Date
Dec. 3, 2024, 11:38 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.024037] ================================================================== [ 35.025024] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.026081] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.027718] [ 35.028124] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.029251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.029771] Hardware name: linux,dummy-virt (DT) [ 35.030402] Call trace: [ 35.030870] show_stack+0x20/0x38 (C) [ 35.031456] dump_stack_lvl+0x8c/0xd0 [ 35.032121] print_report+0x118/0x5e0 [ 35.032714] kasan_report+0xc8/0x118 [ 35.033184] kasan_check_range+0x100/0x1a8 [ 35.033937] __kasan_check_write+0x20/0x30 [ 35.034531] kasan_atomics_helper+0x4e4/0x4858 [ 35.035185] kasan_atomics+0x198/0x2e8 [ 35.035819] kunit_try_run_case+0x14c/0x3d0 [ 35.036503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.037272] kthread+0x24c/0x2d0 [ 35.037900] ret_from_fork+0x10/0x20 [ 35.038513] [ 35.038833] Allocated by task 254: [ 35.039302] kasan_save_stack+0x3c/0x68 [ 35.039866] kasan_save_track+0x20/0x40 [ 35.040530] kasan_save_alloc_info+0x40/0x58 [ 35.041103] __kasan_kmalloc+0xd4/0xd8 [ 35.041808] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.042490] kasan_atomics+0xb8/0x2e8 [ 35.043027] kunit_try_run_case+0x14c/0x3d0 [ 35.043670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.044400] kthread+0x24c/0x2d0 [ 35.044859] ret_from_fork+0x10/0x20 [ 35.045461] [ 35.045852] The buggy address belongs to the object at fff00000c594f180 [ 35.045852] which belongs to the cache kmalloc-64 of size 64 [ 35.047378] The buggy address is located 0 bytes to the right of [ 35.047378] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.048819] [ 35.049167] The buggy address belongs to the physical page: [ 35.049916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.050856] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.051687] page_type: f5(slab) [ 35.052246] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.053175] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.054132] page dumped because: kasan: bad access detected [ 35.054812] [ 35.055135] Memory state around the buggy address: [ 35.055807] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.056707] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.057563] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.058463] ^ [ 35.059192] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.060084] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.060964] ================================================================== [ 36.482177] ================================================================== [ 36.483515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.484102] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.485318] [ 36.485893] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.487246] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.488042] Hardware name: linux,dummy-virt (DT) [ 36.488735] Call trace: [ 36.489186] show_stack+0x20/0x38 (C) [ 36.489900] dump_stack_lvl+0x8c/0xd0 [ 36.490507] print_report+0x118/0x5e0 [ 36.491087] kasan_report+0xc8/0x118 [ 36.491735] kasan_check_range+0x100/0x1a8 [ 36.492431] __kasan_check_write+0x20/0x30 [ 36.493199] kasan_atomics_helper+0x126c/0x4858 [ 36.493952] kasan_atomics+0x198/0x2e8 [ 36.494586] kunit_try_run_case+0x14c/0x3d0 [ 36.495373] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.496155] kthread+0x24c/0x2d0 [ 36.496732] ret_from_fork+0x10/0x20 [ 36.497400] [ 36.497742] Allocated by task 254: [ 36.498412] kasan_save_stack+0x3c/0x68 [ 36.499056] kasan_save_track+0x20/0x40 [ 36.499758] kasan_save_alloc_info+0x40/0x58 [ 36.500440] __kasan_kmalloc+0xd4/0xd8 [ 36.501074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.501813] kasan_atomics+0xb8/0x2e8 [ 36.502437] kunit_try_run_case+0x14c/0x3d0 [ 36.503125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.503893] kthread+0x24c/0x2d0 [ 36.504467] ret_from_fork+0x10/0x20 [ 36.505169] [ 36.505573] The buggy address belongs to the object at fff00000c594f180 [ 36.505573] which belongs to the cache kmalloc-64 of size 64 [ 36.507053] The buggy address is located 0 bytes to the right of [ 36.507053] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.509004] [ 36.509400] The buggy address belongs to the physical page: [ 36.510081] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.511411] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.512430] page_type: f5(slab) [ 36.513135] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.514275] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.515380] page dumped because: kasan: bad access detected [ 36.516281] [ 36.516816] Memory state around the buggy address: [ 36.517611] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.518228] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.518819] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.519758] ^ [ 36.521228] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.522022] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.523145] ================================================================== [ 37.059861] ================================================================== [ 37.060792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.062737] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.063849] [ 37.064388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.065756] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.066489] Hardware name: linux,dummy-virt (DT) [ 37.067087] Call trace: [ 37.067759] show_stack+0x20/0x38 (C) [ 37.068470] dump_stack_lvl+0x8c/0xd0 [ 37.069243] print_report+0x118/0x5e0 [ 37.070031] kasan_report+0xc8/0x118 [ 37.070688] kasan_check_range+0x100/0x1a8 [ 37.071457] __kasan_check_write+0x20/0x30 [ 37.072180] kasan_atomics_helper+0x175c/0x4858 [ 37.073092] kasan_atomics+0x198/0x2e8 [ 37.073876] kunit_try_run_case+0x14c/0x3d0 [ 37.074657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.075530] kthread+0x24c/0x2d0 [ 37.076031] ret_from_fork+0x10/0x20 [ 37.076619] [ 37.076944] Allocated by task 254: [ 37.077869] kasan_save_stack+0x3c/0x68 [ 37.078471] kasan_save_track+0x20/0x40 [ 37.079200] kasan_save_alloc_info+0x40/0x58 [ 37.079779] __kasan_kmalloc+0xd4/0xd8 [ 37.080071] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.080451] kasan_atomics+0xb8/0x2e8 [ 37.081127] kunit_try_run_case+0x14c/0x3d0 [ 37.081876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.082797] kthread+0x24c/0x2d0 [ 37.083438] ret_from_fork+0x10/0x20 [ 37.084110] [ 37.084680] The buggy address belongs to the object at fff00000c594f180 [ 37.084680] which belongs to the cache kmalloc-64 of size 64 [ 37.086239] The buggy address is located 0 bytes to the right of [ 37.086239] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.087836] [ 37.088207] The buggy address belongs to the physical page: [ 37.088985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.090125] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.091017] page_type: f5(slab) [ 37.091604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.092612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.093580] page dumped because: kasan: bad access detected [ 37.094384] [ 37.094720] Memory state around the buggy address: [ 37.095447] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.096506] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.097448] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.098432] ^ [ 37.099162] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.100047] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.100963] ================================================================== [ 35.255634] ================================================================== [ 35.256414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 35.257370] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.259180] [ 35.259541] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.260725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.261267] Hardware name: linux,dummy-virt (DT) [ 35.261924] Call trace: [ 35.262360] show_stack+0x20/0x38 (C) [ 35.262952] dump_stack_lvl+0x8c/0xd0 [ 35.263539] print_report+0x118/0x5e0 [ 35.264127] kasan_report+0xc8/0x118 [ 35.264755] kasan_check_range+0x100/0x1a8 [ 35.265439] __kasan_check_write+0x20/0x30 [ 35.266183] kasan_atomics_helper+0x760/0x4858 [ 35.266868] kasan_atomics+0x198/0x2e8 [ 35.267427] kunit_try_run_case+0x14c/0x3d0 [ 35.268063] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.268794] kthread+0x24c/0x2d0 [ 35.269404] ret_from_fork+0x10/0x20 [ 35.270001] [ 35.270423] Allocated by task 254: [ 35.270867] kasan_save_stack+0x3c/0x68 [ 35.271597] kasan_save_track+0x20/0x40 [ 35.272136] kasan_save_alloc_info+0x40/0x58 [ 35.272805] __kasan_kmalloc+0xd4/0xd8 [ 35.273384] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.274043] kasan_atomics+0xb8/0x2e8 [ 35.274667] kunit_try_run_case+0x14c/0x3d0 [ 35.275243] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.276130] kthread+0x24c/0x2d0 [ 35.276633] ret_from_fork+0x10/0x20 [ 35.277214] [ 35.277574] The buggy address belongs to the object at fff00000c594f180 [ 35.277574] which belongs to the cache kmalloc-64 of size 64 [ 35.278920] The buggy address is located 0 bytes to the right of [ 35.278920] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.280371] [ 35.280689] The buggy address belongs to the physical page: [ 35.281498] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.282392] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.283262] page_type: f5(slab) [ 35.283842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.284847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.285773] page dumped because: kasan: bad access detected [ 35.286470] [ 35.286789] Memory state around the buggy address: [ 35.287445] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.288320] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.289292] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.290143] ^ [ 35.290859] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.291752] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.292612] ================================================================== [ 34.783678] ================================================================== [ 34.784533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.785348] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.786262] [ 34.786580] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.788078] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.788931] Hardware name: linux,dummy-virt (DT) [ 34.789756] Call trace: [ 34.790291] show_stack+0x20/0x38 (C) [ 34.790860] dump_stack_lvl+0x8c/0xd0 [ 34.791443] print_report+0x118/0x5e0 [ 34.792013] kasan_report+0xc8/0x118 [ 34.792650] __asan_report_load4_noabort+0x20/0x30 [ 34.793387] kasan_atomics_helper+0x40fc/0x4858 [ 34.794171] kasan_atomics+0x198/0x2e8 [ 34.794719] kunit_try_run_case+0x14c/0x3d0 [ 34.795308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.796077] kthread+0x24c/0x2d0 [ 34.796761] ret_from_fork+0x10/0x20 [ 34.797258] [ 34.797639] Allocated by task 254: [ 34.798128] kasan_save_stack+0x3c/0x68 [ 34.798979] kasan_save_track+0x20/0x40 [ 34.799565] kasan_save_alloc_info+0x40/0x58 [ 34.800150] __kasan_kmalloc+0xd4/0xd8 [ 34.800700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.801356] kasan_atomics+0xb8/0x2e8 [ 34.802095] kunit_try_run_case+0x14c/0x3d0 [ 34.802673] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.803364] kthread+0x24c/0x2d0 [ 34.803838] ret_from_fork+0x10/0x20 [ 34.804381] [ 34.804686] The buggy address belongs to the object at fff00000c594f180 [ 34.804686] which belongs to the cache kmalloc-64 of size 64 [ 34.806148] The buggy address is located 0 bytes to the right of [ 34.806148] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.807540] [ 34.807881] The buggy address belongs to the physical page: [ 34.808511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.809536] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.810388] page_type: f5(slab) [ 34.810883] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.811788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.812693] page dumped because: kasan: bad access detected [ 34.813414] [ 34.813734] Memory state around the buggy address: [ 34.814493] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.815357] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.816251] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.817108] ^ [ 34.817737] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.818632] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.819454] ================================================================== [ 35.138676] ================================================================== [ 35.139839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 35.141046] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.142126] [ 35.142506] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.143786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.144465] Hardware name: linux,dummy-virt (DT) [ 35.144984] Call trace: [ 35.145490] show_stack+0x20/0x38 (C) [ 35.146078] dump_stack_lvl+0x8c/0xd0 [ 35.146739] print_report+0x118/0x5e0 [ 35.147407] kasan_report+0xc8/0x118 [ 35.148011] kasan_check_range+0x100/0x1a8 [ 35.148611] __kasan_check_write+0x20/0x30 [ 35.149252] kasan_atomics_helper+0x61c/0x4858 [ 35.149919] kasan_atomics+0x198/0x2e8 [ 35.150690] kunit_try_run_case+0x14c/0x3d0 [ 35.151309] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.152109] kthread+0x24c/0x2d0 [ 35.152633] ret_from_fork+0x10/0x20 [ 35.153225] [ 35.153601] Allocated by task 254: [ 35.154102] kasan_save_stack+0x3c/0x68 [ 35.154639] kasan_save_track+0x20/0x40 [ 35.155301] kasan_save_alloc_info+0x40/0x58 [ 35.155920] __kasan_kmalloc+0xd4/0xd8 [ 35.156570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.157192] kasan_atomics+0xb8/0x2e8 [ 35.157799] kunit_try_run_case+0x14c/0x3d0 [ 35.158449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.159073] kthread+0x24c/0x2d0 [ 35.159684] ret_from_fork+0x10/0x20 [ 35.160214] [ 35.160564] The buggy address belongs to the object at fff00000c594f180 [ 35.160564] which belongs to the cache kmalloc-64 of size 64 [ 35.161976] The buggy address is located 0 bytes to the right of [ 35.161976] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.163376] [ 35.163696] The buggy address belongs to the physical page: [ 35.164568] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.165457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.166449] page_type: f5(slab) [ 35.166926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.167883] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.168794] page dumped because: kasan: bad access detected [ 35.169493] [ 35.169808] Memory state around the buggy address: [ 35.170438] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.171296] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.172208] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.173152] ^ [ 35.173850] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.174757] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.175623] ================================================================== [ 35.887924] ================================================================== [ 35.888666] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.889577] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.890655] [ 35.891015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.892477] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.893085] Hardware name: linux,dummy-virt (DT) [ 35.893819] Call trace: [ 35.894356] show_stack+0x20/0x38 (C) [ 35.894952] dump_stack_lvl+0x8c/0xd0 [ 35.895506] print_report+0x118/0x5e0 [ 35.896122] kasan_report+0xc8/0x118 [ 35.896689] kasan_check_range+0x100/0x1a8 [ 35.897265] __kasan_check_write+0x20/0x30 [ 35.897910] kasan_atomics_helper+0xd3c/0x4858 [ 35.898459] kasan_atomics+0x198/0x2e8 [ 35.899208] kunit_try_run_case+0x14c/0x3d0 [ 35.899916] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.900829] kthread+0x24c/0x2d0 [ 35.901383] ret_from_fork+0x10/0x20 [ 35.901955] [ 35.902305] Allocated by task 254: [ 35.902730] kasan_save_stack+0x3c/0x68 [ 35.903436] kasan_save_track+0x20/0x40 [ 35.904095] kasan_save_alloc_info+0x40/0x58 [ 35.904772] __kasan_kmalloc+0xd4/0xd8 [ 35.905363] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.906027] kasan_atomics+0xb8/0x2e8 [ 35.906560] kunit_try_run_case+0x14c/0x3d0 [ 35.907279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.908030] kthread+0x24c/0x2d0 [ 35.908546] ret_from_fork+0x10/0x20 [ 35.909074] [ 35.909429] The buggy address belongs to the object at fff00000c594f180 [ 35.909429] which belongs to the cache kmalloc-64 of size 64 [ 35.910865] The buggy address is located 0 bytes to the right of [ 35.910865] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.912289] [ 35.912605] The buggy address belongs to the physical page: [ 35.913431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.914390] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.915248] page_type: f5(slab) [ 35.915843] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.916786] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.917724] page dumped because: kasan: bad access detected [ 35.918435] [ 35.918749] Memory state around the buggy address: [ 35.919390] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.920215] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.921101] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.921979] ^ [ 35.922636] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.923519] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.924303] ================================================================== [ 36.119499] ================================================================== [ 36.120352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.121308] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.122728] [ 36.123095] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.124173] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.124945] Hardware name: linux,dummy-virt (DT) [ 36.125600] Call trace: [ 36.126053] show_stack+0x20/0x38 (C) [ 36.126671] dump_stack_lvl+0x8c/0xd0 [ 36.127171] print_report+0x118/0x5e0 [ 36.127959] kasan_report+0xc8/0x118 [ 36.128655] kasan_check_range+0x100/0x1a8 [ 36.129248] __kasan_check_write+0x20/0x30 [ 36.129901] kasan_atomics_helper+0xeb8/0x4858 [ 36.130600] kasan_atomics+0x198/0x2e8 [ 36.131173] kunit_try_run_case+0x14c/0x3d0 [ 36.131861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.132671] kthread+0x24c/0x2d0 [ 36.133174] ret_from_fork+0x10/0x20 [ 36.133816] [ 36.134132] Allocated by task 254: [ 36.134670] kasan_save_stack+0x3c/0x68 [ 36.135263] kasan_save_track+0x20/0x40 [ 36.135938] kasan_save_alloc_info+0x40/0x58 [ 36.136544] __kasan_kmalloc+0xd4/0xd8 [ 36.137186] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.137703] kasan_atomics+0xb8/0x2e8 [ 36.138376] kunit_try_run_case+0x14c/0x3d0 [ 36.139026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.140015] kthread+0x24c/0x2d0 [ 36.140762] ret_from_fork+0x10/0x20 [ 36.141384] [ 36.141845] The buggy address belongs to the object at fff00000c594f180 [ 36.141845] which belongs to the cache kmalloc-64 of size 64 [ 36.143369] The buggy address is located 0 bytes to the right of [ 36.143369] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.144713] [ 36.145011] The buggy address belongs to the physical page: [ 36.145878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.146891] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.147750] page_type: f5(slab) [ 36.148654] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.149600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.150576] page dumped because: kasan: bad access detected [ 36.151364] [ 36.151822] Memory state around the buggy address: [ 36.152496] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.153431] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.154443] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.155359] ^ [ 36.156086] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.157066] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.157930] ================================================================== [ 37.142408] ================================================================== [ 37.143406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.144231] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.145118] [ 37.145477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.146842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.147381] Hardware name: linux,dummy-virt (DT) [ 37.148046] Call trace: [ 37.148469] show_stack+0x20/0x38 (C) [ 37.149133] dump_stack_lvl+0x8c/0xd0 [ 37.149666] print_report+0x118/0x5e0 [ 37.150347] kasan_report+0xc8/0x118 [ 37.150916] kasan_check_range+0x100/0x1a8 [ 37.151551] __kasan_check_write+0x20/0x30 [ 37.152155] kasan_atomics_helper+0x17ec/0x4858 [ 37.152912] kasan_atomics+0x198/0x2e8 [ 37.153552] kunit_try_run_case+0x14c/0x3d0 [ 37.154163] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.154976] kthread+0x24c/0x2d0 [ 37.155465] ret_from_fork+0x10/0x20 [ 37.156108] [ 37.156496] Allocated by task 254: [ 37.156981] kasan_save_stack+0x3c/0x68 [ 37.157680] kasan_save_track+0x20/0x40 [ 37.158255] kasan_save_alloc_info+0x40/0x58 [ 37.158883] __kasan_kmalloc+0xd4/0xd8 [ 37.159452] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.160065] kasan_atomics+0xb8/0x2e8 [ 37.160618] kunit_try_run_case+0x14c/0x3d0 [ 37.161295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.162013] kthread+0x24c/0x2d0 [ 37.162478] ret_from_fork+0x10/0x20 [ 37.163180] [ 37.163548] The buggy address belongs to the object at fff00000c594f180 [ 37.163548] which belongs to the cache kmalloc-64 of size 64 [ 37.164945] The buggy address is located 0 bytes to the right of [ 37.164945] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.166377] [ 37.166801] The buggy address belongs to the physical page: [ 37.167515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.168430] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.169416] page_type: f5(slab) [ 37.169904] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.171809] page