalloc-64 of size 64 [ 28.207211] The buggy address is located 0 bytes to the right of [ 28.207211] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.208287] [ 28.208615] The buggy address belongs to the physical page: [ 28.209294] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.209864] flags: 0x200000000000000(node=0|zone=2) [ 28.210571] page_type: f5(slab) [ 28.210885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.211615] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.212534] page dumped because: kasan: bad access detected [ 28.213044] [ 28.213248] Memory state around the buggy address: [ 28.213865] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.214670] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.215186] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.215843] ^ [ 28.216441] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.216944] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.217811] ================================================================== [ 28.262798] ================================================================== [ 28.263551] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 28.264352] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.264803] [ 28.265605] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.266542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.266845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.268399] Call Trace: [ 28.268868] <TASK> [ 28.269305] dump_stack_lvl+0x73/0xb0 [ 28.269729] print_report+0xd1/0x640 [ 28.270110] ? __virt_addr_valid+0x1db/0x2d0 [ 28.270498] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.271120] kasan_report+0x102/0x140 [ 28.271491] ? kasan_atomics_helper+0x218b/0x5450 [ 28.271886] ? kasan_atomics_helper+0x218b/0x5450 [ 28.272543] kasan_check_range+0x10c/0x1c0 [ 28.272941] __kasan_check_write+0x18/0x20 [ 28.273440] kasan_atomics_helper+0x218b/0x5450 [ 28.273880] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.274358] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.274847] ? kasan_atomics+0x153/0x310 [ 28.275352] kasan_atomics+0x1dd/0x310 [ 28.275671] ? __pfx_kasan_atomics+0x10/0x10 [ 28.276230] ? __pfx_read_tsc+0x10/0x10 [ 28.276694] ? ktime_get_ts64+0x84/0x230 [ 28.277130] kunit_try_run_case+0x1b3/0x490 [ 28.277656] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.278254] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.278643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.279308] ? __kthread_parkme+0x82/0x160 [ 28.279631] ? preempt_count_sub+0x50/0x80 [ 28.280199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.280608] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.281113] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.281756] kthread+0x257/0x310 [ 28.282111] ? __pfx_kthread+0x10/0x10 [ 28.282520] ret_from_fork+0x41/0x80 [ 28.282953] ? __pfx_kthread+0x10/0x10 [ 28.283413] ret_from_fork_asm+0x1a/0x30 [ 28.283956] </TASK> [ 28.284313] [ 28.284542] Allocated by task 273: [ 28.284785] kasan_save_stack+0x3d/0x60 [ 28.285366] kasan_save_track+0x18/0x40 [ 28.285916] kasan_save_alloc_info+0x3b/0x50 [ 28.286286] __kasan_kmalloc+0xb7/0xc0 [ 28.286951] __kmalloc_cache_noprof+0x184/0x410 [ 28.287318] kasan_atomics+0x96/0x310 [ 28.288409] kunit_try_run_case+0x1b3/0x490 [ 28.288948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.289515] kthread+0x257/0x310 [ 28.289872] ret_from_fork+0x41/0x80 [ 28.290393] ret_from_fork_asm+0x1a/0x30 [ 28.290695] [ 28.290937] The buggy address belongs to the object at ffff888102a32500 [ 28.290937] which belongs to the cache kmalloc-64 of size 64 [ 28.291887] The buggy address is located 0 bytes to the right of [ 28.291887] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.292900] [ 28.293169] The buggy address belongs to the physical page: [ 28.293685] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.294413] flags: 0x200000000000000(node=0|zone=2) [ 28.294848] page_type: f5(slab) [ 28.295237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.295797] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.296470] page dumped because: kasan: bad access detected [ 28.297009] [ 28.297306] Memory state around the buggy address: [ 28.297741] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.298459] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.298956] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.299692] ^ [ 28.300180] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.300732] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.301513] ================================================================== [ 25.888477] ================================================================== [ 25.889168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 25.889818] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.891135] [ 25.891458] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.892248] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.892819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.893828] Call Trace: [ 25.894264] <TASK> [ 25.894598] dump_stack_lvl+0x73/0xb0 [ 25.895028] print_report+0xd1/0x640 [ 25.895462] ? __virt_addr_valid+0x1db/0x2d0 [ 25.896142] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.896734] kasan_report+0x102/0x140 [ 25.897125] ? kasan_atomics_helper+0x4b3c/0x5450 [ 25.897527] ? kasan_atomics_helper+0x4b3c/0x5450 [ 25.898033] __asan_report_store4_noabort+0x1b/0x30 [ 25.898610] kasan_atomics_helper+0x4b3c/0x5450 [ 25.899249] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.899827] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.900524] ? kasan_atomics+0x153/0x310 [ 25.901039] kasan_atomics+0x1dd/0x310 [ 25.901614] ? __pfx_kasan_atomics+0x10/0x10 [ 25.902029] ? __pfx_read_tsc+0x10/0x10 [ 25.902561] ? ktime_get_ts64+0x84/0x230 [ 25.903043] kunit_try_run_case+0x1b3/0x490 [ 25.903539] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.904152] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.904590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.905261] ? __kthread_parkme+0x82/0x160 [ 25.905863] ? preempt_count_sub+0x50/0x80 [ 25.906297] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.906927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.907596] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.908254] kthread+0x257/0x310 [ 25.908593] ? __pfx_kthread+0x10/0x10 [ 25.909035] ret_from_fork+0x41/0x80 [ 25.909528] ? __pfx_kthread+0x10/0x10 [ 25.910022] ret_from_fork_asm+0x1a/0x30 [ 25.910567] </TASK> [ 25.910940] [ 25.911160] Allocated by task 273: [ 25.911586] kasan_save_stack+0x3d/0x60 [ 25.912179] kasan_save_track+0x18/0x40 [ 25.912586] kasan_save_alloc_info+0x3b/0x50 [ 25.913192] __kasan_kmalloc+0xb7/0xc0 [ 25.913521] __kmalloc_cache_noprof+0x184/0x410 [ 25.914001] kasan_atomics+0x96/0x310 [ 25.914565] kunit_try_run_case+0x1b3/0x490 [ 