dumped because: kasan: bad access detected [ 37.172504] [ 37.172856] Memory state around the buggy address: [ 37.173559] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.174421] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.175347] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.176227] ^ [ 37.176964] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.177778] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.178713] ================================================================== [ 34.904169] ================================================================== [ 34.905002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 34.906473] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.908209] [ 34.909131] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.910312] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.910843] Hardware name: linux,dummy-virt (DT) [ 34.911513] Call trace: [ 34.911961] show_stack+0x20/0x38 (C) [ 34.912566] dump_stack_lvl+0x8c/0xd0 [ 34.913175] print_report+0x118/0x5e0 [ 34.913897] kasan_report+0xc8/0x118 [ 34.914457] kasan_check_range+0x100/0x1a8 [ 34.915130] __kasan_check_write+0x20/0x30 [ 34.915719] kasan_atomics_helper+0x3ac/0x4858 [ 34.916464] kasan_atomics+0x198/0x2e8 [ 34.917109] kunit_try_run_case+0x14c/0x3d0 [ 34.917779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.918598] kthread+0x24c/0x2d0 [ 34.919140] ret_from_fork+0x10/0x20 [ 34.919754] [ 34.920103] Allocated by task 254: [ 34.920722] kasan_save_stack+0x3c/0x68 [ 34.921236] kasan_save_track+0x20/0x40 [ 34.921933] kasan_save_alloc_info+0x40/0x58 [ 34.922596] __kasan_kmalloc+0xd4/0xd8 [ 34.923258] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.923875] kasan_atomics+0xb8/0x2e8 [ 34.924496] kunit_try_run_case+0x14c/0x3d0 [ 34.925203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.925948] kthread+0x24c/0x2d0 [ 34.926567] ret_from_fork+0x10/0x20 [ 34.927153] [ 34.927572] The buggy address belongs to the object at fff00000c594f180 [ 34.927572] which belongs to the cache kmalloc-64 of size 64 [ 34.928923] The buggy address is located 0 bytes to the right of [ 34.928923] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.930384] [ 34.930694] The buggy address belongs to the physical page: [ 34.931377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.932284] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.933213] page_type: f5(slab) [ 34.933751] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.934719] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.935588] page dumped because: kasan: bad access detected [ 34.936197] [ 34.936574] Memory state around the buggy address: [ 34.937120] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.937997] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.938914] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.939829] ^ [ 34.940541] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.941357] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.942236] ================================================================== [ 36.322192] ================================================================== [ 36.323532] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.324620] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.326291] [ 36.326831] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.328120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.328988] Hardware name: linux,dummy-virt (DT) [ 36.329638] Call trace: [ 36.330086] show_stack+0x20/0x38 (C) [ 36.330887] dump_stack_lvl+0x8c/0xd0 [ 36.331609] print_report+0x118/0x5e0 [ 36.332314] kasan_report+0xc8/0x118 [ 36.333023] kasan_check_range+0x100/0x1a8 [ 36.333764] __kasan_check_write+0x20/0x30 [ 36.334546] kasan_atomics_helper+0x10c0/0x4858 [ 36.335310] kasan_atomics+0x198/0x2e8 [ 36.336015] kunit_try_run_case+0x14c/0x3d0 [ 36.336801] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.337639] kthread+0x24c/0x2d0 [ 36.338426] ret_from_fork+0x10/0x20 [ 36.339160] [ 36.339587] Allocated by task 254: [ 36.340112] kasan_save_stack+0x3c/0x68 [ 36.340840] kasan_save_track+0x20/0x40 [ 36.341497] kasan_save_alloc_info+0x40/0x58 [ 36.342155] __kasan_kmalloc+0xd4/0xd8 [ 36.342773] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.343515] kasan_atomics+0xb8/0x2e8 [ 36.344140] kunit_try_run_case+0x14c/0x3d0 [ 36.344875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.345532] kthread+0x24c/0x2d0 [ 36.346017] ret_from_fork+0x10/0x20 [ 36.346525] [ 36.346865] The buggy address belongs to the object at fff00000c594f180 [ 36.346865] which belongs to the cache kmalloc-64 of size 64 [ 36.348125] The buggy address is located 0 bytes to the right of [ 36.348125] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.349575] [ 36.349930] The buggy address belongs to the physical page: [ 36.350762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.351691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.352524] page_type: f5(slab) [ 36.353064] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.354115] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.355024] page dumped because: kasan: bad access detected [ 36.355834] [ 36.356153] Memory state around the buggy address: [ 36.356792] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.357666] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.358584] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.359421] ^ [ 36.360016] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.361140] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.362134] ================================================================== [ 36.850258] ================================================================== [ 36.851073] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.852345] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.853206] [ 36.853620] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.855344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.856045] Hardware name: linux,dummy-virt (DT) [ 36.856740] Call trace: [ 36.857288] show_stack+0x20/0x38 (C) [ 36.858080] dump_stack_lvl+0x8c/0xd0 [ 36.858766] print_report+0x118/0x5e0 [ 36.859497] kasan_report+0xc8/0x118 [ 36.860070] __asan_report_load8_noabort+0x20/0x30 [ 36.861016] kasan_atomics_helper+0x3db0/0x4858 [ 36.861688] kasan_atomics+0x198/0x2e8 [ 36.862413] kunit_try_run_case+0x14c/0x3d0 [ 36.863068] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.863972] kthread+0x24c/0x2d0 [ 36.864649] ret_from_fork+0x10/0x20 [ 36.865344] [ 36.865776] Allocated by task 254: [ 36.866443] kasan_save_stack+0x3c/0x68 [ 36.867073] kasan_save_track+0x20/0x40 [ 36.867724] kasan_save_alloc_info+0x40/0x58 [ 36.868419] __kasan_kmalloc+0xd4/0xd8 [ 36.868962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.869792] kasan_atomics+0xb8/0x2e8 [ 36.870459] kunit_try_run_case+0x14c/0x3d0 [ 36.871122] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.872008] kthread+0x24c/0x2d0 [ 36.872732] ret_from_fork+0x10/0x20 [ 36.873359] [ 36.873845] The buggy address belongs to the object at fff00000c594f180 [ 36.873845] which belongs to the cache kmalloc-64 of size 64 [ 36.875319] The buggy address is located 0 bytes to the right of [ 36.875319] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.876742] [ 36.877023] The buggy address belongs to the physical page: [ 36.877727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.879016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.879914] page_type: f5(slab) [ 36.880472] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.881407] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.882473] page dumped because: kasan: bad access detected [ 36.883282] [ 36.883683] Memory state around the buggy address: [ 36.884438] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.885406] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.886431] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.887357] ^ [ 36.888018] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.889002] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.889909] ================================================================== [ 34.705810] ================================================================== [ 34.706633] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 34.707467] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.708321] [ 34.708763] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.710077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.710720] Hardware name: linux,dummy-virt (DT) [ 34.711264] Call trace: [ 34.711821] show_stack+0x20/0x38 (C) [ 34.712439] dump_stack_lvl+0x8c/0xd0 [ 34.712948] print_report+0x118/0x5e0 [ 34.713636] kasan_report+0xc8/0x118 [ 34.714283] kasan_check_range+0x100/0x1a8 [ 34.714947] __kasan_check_write+0x20/0x30 [ 34.715583] kasan_atomics_helper+0x24c/0x4858 [ 34.716321] kasan_atomics+0x198/0x2e8 [ 34.716893] kunit_try_run_case+0x14c/0x3d0 [ 34.717560] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.718392] kthread+0x24c/0x2d0 [ 34.718900] ret_from_fork+0x10/0x20 [ 34.719503] [ 34.719856] Allocated by task 254: [ 34.720415] kasan_save_stack+0x3c/0x68 [ 34.721018] kasan_save_track+0x20/0x40 [ 34.721596] kasan_save_alloc_info+0x40/0x58 [ 34.722234] __kasan_kmalloc+0xd4/0xd8 [ 34.722818] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.723383] kasan_atomics+0xb8/0x2e8 [ 34.724016] kunit_try_run_case+0x14c/0x3d0 [ 34.724684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.725516] kthread+0x24c/0x2d0 [ 34.726036] ret_from_fork+0x10/0x20 [ 34.726636] [ 34.726956] The buggy address belongs to the object at fff00000c594f180 [ 34.726956] which belongs to the cache kmalloc-64 of size 64 [ 34.728378] The buggy address is located 0 bytes to the right of [ 34.728378] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.729748] [ 34.730045] The buggy address belongs to the physical page: [ 34.730801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.731742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.732656] page_type: f5(slab) [ 34.733242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.734213] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.735126] page dumped because: kasan: bad access detected [ 34.735826] [ 34.736149] Memory state around the buggy address: [ 34.736802] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.737615] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.738494] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.739376] ^ [ 34.740016] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.740906] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.741824] ================================================================== [ 34.623642] ================================================================== [ 34.625094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 34.626117] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.627433] [ 34.627760] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.628926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.629672] Hardware name: linux,dummy-virt (DT) [ 34.630160] Call trace: [ 34.630532] show_stack+0x20/0x38 (C) [ 34.631192] dump_stack_lvl+0x8c/0xd0 [ 34.631920] print_report+0x118/0x5e0 [ 34.632707] kasan_report+0xc8/0x118 [ 34.633317] __asan_report_store4_noabort+0x20/0x30 [ 34.634091] kasan_atomics_helper+0x3f7c/0x4858 [ 34.634823] kasan_atomics+0x198/0x2e8 [ 34.635457] kunit_try_run_case+0x14c/0x3d0 [ 34.636178] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.637126] kthread+0x24c/0x2d0 [ 34.637650] ret_from_fork+0x10/0x20 [ 34.638278] [ 34.638873] Allocated by task 254: [ 34.639544] kasan_save_stack+0x3c/0x68 [ 34.640206] kasan_save_track+0x20/0x40 [ 34.640984] kasan_save_alloc_info+0x40/0x58 [ 34.641724] __kasan_kmalloc+0xd4/0xd8 [ 34.642556] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.643130] kasan_atomics+0xb8/0x2e8 [ 34.643723] kunit_try_run_case+0x14c/0x3d0 [ 34.644351] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.645174] kthread+0x24c/0x2d0 [ 34.645740] ret_from_fork+0x10/0x20 [ 34.646389] [ 34.646672] The buggy address belongs to the object at fff00000c594f180 [ 34.646672] which belongs to the cache kmalloc-64 of size 64 [ 34.648095] The buggy address is located 0 bytes to the right of [ 34.648095] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.649525] [ 34.649810] The buggy address belongs to the physical page: [ 34.650633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.651502] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.652422] page_type: f5(slab) [ 34.652929] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.653862] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.654888] page dumped because: kasan: bad access detected [ 34.655516] [ 34.655873] Memory state around the buggy address: [ 34.656543] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.657438] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.658346] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.659182] ^ [ 34.659848] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.660781] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.661753] ================================================================== [ 35.573235] ================================================================== [ 35.574142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.575194] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.576193] [ 35.576742] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.578210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.578814] Hardware name: linux,dummy-virt (DT) [ 35.579506] Call trace: [ 35.580075] show_stack+0x20/0x38 (C) [ 35.580742] dump_stack_lvl+0x8c/0xd0 [ 35.581389] print_report+0x118/0x5e0 [ 35.582046] kasan_report+0xc8/0x118 [ 35.582708] kasan_check_range+0x100/0x1a8 [ 35.583408] __kasan_check_write+0x20/0x30 [ 35.584061] kasan_atomics_helper+0xad4/0x4858 [ 35.584797] kasan_atomics+0x198/0x2e8 [ 35.585448] kunit_try_run_case+0x14c/0x3d0 [ 35.586150] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.586944] kthread+0x24c/0x2d0 [ 35.587555] ret_from_fork+0x10/0x20 [ 35.588131] [ 35.588495] Allocated by task 254: [ 35.589145] kasan_save_stack+0x3c/0x68 [ 35.589914] kasan_save_track+0x20/0x40 [ 35.590528] kasan_save_alloc_info+0x40/0x58 [ 35.591260] __kasan_kmalloc+0xd4/0xd8 [ 35.591993] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.592751] kasan_atomics+0xb8/0x2e8 [ 35.593380] kunit_try_run_case+0x14c/0x3d0 [ 35.594058] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.594865] kthread+0x24c/0x2d0 [ 35.595634] ret_from_fork+0x10/0x20 [ 35.596256] [ 35.596607] The buggy address belongs to the object at fff00000c594f180 [ 35.596607] which belongs to the cache kmalloc-64 of size 64 [ 35.598183] The buggy address is located 0 bytes to the right of [ 35.598183] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.599766] [ 35.600224] The buggy address belongs to the physical page: [ 35.601026] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.602061] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.603000] page_type: f5(slab) [ 35.603605] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.604634] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.605495] page dumped because: kasan: bad access detected [ 35.606213] [ 35.606513] Memory state around the buggy address: [ 35.607149] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.608032] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.608823] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.609759] ^ [ 35.610413] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.611297] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.612166] ================================================================== [ 35.413019] ================================================================== [ 35.413856] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 35.415376] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.416249] [ 35.416624] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.417856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.418422] Hardware name: linux,dummy-virt (DT) [ 35.418995] Call trace: [ 35.419477] show_stack+0x20/0x38 (C) [ 35.420089] dump_stack_lvl+0x8c/0xd0 [ 35.420674] print_report+0x118/0x5e0 [ 35.421279] kasan_report+0xc8/0x118 [ 35.421976] kasan_check_range+0x100/0x1a8 [ 35.422703] __kasan_check_write+0x20/0x30 [ 35.423314] kasan_atomics_helper+0x934/0x4858 [ 35.424069] kasan_atomics+0x198/0x2e8 [ 35.424595] kunit_try_run_case+0x14c/0x3d0 [ 35.425316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.426038] kthread+0x24c/0x2d0 [ 35.426682] ret_from_fork+0x10/0x20 [ 35.427235] [ 35.427592] Allocated by task 254: [ 35.428091] kasan_save_stack+0x3c/0x68 [ 35.428635] kasan_save_track+0x20/0x40 [ 35.429244] kasan_save_alloc_info+0x40/0x58 [ 35.429952] __kasan_kmalloc+0xd4/0xd8 [ 35.430549] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.431202] kasan_atomics+0xb8/0x2e8 [ 35.431732] kunit_try_run_case+0x14c/0x3d0 [ 35.432382] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.433093] kthread+0x24c/0x2d0 [ 35.433580] ret_from_fork+0x10/0x20 [ 35.434198] [ 35.434655] The buggy address belongs to the object at fff00000c594f180 [ 35.434655] which belongs to the cache kmalloc-64 of size 64 [ 35.436152] The buggy address is located 0 bytes to the right of [ 35.436152] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.437713] [ 35.438011] The buggy address belongs to the physical page: [ 35.438603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.439643] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.440521] page_type: f5(slab) [ 35.441094] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.442076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.443047] page dumped because: kasan: bad access detected [ 35.443780] [ 35.444149] Memory state around the buggy address: [ 35.444791] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.445632] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.446463] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.447411] ^ [ 35.448032] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.448959] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.449803] ================================================================== [ 36.934447] ================================================================== [ 36.935919] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.936882] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.938501] [ 36.939015] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.940083] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.940951] Hardware name: linux,dummy-virt (DT) [ 36.941628] Call trace: [ 36.942294] show_stack+0x20/0x38 (C) [ 36.943182] dump_stack_lvl+0x8c/0xd0 [ 36.943633] print_report+0x118/0x5e0 [ 36.944386] kasan_report+0xc8/0x118 [ 36.944988] __asan_report_load8_noabort+0x20/0x30 [ 36.945754] kasan_atomics_helper+0x3df4/0x4858 [ 36.946513] kasan_atomics+0x198/0x2e8 [ 36.947235] kunit_try_run_case+0x14c/0x3d0 [ 36.947963] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.948719] kthread+0x24c/0x2d0 [ 36.949370] ret_from_fork+0x10/0x20 [ 36.950060] [ 36.950426] Allocated by task 254: [ 36.951104] kasan_save_stack+0x3c/0x68 [ 36.951824] kasan_save_track+0x20/0x40 [ 36.952484] kasan_save_alloc_info+0x40/0x58 [ 36.953153] __kasan_kmalloc+0xd4/0xd8 [ 36.953868] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.954608] kasan_atomics+0xb8/0x2e8 [ 36.955247] kunit_try_run_case+0x14c/0x3d0 [ 36.955909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.956688] kthread+0x24c/0x2d0 [ 36.957268] ret_from_fork+0x10/0x20 [ 36.957905] [ 36.958264] The buggy address belongs to the object at fff00000c594f180 [ 36.958264] which belongs to the cache kmalloc-64 of size 64 [ 36.959812] The buggy address is located 0 bytes to the right of [ 36.959812] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.961310] [ 36.961750] The buggy address belongs to the physical page: [ 36.962569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.963579] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.964485] page_type: f5(slab) [ 36.965065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.966098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.967078] page dumped because: kasan: bad access detected [ 36.967856] [ 36.968234] Memory state around the buggy address: [ 36.968977] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.969947] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.970908] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.971891] ^ [ 36.972676] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.973591] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.974547] ================================================================== [ 37.102775] ================================================================== [ 37.103819] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.104783] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.105749] [ 37.106139] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.107429] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.108181] Hardware name: linux,dummy-virt (DT) [ 37.108940] Call trace: [ 37.109533] show_stack+0x20/0x38 (C) [ 37.110190] dump_stack_lvl+0x8c/0xd0 [ 37.110865] print_report+0x118/0x5e0 [ 37.111654] kasan_report+0xc8/0x118 [ 37.112433] __asan_report_load8_noabort+0x20/0x30 [ 37.113293] kasan_atomics_helper+0x3e20/0x4858 [ 37.114178] kasan_atomics+0x198/0x2e8 [ 37.114820] kunit_try_run_case+0x14c/0x3d0 [ 37.115617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.116421] kthread+0x24c/0x2d0 [ 37.116913] ret_from_fork+0x10/0x20 [ 37.117590] [ 37.117900] Allocated by task 254: [ 37.118486] kasan_save_stack+0x3c/0x68 [ 37.119148] kasan_save_track+0x20/0x40 [ 37.119741] kasan_save_alloc_info+0x40/0x58 [ 37.120376] __kasan_kmalloc+0xd4/0xd8 [ 37.120943] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.121507] kasan_atomics+0xb8/0x2e8 [ 37.122168] kunit_try_run_case+0x14c/0x3d0 [ 37.122969] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.123743] kthread+0x24c/0x2d0 [ 37.124227] ret_from_fork+0x10/0x20 [ 37.124814] [ 37.125115] The buggy address belongs to the object at fff00000c594f180 [ 37.125115] which belongs to the cache kmalloc-64 of size 64 [ 37.126461] The buggy address is located 0 bytes to the right of [ 37.126461] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.127949] [ 37.128259] The buggy address belongs to the physical page: [ 37.129161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.130151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.131088] page_type: f5(slab) [ 37.131786] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.132846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.133811] page dumped because: kasan: bad access detected [ 37.134513] [ 37.134814] Memory state around the buggy address: [ 37.135477] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.136279] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.137414] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.138243] ^ [ 37.138791] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.139593] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.140315] ================================================================== [ 36.651369] ================================================================== [ 36.652242] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.653290] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.654143] [ 36.654521] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.655800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.656379] Hardware name: linux,dummy-virt (DT) [ 36.656936] Call trace: [ 36.657447] show_stack+0x20/0x38 (C) [ 36.658128] dump_stack_lvl+0x8c/0xd0 [ 36.658803] print_report+0x118/0x5e0 [ 36.659313] kasan_report+0xc8/0x118 [ 36.659976] kasan_check_range+0x100/0x1a8 [ 36.660767] __kasan_check_write+0x20/0x30 [ 36.661400] kasan_atomics_helper+0x1414/0x4858 [ 36.662138] kasan_atomics+0x198/0x2e8 [ 36.662682] kunit_try_run_case+0x14c/0x3d0 [ 36.663401] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.664095] kthread+0x24c/0x2d0 [ 36.664715] ret_from_fork+0x10/0x20 [ 36.665280] [ 36.665617] Allocated by task 254: [ 36.666092] kasan_save_stack+0x3c/0x68 [ 36.666739] kasan_save_track+0x20/0x40 [ 36.667254] kasan_save_alloc_info+0x40/0x58 [ 36.667968] __kasan_kmalloc+0xd4/0xd8 [ 36.668476] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.669206] kasan_atomics+0xb8/0x2e8 [ 36.669782] kunit_try_run_case+0x14c/0x3d0 [ 36.670482] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.671225] kthread+0x24c/0x2d0 [ 36.671802] ret_from_fork+0x10/0x20 [ 36.672359] [ 36.672668] The buggy address belongs to the object at fff00000c594f180 [ 36.672668] which belongs to the cache kmalloc-64 of size 64 [ 36.674098] The buggy address is located 0 bytes to the right of [ 36.674098] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.675513] [ 36.675834] The buggy address belongs to the physical page: [ 36.676612] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.677614] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.678388] page_type: f5(slab) [ 36.678999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.679960] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.680820] page dumped because: kasan: bad access detected [ 36.681500] [ 36.681856] Memory state around the buggy address: [ 36.682512] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.683378] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.684358] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.685200] ^ [ 36.685842] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.686841] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.687696] ================================================================== [ 36.893034] ================================================================== [ 36.894499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.895664] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.897048] [ 36.897433] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.898857] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.899634] Hardware name: linux,dummy-virt (DT) [ 36.900360] Call trace: [ 36.900965] show_stack+0x20/0x38 (C) [ 36.901776] dump_stack_lvl+0x8c/0xd0 [ 36.902602] print_report+0x118/0x5e0 [ 36.903401] kasan_report+0xc8/0x118 [ 36.903999] kasan_check_range+0x100/0x1a8 [ 36.904641] __kasan_check_write+0x20/0x30 [ 36.905165] kasan_atomics_helper+0x1644/0x4858 [ 36.905914] kasan_atomics+0x198/0x2e8 [ 36.906705] kunit_try_run_case+0x14c/0x3d0 [ 36.907529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.908363] kthread+0x24c/0x2d0 [ 36.908999] ret_from_fork+0x10/0x20 [ 36.909619] [ 36.909896] Allocated by task 254: [ 36.910426] kasan_save_stack+0x3c/0x68 [ 36.911068] kasan_save_track+0x20/0x40 [ 36.911650] kasan_save_alloc_info+0x40/0x58 [ 36.912383] __kasan_kmalloc+0xd4/0xd8 [ 36.912971] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.913625] kasan_atomics+0xb8/0x2e8 [ 36.914188] kunit_try_run_case+0x14c/0x3d0 [ 36.914870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.915578] kthread+0x24c/0x2d0 [ 36.916101] ret_from_fork+0x10/0x20 [ 36.916669] [ 36.917015] The buggy address belongs to the object at fff00000c594f180 [ 36.917015] which belongs to the cache kmalloc-64 of size 64 [ 36.918522] The buggy address is located 0 bytes to the right of [ 36.918522] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.919930] [ 36.920237] The buggy address belongs to the physical page: [ 36.921075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.921994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.922896] page_type: f5(slab) [ 36.923459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.924520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.925523] page dumped because: kasan: bad access detected [ 36.926217] [ 36.926561] Memory state around the buggy address: [ 36.927160] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.928048] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.929084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.929973] ^ [ 36.930814] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.931727] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.932651] ================================================================== [ 36.238513] ================================================================== [ 36.239525] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.240359] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.241429] [ 36.241953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.243267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.244011] Hardware name: linux,dummy-virt (DT) [ 36.244849] Call trace: [ 36.245419] show_stack+0x20/0x38 (C) [ 36.246142] dump_stack_lvl+0x8c/0xd0 [ 36.246773] print_report+0x118/0x5e0 [ 36.247433] kasan_report+0xc8/0x118 [ 36.248080] kasan_check_range+0x100/0x1a8 [ 36.248775] __kasan_check_write+0x20/0x30 [ 36.249566] kasan_atomics_helper+0xff0/0x4858 [ 36.250278] kasan_atomics+0x198/0x2e8 [ 36.250939] kunit_try_run_case+0x14c/0x3d0 [ 36.251649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.252478] kthread+0x24c/0x2d0 [ 36.253101] ret_from_fork+0x10/0x20 [ 36.253753] [ 36.254093] Allocated by task 254: [ 36.254679] kasan_save_stack+0x3c/0x68 [ 36.255343] kasan_save_track+0x20/0x40 [ 36.256013] kasan_save_alloc_info+0x40/0x58 [ 36.256736] __kasan_kmalloc+0xd4/0xd8 [ 36.257466] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.258122] kasan_atomics+0xb8/0x2e8 [ 36.258752] kunit_try_run_case+0x14c/0x3d0 [ 36.259476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.260267] kthread+0x24c/0x2d0 [ 36.260930] ret_from_fork+0x10/0x20 [ 36.261656] [ 36.262053] The buggy address belongs to the object at fff00000c594f180 [ 36.262053] which belongs to the cache kmalloc-64 of size 64 [ 36.263601] The buggy address is located 0 bytes to the right of [ 36.263601] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.265099] [ 36.265568] The buggy address belongs to the physical page: [ 36.266383] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.267433] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.268297] page_type: f5(slab) [ 36.268902] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.269927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.270881] page dumped because: kasan: bad access detected [ 36.271649] [ 36.272000] Memory state around the buggy address: [ 36.272684] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.273725] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.274641] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.275655] ^ [ 36.276394] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.277320] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.278238] ================================================================== [ 34.744000] ================================================================== [ 34.745480] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 34.746861] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.747831] [ 34.748147] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.749492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.750013] Hardware name: linux,dummy-virt (DT) [ 34.750667] Call trace: [ 34.751140] show_stack+0x20/0x38 (C) [ 34.751761] dump_stack_lvl+0x8c/0xd0 [ 34.752365] print_report+0x118/0x5e0 [ 34.753004] kasan_report+0xc8/0x118 [ 34.753579] kasan_check_range+0x100/0x1a8 [ 34.754233] __kasan_check_read+0x20/0x30 [ 34.754885] kasan_atomics_helper+0x2b0/0x4858 [ 34.755519] kasan_atomics+0x198/0x2e8 [ 34.756145] kunit_try_run_case+0x14c/0x3d0 [ 34.756819] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.757605] kthread+0x24c/0x2d0 [ 34.758169] ret_from_fork+0x10/0x20 [ 34.758797] [ 34.759076] Allocated by task 254: [ 34.759689] kasan_save_stack+0x3c/0x68 [ 34.760319] kasan_save_track+0x20/0x40 [ 34.760879] kasan_save_alloc_info+0x40/0x58 [ 34.761543] __kasan_kmalloc+0xd4/0xd8 [ 34.762223] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.762792] kasan_atomics+0xb8/0x2e8 [ 34.763451] kunit_try_run_case+0x14c/0x3d0 [ 34.764016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.764755] kthread+0x24c/0x2d0 [ 34.765317] ret_from_fork+0x10/0x20 [ 34.765922] [ 34.766283] The buggy address belongs to the object at fff00000c594f180 [ 34.766283] which belongs to the cache kmalloc-64 of size 64 [ 34.767660] The buggy address is located 0 bytes to the right of [ 34.767660] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.769047] [ 34.769426] The buggy address belongs to the physical page: [ 34.770099] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.771044] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.771818] page_type: f5(slab) [ 34.772367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.773293] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.774255] page dumped because: kasan: bad access detected [ 34.774975] [ 34.775283] Memory state around the buggy address: [ 34.775894] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.776743] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.777606] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.778496] ^ [ 34.779152] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.780061] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.780903] ================================================================== [ 35.374665] ================================================================== [ 35.375272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.376908] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.378045] [ 35.378529] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.379946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.380472] Hardware name: linux,dummy-virt (DT) [ 35.381085] Call trace: [ 35.381664] show_stack+0x20/0x38 (C) [ 35.382193] dump_stack_lvl+0x8c/0xd0 [ 35.382878] print_report+0x118/0x5e0 [ 35.383538] kasan_report+0xc8/0x118 [ 35.384094] __asan_report_load4_noabort+0x20/0x30 [ 35.384783] kasan_atomics_helper+0x42d8/0x4858 [ 35.385449] kasan_atomics+0x198/0x2e8 [ 35.386086] kunit_try_run_case+0x14c/0x3d0 [ 35.386721] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.387518] kthread+0x24c/0x2d0 [ 35.388113] ret_from_fork+0x10/0x20 [ 35.388807] [ 35.389145] Allocated by task 254: [ 35.389773] kasan_save_stack+0x3c/0x68 [ 35.390415] kasan_save_track+0x20/0x40 [ 35.390968] kasan_save_alloc_info+0x40/0x58 [ 35.391705] __kasan_kmalloc+0xd4/0xd8 [ 35.392319] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.393091] kasan_atomics+0xb8/0x2e8 [ 35.393614] kunit_try_run_case+0x14c/0x3d0 [ 35.394316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.395089] kthread+0x24c/0x2d0 [ 35.395690] ret_from_fork+0x10/0x20 [ 35.396247] [ 35.396575] The buggy address belongs to the object at fff00000c594f180 [ 35.396575] which belongs to the cache kmalloc-64 of size 64 [ 35.398007] The buggy address is located 0 bytes to the right of [ 35.398007] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.399440] [ 35.399752] The buggy address belongs to the physical page: [ 35.400437] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.401523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.402362] page_type: f5(slab) [ 35.402868] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.403804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.404751] page dumped because: kasan: bad access detected [ 35.405470] [ 35.405762] Memory state around the buggy address: [ 35.406433] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.407275] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.408132] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.409088] ^ [ 35.409744] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.410658] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.411538] ================================================================== [ 36.566133] ================================================================== [ 36.567413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.568424] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.569386] [ 36.569762] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.571085] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.571812] Hardware name: linux,dummy-virt (DT) [ 36.572566] Call trace: [ 36.573133] show_stack+0x20/0x38 (C) [ 36.573913] dump_stack_lvl+0x8c/0xd0 [ 36.574646] print_report+0x118/0x5e0 [ 36.575284] kasan_report+0xc8/0x118 [ 36.575947] kasan_check_range+0x100/0x1a8 [ 36.576653] __kasan_check_write+0x20/0x30 [ 36.577359] kasan_atomics_helper+0x1384/0x4858 [ 36.578092] kasan_atomics+0x198/0x2e8 [ 36.578756] kunit_try_run_case+0x14c/0x3d0 [ 36.579457] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.580179] kthread+0x24c/0x2d0 [ 36.580897] ret_from_fork+0x10/0x20 [ 36.581564] [ 36.581938] Allocated by task 254: [ 36.582565] kasan_save_stack+0x3c/0x68 [ 36.583361] kasan_save_track+0x20/0x40 [ 36.583959] kasan_save_alloc_info+0x40/0x58 [ 36.584706] __kasan_kmalloc+0xd4/0xd8 [ 36.585367] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.586063] kasan_atomics+0xb8/0x2e8 [ 36.586746] kunit_try_run_case+0x14c/0x3d0 [ 36.587415] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.588217] kthread+0x24c/0x2d0 [ 36.588860] ret_from_fork+0x10/0x20 [ 36.589516] [ 36.589875] The buggy address belongs to the object at fff00000c594f180 [ 36.589875] which belongs to the cache kmalloc-64 of size 64 [ 36.591534] The buggy address is located 0 bytes to the right of [ 36.591534] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.592991] [ 36.593306] The buggy address belongs to the physical page: [ 36.594049] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.595212] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.596094] page_type: f5(slab) [ 36.596700] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.597700] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.598654] page dumped because: kasan: bad access detected [ 36.599424] [ 36.599757] Memory state around the buggy address: [ 36.600603] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.601611] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.602537] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.603425] ^ [ 36.604134] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605074] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.606011] ================================================================== [ 35.062939] ================================================================== [ 35.063706] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.064561] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.065434] [ 35.065820] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.066907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.067575] Hardware name: linux,dummy-virt (DT) [ 35.068069] Call trace: [ 35.068554] show_stack+0x20/0x38 (C) [ 35.069201] dump_stack_lvl+0x8c/0xd0 [ 35.069850] print_report+0x118/0x5e0 [ 35.070435] kasan_report+0xc8/0x118 [ 35.071018] kasan_check_range+0x100/0x1a8 [ 35.071634] __kasan_check_write+0x20/0x30 [ 35.072300] kasan_atomics_helper+0x54c/0x4858 [ 35.073073] kasan_atomics+0x198/0x2e8 [ 35.073636] kunit_try_run_case+0x14c/0x3d0 [ 35.074304] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.075094] kthread+0x24c/0x2d0 [ 35.075702] ret_from_fork+0x10/0x20 [ 35.076274] [ 35.076639] Allocated by task 254: [ 35.077057] kasan_save_stack+0x3c/0x68 [ 35.077823] kasan_save_track+0x20/0x40 [ 35.078356] kasan_save_alloc_info+0x40/0x58 [ 35.079047] __kasan_kmalloc+0xd4/0xd8 [ 35.079565] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.080227] kasan_atomics+0xb8/0x2e8 [ 35.080807] kunit_try_run_case+0x14c/0x3d0 [ 35.081308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.082220] kthread+0x24c/0x2d0 [ 35.082691] ret_from_fork+0x10/0x20 [ 35.083251] [ 35.083643] The buggy address belongs to the object at fff00000c594f180 [ 35.083643] which belongs to the cache kmalloc-64 of size 64 [ 35.084959] The buggy address is located 0 bytes to the right of [ 35.084959] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.086399] [ 35.086733] The buggy address belongs to the physical page: [ 35.087493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.088452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.089351] page_type: f5(slab) [ 35.089882] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.090820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.091835] page dumped because: kasan: bad access detected [ 35.092508] [ 35.092827] Memory state around the buggy address: [ 35.093537] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.094397] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.095201] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.096120] ^ [ 35.096742] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.097660] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.098527] ================================================================== [ 35.216860] ================================================================== [ 35.217617] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.218694] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.219708] [ 35.220065] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.221361] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.221997] Hardware name: linux,dummy-virt (DT) [ 35.222684] Call trace: [ 35.223113] show_stack+0x20/0x38 (C) [ 35.223722] dump_stack_lvl+0x8c/0xd0 [ 35.224312] print_report+0x118/0x5e0 [ 35.224904] kasan_report+0xc8/0x118 [ 35.225596] kasan_check_range+0x100/0x1a8 [ 35.226270] __kasan_check_write+0x20/0x30 [ 35.227085] kasan_atomics_helper+0x6ec/0x4858 [ 35.227777] kasan_atomics+0x198/0x2e8 [ 35.228477] kunit_try_run_case+0x14c/0x3d0 [ 35.229002] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.229901] kthread+0x24c/0x2d0 [ 35.230520] ret_from_fork+0x10/0x20 [ 35.231097] [ 35.231433] Allocated by task 254: [ 35.231983] kasan_save_stack+0x3c/0x68 [ 35.232608] kasan_save_track+0x20/0x40 [ 35.233067] kasan_save_alloc_info+0x40/0x58 [ 35.233805] __kasan_kmalloc+0xd4/0xd8 [ 35.234322] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.235129] kasan_atomics+0xb8/0x2e8 [ 35.235699] kunit_try_run_case+0x14c/0x3d0 [ 35.236427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.237078] kthread+0x24c/0x2d0 [ 35.237700] ret_from_fork+0x10/0x20 [ 35.238277] [ 35.238754] The buggy address belongs to the object at fff00000c594f180 [ 35.238754] which belongs to the cache kmalloc-64 of size 64 [ 35.240106] The buggy address is located 0 bytes to the right of [ 35.240106] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.241527] [ 35.241861] The buggy address belongs to the physical page: [ 35.242609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.243534] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.244391] page_type: f5(slab) [ 35.244966] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.245964] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.246854] page dumped because: kasan: bad access detected [ 35.247583] [ 35.247939] Memory state around the buggy address: [ 35.248610] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.249464] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.250284] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.251212] ^ [ 35.251850] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.252777] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.253654] ================================================================== [ 35.533108] ================================================================== [ 35.533796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.535573] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.536598] [ 35.536973] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.538188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.538759] Hardware name: linux,dummy-virt (DT) [ 35.539349] Call trace: [ 35.539824] show_stack+0x20/0x38 (C) [ 35.540431] dump_stack_lvl+0x8c/0xd0 [ 35.541021] print_report+0x118/0x5e0 [ 35.541601] kasan_report+0xc8/0x118 [ 35.542237] kasan_check_range+0x100/0x1a8 [ 35.542805] __kasan_check_write+0x20/0x30 [ 35.543482] kasan_atomics_helper+0xa6c/0x4858 [ 35.544221] kasan_atomics+0x198/0x2e8 [ 35.544803] kunit_try_run_case+0x14c/0x3d0 [ 35.545459] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.546218] kthread+0x24c/0x2d0 [ 35.546734] ret_from_fork+0x10/0x20 [ 35.547318] [ 35.547697] Allocated by task 254: [ 35.548227] kasan_save_stack+0x3c/0x68 [ 35.548817] kasan_save_track+0x20/0x40 [ 