25.915005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.915701] kthread+0x257/0x310 [ 25.916142] ret_from_fork+0x41/0x80 [ 25.916540] ret_from_fork_asm+0x1a/0x30 [ 25.916985] [ 25.917384] The buggy address belongs to the object at ffff888102a32500 [ 25.917384] which belongs to the cache kmalloc-64 of size 64 [ 25.918434] The buggy address is located 0 bytes to the right of [ 25.918434] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.919441] [ 25.919721] The buggy address belongs to the physical page: [ 25.920524] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.921219] flags: 0x200000000000000(node=0|zone=2) [ 25.921624] page_type: f5(slab) [ 25.922163] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.922925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.923737] page dumped because: kasan: bad access detected [ 25.924329] [ 25.924622] Memory state around the buggy address: [ 25.925021] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.925811] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.926491] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.927193] ^ [ 25.927517] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.928856] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.929875] ================================================================== [ 28.047524] ================================================================== [ 28.048906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 28.050237] Read of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 28.050885] [ 28.051006] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 28.052382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.053107] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.053955] Call Trace: [ 28.054685] <TASK> [ 28.055010] dump_stack_lvl+0x73/0xb0 [ 28.055843] print_report+0xd1/0x640 [ 28.056407] ? __virt_addr_valid+0x1db/0x2d0 [ 28.057031] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.057686] kasan_report+0x102/0x140 [ 28.058085] ? kasan_atomics_helper+0x4f73/0x5450 [ 28.058937] ? kasan_atomics_helper+0x4f73/0x5450 [ 28.059412] __asan_report_load8_noabort+0x18/0x20 [ 28.059792] kasan_atomics_helper+0x4f73/0x5450 [ 28.060403] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.060912] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.061550] ? kasan_atomics+0x153/0x310 [ 28.062001] kasan_atomics+0x1dd/0x310 [ 28.062908] ? __pfx_kasan_atomics+0x10/0x10 [ 28.063531] ? __pfx_read_tsc+0x10/0x10 [ 28.064003] ? ktime_get_ts64+0x84/0x230 [ 28.064579] kunit_try_run_case+0x1b3/0x490 [ 28.065284] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.065803] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.066231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.066635] ? __kthread_parkme+0x82/0x160 [ 28.067116] ? preempt_count_sub+0x50/0x80 [ 28.067560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.067921] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.068520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.068946] kthread+0x257/0x310 [ 28.069413] ? __pfx_kthread+0x10/0x10 [ 28.069808] ret_from_fork+0x41/0x80 [ 28.070185] ? __pfx_kthread+0x10/0x10 [ 28.070701] ret_from_fork_asm+0x1a/0x30 [ 28.071161] </TASK> [ 28.071470] [ 28.071685] Allocated by task 273: [ 28.071930] kasan_save_stack+0x3d/0x60 [ 28.072478] kasan_save_track+0x18/0x40 [ 28.072943] kasan_save_alloc_info+0x3b/0x50 [ 28.073438] __kasan_kmalloc+0xb7/0xc0 [ 28.073729] __kmalloc_cache_noprof+0x184/0x410 [ 28.074271] kasan_atomics+0x96/0x310 [ 28.074670] kunit_try_run_case+0x1b3/0x490 [ 28.075238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.075706] kthread+0x257/0x310 [ 28.075963] ret_from_fork+0x41/0x80 [ 28.076485] ret_from_fork_asm+0x1a/0x30 [ 28.076962] [ 28.077261] The buggy address belongs to the object at ffff888102a32500 [ 28.077261] which belongs to the cache kmalloc-64 of size 64 [ 28.078288] The buggy address is located 0 bytes to the right of [ 28.078288] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 28.079454] [ 28.079618] The buggy address belongs to the physical page: [ 28.080029] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 28.080894] flags: 0x200000000000000(node=0|zone=2) [ 28.081426] page_type: f5(slab) [ 28.081688] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.082558] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 28.083308] page dumped because: kasan: bad access detected [ 28.083793] [ 28.083982] Memory state around the buggy address: [ 28.084538] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.085130] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.085696] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.086447] ^ [ 28.086796] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.087272] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.088058] ================================================================== [ 27.540469] ================================================================== [ 27.541463] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 27.542397] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.543220] [ 27.543569] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.544403] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.544679] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.545236] Call Trace: [ 27.545554] <TASK> [ 27.545896] dump_stack_lvl+0x73/0xb0 [ 27.546592] print_report+0xd1/0x640 [ 27.547187] ? __virt_addr_valid+0x1db/0x2d0 [ 27.547726] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.548209] kasan_report+0x102/0x140 [ 27.548690] ? kasan_atomics_helper+0x18b2/0x5450 [ 27.549310] ? kasan_atomics_helper+0x18b2/0x5450 [ 27.549773] kasan_check_range+0x10c/0x1c0 [ 27.550364] __kasan_check_write+0x18/0x20 [ 27.550759] kasan_atomics_helper+0x18b2/0x5450 [ 27.551321] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.551666] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.551990] ? kasan_atomics+0x153/0x310 [ 27.552480] kasan_atomics+0x1dd/0x310 [ 27.552999] ? __pfx_kasan_atomics+0x10/0x10 [ 27.553628] ? __pfx_read_tsc+0x10/0x10 [ 27.554146] ? ktime_get_ts64+0x84/0x230 [ 27.554706] kunit_try_run_case+0x1b3/0x490 [ 27.555298] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.555727] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.556053] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.556625] ? __kthread_parkme+0x82/0x160 [ 27.557210] ? preempt_count_sub+0x50/0x80 [ 27.557762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.558403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.558958] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.559457] kthread+0x257/0x310 [ 27.559845] ? __pfx_kthread+0x10/0x10 [ 27.560324] ret_from_fork+0x41/0x80 [ 27.560753] ? __pfx_kthread+0x10/0x10 [ 27.561236] ret_from_fork_asm+0x1a/0x30 [ 27.561662] </TASK> [ 27.561915] [ 27.562158] Allocated by task 