35.549402] kasan_save_alloc_info+0x40/0x58 [ 35.550048] __kasan_kmalloc+0xd4/0xd8 [ 35.550617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.551234] kasan_atomics+0xb8/0x2e8 [ 35.551894] kunit_try_run_case+0x14c/0x3d0 [ 35.552467] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.553286] kthread+0x24c/0x2d0 [ 35.554006] ret_from_fork+0x10/0x20 [ 35.554626] [ 35.555003] The buggy address belongs to the object at fff00000c594f180 [ 35.555003] which belongs to the cache kmalloc-64 of size 64 [ 35.556461] The buggy address is located 0 bytes to the right of [ 35.556461] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.558014] [ 35.558432] The buggy address belongs to the physical page: [ 35.559190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.560238] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.561104] page_type: f5(slab) [ 35.561647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.562710] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.563673] page dumped because: kasan: bad access detected [ 35.564447] [ 35.564798] Memory state around the buggy address: [ 35.565548] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.566586] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.567518] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.568457] ^ [ 35.569151] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.570129] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.571012] ================================================================== [ 36.081268] ================================================================== [ 36.081928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.082976] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.084047] [ 36.084458] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.086288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.087034] Hardware name: linux,dummy-virt (DT) [ 36.087748] Call trace: [ 36.088276] show_stack+0x20/0x38 (C) [ 36.088931] dump_stack_lvl+0x8c/0xd0 [ 36.089523] print_report+0x118/0x5e0 [ 36.090174] kasan_report+0xc8/0x118 [ 36.090751] __asan_report_store8_noabort+0x20/0x30 [ 36.091428] kasan_atomics_helper+0x3e5c/0x4858 [ 36.092052] kasan_atomics+0x198/0x2e8 [ 36.092700] kunit_try_run_case+0x14c/0x3d0 [ 36.093370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.094120] kthread+0x24c/0x2d0 [ 36.094733] ret_from_fork+0x10/0x20 [ 36.095341] [ 36.095716] Allocated by task 254: [ 36.096237] kasan_save_stack+0x3c/0x68 [ 36.096887] kasan_save_track+0x20/0x40 [ 36.097497] kasan_save_alloc_info+0x40/0x58 [ 36.098040] __kasan_kmalloc+0xd4/0xd8 [ 36.098684] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.099234] kasan_atomics+0xb8/0x2e8 [ 36.099943] kunit_try_run_case+0x14c/0x3d0 [ 36.100636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.101456] kthread+0x24c/0x2d0 [ 36.101978] ret_from_fork+0x10/0x20 [ 36.102455] [ 36.102817] The buggy address belongs to the object at fff00000c594f180 [ 36.102817] which belongs to the cache kmalloc-64 of size 64 [ 36.104297] The buggy address is located 0 bytes to the right of [ 36.104297] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.105724] [ 36.106071] The buggy address belongs to the physical page: [ 36.106739] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.107945] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.108671] page_type: f5(slab) [ 36.109225] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.110088] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.110997] page dumped because: kasan: bad access detected [ 36.111817] [ 36.112116] Memory state around the buggy address: [ 36.112718] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.113660] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.114479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.115399] ^ [ 36.115982] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.116970] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.117890] ================================================================== [ 36.443584] ================================================================== [ 36.444439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.445248] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.446536] [ 36.446925] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.448311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.448863] Hardware name: linux,dummy-virt (DT) [ 36.449429] Call trace: [ 36.449922] show_stack+0x20/0x38 (C) [ 36.450607] dump_stack_lvl+0x8c/0xd0 [ 36.451194] print_report+0x118/0x5e0 [ 36.451850] kasan_report+0xc8/0x118 [ 36.452448] kasan_check_range+0x100/0x1a8 [ 36.453028] __kasan_check_write+0x20/0x30 [ 36.453693] kasan_atomics_helper+0x11f8/0x4858 [ 36.454303] kasan_atomics+0x198/0x2e8 [ 36.454932] kunit_try_run_case+0x14c/0x3d0 [ 36.455663] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.456520] kthread+0x24c/0x2d0 [ 36.457025] ret_from_fork+0x10/0x20 [ 36.457596] [ 36.457973] Allocated by task 254: [ 36.458508] kasan_save_stack+0x3c/0x68 [ 36.458987] kasan_save_track+0x20/0x40 [ 36.459665] kasan_save_alloc_info+0x40/0x58 [ 36.460356] __kasan_kmalloc+0xd4/0xd8 [ 36.461006] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.461620] kasan_atomics+0xb8/0x2e8 [ 36.462282] kunit_try_run_case+0x14c/0x3d0 [ 36.462967] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.463758] kthread+0x24c/0x2d0 [ 36.464253] ret_from_fork+0x10/0x20 [ 36.464893] [ 36.465189] The buggy address belongs to the object at fff00000c594f180 [ 36.465189] which belongs to the cache kmalloc-64 of size 64 [ 36.466625] The buggy address is located 0 bytes to the right of [ 36.466625] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.468032] [ 36.468433] The buggy address belongs to the physical page: [ 36.469153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.470093] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.471127] page_type: f5(slab) [ 36.471674] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.472655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.473555] page dumped because: kasan: bad access detected [ 36.474272] [ 36.474666] Memory state around the buggy address: [ 36.475535] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.476450] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.477314] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.478160] ^ [ 36.478836] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.479702] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.480533] ================================================================== [ 36.769172] ================================================================== [ 36.770616] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.771938] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.773016] [ 36.773495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.774750] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.775319] Hardware name: linux,dummy-virt (DT) [ 36.776002] Call trace: [ 36.776532] show_stack+0x20/0x38 (C) [ 36.777074] dump_stack_lvl+0x8c/0xd0 [ 36.777731] print_report+0x118/0x5e0 [ 36.778304] kasan_report+0xc8/0x118 [ 36.778880] kasan_check_range+0x100/0x1a8 [ 36.779512] __kasan_check_write+0x20/0x30 [ 36.780216] kasan_atomics_helper+0x154c/0x4858 [ 36.780931] kasan_atomics+0x198/0x2e8 [ 36.781518] kunit_try_run_case+0x14c/0x3d0 [ 36.782204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.782995] kthread+0x24c/0x2d0 [ 36.783594] ret_from_fork+0x10/0x20 [ 36.784200] [ 36.784615] Allocated by task 254: [ 36.785053] kasan_save_stack+0x3c/0x68 [ 36.785743] kasan_save_track+0x20/0x40 [ 36.786374] kasan_save_alloc_info+0x40/0x58 [ 36.787084] __kasan_kmalloc+0xd4/0xd8 [ 36.787602] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.788344] kasan_atomics+0xb8/0x2e8 [ 36.788812] kunit_try_run_case+0x14c/0x3d0 [ 36.789609] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.790351] kthread+0x24c/0x2d0 [ 36.790866] ret_from_fork+0x10/0x20 [ 36.791476] [ 36.791776] The buggy address belongs to the object at fff00000c594f180 [ 36.791776] which belongs to the cache kmalloc-64 of size 64 [ 36.793163] The buggy address is located 0 bytes to the right of [ 36.793163] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.794645] [ 36.794961] The buggy address belongs to the physical page: [ 36.795709] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.796669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.797501] page_type: f5(slab) [ 36.797971] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.799013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.799910] page dumped because: kasan: bad access detected [ 36.800575] [ 36.800907] Memory state around the buggy address: [ 36.801579] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.802363] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.803257] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.804122] ^ [ 36.804801] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.805715] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.806714] ================================================================== [ 37.018270] ================================================================== [ 37.018973] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.020626] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 37.021752] [ 37.022287] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 37.023636] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.024248] Hardware name: linux,dummy-virt (DT) [ 37.024954] Call trace: [ 37.025554] show_stack+0x20/0x38 (C) [ 37.026209] dump_stack_lvl+0x8c/0xd0 [ 37.026900] print_report+0x118/0x5e0 [ 37.027537] kasan_report+0xc8/0x118 [ 37.028162] __asan_report_load8_noabort+0x20/0x30 [ 37.028892] kasan_atomics_helper+0x3e10/0x4858 [ 37.029631] kasan_atomics+0x198/0x2e8 [ 37.030260] kunit_try_run_case+0x14c/0x3d0 [ 37.031006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.031823] kthread+0x24c/0x2d0 [ 37.032435] ret_from_fork+0x10/0x20 [ 37.033061] [ 37.033448] Allocated by task 254: [ 37.034080] kasan_save_stack+0x3c/0x68 [ 37.034806] kasan_save_track+0x20/0x40 [ 37.035588] kasan_save_alloc_info+0x40/0x58 [ 37.036263] __kasan_kmalloc+0xd4/0xd8 [ 37.036946] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.037671] kasan_atomics+0xb8/0x2e8 [ 37.038292] kunit_try_run_case+0x14c/0x3d0 [ 37.038974] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.039765] kthread+0x24c/0x2d0 [ 37.040500] ret_from_fork+0x10/0x20 [ 37.041104] [ 37.041457] The buggy address belongs to the object at fff00000c594f180 [ 37.041457] which belongs to the cache kmalloc-64 of size 64 [ 37.042997] The buggy address is located 0 bytes to the right of [ 37.042997] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.044492] [ 37.044902] The buggy address belongs to the physical page: [ 37.045678] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.046796] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.047695] page_type: f5(slab) [ 37.048265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.049297] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.050260] page dumped because: kasan: bad access detected [ 37.051044] [ 37.051560] Memory state around the buggy address: [ 37.052209] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.053177] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.054085] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.054999] ^ [ 37.055733] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.056667] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.057697] ================================================================== [ 34.862156] ================================================================== [ 34.863009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.863975] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.865573] [ 34.865988] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.867452] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.867985] Hardware name: linux,dummy-virt (DT) [ 34.868748] Call trace: [ 34.869185] show_stack+0x20/0x38 (C) [ 34.869870] dump_stack_lvl+0x8c/0xd0 [ 34.870590] print_report+0x118/0x5e0 [ 34.871359] kasan_report+0xc8/0x118 [ 34.871971] __asan_report_store4_noabort+0x20/0x30 [ 34.872729] kasan_atomics_helper+0x3f94/0x4858 [ 34.873441] kasan_atomics+0x198/0x2e8 [ 34.874161] kunit_try_run_case+0x14c/0x3d0 [ 34.874807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.875568] kthread+0x24c/0x2d0 [ 34.876106] ret_from_fork+0x10/0x20 [ 34.876781] [ 34.877119] Allocated by task 254: [ 34.877735] kasan_save_stack+0x3c/0x68 [ 34.878531] kasan_save_track+0x20/0x40 [ 34.879264] kasan_save_alloc_info+0x40/0x58 [ 34.879963] __kasan_kmalloc+0xd4/0xd8 [ 34.880623] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.881309] kasan_atomics+0xb8/0x2e8 [ 34.882019] kunit_try_run_case+0x14c/0x3d0 [ 34.882724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.883597] kthread+0x24c/0x2d0 [ 34.884165] ret_from_fork+0x10/0x20 [ 34.884809] [ 34.885341] The buggy address belongs to the object at fff00000c594f180 [ 34.885341] which belongs to the cache kmalloc-64 of size 64 [ 34.886840] The buggy address is located 0 bytes to the right of [ 34.886840] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.888271] [ 34.888696] The buggy address belongs to the physical page: [ 34.889571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.890710] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.891605] page_type: f5(slab) [ 34.892209] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.893234] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.894218] page dumped because: kasan: bad access detected [ 34.895022] [ 34.895562] Memory state around the buggy address: [ 34.896301] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.897228] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.898180] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.899163] ^ [ 34.899855] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.901083] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.902044] ================================================================== [ 34.982941] ================================================================== [ 34.983861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 34.985746] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.987188] [ 34.987623] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.989178] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.989746] Hardware name: linux,dummy-virt (DT) [ 34.990348] Call trace: [ 34.990867] show_stack+0x20/0x38 (C) [ 34.991570] dump_stack_lvl+0x8c/0xd0 [ 34.992354] print_report+0x118/0x5e0 [ 34.993115] kasan_report+0xc8/0x118 [ 34.993690] kasan_check_range+0x100/0x1a8 [ 34.994297] __kasan_check_write+0x20/0x30 [ 34.995243] kasan_atomics_helper+0x47c/0x4858 [ 34.995946] kasan_atomics+0x198/0x2e8 [ 34.996525] kunit_try_run_case+0x14c/0x3d0 [ 34.996998] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.997816] kthread+0x24c/0x2d0 [ 34.998470] ret_from_fork+0x10/0x20 [ 34.998940] [ 34.999218] Allocated by task 254: [ 34.999818] kasan_save_stack+0x3c/0x68 [ 35.000450] kasan_save_track+0x20/0x40 [ 35.001042] kasan_save_alloc_info+0x40/0x58 [ 35.001670] __kasan_kmalloc+0xd4/0xd8 [ 35.002279] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.002957] kasan_atomics+0xb8/0x2e8 [ 35.003543] kunit_try_run_case+0x14c/0x3d0 [ 35.004162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.004837] kthread+0x24c/0x2d0 [ 35.005450] ret_from_fork+0x10/0x20 [ 35.005973] [ 35.006374] The buggy address belongs to the object at fff00000c594f180 [ 35.006374] which belongs to the cache kmalloc-64 of size 64 [ 35.007839] The buggy address is located 0 bytes to the right of [ 35.007839] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.009274] [ 35.009633] The buggy address belongs to the physical page: [ 35.010310] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.011418] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.012302] page_type: f5(slab) [ 35.012816] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.013820] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.014748] page dumped because: kasan: bad access detected [ 35.015437] [ 35.015667] Memory state around the buggy address: [ 35.016429] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.017267] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.018084] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.019035] ^ [ 35.019678] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.020634] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.021603] ================================================================== [ 35.844979] ================================================================== [ 35.845814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.847556] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.848779] [ 35.849574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.850996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.851580] Hardware name: linux,dummy-virt (DT) [ 35.852398] Call trace: [ 35.852759] show_stack+0x20/0x38 (C) [ 35.853366] dump_stack_lvl+0x8c/0xd0 [ 35.854219] print_report+0x118/0x5e0 [ 35.854832] kasan_report+0xc8/0x118 [ 35.855530] __asan_report_load4_noabort+0x20/0x30 [ 35.856249] kasan_atomics_helper+0x3dd8/0x4858 [ 35.856941] kasan_atomics+0x198/0x2e8 [ 35.857552] kunit_try_run_case+0x14c/0x3d0 [ 35.858269] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.859121] kthread+0x24c/0x2d0 [ 35.859713] ret_from_fork+0x10/0x20 [ 35.860355] [ 35.860763] Allocated by task 254: [ 35.861385] kasan_save_stack+0x3c/0x68 [ 35.862033] kasan_save_track+0x20/0x40 [ 35.863180] kasan_save_alloc_info+0x40/0x58 [ 35.863852] __kasan_kmalloc+0xd4/0xd8 [ 35.864803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.865679] kasan_atomics+0xb8/0x2e8 [ 35.866266] kunit_try_run_case+0x14c/0x3d0 [ 35.867175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.868062] kthread+0x24c/0x2d0 [ 35.868671] ret_from_fork+0x10/0x20 [ 35.869264] [ 35.869736] The buggy address belongs to the object at fff00000c594f180 [ 35.869736] which belongs to the cache kmalloc-64 of size 64 [ 35.871254] The buggy address is located 0 bytes to the right of [ 35.871254] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.872772] [ 35.873133] The buggy address belongs to the physical page: [ 35.874072] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.875153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.876067] page_type: f5(slab) [ 35.876652] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.877717] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.878669] page dumped because: kasan: bad access detected [ 35.879455] [ 35.879834] Memory state around the buggy address: [ 35.880526] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.881458] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.882398] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.883279] ^ [ 35.883994] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.885038] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.885959] ================================================================== [ 36.043366] ================================================================== [ 36.044539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.045172] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.045931] [ 36.046280] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.047396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.047977] Hardware name: linux,dummy-virt (DT) [ 36.048732] Call trace: [ 36.049154] show_stack+0x20/0x38 (C) [ 36.049938] dump_stack_lvl+0x8c/0xd0 [ 36.050645] print_report+0x118/0x5e0 [ 36.051201] kasan_report+0xc8/0x118 [ 36.051804] kasan_check_range+0x100/0x1a8 [ 36.052460] __kasan_check_write+0x20/0x30 [ 36.053036] kasan_atomics_helper+0xe44/0x4858 [ 36.053775] kasan_atomics+0x198/0x2e8 [ 36.054407] kunit_try_run_case+0x14c/0x3d0 [ 36.055027] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.055797] kthread+0x24c/0x2d0 [ 36.056428] ret_from_fork+0x10/0x20 [ 36.057090] [ 36.057444] Allocated by task 254: [ 36.057888] kasan_save_stack+0x3c/0x68 [ 36.058534] kasan_save_track+0x20/0x40 [ 36.059102] kasan_save_alloc_info+0x40/0x58 [ 36.059820] __kasan_kmalloc+0xd4/0xd8 [ 36.060395] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.060962] kasan_atomics+0xb8/0x2e8 [ 36.061676] kunit_try_run_case+0x14c/0x3d0 [ 36.062307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.063061] kthread+0x24c/0x2d0 [ 36.063561] ret_from_fork+0x10/0x20 [ 36.064115] [ 36.064519] The buggy address belongs to the object at fff00000c594f180 [ 36.064519] which belongs to the cache kmalloc-64 of size 64 [ 36.065921] The buggy address is located 0 bytes to the right of [ 36.065921] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.067310] [ 36.067613] The buggy address belongs to the physical page: [ 36.068344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.069248] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.070168] page_type: f5(slab) [ 36.070705] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.071641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.072589] page dumped because: kasan: bad access detected [ 36.073353] [ 36.073677] Memory state around the buggy address: [ 36.074355] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.075238] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.076026] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.076960] ^ [ 36.077589] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.078493] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.079370] ================================================================== [ 34.583862] ================================================================== [ 34.585662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 34.586757] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.587396] [ 34.587715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.588949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.589532] Hardware name: linux,dummy-virt (DT) [ 34.590246] Call trace: [ 34.590680] show_stack+0x20/0x38 (C) [ 34.591389] dump_stack_lvl+0x8c/0xd0 [ 34.592024] print_report+0x118/0x5e0 [ 34.592714] kasan_report+0xc8/0x118 [ 34.593281] __asan_report_load4_noabort+0x20/0x30 [ 34.594191] kasan_atomics_helper+0x40a8/0x4858 [ 34.594877] kasan_atomics+0x198/0x2e8 [ 34.595424] kunit_try_run_case+0x14c/0x3d0 [ 34.596210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.597002] kthread+0x24c/0x2d0 [ 34.597654] ret_from_fork+0x10/0x20 [ 34.598362] [ 34.598763] Allocated by task 254: [ 34.599241] kasan_save_stack+0x3c/0x68 [ 34.599819] kasan_save_track+0x20/0x40 [ 34.600414] kasan_save_alloc_info+0x40/0x58 [ 34.601008] __kasan_kmalloc+0xd4/0xd8 [ 34.601668] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.602365] kasan_atomics+0xb8/0x2e8 [ 34.602991] kunit_try_run_case+0x14c/0x3d0 [ 34.603628] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.604366] kthread+0x24c/0x2d0 [ 34.604809] ret_from_fork+0x10/0x20 [ 34.605481] [ 34.605852] The buggy address belongs to the object at fff00000c594f180 [ 34.605852] which belongs to the cache kmalloc-64 of size 64 [ 34.607185] The buggy address is located 0 bytes to the right of [ 34.607185] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.608622] [ 34.608927] The buggy address belongs to the physical page: [ 34.609789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.610784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.611503] page_type: f5(slab) [ 34.612096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.613086] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.614060] page dumped because: kasan: bad access detected [ 34.615011] [ 34.615535] Memory state around the buggy address: [ 34.616300] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.617262] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.618141] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.619063] ^ [ 34.619781] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.620730] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.621655] ================================================================== [ 35.725812] ================================================================== [ 35.726540] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 35.727475] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.728405] [ 35.728715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.729957] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.730766] Hardware name: linux,dummy-virt (DT) [ 35.731499] Call trace: [ 35.731905] show_stack+0x20/0x38 (C) [ 35.732671] dump_stack_lvl+0x8c/0xd0 [ 35.733284] print_report+0x118/0x5e0 [ 35.734220] kasan_report+0xc8/0x118 [ 35.734901] kasan_check_range+0x100/0x1a8 [ 35.735792] __kasan_check_write+0x20/0x30 [ 35.736608] kasan_atomics_helper+0xc08/0x4858 [ 35.737427] kasan_atomics+0x198/0x2e8 [ 35.738210] kunit_try_run_case+0x14c/0x3d0 [ 35.738859] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.739822] kthread+0x24c/0x2d0 [ 35.740527] ret_from_fork+0x10/0x20 [ 35.741109] [ 35.741432] Allocated by task 254: [ 35.741940] kasan_save_stack+0x3c/0x68 [ 35.742551] kasan_save_track+0x20/0x40 [ 35.743138] kasan_save_alloc_info+0x40/0x58 [ 35.743752] __kasan_kmalloc+0xd4/0xd8 [ 35.744408] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.745035] kasan_atomics+0xb8/0x2e8 [ 35.745582] kunit_try_run_case+0x14c/0x3d0 [ 35.746248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.747035] kthread+0x24c/0x2d0 [ 35.747541] ret_from_fork+0x10/0x20 [ 35.748047] [ 35.748514] The buggy address belongs to the object at fff00000c594f180 [ 35.748514] which belongs to the cache kmalloc-64 of size 64 [ 35.749968] The buggy address is located 0 bytes to the right of [ 35.749968] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.751383] [ 35.751670] The buggy address belongs to the physical page: [ 35.752319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.753344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.754176] page_type: f5(slab) [ 35.754727] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.755673] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.756590] page dumped because: kasan: bad access detected [ 35.757310] [ 35.757640] Memory state around the buggy address: [ 35.758319] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.759217] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.760089] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.760964] ^ [ 35.761631] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.762580] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.763471] ================================================================== [ 35.806844] ================================================================== [ 35.807704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 35.808596] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.809456] [ 35.809969] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.811155] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.811780] Hardware name: linux,dummy-virt (DT) [ 35.812557] Call trace: [ 35.812953] show_stack+0x20/0x38 (C) [ 35.813595] dump_stack_lvl+0x8c/0xd0 [ 35.814153] print_report+0x118/0x5e0 [ 35.814830] kasan_report+0xc8/0x118 [ 35.815521] kasan_check_range+0x100/0x1a8 [ 35.816079] __kasan_check_write+0x20/0x30 [ 35.816700] kasan_atomics_helper+0xca0/0x4858 [ 35.817293] kasan_atomics+0x198/0x2e8 [ 35.817749] kunit_try_run_case+0x14c/0x3d0 [ 35.818241] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.818824] kthread+0x24c/0x2d0 [ 35.819401] ret_from_fork+0x10/0x20 [ 35.820122] [ 35.820534] Allocated by task 254: [ 35.821194] kasan_save_stack+0x3c/0x68 [ 35.821791] kasan_save_track+0x20/0x40 [ 35.822423] kasan_save_alloc_info+0x40/0x58 [ 35.822967] __kasan_kmalloc+0xd4/0xd8 [ 35.823713] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.824470] kasan_atomics+0xb8/0x2e8 [ 35.824928] kunit_try_run_case+0x14c/0x3d0 [ 35.825723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.826530] kthread+0x24c/0x2d0 [ 35.827077] ret_from_fork+0x10/0x20 [ 35.827630] [ 35.827988] The buggy address belongs to the object at fff00000c594f180 [ 35.827988] which belongs to the cache kmalloc-64 of size 64 [ 35.829434] The buggy address is located 0 bytes to the right of [ 35.829434] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.830866] [ 35.831194] The buggy address belongs to the physical page: [ 35.832151] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.833040] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.833669] page_type: f5(slab) [ 35.834095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.834853] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.836310] page dumped because: kasan: bad access detected [ 35.836985] [ 35.837372] Memory state around the buggy address: [ 35.837987] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.838900] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.839808] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.840643] ^ [ 35.841275] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.842196] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.843050] ================================================================== [ 36.403890] ================================================================== [ 36.404670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.405956] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.406738] [ 36.407217] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.408514] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.409086] Hardware name: linux,dummy-virt (DT) [ 36.409821] Call trace: [ 36.410314] show_stack+0x20/0x38 (C) [ 36.410912] dump_stack_lvl+0x8c/0xd0 [ 36.411497] print_report+0x118/0x5e0 [ 36.412080] kasan_report+0xc8/0x118 [ 36.412770] kasan_check_range+0x100/0x1a8 [ 36.413344] __kasan_check_write+0x20/0x30 [ 36.414120] kasan_atomics_helper+0x1190/0x4858 [ 36.414868] kasan_atomics+0x198/0x2e8 [ 36.415528] kunit_try_run_case+0x14c/0x3d0 [ 36.416221] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.416988] kthread+0x24c/0x2d0 [ 36.417627] ret_from_fork+0x10/0x20 [ 36.418236] [ 36.418610] Allocated by task 254: [ 36.419175] kasan_save_stack+0x3c/0x68 [ 36.419750] kasan_save_track+0x20/0x40 [ 36.420359] kasan_save_alloc_info+0x40/0x58 [ 36.420980] __kasan_kmalloc+0xd4/0xd8 [ 36.421543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.422293] kasan_atomics+0xb8/0x2e8 [ 36.422811] kunit_try_run_case+0x14c/0x3d0 [ 36.423523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.424227] kthread+0x24c/0x2d0 [ 36.424779] ret_from_fork+0x10/0x20 [ 36.425371] [ 36.425672] The buggy address belongs to the object at fff00000c594f180 [ 36.425672] which belongs to the cache kmalloc-64 of size 64 [ 36.427050] The buggy address is located 0 bytes to the right of [ 36.427050] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.428468] [ 36.428823] The buggy address belongs to the physical page: [ 36.429565] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.430559] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.431352] page_type: f5(slab) [ 36.431952] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.432834] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.433877] page dumped because: kasan: bad access detected [ 36.434567] [ 36.434939] Memory state around the buggy address: [ 36.435615] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.436462] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.437411] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.438392] ^ [ 36.438977] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.439906] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.440756] ================================================================== [ 34.663860] ================================================================== [ 34.664704] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 34.665513] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.666247] [ 34.666704] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.668861] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.669456] Hardware name: linux,dummy-virt (DT) [ 34.670057] Call trace: [ 34.670768] show_stack+0x20/0x38 (C) [ 34.671589] dump_stack_lvl+0x8c/0xd0 [ 34.672135] print_report+0x118/0x5e0 [ 34.672691] kasan_report+0xc8/0x118 [ 34.673227] kasan_check_range+0x100/0x1a8 [ 34.673869] __kasan_check_read+0x20/0x30 [ 34.674483] kasan_atomics_helper+0x1ec/0x4858 [ 34.675243] kasan_atomics+0x198/0x2e8 [ 34.675848] kunit_try_run_case+0x14c/0x3d0 [ 34.676447] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.677298] kthread+0x24c/0x2d0 [ 34.677876] ret_from_fork+0x10/0x20 [ 34.678389] [ 34.678740] Allocated by task 254: [ 34.679358] kasan_save_stack+0x3c/0x68 [ 34.679946] kasan_save_track+0x20/0x40 [ 34.680501] kasan_save_alloc_info+0x40/0x58 [ 34.681098] __kasan_kmalloc+0xd4/0xd8 [ 34.681795] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.682462] kasan_atomics+0xb8/0x2e8 [ 34.683077] kunit_try_run_case+0x14c/0x3d0 [ 34.683631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.684442] kthread+0x24c/0x2d0 [ 34.684945] ret_from_fork+0x10/0x20 [ 34.685459] [ 34.685917] The buggy address belongs to the object at fff00000c594f180 [ 34.685917] which belongs to the cache kmalloc-64 of size 64 [ 34.687339] The buggy address is located 0 bytes to the right of [ 34.687339] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.688766] [ 34.689117] The buggy address belongs to the physical page: [ 34.689865] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.690878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.691681] page_type: f5(slab) [ 34.692139] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.693162] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.694088] page dumped because: kasan: bad access detected [ 34.694827] [ 34.695148] Memory state around the buggy address: [ 34.695749] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.696666] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.697552] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.698477] ^ [ 34.699063] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.699945] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.700809] ================================================================== [ 35.177764] ================================================================== [ 35.178792] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.179752] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.180547] [ 35.180962] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.182238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.182721] Hardware name: linux,dummy-virt (DT) [ 35.183512] Call trace: [ 35.183894] show_stack+0x20/0x38 (C) [ 35.184685] dump_stack_lvl+0x8c/0xd0 [ 35.185493] print_report+0x118/0x5e0 [ 35.186139] kasan_report+0xc8/0x118 [ 35.186751] kasan_check_range+0x100/0x1a8 [ 35.187410] __kasan_check_write+0x20/0x30 [ 35.188082] kasan_atomics_helper+0x684/0x4858 [ 35.188751] kasan_atomics+0x198/0x2e8 [ 35.189366] kunit_try_run_case+0x14c/0x3d0 [ 35.190035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.190804] kthread+0x24c/0x2d0 [ 35.191490] ret_from_fork+0x10/0x20 [ 35.192046] [ 35.192420] Allocated by task 254: [ 35.192927] kasan_save_stack+0x3c/0x68 [ 35.193436] kasan_save_track+0x20/0x40 [ 35.194065] kasan_save_alloc_info+0x40/0x58 [ 35.194694] __kasan_kmalloc+0xd4/0xd8 [ 35.195227] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.195920] kasan_atomics+0xb8/0x2e8 [ 35.196516] kunit_try_run_case+0x14c/0x3d0 [ 35.197035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.197891] kthread+0x24c/0x2d0 [ 35.198419] ret_from_fork+0x10/0x20 [ 35.198928] [ 35.199354] The buggy address belongs to the object at fff00000c594f180 [ 35.199354] which belongs to the cache kmalloc-64 of size 64 [ 35.200775] The buggy address is located 0 bytes to the right of [ 35.200775] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.202121] [ 35.202474] The buggy address belongs to the physical page: [ 35.203117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.204143] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.204875] page_type: f5(slab) [ 35.205423] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.206346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.207288] page dumped because: kasan: bad access detected [ 35.208085] [ 35.208456] Memory state around the buggy address: [ 35.209148] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.210160] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.211106] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.212048] ^ [ 35.212895] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.213806] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.214810] ================================================================== [ 35.614004] ================================================================== [ 35.615896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.616914] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.617855] [ 35.618241] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.619538] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.620204] Hardware name: linux,dummy-virt (DT) [ 35.620810] Call trace: [ 35.621225] show_stack+0x20/0x38 (C) [ 35.621856] dump_stack_lvl+0x8c/0xd0 [ 35.622443] print_report+0x118/0x5e0 [ 35.622952] kasan_report+0xc8/0x118 [ 35.623661] __asan_report_load4_noabort+0x20/0x30 [ 35.624353] kasan_atomics_helper+0x3dcc/0x4858 [ 35.625105] kasan_atomics+0x198/0x2e8 [ 35.625757] kunit_try_run_case+0x14c/0x3d0 [ 35.626476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.627285] kthread+0x24c/0x2d0 [ 35.627865] ret_from_fork+0x10/0x20 [ 35.628423] [ 35.628808] Allocated by task 254: [ 35.629282] kasan_save_stack+0x3c/0x68 [ 35.630017] kasan_save_track+0x20/0x40 [ 35.630528] kasan_save_alloc_info+0x40/0x58 [ 35.631217] __kasan_kmalloc+0xd4/0xd8 [ 35.631772] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.632423] kasan_atomics+0xb8/0x2e8 [ 35.632964] kunit_try_run_case+0x14c/0x3d0 [ 35.633605] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.634210] kthread+0x24c/0x2d0 [ 35.634812] ret_from_fork+0x10/0x20 [ 35.635421] [ 35.635768] The buggy address belongs to the object at fff00000c594f180 [ 35.635768] which belongs to the cache kmalloc-64 of size 64 [ 35.637250] The buggy address is located 0 bytes to the right of [ 35.637250] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.638618] [ 35.639081] The buggy address belongs to the physical page: [ 35.639792] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.640886] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.641699] page_type: f5(slab) [ 35.642284] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.643164] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.644126] page dumped because: kasan: bad access detected [ 35.644796] [ 35.645102] Memory state around the buggy address: [ 35.645718] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.646526] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.646948] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.647381] ^ [ 35.647702] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.648118] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.648678] ================================================================== [ 36.279955] ================================================================== [ 36.280735] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.282257] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.283251] [ 36.283660] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.285068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.285784] Hardware name: linux,dummy-virt (DT) [ 36.286634] Call trace: [ 36.287138] show_stack+0x20/0x38 (C) [ 36.287904] dump_stack_lvl+0x8c/0xd0 [ 36.288596] print_report+0x118/0x5e0 [ 36.289222] kasan_report+0xc8/0x118 [ 36.289879] kasan_check_range+0x100/0x1a8 [ 36.290572] __kasan_check_write+0x20/0x30 [ 36.291253] kasan_atomics_helper+0x1058/0x4858 [ 36.292048] kasan_atomics+0x198/0x2e8 [ 36.292704] kunit_try_run_case+0x14c/0x3d0 [ 36.293441] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.294183] kthread+0x24c/0x2d0 [ 36.294853] ret_from_fork+0x10/0x20 [ 36.295490] [ 36.295968] Allocated by task 254: [ 36.296509] kasan_save_stack+0x3c/0x68 [ 36.297197] kasan_save_track+0x20/0x40 [ 36.297885] kasan_save_alloc_info+0x40/0x58 [ 36.298589] __kasan_kmalloc+0xd4/0xd8 [ 36.299213] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.299950] kasan_atomics+0xb8/0x2e8 [ 36.300533] kunit_try_run_case+0x14c/0x3d0 [ 36.301160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.301988] kthread+0x24c/0x2d0 [ 36.302604] ret_from_fork+0x10/0x20 [ 36.303265] [ 36.303653] The buggy address belongs to the object at fff00000c594f180 [ 36.303653] which belongs to the cache kmalloc-64 of size 64 [ 36.305099] The buggy address is located 0 bytes to the right of [ 36.305099] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.306699] [ 36.307205] The buggy address belongs to the physical page: [ 36.308029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.309043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.309936] page_type: f5(slab) [ 36.310546] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.311545] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.312518] page dumped because: kasan: bad access detected [ 36.313316] [ 36.313795] Memory state around the buggy address: [ 36.314494] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.315581] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.316491] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.317396] ^ [ 36.318188] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.319084] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.320105] ================================================================== [ 35.689147] ================================================================== [ 35.689879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 35.690655] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.691679] [ 35.692003] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.693241] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.693791] Hardware name: linux,dummy-virt (DT) [ 35.694396] Call trace: [ 35.694891] show_stack+0x20/0x38 (C) [ 35.695408] dump_stack_lvl+0x8c/0xd0 [ 35.696087] print_report+0x118/0x5e0 [ 35.696668] kasan_report+0xc8/0x118 [ 35.697199] __asan_report_load4_noabort+0x20/0x30 [ 35.697917] kasan_atomics_helper+0x3dbc/0x4858 [ 35.698557] kasan_atomics+0x198/0x2e8 [ 35.699132] kunit_try_run_case+0x14c/0x3d0 [ 35.699803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.700476] kthread+0x24c/0x2d0 [ 35.701095] ret_from_fork+0x10/0x20 [ 35.701713] [ 35.702089] Allocated by task 254: [ 35.702612] kasan_save_stack+0x3c/0x68 [ 35.703201] kasan_save_track+0x20/0x40 [ 35.703798] kasan_save_alloc_info+0x40/0x58 [ 35.704346] __kasan_kmalloc+0xd4/0xd8 [ 35.704940] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.705624] kasan_atomics+0xb8/0x2e8 [ 35.706178] kunit_try_run_case+0x14c/0x3d0 [ 35.706725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.707540] kthread+0x24c/0x2d0 [ 35.708013] ret_from_fork+0x10/0x20 [ 35.708693] [ 35.709057] The buggy address belongs to the object at fff00000c594f180 [ 35.709057] which belongs to the cache kmalloc-64 of size 64 [ 35.710498] The buggy address is located 0 bytes to the right of [ 35.710498] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.711953] [ 35.712257] The buggy address belongs to the physical page: [ 35.712997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.713977] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.714804] page_type: f5(slab) [ 35.715373] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.716369] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.717305] page dumped because: kasan: bad access detected [ 35.718010] [ 35.718317] Memory state around the buggy address: [ 35.718882] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.719827] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.720703] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.721592] ^ [ 35.722144] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.723066] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.723941] ================================================================== [ 35.765266] ================================================================== [ 35.766357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 