273: [ 27.562511] kasan_save_stack+0x3d/0x60 [ 27.562851] kasan_save_track+0x18/0x40 [ 27.563303] kasan_save_alloc_info+0x3b/0x50 [ 27.564674] __kasan_kmalloc+0xb7/0xc0 [ 27.566033] __kmalloc_cache_noprof+0x184/0x410 [ 27.566535] kasan_atomics+0x96/0x310 [ 27.566879] kunit_try_run_case+0x1b3/0x490 [ 27.568459] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.568940] kthread+0x257/0x310 [ 27.569433] ret_from_fork+0x41/0x80 [ 27.569858] ret_from_fork_asm+0x1a/0x30 [ 27.570808] [ 27.571367] The buggy address belongs to the object at ffff888102a32500 [ 27.571367] which belongs to the cache kmalloc-64 of size 64 [ 27.572230] The buggy address is located 0 bytes to the right of [ 27.572230] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.573211] [ 27.573705] The buggy address belongs to the physical page: [ 27.574165] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.575038] flags: 0x200000000000000(node=0|zone=2) [ 27.575746] page_type: f5(slab) [ 27.576071] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.576744] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.578203] page dumped because: kasan: bad access detected [ 27.578767] [ 27.579028] Memory state around the buggy address: [ 27.579617] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.580301] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.581080] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.581947] ^ [ 27.582272] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.583009] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.583762] ================================================================== [ 27.877114] ================================================================== [ 27.877840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 27.878762] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.879216] [ 27.879565] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.880649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.881006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.881854] Call Trace: [ 27.882348] <TASK> [ 27.882664] dump_stack_lvl+0x73/0xb0 [ 27.883461] print_report+0xd1/0x640 [ 27.883880] ? __virt_addr_valid+0x1db/0x2d0 [ 27.884548] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.885272] kasan_report+0x102/0x140 [ 27.885757] ? kasan_atomics_helper+0x1d7b/0x5450 [ 27.886431] ? kasan_atomics_helper+0x1d7b/0x5450 [ 27.886858] kasan_check_range+0x10c/0x1c0 [ 27.887645] __kasan_check_write+0x18/0x20 [ 27.888182] kasan_atomics_helper+0x1d7b/0x5450 [ 27.888519] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.889235] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.889832] ? kasan_atomics+0x153/0x310 [ 27.890422] kasan_atomics+0x1dd/0x310 [ 27.890913] ? __pfx_kasan_atomics+0x10/0x10 [ 27.891359] ? __pfx_read_tsc+0x10/0x10 [ 27.891882] ? ktime_get_ts64+0x84/0x230 [ 27.892502] kunit_try_run_case+0x1b3/0x490 [ 27.892975] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.893510] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.894175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.894750] ? __kthread_parkme+0x82/0x160 [ 27.895164] ? preempt_count_sub+0x50/0x80 [ 27.895812] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.896292] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.897127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.897725] kthread+0x257/0x310 [ 27.898141] ? __pfx_kthread+0x10/0x10 [ 27.898667] ret_from_fork+0x41/0x80 [ 27.898988] ? __pfx_kthread+0x10/0x10 [ 27.899553] ret_from_fork_asm+0x1a/0x30 [ 27.900163] </TASK> [ 27.900438] [ 27.900709] Allocated by task 273: [ 27.901139] kasan_save_stack+0x3d/0x60 [ 27.901696] kasan_save_track+0x18/0x40 [ 27.902200] kasan_save_alloc_info+0x3b/0x50 [ 27.902530] __kasan_kmalloc+0xb7/0xc0 [ 27.903105] __kmalloc_cache_noprof+0x184/0x410 [ 27.903690] kasan_atomics+0x96/0x310 [ 27.904005] kunit_try_run_case+0x1b3/0x490 [ 27.904618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.905268] kthread+0x257/0x310 [ 27.905795] ret_from_fork+0x41/0x80 [ 27.906910] ret_from_fork_asm+0x1a/0x30 [ 27.907362] [ 27.907626] The buggy address belongs to the object at ffff888102a32500 [ 27.907626] which belongs to the cache kmalloc-64 of size 64 [ 27.908701] The buggy address is located 0 bytes to the right of [ 27.908701] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.909933] [ 27.910258] The buggy address belongs to the physical page: [ 27.910992] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.911666] flags: 0x200000000000000(node=0|zone=2) [ 27.912006] page_type: f5(slab) [ 27.912704] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.913165] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.914432] page dumped because: kasan: bad access detected [ 27.915005] [ 27.915290] Memory state around the buggy address: [ 27.915732] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.916389] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.917279] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.917988] ^ [ 27.918639] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.919415] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.920069] ================================================================== [ 25.710400] ================================================================== [ 25.711065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 25.712908] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.713917] [ 25.714537] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.715660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.716065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.716812] Call Trace: [ 25.717086] <TASK> [ 25.717441] dump_stack_lvl+0x73/0xb0 [ 25.717811] print_report+0xd1/0x640 [ 25.718508] ? __virt_addr_valid+0x1db/0x2d0 [ 25.718998] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.719844] kasan_report+0x102/0x140 [ 25.720396] ? kasan_atomics_helper+0x4b70/0x5450 [ 25.721058] ? kasan_atomics_helper+0x4b70/0x5450 [ 25.721794] __asan_report_store4_noabort+0x1b/0x30 [ 25.722404] kasan_atomics_helper+0x4b70/0x5450 [ 25.722921] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.723637] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.724364] ? kasan_atomics+0x153/0x310 [ 25.724806] kasan_atomics+0x1dd/0x310 [ 25.725409] ? __pfx_kasan_atomics+0x10/0x10 [ 25.725965] ? __pfx_read_tsc+0x10/0x10 [ 25.726657] ? ktime_get_ts64+0x84/0x230 [ 25.727044] kunit_try_run_case+0x1b3/0x490 [ 25.727701] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.728308] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.728888] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.729636] ? __kthread_parkme+0x82/0x160 [ 25.730016] ? preempt_count_sub+0x50/0x80 [ 25.730589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.731270] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.731926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.732731] kthread+0x257/0x310 [ 25.733148] ? __pfx_kthread+0x10/0x10 [ 25.733687] ret_from_fork+0x41/0x80 [ 25.734037] ? __pfx_kthread+0x10/0x10 [ 25.734431] ret_from_fork_asm+0x1a/0x30 [ 25.734907] </TASK> [ 25.735177] [ 25.735438] Allocated by task 273: [ 25.735958] kasan_save_stack+0x3d/0x60 [ 25.736309] kasan_save_track+0x18/0x40 [ 25.736604] kasan_save_alloc_info+0x3b/0x50 [ 25.737370] __kasan_kmalloc+0xb7/0xc0 [ 25.737976] __kmalloc_cache_noprof+0x184/0x410 [ 25.738664] kasan_atomics+0x96/0x310 [ 25.739164] kunit_try_run_case+0x1b3/0x490 [ 25.739806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.740300] kthread+0x257/0x310 [ 25.740739] ret_from_fork+0x41/0x80 [ 25.741451] ret_from_fork_asm+0x1a/0x30 [ 25.741900] [ 25.742365] The buggy address belongs to the object at ffff888102a32500 [ 25.742365] which belongs to the cache kmalloc-64 of size 64 [ 25.743590] The buggy address is located 0 bytes to the right of [ 25.743590] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.744853] [ 25.745314] The buggy address belongs to the physical page: [ 25.746575] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.747670] flags: 0x200000000000000(node=0|zone=2) [ 25.747986] page_type: f5(slab) [ 25.748530] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.749308] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.750066] page dumped because: kasan: bad access detected [ 25.750803] [ 25.750951] Memory state around the buggy address: [ 25.751617] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.752318] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.753290] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.753930] ^ [ 25.754688] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.755518] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.756212] ================================================================== [ 27.273097] ================================================================== [ 27.273532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 27.274720] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.275761] [ 27.275943] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.277161] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.277956] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.279098] Call Trace: [ 27.279444] <TASK> [ 27.279722] dump_stack_lvl+0x73/0xb0 [ 27.280467] print_report+0xd1/0x640 [ 27.280787] ? __virt_addr_valid+0x1db/0x2d0 [ 27.281407] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.281925] kasan_report+0x102/0x140 [ 27.282463] ? kasan_atomics_helper+0x151e/0x5450 [ 27.283120] ? kasan_atomics_helper+0x151e/0x5450 [ 27.283498] kasan_check_range+0x10c/0x1c0 [ 27.284008] __kasan_check_write+0x18/0x20 [ 27.284738] kasan_atomics_helper+0x151e/0x5450 [ 27.285172] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.285744] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.286658] ? kasan_atomics+0x153/0x310 [ 27.287136] kasan_atomics+0x1dd/0x310 [ 27.287460] ? __pfx_kasan_atomics+0x10/0x10 [ 27.288125] ? __pfx_read_tsc+0x10/0x10 [ 27.288696] ? ktime_get_ts64+0x84/0x230 [ 27.289119] kunit_try_run_case+0x1b3/0x490 [ 27.289457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.290121] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.291104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.291503] ? __kthread_parkme+0x82/0x160 [ 27.292078] ? preempt_count_sub+0x50/0x80 [ 27.292783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.293789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.294321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.294874] kthread+0x257/0x310 [ 27.295363] ? __pfx_kthread+0x10/0x10 [ 27.295946] ret_from_fork+0x41/0x80 [ 27.296555] ? __pfx_kthread+0x10/0x10 [ 27.297138] ret_from_fork_asm+0x1a/0x30 [ 27.297957] </TASK> [ 27.298421] [ 27.298694] Allocated by task 273: [ 27.299211] kasan_save_stack+0x3d/0x60 [ 27.299734] kasan_save_track+0x18/0x40 [ 27.300112] kasan_save_alloc_info+0x3b/0x50 [ 27.300783] __kasan_kmalloc+0xb7/0xc0 [ 27.301366] __kmalloc_cache_noprof+0x184/0x410 [ 27.302049] kasan_atomics+0x96/0x310 [ 27.302487] kunit_try_run_case+0x1b3/0x490 [ 27.302841] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.303510] kthread+0x257/0x310 [ 27.303907] ret_from_fork+0x41/0x80 [ 27.304371] ret_from_fork_asm+0x1a/0x30 [ 27.304861] [ 27.305018] The buggy address belongs to the object at ffff888102a32500 [ 27.305018] which belongs to the cache kmalloc-64 of size 64 [ 27.306235] The buggy address is located 0 bytes to the right of [ 27.306235] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.307470] [ 27.307787] The buggy address belongs to the physical page: [ 27.308387] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.309207] flags: 0x200000000000000(node=0|zone=2) [ 27.309853] page_type: f5(slab) [ 27.310255] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.311034] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.311770] page dumped because: kasan: bad access detected [ 27.312368] [ 27.312614] Memory state around the buggy address: [ 27.313166] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.313762] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.314630] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.315309] ^ [ 27.315676] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.316392] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.316898] ================================================================== [ 27.963660] ================================================================== [ 27.964593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 27.965426] Write of size 8 at addr ffff888102a32530 by task kunit_try_catch/273 [ 27.966942] [ 27.967145] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 27.968875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.969529] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.970287] Call Trace: [ 27.970780] <TASK> [ 27.971063] dump_stack_lvl+0x73/0xb0 [ 27.971581] print_report+0xd1/0x640 [ 27.971945] ? __virt_addr_valid+0x1db/0x2d0 [ 27.972316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.972862] kasan_report+0x102/0x140 [ 27.973306] ? kasan_atomics_helper+0x1eab/0x5450 [ 27.973752] ? kasan_atomics_helper+0x1eab/0x5450 [ 27.974277] kasan_check_range+0x10c/0x1c0 [ 27.974739] __kasan_check_write+0x18/0x20 [ 27.975215] kasan_atomics_helper+0x1eab/0x5450 [ 27.975596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.976182] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.976625] ? kasan_atomics+0x153/0x310 [ 27.976977] kasan_atomics+0x1dd/0x310 [ 27.977517] ? __pfx_kasan_atomics+0x10/0x10 [ 27.978058] ? __pfx_read_tsc+0x10/0x10 [ 27.978502] ? ktime_get_ts64+0x84/0x230 [ 27.978895] kunit_try_run_case+0x1b3/0x490 [ 