35.767865] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.768943] [ 35.769344] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.770626] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.771498] Hardware name: linux,dummy-virt (DT) [ 35.772254] Call trace: [ 35.772877] show_stack+0x20/0x38 (C) [ 35.773661] dump_stack_lvl+0x8c/0xd0 [ 35.774222] print_report+0x118/0x5e0 [ 35.774870] kasan_report+0xc8/0x118 [ 35.775447] __asan_report_load4_noabort+0x20/0x30 [ 35.776346] kasan_atomics_helper+0x3de4/0x4858 [ 35.777139] kasan_atomics+0x198/0x2e8 [ 35.777723] kunit_try_run_case+0x14c/0x3d0 [ 35.778484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.779279] kthread+0x24c/0x2d0 [ 35.779881] ret_from_fork+0x10/0x20 [ 35.780544] [ 35.780859] Allocated by task 254: [ 35.781518] kasan_save_stack+0x3c/0x68 [ 35.782142] kasan_save_track+0x20/0x40 [ 35.782906] kasan_save_alloc_info+0x40/0x58 [ 35.783597] __kasan_kmalloc+0xd4/0xd8 [ 35.784305] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.784986] kasan_atomics+0xb8/0x2e8 [ 35.785597] kunit_try_run_case+0x14c/0x3d0 [ 35.786299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.787079] kthread+0x24c/0x2d0 [ 35.787693] ret_from_fork+0x10/0x20 [ 35.788315] [ 35.788702] The buggy address belongs to the object at fff00000c594f180 [ 35.788702] which belongs to the cache kmalloc-64 of size 64 [ 35.790375] The buggy address is located 0 bytes to the right of [ 35.790375] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.791965] [ 35.792414] The buggy address belongs to the physical page: [ 35.793188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.794204] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.795124] page_type: f5(slab) [ 35.795772] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.796772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.797728] page dumped because: kasan: bad access detected [ 35.798569] [ 35.798902] Memory state around the buggy address: [ 35.799766] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.800843] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.801899] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.802776] ^ [ 35.803355] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.804050] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.804823] ================================================================== [ 36.730681] ================================================================== [ 36.731392] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.732837] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.733808] [ 36.734213] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.735462] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.736034] Hardware name: linux,dummy-virt (DT) [ 36.736702] Call trace: [ 36.737174] show_stack+0x20/0x38 (C) [ 36.737788] dump_stack_lvl+0x8c/0xd0 [ 36.738409] print_report+0x118/0x5e0 [ 36.739000] kasan_report+0xc8/0x118 [ 36.739616] kasan_check_range+0x100/0x1a8 [ 36.740221] __kasan_check_write+0x20/0x30 [ 36.740877] kasan_atomics_helper+0x14e4/0x4858 [ 36.741463] kasan_atomics+0x198/0x2e8 [ 36.742117] kunit_try_run_case+0x14c/0x3d0 [ 36.742687] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.743568] kthread+0x24c/0x2d0 [ 36.744158] ret_from_fork+0x10/0x20 [ 36.744815] [ 36.745092] Allocated by task 254: [ 36.745714] kasan_save_stack+0x3c/0x68 [ 36.746322] kasan_save_track+0x20/0x40 [ 36.746873] kasan_save_alloc_info+0x40/0x58 [ 36.747497] __kasan_kmalloc+0xd4/0xd8 [ 36.748060] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.748831] kasan_atomics+0xb8/0x2e8 [ 36.749361] kunit_try_run_case+0x14c/0x3d0 [ 36.750083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.750846] kthread+0x24c/0x2d0 [ 36.751388] ret_from_fork+0x10/0x20 [ 36.751982] [ 36.752279] The buggy address belongs to the object at fff00000c594f180 [ 36.752279] which belongs to the cache kmalloc-64 of size 64 [ 36.753664] The buggy address is located 0 bytes to the right of [ 36.753664] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.755167] [ 36.755534] The buggy address belongs to the physical page: [ 36.756155] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.757217] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.758156] page_type: f5(slab) [ 36.758635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.759643] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.760640] page dumped because: kasan: bad access detected [ 36.761408] [ 36.761704] Memory state around the buggy address: [ 36.762270] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.763241] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.764097] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.764972] ^ [ 36.765619] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.766500] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.767415] ================================================================== [ 36.363842] ================================================================== [ 36.365703] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.366555] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.366981] [ 36.367661] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.369298] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.369821] Hardware name: linux,dummy-virt (DT) [ 36.370594] Call trace: [ 36.371043] show_stack+0x20/0x38 (C) [ 36.371662] dump_stack_lvl+0x8c/0xd0 [ 36.372175] print_report+0x118/0x5e0 [ 36.372878] kasan_report+0xc8/0x118 [ 36.373506] kasan_check_range+0x100/0x1a8 [ 36.374091] __kasan_check_write+0x20/0x30 [ 36.374847] kasan_atomics_helper+0x1128/0x4858 [ 36.375516] kasan_atomics+0x198/0x2e8 [ 36.376060] kunit_try_run_case+0x14c/0x3d0 [ 36.376725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.377526] kthread+0x24c/0x2d0 [ 36.378091] ret_from_fork+0x10/0x20 [ 36.378688] [ 36.379049] Allocated by task 254: [ 36.379625] kasan_save_stack+0x3c/0x68 [ 36.380147] kasan_save_track+0x20/0x40 [ 36.380763] kasan_save_alloc_info+0x40/0x58 [ 36.381401] __kasan_kmalloc+0xd4/0xd8 [ 36.381908] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.382597] kasan_atomics+0xb8/0x2e8 [ 36.383239] kunit_try_run_case+0x14c/0x3d0 [ 36.383947] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.384955] kthread+0x24c/0x2d0 [ 36.385622] ret_from_fork+0x10/0x20 [ 36.386151] [ 36.386532] The buggy address belongs to the object at fff00000c594f180 [ 36.386532] which belongs to the cache kmalloc-64 of size 64 [ 36.388130] The buggy address is located 0 bytes to the right of [ 36.388130] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.389599] [ 36.389930] The buggy address belongs to the physical page: [ 36.390756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.391677] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.392598] page_type: f5(slab) [ 36.393034] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.394101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.394995] page dumped because: kasan: bad access detected [ 36.395857] [ 36.396295] Memory state around the buggy address: [ 36.396874] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.397782] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.398674] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.399591] ^ [ 36.400344] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.401196] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.402205] ================================================================== [ 36.808987] ================================================================== [ 36.809691] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.811250] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.812681] [ 36.813291] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.815188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.815908] Hardware name: linux,dummy-virt (DT) [ 36.816489] Call trace: [ 36.816925] show_stack+0x20/0x38 (C) [ 36.817614] dump_stack_lvl+0x8c/0xd0 [ 36.818492] print_report+0x118/0x5e0 [ 36.819233] kasan_report+0xc8/0x118 [ 36.819776] kasan_check_range+0x100/0x1a8 [ 36.820405] __kasan_check_write+0x20/0x30 [ 36.821064] kasan_atomics_helper+0x15b4/0x4858 [ 36.821890] kasan_atomics+0x198/0x2e8 [ 36.822491] kunit_try_run_case+0x14c/0x3d0 [ 36.823081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.824003] kthread+0x24c/0x2d0 [ 36.824644] ret_from_fork+0x10/0x20 [ 36.825157] [ 36.825545] Allocated by task 254: [ 36.826123] kasan_save_stack+0x3c/0x68 [ 36.826720] kasan_save_track+0x20/0x40 [ 36.827279] kasan_save_alloc_info+0x40/0x58 [ 36.827949] __kasan_kmalloc+0xd4/0xd8 [ 36.828614] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.829234] kasan_atomics+0xb8/0x2e8 [ 36.829786] kunit_try_run_case+0x14c/0x3d0 [ 36.830437] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.831131] kthread+0x24c/0x2d0 [ 36.831594] ret_from_fork+0x10/0x20 [ 36.832188] [ 36.832559] The buggy address belongs to the object at fff00000c594f180 [ 36.832559] which belongs to the cache kmalloc-64 of size 64 [ 36.833890] The buggy address is located 0 bytes to the right of [ 36.833890] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.835394] [ 36.835676] The buggy address belongs to the physical page: [ 36.836492] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.837665] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.839148] page_type: f5(slab) [ 36.839615] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.840644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.841824] page dumped because: kasan: bad access detected [ 36.842689] [ 36.843244] Memory state around the buggy address: [ 36.843882] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.844795] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.845690] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.846464] ^ [ 36.847077] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848100] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848991] ================================================================== [ 35.451717] ================================================================== [ 35.452492] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.453366] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.454355] [ 35.454707] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.456255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.457320] Hardware name: linux,dummy-virt (DT) [ 35.457970] Call trace: [ 35.458408] show_stack+0x20/0x38 (C) [ 35.458944] dump_stack_lvl+0x8c/0xd0 [ 35.459576] print_report+0x118/0x5e0 [ 35.460475] kasan_report+0xc8/0x118 [ 35.461169] kasan_check_range+0x100/0x1a8 [ 35.461952] __kasan_check_write+0x20/0x30 [ 35.462585] kasan_atomics_helper+0x99c/0x4858 [ 35.462922] kasan_atomics+0x198/0x2e8 [ 35.463215] kunit_try_run_case+0x14c/0x3d0 [ 35.464278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.465135] kthread+0x24c/0x2d0 [ 35.465849] ret_from_fork+0x10/0x20 [ 35.466676] [ 35.467079] Allocated by task 254: [ 35.467730] kasan_save_stack+0x3c/0x68 [ 35.468410] kasan_save_track+0x20/0x40 [ 35.469096] kasan_save_alloc_info+0x40/0x58 [ 35.469899] __kasan_kmalloc+0xd4/0xd8 [ 35.470482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.471149] kasan_atomics+0xb8/0x2e8 [ 35.471762] kunit_try_run_case+0x14c/0x3d0 [ 35.472430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.473208] kthread+0x24c/0x2d0 [ 35.473784] ret_from_fork+0x10/0x20 [ 35.474431] [ 35.474798] The buggy address belongs to the object at fff00000c594f180 [ 35.474798] which belongs to the cache kmalloc-64 of size 64 [ 35.476376] The buggy address is located 0 bytes to the right of [ 35.476376] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.477969] [ 35.478260] The buggy address belongs to the physical page: [ 35.479165] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.480251] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.481166] page_type: f5(slab) [ 35.481741] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.482854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.483906] page dumped because: kasan: bad access detected [ 35.484712] [ 35.485234] Memory state around the buggy address: [ 35.485810] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.486876] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.487747] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.488642] ^ [ 35.489263] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.490159] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.491213] ================================================================== [ 34.821604] ================================================================== [ 34.822348] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 34.823931] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.825863] [ 34.826510] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.827736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.828279] Hardware name: linux,dummy-virt (DT) [ 34.829176] Call trace: [ 34.829779] show_stack+0x20/0x38 (C) [ 34.830530] dump_stack_lvl+0x8c/0xd0 [ 34.831088] print_report+0x118/0x5e0 [ 34.831870] kasan_report+0xc8/0x118 [ 34.832411] kasan_check_range+0x100/0x1a8 [ 34.833093] __kasan_check_write+0x20/0x30 [ 34.833736] kasan_atomics_helper+0x32c/0x4858 [ 34.834489] kasan_atomics+0x198/0x2e8 [ 34.834985] kunit_try_run_case+0x14c/0x3d0 [ 34.835762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.836605] kthread+0x24c/0x2d0 [ 34.837129] ret_from_fork+0x10/0x20 [ 34.837718] [ 34.838073] Allocated by task 254: [ 34.838570] kasan_save_stack+0x3c/0x68 [ 34.839213] kasan_save_track+0x20/0x40 [ 34.839746] kasan_save_alloc_info+0x40/0x58 [ 34.840472] __kasan_kmalloc+0xd4/0xd8 [ 34.840947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.841675] kasan_atomics+0xb8/0x2e8 [ 34.842261] kunit_try_run_case+0x14c/0x3d0 [ 34.842877] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.843575] kthread+0x24c/0x2d0 [ 34.844182] ret_from_fork+0x10/0x20 [ 34.844781] [ 34.845077] The buggy address belongs to the object at fff00000c594f180 [ 34.845077] which belongs to the cache kmalloc-64 of size 64 [ 34.846606] The buggy address is located 0 bytes to the right of [ 34.846606] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.847999] [ 34.848345] The buggy address belongs to the physical page: [ 34.849039] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.849988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.850834] page_type: f5(slab) [ 34.851298] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.852547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.853421] page dumped because: kasan: bad access detected [ 34.854088] [ 34.854441] Memory state around the buggy address: [ 34.855093] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.855958] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.856863] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.857700] ^ [ 34.858295] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.859235] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.860062] ================================================================== [ 35.100157] ================================================================== [ 35.100813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.101968] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.102821] [ 35.103348] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.104571] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.105279] Hardware name: linux,dummy-virt (DT) [ 35.106061] Call trace: [ 35.106476] show_stack+0x20/0x38 (C) [ 35.107048] dump_stack_lvl+0x8c/0xd0 [ 35.107626] print_report+0x118/0x5e0 [ 35.108227] kasan_report+0xc8/0x118 [ 35.109097] kasan_check_range+0x100/0x1a8 [ 35.109703] __kasan_check_write+0x20/0x30 [ 35.110410] kasan_atomics_helper+0x5b4/0x4858 [ 35.111013] kasan_atomics+0x198/0x2e8 [ 35.111705] kunit_try_run_case+0x14c/0x3d0 [ 35.112368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.113042] kthread+0x24c/0x2d0 [ 35.113700] ret_from_fork+0x10/0x20 [ 35.114288] [ 35.114712] Allocated by task 254: [ 35.115259] kasan_save_stack+0x3c/0x68 [ 35.115843] kasan_save_track+0x20/0x40 [ 35.116387] kasan_save_alloc_info+0x40/0x58 [ 35.117018] __kasan_kmalloc+0xd4/0xd8 [ 35.117621] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.118177] kasan_atomics+0xb8/0x2e8 [ 35.118826] kunit_try_run_case+0x14c/0x3d0 [ 35.119462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.120196] kthread+0x24c/0x2d0 [ 35.120805] ret_from_fork+0x10/0x20 [ 35.121367] [ 35.121656] The buggy address belongs to the object at fff00000c594f180 [ 35.121656] which belongs to the cache kmalloc-64 of size 64 [ 35.123135] The buggy address is located 0 bytes to the right of [ 35.123135] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.124486] [ 35.124791] The buggy address belongs to the physical page: [ 35.125628] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.126540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.127485] page_type: f5(slab) [ 35.127956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.128995] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.129912] page dumped because: kasan: bad access detected [ 35.130668] [ 35.131007] Memory state around the buggy address: [ 35.131635] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.132462] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.133369] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.134211] ^ [ 35.134899] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.135803] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.136733] ================================================================== [ 36.607937] ================================================================== [ 36.608849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.609780] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.610776] [ 36.611178] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.612103] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.612515] Hardware name: linux,dummy-virt (DT) [ 36.612940] Call trace: [ 36.613233] show_stack+0x20/0x38 (C) [ 36.613689] dump_stack_lvl+0x8c/0xd0 [ 36.614620] print_report+0x118/0x5e0 [ 36.615494] kasan_report+0xc8/0x118 [ 36.616154] __asan_report_load8_noabort+0x20/0x30 [ 36.616920] kasan_atomics_helper+0x3f04/0x4858 [ 36.617397] kasan_atomics+0x198/0x2e8 [ 36.617798] kunit_try_run_case+0x14c/0x3d0 [ 36.619395] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.620568] kthread+0x24c/0x2d0 [ 36.620974] ret_from_fork+0x10/0x20 [ 36.621940] [ 36.622966] Allocated by task 254: [ 36.623971] kasan_save_stack+0x3c/0x68 [ 36.624560] kasan_save_track+0x20/0x40 [ 36.625030] kasan_save_alloc_info+0x40/0x58 [ 36.625970] __kasan_kmalloc+0xd4/0xd8 [ 36.626611] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.627070] kasan_atomics+0xb8/0x2e8 [ 36.628165] kunit_try_run_case+0x14c/0x3d0 [ 36.629306] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.630030] kthread+0x24c/0x2d0 [ 36.630485] ret_from_fork+0x10/0x20 [ 36.630973] [ 36.631377] The buggy address belongs to the object at fff00000c594f180 [ 36.631377] which belongs to the cache kmalloc-64 of size 64 [ 36.632980] The buggy address is located 0 bytes to the right of [ 36.632980] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.634105] [ 36.634722] The buggy address belongs to the physical page: [ 36.635213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.637076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.639172] page_type: f5(slab) [ 36.640017] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.641506] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.642395] page dumped because: kasan: bad access detected [ 36.643033] [ 36.643442] Memory state around the buggy address: [ 36.644152] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.644955] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.645905] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.646789] ^ [ 36.647563] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.648381] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.649367] ================================================================== [ 35.650612] ================================================================== [ 35.651520] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 35.652438] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.653298] [ 35.653715] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.655140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.655652] Hardware name: linux,dummy-virt (DT) [ 35.656502] Call trace: [ 35.656940] show_stack+0x20/0x38 (C) [ 35.657640] dump_stack_lvl+0x8c/0xd0 [ 35.658226] print_report+0x118/0x5e0 [ 35.658919] kasan_report+0xc8/0x118 [ 35.659536] kasan_check_range+0x100/0x1a8 [ 35.660187] __kasan_check_write+0x20/0x30 [ 35.660817] kasan_atomics_helper+0xb70/0x4858 [ 35.661374] kasan_atomics+0x198/0x2e8 [ 35.662037] kunit_try_run_case+0x14c/0x3d0 [ 35.662649] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.663517] kthread+0x24c/0x2d0 [ 35.664083] ret_from_fork+0x10/0x20 [ 35.664616] [ 35.664993] Allocated by task 254: [ 35.665571] kasan_save_stack+0x3c/0x68 [ 35.666061] kasan_save_track+0x20/0x40 [ 35.666833] kasan_save_alloc_info+0x40/0x58 [ 35.667342] __kasan_kmalloc+0xd4/0xd8 [ 35.668079] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.668704] kasan_atomics+0xb8/0x2e8 [ 35.669220] kunit_try_run_case+0x14c/0x3d0 [ 35.670013] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.670630] kthread+0x24c/0x2d0 [ 35.671253] ret_from_fork+0x10/0x20 [ 35.671858] [ 35.672238] The buggy address belongs to the object at fff00000c594f180 [ 35.672238] which belongs to the cache kmalloc-64 of size 64 [ 35.673685] The buggy address is located 0 bytes to the right of [ 35.673685] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.675087] [ 35.675449] The buggy address belongs to the physical page: [ 35.676084] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.677097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.677965] page_type: f5(slab) [ 35.678464] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.679465] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.680377] page dumped because: kasan: bad access detected [ 35.681042] [ 35.681379] Memory state around the buggy address: [ 35.682004] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.682904] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.683778] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.684707] ^ [ 35.685353] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.686237] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.687128] ================================================================== [ 35.964775] ================================================================== [ 35.965677] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.966267] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.967196] [ 35.967525] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.968997] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.969659] Hardware name: linux,dummy-virt (DT) [ 35.970267] Call trace: [ 35.970700] show_stack+0x20/0x38 (C) [ 35.971316] dump_stack_lvl+0x8c/0xd0 [ 35.971837] print_report+0x118/0x5e0 [ 35.972508] kasan_report+0xc8/0x118 [ 35.973115] kasan_check_range+0x100/0x1a8 [ 35.973738] __kasan_check_read+0x20/0x30 [ 35.974297] kasan_atomics_helper+0xdd4/0x4858 [ 35.975020] kasan_atomics+0x198/0x2e8 [ 35.975594] kunit_try_run_case+0x14c/0x3d0 [ 35.976218] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.976982] kthread+0x24c/0x2d0 [ 35.977649] ret_from_fork+0x10/0x20 [ 35.978232] [ 35.978615] Allocated by task 254: [ 35.979152] kasan_save_stack+0x3c/0x68 [ 35.979898] kasan_save_track+0x20/0x40 [ 35.980494] kasan_save_alloc_info+0x40/0x58 [ 35.981237] __kasan_kmalloc+0xd4/0xd8 [ 35.981822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.982565] kasan_atomics+0xb8/0x2e8 [ 35.983069] kunit_try_run_case+0x14c/0x3d0 [ 35.983779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.984492] kthread+0x24c/0x2d0 [ 35.985110] ret_from_fork+0x10/0x20 [ 35.985629] [ 35.986097] The buggy address belongs to the object at fff00000c594f180 [ 35.986097] which belongs to the cache kmalloc-64 of size 64 [ 35.987566] The buggy address is located 0 bytes to the right of [ 35.987566] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.988952] [ 35.989238] The buggy address belongs to the physical page: [ 35.990073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.990991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.991839] page_type: f5(slab) [ 35.992410] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.993376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.994289] page dumped because: kasan: bad access detected [ 35.995000] [ 35.995312] Memory state around the buggy address: [ 35.996006] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.996836] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.997774] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.998647] ^ [ 35.999278] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.000236] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.001188] ================================================================== [ 36.159798] ================================================================== [ 36.160553] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.161467] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.162253] [ 36.162702] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.163966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.164686] Hardware name: linux,dummy-virt (DT) [ 36.165353] Call trace: [ 36.165736] show_stack+0x20/0x38 (C) [ 36.166473] dump_stack_lvl+0x8c/0xd0 [ 36.167147] print_report+0x118/0x5e0 [ 36.167832] kasan_report+0xc8/0x118 [ 36.168469] kasan_check_range+0x100/0x1a8 [ 36.169006] __kasan_check_write+0x20/0x30 [ 36.169745] kasan_atomics_helper+0xf20/0x4858 [ 36.170490] kasan_atomics+0x198/0x2e8 [ 36.170972] kunit_try_run_case+0x14c/0x3d0 [ 36.171713] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.172410] kthread+0x24c/0x2d0 [ 36.173119] ret_from_fork+0x10/0x20 [ 36.173675] [ 36.174039] Allocated by task 254: [ 36.174556] kasan_save_stack+0x3c/0x68 [ 36.175187] kasan_save_track+0x20/0x40 [ 36.175772] kasan_save_alloc_info+0x40/0x58 [ 36.176417] __kasan_kmalloc+0xd4/0xd8 [ 36.176967] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.177632] kasan_atomics+0xb8/0x2e8 [ 36.178184] kunit_try_run_case+0x14c/0x3d0 [ 36.178813] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.179661] kthread+0x24c/0x2d0 [ 36.180154] ret_from_fork+0x10/0x20 [ 36.180742] [ 36.181022] The buggy address belongs to the object at fff00000c594f180 [ 36.181022] which belongs to the cache kmalloc-64 of size 64 [ 36.182509] The buggy address is located 0 bytes to the right of [ 36.182509] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.183866] [ 36.184209] The buggy address belongs to the physical page: [ 36.185033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.185985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.186907] page_type: f5(slab) [ 36.187418] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.188304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.189393] page dumped because: kasan: bad access detected [ 36.190117] [ 36.190620] Memory state around the buggy address: [ 36.191286] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.192158] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.193075] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.193913] ^ [ 36.194614] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.195451] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.196407] ================================================================== [ 36.524707] ================================================================== [ 36.526394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.527528] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.528894] [ 36.529385] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.530702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.531271] Hardware name: linux,dummy-virt (DT) [ 36.531937] Call trace: [ 36.532433] show_stack+0x20/0x38 (C) [ 36.532995] dump_stack_lvl+0x8c/0xd0 [ 36.533757] print_report+0x118/0x5e0 [ 36.534454] kasan_report+0xc8/0x118 [ 36.535067] kasan_check_range+0x100/0x1a8 [ 36.535836] __kasan_check_write+0x20/0x30 [ 36.536443] kasan_atomics_helper+0x12d8/0x4858 [ 36.537262] kasan_atomics+0x198/0x2e8 [ 36.537968] kunit_try_run_case+0x14c/0x3d0 [ 36.538725] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.539590] kthread+0x24c/0x2d0 [ 36.540238] ret_from_fork+0x10/0x20 [ 36.541018] [ 36.541362] Allocated by task 254: [ 36.541975] kasan_save_stack+0x3c/0x68 [ 36.542507] kasan_save_track+0x20/0x40 [ 36.543046] kasan_save_alloc_info+0x40/0x58 [ 36.543681] __kasan_kmalloc+0xd4/0xd8 [ 36.544143] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.544866] kasan_atomics+0xb8/0x2e8 [ 36.545433] kunit_try_run_case+0x14c/0x3d0 [ 36.546203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.547219] kthread+0x24c/0x2d0 [ 36.547944] ret_from_fork+0x10/0x20 [ 36.548358] [ 36.548761] The buggy address belongs to the object at fff00000c594f180 [ 36.548761] which belongs to the cache kmalloc-64 of size 64 [ 36.550204] The buggy address is located 0 bytes to the right of [ 36.550204] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.551677] [ 36.551968] The buggy address belongs to the physical page: [ 36.552764] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.553688] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.554472] page_type: f5(slab) [ 36.555032] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.556015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.556980] page dumped because: kasan: bad access detected [ 36.557659] [ 36.558107] Memory state around the buggy address: [ 36.558848] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.559962] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.560982] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.561700] ^ [ 36.562035] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.562601] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.563696] ================================================================== [ 36.976557] ================================================================== [ 36.977433] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.978273] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.979567] [ 36.980143] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.981594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.982257] Hardware name: linux,dummy-virt (DT) [ 36.983062] Call trace: [ 36.983637] show_stack+0x20/0x38 (C) [ 36.984405] dump_stack_lvl+0x8c/0xd0 [ 36.985171] print_report+0x118/0x5e0 [ 36.985774] kasan_report+0xc8/0x118 [ 36.986525] kasan_check_range+0x100/0x1a8 [ 36.987207] __kasan_check_write+0x20/0x30 [ 36.987915] kasan_atomics_helper+0x16d0/0x4858 [ 36.988654] kasan_atomics+0x198/0x2e8 [ 36.989320] kunit_try_run_case+0x14c/0x3d0 [ 36.990047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.990859] kthread+0x24c/0x2d0 [ 36.991489] ret_from_fork+0x10/0x20 [ 36.992122] [ 36.992460] Allocated by task 254: [ 36.993117] kasan_save_stack+0x3c/0x68 [ 36.993791] kasan_save_track+0x20/0x40 [ 36.994496] kasan_save_alloc_info+0x40/0x58 [ 36.995116] __kasan_kmalloc+0xd4/0xd8 [ 36.995900] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.996647] kasan_atomics+0xb8/0x2e8 [ 36.997247] kunit_try_run_case+0x14c/0x3d0 [ 36.997944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.998759] kthread+0x24c/0x2d0 [ 36.999372] ret_from_fork+0x10/0x20 [ 37.000029] [ 37.000385] The buggy address belongs to the object at fff00000c594f180 [ 37.000385] which belongs to the cache kmalloc-64 of size 64 [ 37.001920] The buggy address is located 0 bytes to the right of [ 37.001920] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 37.003402] [ 37.003932] The buggy address belongs to the physical page: [ 37.004713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 37.005763] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.006679] page_type: f5(slab) [ 37.007256] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.008273] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.009264] page dumped because: kasan: bad access detected [ 37.010045] [ 37.010560] Memory state around the buggy address: [ 37.011223] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.012192] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.013118] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.014052] ^ [ 37.014784] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.015753] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.016646] ================================================================== [ 35.294405] ================================================================== [ 35.295381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 35.296419] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.297657] [ 35.298135] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.299556] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.300213] Hardware name: linux,dummy-virt (DT) [ 35.300845] Call trace: [ 35.301269] show_stack+0x20/0x38 (C) [ 35.301886] dump_stack_lvl+0x8c/0xd0 [ 35.302388] print_report+0x118/0x5e0 [ 35.303036] kasan_report+0xc8/0x118 [ 35.303553] kasan_check_range+0x100/0x1a8 [ 35.304266] __kasan_check_write+0x20/0x30 [ 35.304981] kasan_atomics_helper+0x7cc/0x4858 [ 35.305745] kasan_atomics+0x198/0x2e8 [ 35.306497] kunit_try_run_case+0x14c/0x3d0 [ 35.307109] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.307818] kthread+0x24c/0x2d0 [ 35.308563] ret_from_fork+0x10/0x20 [ 35.308977] [ 35.309431] Allocated by task 254: [ 35.309988] kasan_save_stack+0x3c/0x68 [ 35.310565] kasan_save_track+0x20/0x40 [ 35.311184] kasan_save_alloc_info+0x40/0x58 [ 35.311883] __kasan_kmalloc+0xd4/0xd8 [ 35.312552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.313227] kasan_atomics+0xb8/0x2e8 [ 35.313775] kunit_try_run_case+0x14c/0x3d0 [ 35.314431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.315099] kthread+0x24c/0x2d0 [ 35.315633] ret_from_fork+0x10/0x20 [ 35.316176] [ 35.316557] The buggy address belongs to the object at fff00000c594f180 [ 35.316557] which belongs to the cache kmalloc-64 of size 64 [ 35.318006] The buggy address is located 0 bytes to the right of [ 35.318006] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.319438] [ 35.319739] The buggy address belongs to the physical page: [ 35.320452] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.321457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.322349] page_type: f5(slab) [ 35.322928] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.323829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.324830] page dumped because: kasan: bad access detected [ 35.325514] [ 35.325846] Memory state around the buggy address: [ 35.326481] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.327360] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.328272] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.329142] ^ [ 35.329901] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.330773] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.331670] ================================================================== [ 36.199843] ================================================================== [ 36.200729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.201483] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.202295] [ 36.202796] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.204253] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.204810] Hardware name: linux,dummy-virt (DT) [ 36.205417] Call trace: [ 36.205849] show_stack+0x20/0x38 (C) [ 36.207115] dump_stack_lvl+0x8c/0xd0 [ 36.207649] print_report+0x118/0x5e0 [ 36.208196] kasan_report+0xc8/0x118 [ 36.208713] kasan_check_range+0x100/0x1a8 [ 36.209397] __kasan_check_write+0x20/0x30 [ 36.210107] kasan_atomics_helper+0xf88/0x4858 [ 36.210839] kasan_atomics+0x198/0x2e8 [ 36.211439] kunit_try_run_case+0x14c/0x3d0 [ 36.212044] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.212814] kthread+0x24c/0x2d0 [ 36.213377] ret_from_fork+0x10/0x20 [ 36.213991] [ 36.214322] Allocated by task 254: [ 36.214815] kasan_save_stack+0x3c/0x68 [ 36.215588] kasan_save_track+0x20/0x40 [ 36.216108] kasan_save_alloc_info+0x40/0x58 [ 36.216815] __kasan_kmalloc+0xd4/0xd8 [ 36.217390] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.218138] kasan_atomics+0xb8/0x2e8 [ 36.218729] kunit_try_run_case+0x14c/0x3d0 [ 36.219431] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.220127] kthread+0x24c/0x2d0 [ 36.220582] ret_from_fork+0x10/0x20 [ 36.221155] [ 36.221474] The buggy address belongs to the object at fff00000c594f180 [ 36.221474] which belongs to the cache kmalloc-64 of size 64 [ 36.222913] The buggy address is located 0 bytes to the right of [ 36.222913] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.224470] [ 36.224801] The buggy address belongs to the physical page: [ 36.225505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.226468] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.227273] page_type: f5(slab) [ 36.227887] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.228849] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.229851] page dumped because: kasan: bad access detected [ 36.230677] [ 36.230984] Memory state around the buggy address: [ 36.231541] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.232209] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.233149] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.234261] ^ [ 36.234881] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.235836] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.236709] ================================================================== [ 36.002739] ================================================================== [ 36.004253] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.005413] Read of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.006356] [ 36.006835] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.008204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.008737] Hardware name: linux,dummy-virt (DT) [ 36.009520] Call trace: [ 36.010072] show_stack+0x20/0x38 (C) [ 36.010819] dump_stack_lvl+0x8c/0xd0 [ 36.011428] print_report+0x118/0x5e0 [ 36.012064] kasan_report+0xc8/0x118 [ 36.012889] __asan_report_load8_noabort+0x20/0x30 [ 36.013705] kasan_atomics_helper+0x3f58/0x4858 [ 36.014358] kasan_atomics+0x198/0x2e8 [ 36.014919] kunit_try_run_case+0x14c/0x3d0 [ 36.015653] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.016502] kthread+0x24c/0x2d0 [ 36.017184] ret_from_fork+0x10/0x20 [ 36.017825] [ 36.018200] Allocated by task 254: [ 36.018763] kasan_save_stack+0x3c/0x68 [ 36.019483] kasan_save_track+0x20/0x40 [ 36.020170] kasan_save_alloc_info+0x40/0x58 [ 36.020988] __kasan_kmalloc+0xd4/0xd8 [ 36.021552] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.022311] kasan_atomics+0xb8/0x2e8 [ 36.022889] kunit_try_run_case+0x14c/0x3d0 [ 36.023512] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.024189] kthread+0x24c/0x2d0 [ 36.024840] ret_from_fork+0x10/0x20 [ 36.025411] [ 36.025800] The buggy address belongs to the object at fff00000c594f180 [ 36.025800] which belongs to the cache kmalloc-64 of size 64 [ 36.027209] The buggy address is located 0 bytes to the right of [ 36.027209] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.028657] [ 36.028998] The buggy address belongs to the physical page: [ 36.029719] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.030804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.031652] page_type: f5(slab) [ 36.032242] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.033196] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.034172] page dumped because: kasan: bad access detected [ 36.034859] [ 36.035209] Memory state around the buggy address: [ 36.035949] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.036757] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037783] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.038783] ^ [ 36.039448] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.040321] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.041290] ================================================================== [ 36.689530] ================================================================== [ 36.690263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.692243] Write of size 8 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 36.693194] [ 36.693948] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 36.695143] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.695725] Hardware name: linux,dummy-virt (DT) [ 36.696298] Call trace: [ 36.696794] show_stack+0x20/0x38 (C) [ 36.697396] dump_stack_lvl+0x8c/0xd0 [ 36.698107] print_report+0x118/0x5e0 [ 36.698618] kasan_report+0xc8/0x118 [ 36.699294] kasan_check_range+0x100/0x1a8 [ 36.699933] __kasan_check_write+0x20/0x30 [ 36.700576] kasan_atomics_helper+0x147c/0x4858 [ 36.701228] kasan_atomics+0x198/0x2e8 [ 36.701943] kunit_try_run_case+0x14c/0x3d0 [ 36.702558] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.703359] kthread+0x24c/0x2d0 [ 36.703943] ret_from_fork+0x10/0x20 [ 36.704527] [ 36.704897] Allocated by task 254: [ 36.705432] kasan_save_stack+0x3c/0x68 [ 36.706055] kasan_save_track+0x20/0x40 [ 36.706646] kasan_save_alloc_info+0x40/0x58 [ 36.707254] __kasan_kmalloc+0xd4/0xd8 [ 36.707946] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.708499] kasan_atomics+0xb8/0x2e8 [ 36.709124] kunit_try_run_case+0x14c/0x3d0 [ 36.709707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.710555] kthread+0x24c/0x2d0 [ 36.711071] ret_from_fork+0x10/0x20 [ 36.711669] [ 36.712011] The buggy address belongs to the object at fff00000c594f180 [ 36.712011] which belongs to the cache kmalloc-64 of size 64 [ 36.713923] The buggy address is located 0 bytes to the right of [ 36.713923] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 36.715344] [ 36.715877] The buggy address belongs to the physical page: [ 36.716727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 36.717870] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.718858] page_type: f5(slab) [ 36.719551] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.720679] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.721764] page dumped because: kasan: bad access detected [ 36.722629] [ 36.723101] Memory state around the buggy address: [ 36.723709] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.724778] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.725912] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.726726] ^ [ 36.727309] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.727987] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.729022] ================================================================== [ 35.926459] ================================================================== [ 35.927286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.928179] Read of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.929027] [ 35.929412] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.930595] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.931125] Hardware name: linux,dummy-virt (DT) [ 35.931711] Call trace: [ 35.932215] show_stack+0x20/0x38 (C) [ 35.932872] dump_stack_lvl+0x8c/0xd0 [ 35.933456] print_report+0x118/0x5e0 [ 35.934037] kasan_report+0xc8/0x118 [ 35.934637] __asan_report_load4_noabort+0x20/0x30 [ 35.935360] kasan_atomics_helper+0x3e04/0x4858 [ 35.935954] kasan_atomics+0x198/0x2e8 [ 35.936630] kunit_try_run_case+0x14c/0x3d0 [ 35.937343] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.938050] kthread+0x24c/0x2d0 [ 35.938701] ret_from_fork+0x10/0x20 [ 35.939224] [ 35.939603] Allocated by task 254: [ 35.940085] kasan_save_stack+0x3c/0x68 [ 35.940768] kasan_save_track+0x20/0x40 [ 35.941318] kasan_save_alloc_info+0x40/0x58 [ 35.942130] __kasan_kmalloc+0xd4/0xd8 [ 35.942694] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.943374] kasan_atomics+0xb8/0x2e8 [ 35.943906] kunit_try_run_case+0x14c/0x3d0 [ 35.944489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.945340] kthread+0x24c/0x2d0 [ 35.945858] ret_from_fork+0x10/0x20 [ 35.946511] [ 35.946920] The buggy address belongs to the object at fff00000c594f180 [ 35.946920] which belongs to the cache kmalloc-64 of size 64 [ 35.948245] The buggy address is located 0 bytes to the right of [ 35.948245] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.949664] [ 