27.979372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.979933] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.980372] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.980946] ? __kthread_parkme+0x82/0x160 [ 27.981430] ? preempt_count_sub+0x50/0x80 [ 27.981788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.982302] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.982959] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.983659] kthread+0x257/0x310 [ 27.983979] ? __pfx_kthread+0x10/0x10 [ 27.984381] ret_from_fork+0x41/0x80 [ 27.984821] ? __pfx_kthread+0x10/0x10 [ 27.985277] ret_from_fork_asm+0x1a/0x30 [ 27.985703] </TASK> [ 27.985900] [ 27.986118] Allocated by task 273: [ 27.986556] kasan_save_stack+0x3d/0x60 [ 27.987061] kasan_save_track+0x18/0x40 [ 27.987431] kasan_save_alloc_info+0x3b/0x50 [ 27.987870] __kasan_kmalloc+0xb7/0xc0 [ 27.988379] __kmalloc_cache_noprof+0x184/0x410 [ 27.988846] kasan_atomics+0x96/0x310 [ 27.989226] kunit_try_run_case+0x1b3/0x490 [ 27.989718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.990252] kthread+0x257/0x310 [ 27.990650] ret_from_fork+0x41/0x80 [ 27.991012] ret_from_fork_asm+0x1a/0x30 [ 27.991462] [ 27.991681] The buggy address belongs to the object at ffff888102a32500 [ 27.991681] which belongs to the cache kmalloc-64 of size 64 [ 27.992690] The buggy address is located 0 bytes to the right of [ 27.992690] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 27.993667] [ 27.993920] The buggy address belongs to the physical page: [ 27.994485] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 27.994932] flags: 0x200000000000000(node=0|zone=2) [ 27.995460] page_type: f5(slab) [ 27.995879] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.996680] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 27.997149] page dumped because: kasan: bad access detected [ 27.997771] [ 27.998011] Memory state around the buggy address: [ 27.998606] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.999377] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.999799] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.000586] ^ [ 28.000969] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.002221] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.003212] ================================================================== [ 26.348936] ================================================================== [ 26.349495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 26.350266] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.350842] [ 26.351155] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.351984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.352517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.353247] Call Trace: [ 26.353607] <TASK> [ 26.353911] dump_stack_lvl+0x73/0xb0 [ 26.354396] print_report+0xd1/0x640 [ 26.354773] ? __virt_addr_valid+0x1db/0x2d0 [ 26.355212] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.355873] kasan_report+0x102/0x140 [ 26.356289] ? kasan_atomics_helper+0xb6b/0x5450 [ 26.356807] ? kasan_atomics_helper+0xb6b/0x5450 [ 26.357317] kasan_check_range+0x10c/0x1c0 [ 26.357848] __kasan_check_write+0x18/0x20 [ 26.358258] kasan_atomics_helper+0xb6b/0x5450 [ 26.358717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.359319] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.359696] ? kasan_atomics+0x153/0x310 [ 26.360212] kasan_atomics+0x1dd/0x310 [ 26.360574] ? __pfx_kasan_atomics+0x10/0x10 [ 26.361174] ? __pfx_read_tsc+0x10/0x10 [ 26.361627] ? ktime_get_ts64+0x84/0x230 [ 26.362153] kunit_try_run_case+0x1b3/0x490 [ 26.362601] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.362990] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.363608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.364046] ? __kthread_parkme+0x82/0x160 [ 26.364693] ? preempt_count_sub+0x50/0x80 [ 26.365772] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.366410] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.367280] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.367763] kthread+0x257/0x310 [ 26.368249] ? __pfx_kthread+0x10/0x10 [ 26.369014] ret_from_fork+0x41/0x80 [ 26.369773] ? __pfx_kthread+0x10/0x10 [ 26.370417] ret_from_fork_asm+0x1a/0x30 [ 26.370897] </TASK> [ 26.371367] [ 26.371575] Allocated by task 273: [ 26.371954] kasan_save_stack+0x3d/0x60 [ 26.372448] kasan_save_track+0x18/0x40 [ 26.372941] kasan_save_alloc_info+0x3b/0x50 [ 26.373605] __kasan_kmalloc+0xb7/0xc0 [ 26.374030] __kmalloc_cache_noprof+0x184/0x410 [ 26.374678] kasan_atomics+0x96/0x310 [ 26.375124] kunit_try_run_case+0x1b3/0x490 [ 26.375815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.376312] kthread+0x257/0x310 [ 26.376739] ret_from_fork+0x41/0x80 [ 26.377208] ret_from_fork_asm+0x1a/0x30 [ 26.377858] [ 26.378054] The buggy address belongs to the object at ffff888102a32500 [ 26.378054] which belongs to the cache kmalloc-64 of size 64 [ 26.378976] The buggy address is located 0 bytes to the right of [ 26.378976] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.380385] [ 26.380552] The buggy address belongs to the physical page: [ 26.380943] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.381973] flags: 0x200000000000000(node=0|zone=2) [ 26.382679] page_type: f5(slab) [ 26.383129] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.384164] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.384757] page dumped because: kasan: bad access detected [ 26.385461] [ 26.385677] Memory state around the buggy address: [ 26.386447] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.386800] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.387102] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.388629] ^ [ 26.388955] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.389826] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.390421] ================================================================== [ 26.435056] ================================================================== [ 26.435873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 26.436995] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.437862] [ 26.438249] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.439122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.439541] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.440327] Call Trace: [ 26.440790] <TASK> [ 26.441124] dump_stack_lvl+0x73/0xb0 [ 26.441661] print_report+0xd1/0x640 [ 26.442041] ? __virt_addr_valid+0x1db/0x2d0 [ 26.442623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.443195] kasan_report+0x102/0x140 [ 26.443625] ? kasan_atomics_helper+0x4a86/0x5450 [ 26.444135] ? kasan_atomics_helper+0x4a86/0x5450 [ 26.444643] __asan_report_load4_noabort+0x18/0x20 [ 26.445207] kasan_atomics_helper+0x4a86/0x5450 [ 26.445762] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.446190] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.446841] ? kasan_atomics+0x153/0x310 [ 26.447223] kasan_atomics+0x1dd/0x310 [ 26.447823] ? __pfx_kasan_atomics+0x10/0x10 [ 26.448512] ? __pfx_read_tsc+0x10/0x10 [ 26.449034] ? ktime_get_ts64+0x84/0x230 [ 26.449545] kunit_try_run_case+0x1b3/0x490 [ 26.450038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.450518] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.451133] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.451569] ? __kthread_parkme+0x82/0x160 [ 26.452154] ? preempt_count_sub+0x50/0x80 [ 26.452643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.453392] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.454202] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.454659] kthread+0x257/0x310 [ 26.455122] ? __pfx_kthread+0x10/0x10 [ 26.455570] ret_from_fork+0x41/0x80 [ 26.456051] ? __pfx_kthread+0x10/0x10 [ 26.456600] ret_from_fork_asm+0x1a/0x30 [ 26.457016] </TASK> [ 26.457384] [ 26.457601] Allocated by task 273: [ 26.457905] kasan_save_stack+0x3d/0x60 [ 26.458357] kasan_save_track+0x18/0x40 [ 26.458686] kasan_save_alloc_info+0x3b/0x50 [ 26.459237] __kasan_kmalloc+0xb7/0xc0 [ 26.459623] __kmalloc_cache_noprof+0x184/0x410 [ 26.460197] kasan_atomics+0x96/0x310 [ 26.460675] kunit_try_run_case+0x1b3/0x490 [ 26.461208] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.461827] kthread+0x257/0x310 [ 26.462370] ret_from_fork+0x41/0x80 [ 26.462909] ret_from_fork_asm+0x1a/0x30 [ 26.463415] [ 26.463646] The buggy address belongs to the object at ffff888102a32500 [ 26.463646] which belongs to the cache kmalloc-64 of size 64 [ 26.464608] The buggy address is located 0 bytes to the right of [ 26.464608] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.465791] [ 26.466127] The buggy address belongs to the physical page: [ 26.466675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.467432] flags: 0x200000000000000(node=0|zone=2) [ 26.467927] page_type: f5(slab) [ 26.468414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.469277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.469973] page dumped because: kasan: bad access detected [ 26.470463] [ 26.470716] Memory state around the buggy address: [ 26.471403] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.472007] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.472675] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.473352] ^ [ 26.473694] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.474527] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.475219] ================================================================== [ 26.779748] ================================================================== [ 26.780854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 26.781711] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.782785] [ 26.783041] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.783798] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.784072] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.784580] Call Trace: [ 26.785086] <TASK> [ 26.785917] dump_stack_lvl+0x73/0xb0 [ 26.786563] print_report+0xd1/0x640 [ 26.787148] ? __virt_addr_valid+0x1db/0x2d0 [ 26.787894] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.788540] kasan_report+0x102/0x140 [ 26.788942] ? kasan_atomics_helper+0x4a1e/0x5450 [ 26.789980] ? kasan_atomics_helper+0x4a1e/0x5450 [ 26.790503] __asan_report_load4_noabort+0x18/0x20 [ 26.790740] kasan_atomics_helper+0x4a1e/0x5450 [ 26.790950] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.791840] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.792662] ? kasan_atomics+0x153/0x310 [ 26.792971] kasan_atomics+0x1dd/0x310 [ 26.793534] ? __pfx_kasan_atomics+0x10/0x10 [ 26.793888] ? __pfx_read_tsc+0x10/0x10 [ 26.794470] ? ktime_get_ts64+0x84/0x230 [ 26.795023] kunit_try_run_case+0x1b3/0x490 [ 26.795493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.796026] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.796647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.797253] ? __kthread_parkme+0x82/0x160 [ 26.797794] ? preempt_count_sub+0x50/0x80 [ 26.798242] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.798787] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.799471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.800107] kthread+0x257/0x310 [ 26.800582] ? __pfx_kthread+0x10/0x10 [ 26.800892] ret_from_fork+0x41/0x80 [ 26.801460] ? __pfx_kthread+0x10/0x10 [ 26.801830] ret_from_fork_asm+0x1a/0x30 [ 26.802445] </TASK> [ 26.802767] [ 26.803021] Allocated by task 273: [ 26.803477] kasan_save_stack+0x3d/0x60 [ 26.803910] kasan_save_track+0x18/0x40 [ 26.804472] kasan_save_alloc_info+0x3b/0x50 [ 26.805032] __kasan_kmalloc+0xb7/0xc0 [ 26.805571] __kmalloc_cache_noprof+0x184/0x410 [ 26.805982] kasan_atomics+0x96/0x310 [ 26.806737] kunit_try_run_case+0x1b3/0x490 [ 26.807410] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.808288] kthread+0x257/0x310 [ 26.808583] ret_from_fork+0x41/0x80 [ 26.809450] ret_from_fork_asm+0x1a/0x30 [ 26.809872] [ 26.810081] The buggy address belongs to the object at ffff888102a32500 [ 26.810081] which belongs to the cache kmalloc-64 of size 64 [ 26.811447] The buggy address is located 0 bytes to the right of [ 26.811447] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.812503] [ 26.812736] The buggy address belongs to the physical page: [ 26.813256] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.814709] flags: 0x200000000000000(node=0|zone=2) [ 26.815446] page_type: f5(slab) [ 26.816380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.817168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.818259] page dumped because: kasan: bad access detected [ 26.819018] [ 26.819264] Memory state around the buggy address: [ 26.819834] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.820564] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.821315] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.822019] ^ [ 26.822573] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.823253] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.823826] ================================================================== [ 25.559987] ================================================================== [ 25.561236] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 25.561851] Read of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 25.562618] [ 25.562791] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 25.563854] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.564945] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.566448] Call Trace: [ 25.566945] <TASK> [ 25.567417] dump_stack_lvl+0x73/0xb0 [ 25.567871] print_report+0xd1/0x640 [ 25.568983] ? __virt_addr_valid+0x1db/0x2d0 [ 25.569477] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.570055] kasan_report+0x102/0x140 [ 25.570528] ? kasan_atomics_helper+0x4bbe/0x5450 [ 25.571402] ? kasan_atomics_helper+0x4bbe/0x5450 [ 25.572589] __asan_report_load4_noabort+0x18/0x20 [ 25.573698] kasan_atomics_helper+0x4bbe/0x5450 [ 25.574571] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.574980] ? __kmalloc_cache_noprof+0x184/0x410 [ 25.575450] ? kasan_atomics+0x153/0x310 [ 25.575814] kasan_atomics+0x1dd/0x310 [ 25.576476] ? __pfx_kasan_atomics+0x10/0x10 [ 25.576846] ? __pfx_read_tsc+0x10/0x10 [ 25.577802] ? ktime_get_ts64+0x84/0x230 [ 25.578420] kunit_try_run_case+0x1b3/0x490 [ 25.578973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.579364] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 25.579926] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.580434] ? __kthread_parkme+0x82/0x160 [ 25.581066] ? preempt_count_sub+0x50/0x80 [ 25.581472] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.581941] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.582599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.583021] kthread+0x257/0x310 [ 25.584054] ? __pfx_kthread+0x10/0x10 [ 25.584915] ret_from_fork+0x41/0x80 [ 25.585384] ? __pfx_kthread+0x10/0x10 [ 25.585736] ret_from_fork_asm+0x1a/0x30 [ 25.586253] </TASK> [ 25.586702] [ 25.587033] Allocated by task 273: [ 25.588251] kasan_save_stack+0x3d/0x60 [ 25.588563] kasan_save_track+0x18/0x40 [ 25.589147] kasan_save_alloc_info+0x3b/0x50 [ 25.589835] __kasan_kmalloc+0xb7/0xc0 [ 25.590554] __kmalloc_cache_noprof+0x184/0x410 [ 25.591030] kasan_atomics+0x96/0x310 [ 25.591396] kunit_try_run_case+0x1b3/0x490 [ 25.591814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.592914] kthread+0x257/0x310 [ 25.593395] ret_from_fork+0x41/0x80 [ 25.593674] ret_from_fork_asm+0x1a/0x30 [ 25.593962] [ 25.594188] The buggy address belongs to the object at ffff888102a32500 [ 25.594188] which belongs to the cache kmalloc-64 of size 64 [ 25.595499] The buggy address is located 0 bytes to the right of [ 25.595499] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 25.596265] [ 25.596665] The buggy address belongs to the physical page: [ 25.597289] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 25.598198] flags: 0x200000000000000(node=0|zone=2) [ 25.599299] page_type: f5(slab) [ 25.599753] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.600814] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 25.601663] page dumped because: kasan: bad access detected [ 25.602120] [ 25.602648] Memory state around the buggy address: [ 25.603328] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.604179] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.604960] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.605519] ^ [ 25.606178] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.607562] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.608051] ================================================================== [ 26.269124] ================================================================== [ 26.269876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 26.270947] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.271382] [ 26.271567] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.272646] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.273007] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.273938] Call Trace: [ 26.274327] <TASK> [ 26.274568] dump_stack_lvl+0x73/0xb0 [ 26.275106] print_report+0xd1/0x640 [ 26.275560] ? __virt_addr_valid+0x1db/0x2d0 [ 26.275923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.276452] kasan_report+0x102/0x140 [ 26.276865] ? kasan_atomics_helper+0xa2c/0x5450 [ 26.277462] ? kasan_atomics_helper+0xa2c/0x5450 [ 26.277842] kasan_check_range+0x10c/0x1c0 [ 26.278213] __kasan_check_write+0x18/0x20 [ 26.278754] kasan_atomics_helper+0xa2c/0x5450 [ 26.279398] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.280017] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.280589] ? kasan_atomics+0x153/0x310 [ 26.280995] kasan_atomics+0x1dd/0x310 [ 26.281391] ? __pfx_kasan_atomics+0x10/0x10 [ 26.281846] ? __pfx_read_tsc+0x10/0x10 [ 26.282252] ? ktime_get_ts64+0x84/0x230 [ 26.282573] kunit_try_run_case+0x1b3/0x490 [ 26.283195] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.283756] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.284136] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.284721] ? __kthread_parkme+0x82/0x160 [ 26.285279] ? preempt_count_sub+0x50/0x80 [ 26.285710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.286200] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.286736] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.287199] kthread+0x257/0x310 [ 26.287506] ? __pfx_kthread+0x10/0x10 [ 26.287993] ret_from_fork+0x41/0x80 [ 26.288523] ? __pfx_kthread+0x10/0x10 [ 26.288836] ret_from_fork_asm+0x1a/0x30 [ 26.289327] </TASK> [ 26.289657] [ 26.289841] Allocated by task 273: [ 26.290306] kasan_save_stack+0x3d/0x60 [ 26.290646] kasan_save_track+0x18/0x40 [ 26.290929] kasan_save_alloc_info+0x3b/0x50 [ 26.291458] __kasan_kmalloc+0xb7/0xc0 [ 26.291967] __kmalloc_cache_noprof+0x184/0x410 [ 26.292570] kasan_atomics+0x96/0x310 [ 26.293005] kunit_try_run_case+0x1b3/0x490 [ 26.293477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.294005] kthread+0x257/0x310 [ 26.294374] ret_from_fork+0x41/0x80 [ 26.294802] ret_from_fork_asm+0x1a/0x30 [ 26.295265] [ 26.295463] The buggy address belongs to the object at ffff888102a32500 [ 26.295463] which belongs to the cache kmalloc-64 of size 64 [ 26.296503] The buggy address is located 0 bytes to the right of [ 26.296503] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.297573] [ 26.297810] The buggy address belongs to the physical page: [ 26.298418] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.298882] flags: 0x200000000000000(node=0|zone=2) [ 26.299240] page_type: f5(slab) [ 26.299693] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.301313] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.302656] page dumped because: kasan: bad access detected [ 26.303166] [ 26.303327] Memory state around the buggy address: [ 26.303725] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.304535] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.305025] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.305729] ^ [ 26.306296] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.306962] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.307603] ================================================================== [ 26.913700] ================================================================== [ 26.914262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 26.915188] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.915610] [ 26.915880] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.916963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.917602] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.918242] Call Trace: [ 26.918666] <TASK> [ 26.918997] dump_stack_lvl+0x73/0xb0 [ 26.919587] print_report+0xd1/0x640 [ 26.919875] ? __virt_addr_valid+0x1db/0x2d0 [ 26.920493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.921260] kasan_report+0x102/0x140 [ 26.921637] ? kasan_atomics_helper+0x1218/0x5450 [ 26.922299] ? kasan_atomics_helper+0x1218/0x5450 [ 26.922817] kasan_check_range+0x10c/0x1c0 [ 26.923298] __kasan_check_write+0x18/0x20 [ 26.923837] kasan_atomics_helper+0x1218/0x5450 [ 26.924404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.924827] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.925475] ? kasan_atomics+0x153/0x310 [ 26.925957] kasan_atomics+0x1dd/0x310 [ 26.926576] ? __pfx_kasan_atomics+0x10/0x10 [ 26.926998] ? __pfx_read_tsc+0x10/0x10 [ 26.927507] ? ktime_get_ts64+0x84/0x230 [ 26.927972] kunit_try_run_case+0x1b3/0x490 [ 26.928528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.929039] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.929674] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.930277] ? __kthread_parkme+0x82/0x160 [ 26.930803] ? preempt_count_sub+0x50/0x80 [ 26.931394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.931944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.932530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.933186] kthread+0x257/0x310 [ 26.933631] ? __pfx_kthread+0x10/0x10 [ 26.934238] ret_from_fork+0x41/0x80 [ 26.934639] ? __pfx_kthread+0x10/0x10 [ 26.935048] ret_from_fork_asm+0x1a/0x30 [ 26.935615] </TASK> [ 26.935835] [ 26.935993] Allocated by task 273: [ 26.936521] kasan_save_stack+0x3d/0x60 [ 26.937113] kasan_save_track+0x18/0x40 [ 26.937420] kasan_save_alloc_info+0x3b/0x50 [ 26.937813] __kasan_kmalloc+0xb7/0xc0 [ 26.938528] __kmalloc_cache_noprof+0x184/0x410 [ 26.939176] kasan_atomics+0x96/0x310 [ 26.939551] kunit_try_run_case+0x1b3/0x490 [ 26.940015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.940714] kthread+0x257/0x310 [ 26.941243] ret_from_fork+0x41/0x80 [ 26.941668] ret_from_fork_asm+0x1a/0x30 [ 26.942029] [ 26.942457] The buggy address belongs to the object at ffff888102a32500 [ 26.942457] which belongs to the cache kmalloc-64 of size 64 [ 26.943423] The buggy address is located 0 bytes to the right of [ 26.943423] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.944798] [ 26.945046] The buggy address belongs to the physical page: [ 26.945570] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.946637] flags: 0x200000000000000(node=0|zone=2) [ 26.947207] page_type: f5(slab) [ 26.947498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.948402] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.949191] page dumped because: kasan: bad access detected [ 26.949776] [ 26.950132] Memory state around the buggy address: [ 26.950683] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.951513] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.952239] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.952821] ^ [ 26.953430] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.953972] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.954826] ================================================================== [ 26.022531] ================================================================== [ 26.023085] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 26.023825] Write of size 4 at addr ffff888102a32530 by task kunit_try_catch/273 [ 26.025416] [ 26.025708] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.12.0-next-20241128 #1 [ 26.026885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.027626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.028519] Call Trace: [ 26.028867] <TASK> [ 26.029143] dump_stack_lvl+0x73/0xb0 [ 26.029617] print_report+0xd1/0x640 [ 26.030037] ? __virt_addr_valid+0x1db/0x2d0 [ 26.030550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.031113] kasan_report+0x102/0x140 [ 26.031667] ? kasan_atomics_helper+0x698/0x5450 [ 26.032267] ? kasan_atomics_helper+0x698/0x5450 [ 26.032806] kasan_check_range+0x10c/0x1c0 [ 26.033277] __kasan_check_write+0x18/0x20 [ 26.033891] kasan_atomics_helper+0x698/0x5450 [ 26.034308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.034871] ? __kmalloc_cache_noprof+0x184/0x410 [ 26.035366] ? kasan_atomics+0x153/0x310 [ 26.035903] kasan_atomics+0x1dd/0x310 [ 26.036323] ? __pfx_kasan_atomics+0x10/0x10 [ 26.036758] ? __pfx_read_tsc+0x10/0x10 [ 26.037037] ? ktime_get_ts64+0x84/0x230 [ 26.037881] kunit_try_run_case+0x1b3/0x490 [ 26.038460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.039225] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 26.039778] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.040401] ? __kthread_parkme+0x82/0x160 [ 26.040912] ? preempt_count_sub+0x50/0x80 [ 26.041576] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.041991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.042686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.043365] kthread+0x257/0x310 [ 26.043931] ? __pfx_kthread+0x10/0x10 [ 26.044212] ret_from_fork+0x41/0x80 [ 26.044984] ? __pfx_kthread+0x10/0x10 [ 26.045416] ret_from_fork_asm+0x1a/0x30 [ 26.045943] </TASK> [ 26.046296] [ 26.046542] Allocated by task 273: [ 26.046879] kasan_save_stack+0x3d/0x60 [ 26.047436] kasan_save_track+0x18/0x40 [ 26.047803] kasan_save_alloc_info+0x3b/0x50 [ 26.048382] __kasan_kmalloc+0xb7/0xc0 [ 26.048854] __kmalloc_cache_noprof+0x184/0x410 [ 26.049410] kasan_atomics+0x96/0x310 [ 26.049963] kunit_try_run_case+0x1b3/0x490 [ 26.050477] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.051024] kthread+0x257/0x310 [ 26.051449] ret_from_fork+0x41/0x80 [ 26.051932] ret_from_fork_asm+0x1a/0x30 [ 26.052494] [ 26.052654] The buggy address belongs to the object at ffff888102a32500 [ 26.052654] which belongs to the cache kmalloc-64 of size 64 [ 26.054000] The buggy address is located 0 bytes to the right of [ 26.054000] allocated 48-byte region [ffff888102a32500, ffff888102a32530) [ 26.055165] [ 26.055539] The buggy address belongs to the physical page: [ 26.055995] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a32 [ 26.056939] flags: 0x200000000000000(node=0|zone=2) [ 26.057634] page_type: f5(slab) [ 26.058021] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.058875] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 26.059514] page dumped because: kasan: bad access detected [ 26.060167] [ 26.060347] Memory state around the buggy address: [ 26.060628] ffff888102a32400: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.061000] ffff888102a32480: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.061415] >ffff888102a32500: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.061806] ^ [ 26.062098] ffff888102a32580: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.062618] ffff888102a32600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.063062] ==================================================================