35.950045] The buggy address belongs to the physical page: [ 35.950778] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.951772] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.952599] page_type: f5(slab) [ 35.953212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.954185] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.955101] page dumped because: kasan: bad access detected [ 35.955743] [ 35.956055] Memory state around the buggy address: [ 35.956691] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.957614] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.958479] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.959310] ^ [ 35.959958] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.960864] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.961734] ================================================================== [ 34.945024] ================================================================== [ 34.945962] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.946733] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 34.947706] [ 34.948166] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 34.949275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.950070] Hardware name: linux,dummy-virt (DT) [ 34.950691] Call trace: [ 34.951027] show_stack+0x20/0x38 (C) [ 34.951708] dump_stack_lvl+0x8c/0xd0 [ 34.952393] print_report+0x118/0x5e0 [ 34.952951] kasan_report+0xc8/0x118 [ 34.953553] kasan_check_range+0x100/0x1a8 [ 34.954187] __kasan_check_write+0x20/0x30 [ 34.954912] kasan_atomics_helper+0x414/0x4858 [ 34.955458] kasan_atomics+0x198/0x2e8 [ 34.956154] kunit_try_run_case+0x14c/0x3d0 [ 34.956746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.957528] kthread+0x24c/0x2d0 [ 34.958136] ret_from_fork+0x10/0x20 [ 34.958710] [ 34.959049] Allocated by task 254: [ 34.959519] kasan_save_stack+0x3c/0x68 [ 34.960131] kasan_save_track+0x20/0x40 [ 34.960805] kasan_save_alloc_info+0x40/0x58 [ 34.961407] __kasan_kmalloc+0xd4/0xd8 [ 34.962008] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.962635] kasan_atomics+0xb8/0x2e8 [ 34.963105] kunit_try_run_case+0x14c/0x3d0 [ 34.963809] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.964455] kthread+0x24c/0x2d0 [ 34.965085] ret_from_fork+0x10/0x20 [ 34.965680] [ 34.965996] The buggy address belongs to the object at fff00000c594f180 [ 34.965996] which belongs to the cache kmalloc-64 of size 64 [ 34.967458] The buggy address is located 0 bytes to the right of [ 34.967458] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 34.968861] [ 34.969205] The buggy address belongs to the physical page: [ 34.970062] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 34.971009] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.971868] page_type: f5(slab) [ 34.972346] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.973197] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.974191] page dumped because: kasan: bad access detected [ 34.974808] [ 34.975146] Memory state around the buggy address: [ 34.975850] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.976675] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.977504] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.978410] ^ [ 34.979029] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.979962] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.980789] ================================================================== [ 35.334052] ================================================================== [ 35.334765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.336267] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.337808] [ 35.338123] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.339856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.340562] Hardware name: linux,dummy-virt (DT) [ 35.341317] Call trace: [ 35.341746] show_stack+0x20/0x38 (C) [ 35.342485] dump_stack_lvl+0x8c/0xd0 [ 35.343099] print_report+0x118/0x5e0 [ 35.343581] kasan_report+0xc8/0x118 [ 35.344419] kasan_check_range+0x100/0x1a8 [ 35.345241] __kasan_check_write+0x20/0x30 [ 35.345872] kasan_atomics_helper+0x894/0x4858 [ 35.346505] kasan_atomics+0x198/0x2e8 [ 35.347097] kunit_try_run_case+0x14c/0x3d0 [ 35.347745] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.348441] kthread+0x24c/0x2d0 [ 35.349023] ret_from_fork+0x10/0x20 [ 35.349668] [ 35.350056] Allocated by task 254: [ 35.350641] kasan_save_stack+0x3c/0x68 [ 35.351152] kasan_save_track+0x20/0x40 [ 35.351870] kasan_save_alloc_info+0x40/0x58 [ 35.352535] __kasan_kmalloc+0xd4/0xd8 [ 35.353276] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.353892] kasan_atomics+0xb8/0x2e8 [ 35.354620] kunit_try_run_case+0x14c/0x3d0 [ 35.355154] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.355995] kthread+0x24c/0x2d0 [ 35.356528] ret_from_fork+0x10/0x20 [ 35.357103] [ 35.357496] The buggy address belongs to the object at fff00000c594f180 [ 35.357496] which belongs to the cache kmalloc-64 of size 64 [ 35.358842] The buggy address is located 0 bytes to the right of [ 35.358842] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.360296] [ 35.360719] The buggy address belongs to the physical page: [ 35.361462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.362480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.363295] page_type: f5(slab) [ 35.363942] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.364959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.365863] page dumped because: kasan: bad access detected [ 35.366599] [ 35.366984] Memory state around the buggy address: [ 35.367744] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.368610] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.369480] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.370355] ^ [ 35.370938] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.371864] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.372794] ================================================================== [ 35.492815] ================================================================== [ 35.493821] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.494864] Write of size 4 at addr fff00000c594f1b0 by task kunit_try_catch/254 [ 35.497020] [ 35.497553] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 35.498972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.499646] Hardware name: linux,dummy-virt (DT) [ 35.500464] Call trace: [ 35.501065] show_stack+0x20/0x38 (C) [ 35.501869] dump_stack_lvl+0x8c/0xd0 [ 35.502531] print_report+0x118/0x5e0 [ 35.503043] kasan_report+0xc8/0x118 [ 35.503689] kasan_check_range+0x100/0x1a8 [ 35.504192] __kasan_check_write+0x20/0x30 [ 35.504903] kasan_atomics_helper+0xa04/0x4858 [ 35.505648] kasan_atomics+0x198/0x2e8 [ 35.506259] kunit_try_run_case+0x14c/0x3d0 [ 35.506847] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.507698] kthread+0x24c/0x2d0 [ 35.508211] ret_from_fork+0x10/0x20 [ 35.508837] [ 35.509167] Allocated by task 254: [ 35.509734] kasan_save_stack+0x3c/0x68 [ 35.510230] kasan_save_track+0x20/0x40 [ 35.510883] kasan_save_alloc_info+0x40/0x58 [ 35.511612] __kasan_kmalloc+0xd4/0xd8 [ 35.512136] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.512923] kasan_atomics+0xb8/0x2e8 [ 35.513496] kunit_try_run_case+0x14c/0x3d0 [ 35.514073] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.514867] kthread+0x24c/0x2d0 [ 35.515402] ret_from_fork+0x10/0x20 [ 35.515936] [ 35.516405] The buggy address belongs to the object at fff00000c594f180 [ 35.516405] which belongs to the cache kmalloc-64 of size 64 [ 35.517792] The buggy address is located 0 bytes to the right of [ 35.517792] allocated 48-byte region [fff00000c594f180, fff00000c594f1b0) [ 35.519084] [ 35.519572] The buggy address belongs to the physical page: [ 35.520164] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10594f [ 35.521230] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.522152] page_type: f5(slab) [ 35.522650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.523653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.524598] page dumped because: kasan: bad access detected [ 35.525279] [ 35.525622] Memory state around the buggy address: [ 35.526366] fff00000c594f080: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.527129] fff00000c594f100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.528051] >fff00000c594f180: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.529000] ^ [ 35.529674] fff00000c594f200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.530528] fff00000c594f280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.531433] ==================================================================
[ 31.642018] ================================================================== [ 31.642422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 31.643221] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.643638] [ 31.643815] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.644903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.645300] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.645880] Call Trace: [ 31.646069] <TASK> [ 31.646228] dump_stack_lvl+0x73/0xb0 [ 31.646587] print_report+0xd1/0x640 [ 31.646976] ? __virt_addr_valid+0x1db/0x2d0 [ 31.647494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.648009] kasan_report+0x102/0x140 [ 31.648502] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.648974] ? kasan_atomics_helper+0x1a80/0x5450 [ 31.649511] kasan_check_range+0x10c/0x1c0 [ 31.649966] __kasan_check_write+0x18/0x20 [ 31.650265] kasan_atomics_helper+0x1a80/0x5450 [ 31.650770] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.651306] ? ret_from_fork_asm+0x1a/0x30 [ 31.651816] ? ret_from_fork+0x41/0x80 [ 31.652267] ? kthread+0x257/0x310 [ 31.652666] kasan_atomics+0x1dd/0x310 [ 31.652947] ? __pfx_kasan_atomics+0x10/0x10 [ 31.653394] ? __pfx_read_tsc+0x10/0x10 [ 31.653901] ? ktime_get_ts64+0x86/0x230 [ 31.654370] kunit_try_run_case+0x1b3/0x490 [ 31.654910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.655237] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.655588] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.655898] ? __kthread_parkme+0x82/0x160 [ 31.656284] ? preempt_count_sub+0x50/0x80 [ 31.656803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.657289] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.657889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.658403] kthread+0x257/0x310 [ 31.658846] ? __pfx_kthread+0x10/0x10 [ 31.659260] ret_from_fork+0x41/0x80 [ 31.659709] ? __pfx_kthread+0x10/0x10 [ 31.660043] ret_from_fork_asm+0x1a/0x30 [ 31.660362] </TASK> [ 31.660598] [ 31.660750] Allocated by task 274: [ 31.661106] kasan_save_stack+0x3d/0x60 [ 31.661608] kasan_save_track+0x18/0x40 [ 31.662067] kasan_save_alloc_info+0x3b/0x50 [ 31.662571] __kasan_kmalloc+0xb7/0xc0 [ 31.662994] __kmalloc_cache_noprof+0x184/0x410 [ 31.666429] kasan_atomics+0x96/0x310 [ 31.666819] kunit_try_run_case+0x1b3/0x490 [ 31.667080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.668307] kthread+0x257/0x310 [ 31.668671] ret_from_fork+0x41/0x80 [ 31.669644] ret_from_fork_asm+0x1a/0x30 [ 31.669927] [ 31.670163] The buggy address belongs to the object at ffff888102a59b80 [ 31.670163] which belongs to the cache kmalloc-64 of size 64 [ 31.671072] The buggy address is located 0 bytes to the right of [ 31.671072] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.672520] [ 31.673241] The buggy address belongs to the physical page: [ 31.673922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.674745] flags: 0x200000000000000(node=0|zone=2) [ 31.675139] page_type: f5(slab) [ 31.675405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.676801] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.677304] page dumped because: kasan: bad access detected [ 31.678206] [ 31.678358] Memory state around the buggy address: [ 31.678645] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.679628] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.680583] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.681129] ^ [ 31.681496] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.682532] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.682859] ================================================================== [ 30.384560] ================================================================== [ 30.385049] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 30.385738] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.386255] [ 30.386502] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.387227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.388462] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.389325] Call Trace: [ 30.389533] <TASK> [ 30.390831] dump_stack_lvl+0x73/0xb0 [ 30.391198] print_report+0xd1/0x640 [ 30.391569] ? __virt_addr_valid+0x1db/0x2d0 [ 30.391961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.392489] kasan_report+0x102/0x140 [ 30.393484] ? kasan_atomics_helper+0xa2c/0x5450 [ 30.393851] ? kasan_atomics_helper+0xa2c/0x5450 [ 30.394419] kasan_check_range+0x10c/0x1c0 [ 30.395023] __kasan_check_write+0x18/0x20 [ 30.395304] kasan_atomics_helper+0xa2c/0x5450 [ 30.395938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.396361] ? ret_from_fork_asm+0x1a/0x30 [ 30.397200] ? ret_from_fork+0x41/0x80 [ 30.397785] ? kthread+0x257/0x310 [ 30.398202] kasan_atomics+0x1dd/0x310 [ 30.398895] ? __pfx_kasan_atomics+0x10/0x10 [ 30.399361] ? __pfx_read_tsc+0x10/0x10 [ 30.400076] ? ktime_get_ts64+0x86/0x230 [ 30.400662] kunit_try_run_case+0x1b3/0x490 [ 30.401127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.401843] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.402470] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.402921] ? __kthread_parkme+0x82/0x160 [ 30.403285] ? preempt_count_sub+0x50/0x80 [ 30.404082] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.404903] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.405351] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.406270] kthread+0x257/0x310 [ 30.406571] ? __pfx_kthread+0x10/0x10 [ 30.406879] ret_from_fork+0x41/0x80 [ 30.407499] ? __pfx_kthread+0x10/0x10 [ 30.407902] ret_from_fork_asm+0x1a/0x30 [ 30.408553] </TASK> [ 30.408828] [ 30.409025] Allocated by task 274: [ 30.409321] kasan_save_stack+0x3d/0x60 [ 30.409698] kasan_save_track+0x18/0x40 [ 30.410696] kasan_save_alloc_info+0x3b/0x50 [ 30.411414] __kasan_kmalloc+0xb7/0xc0 [ 30.411779] __kmalloc_cache_noprof+0x184/0x410 [ 30.412190] kasan_atomics+0x96/0x310 [ 30.412943] kunit_try_run_case+0x1b3/0x490 [ 30.413319] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.413732] kthread+0x257/0x310 [ 30.414080] ret_from_fork+0x41/0x80 [ 30.414390] ret_from_fork_asm+0x1a/0x30 [ 30.415240] [ 30.415408] The buggy address belongs to the object at ffff888102a59b80 [ 30.415408] which belongs to the cache kmalloc-64 of size 64 [ 30.416395] The buggy address is located 0 bytes to the right of [ 30.416395] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.417810] [ 30.417971] The buggy address belongs to the physical page: [ 30.418824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.419509] flags: 0x200000000000000(node=0|zone=2) [ 30.420184] page_type: f5(slab) [ 30.420541] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.421257] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.422212] page dumped because: kasan: bad access detected [ 30.422577] [ 30.422812] Memory state around the buggy address: [ 30.423238] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.423901] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.424367] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.425678] ^ [ 30.426019] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.426649] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.427427] ================================================================== [ 30.586328] ================================================================== [ 30.587420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 30.588522] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.589197] [ 30.589486] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.590371] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.590802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.591683] Call Trace: [ 30.592032] <TASK> [ 30.592592] dump_stack_lvl+0x73/0xb0 [ 30.593026] print_report+0xd1/0x640 [ 30.593322] ? __virt_addr_valid+0x1db/0x2d0 [ 30.593672] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.594151] kasan_report+0x102/0x140 [ 30.594597] ? kasan_atomics_helper+0xd48/0x5450 [ 30.595122] ? kasan_atomics_helper+0xd48/0x5450 [ 30.595693] kasan_check_range+0x10c/0x1c0 [ 30.596140] __kasan_check_write+0x18/0x20 [ 30.596646] kasan_atomics_helper+0xd48/0x5450 [ 30.597148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.597690] ? ret_from_fork_asm+0x1a/0x30 [ 30.598176] ? ret_from_fork+0x41/0x80 [ 30.598637] ? kthread+0x257/0x310 [ 30.598978] kasan_atomics+0x1dd/0x310 [ 30.599468] ? __pfx_kasan_atomics+0x10/0x10 [ 30.599916] ? __pfx_read_tsc+0x10/0x10 [ 30.600253] ? ktime_get_ts64+0x86/0x230 [ 30.600594] kunit_try_run_case+0x1b3/0x490 [ 30.600891] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.601296] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.601791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.602307] ? __kthread_parkme+0x82/0x160 [ 30.602819] ? preempt_count_sub+0x50/0x80 [ 30.603272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.603809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.604421] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.604989] kthread+0x257/0x310 [ 30.605345] ? __pfx_kthread+0x10/0x10 [ 30.605781] ret_from_fork+0x41/0x80 [ 30.606220] ? __pfx_kthread+0x10/0x10 [ 30.606694] ret_from_fork_asm+0x1a/0x30 [ 30.607017] </TASK> [ 30.607254] [ 30.607561] Allocated by task 274: [ 30.607919] kasan_save_stack+0x3d/0x60 [ 30.608376] kasan_save_track+0x18/0x40 [ 30.608772] kasan_save_alloc_info+0x3b/0x50 [ 30.609256] __kasan_kmalloc+0xb7/0xc0 [ 30.609595] __kmalloc_cache_noprof+0x184/0x410 [ 30.610042] kasan_atomics+0x96/0x310 [ 30.610331] kunit_try_run_case+0x1b3/0x490 [ 30.610766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.611134] kthread+0x257/0x310 [ 30.611381] ret_from_fork+0x41/0x80 [ 30.611679] ret_from_fork_asm+0x1a/0x30 [ 30.611950] [ 30.612127] The buggy address belongs to the object at ffff888102a59b80 [ 30.612127] which belongs to the cache kmalloc-64 of size 64 [ 30.613177] The buggy address is located 0 bytes to the right of [ 30.613177] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.614238] [ 30.614501] The buggy address belongs to the physical page: [ 30.615221] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.616853] flags: 0x200000000000000(node=0|zone=2) [ 30.617961] page_type: f5(slab) [ 30.619743] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.620378] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.620758] page dumped because: kasan: bad access detected [ 30.621099] [ 30.621253] Memory state around the buggy address: [ 30.622151] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.622877] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.623428] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.623934] ^ [ 30.624283] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.624899] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.625423] ================================================================== [ 31.155012] ================================================================== [ 31.155689] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 31.156273] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.157520] [ 31.157776] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.158503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.158900] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.159473] Call Trace: [ 31.159784] <TASK> [ 31.160029] dump_stack_lvl+0x73/0xb0 [ 31.160527] print_report+0xd1/0x640 [ 31.160928] ? __virt_addr_valid+0x1db/0x2d0 [ 31.161302] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.161805] kasan_report+0x102/0x140 [ 31.162091] ? kasan_atomics_helper+0x4eb0/0x5450 [ 31.162393] ? kasan_atomics_helper+0x4eb0/0x5450 [ 31.162782] __asan_report_load8_noabort+0x18/0x20 [ 31.163115] kasan_atomics_helper+0x4eb0/0x5450 [ 31.163603] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.164107] ? ret_from_fork_asm+0x1a/0x30 [ 31.164585] ? ret_from_fork+0x41/0x80 [ 31.164993] ? kthread+0x257/0x310 [ 31.165375] kasan_atomics+0x1dd/0x310 [ 31.165810] ? __pfx_kasan_atomics+0x10/0x10 [ 31.166262] ? __pfx_read_tsc+0x10/0x10 [ 31.166690] ? ktime_get_ts64+0x86/0x230 [ 31.167021] kunit_try_run_case+0x1b3/0x490 [ 31.167514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.167921] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.168361] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.168751] ? __kthread_parkme+0x82/0x160 [ 31.169178] ? preempt_count_sub+0x50/0x80 [ 31.169649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.170140] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.171230] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.172184] kthread+0x257/0x310 [ 31.173679] ? __pfx_kthread+0x10/0x10 [ 31.174087] ret_from_fork+0x41/0x80 [ 31.174509] ? __pfx_kthread+0x10/0x10 [ 31.174810] ret_from_fork_asm+0x1a/0x30 [ 31.175175] </TASK> [ 31.175408] [ 31.176247] Allocated by task 274: [ 31.177068] kasan_save_stack+0x3d/0x60 [ 31.177698] kasan_save_track+0x18/0x40 [ 31.178068] kasan_save_alloc_info+0x3b/0x50 [ 31.178486] __kasan_kmalloc+0xb7/0xc0 [ 31.178880] __kmalloc_cache_noprof+0x184/0x410 [ 31.179243] kasan_atomics+0x96/0x310 [ 31.179620] kunit_try_run_case+0x1b3/0x490 [ 31.179999] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.180544] kthread+0x257/0x310 [ 31.180821] ret_from_fork+0x41/0x80 [ 31.181137] ret_from_fork_asm+0x1a/0x30 [ 31.181583] [ 31.181796] The buggy address belongs to the object at ffff888102a59b80 [ 31.181796] which belongs to the cache kmalloc-64 of size 64 [ 31.182654] The buggy address is located 0 bytes to the right of [ 31.182654] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.183375] [ 31.183653] The buggy address belongs to the physical page: [ 31.184157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.184735] flags: 0x200000000000000(node=0|zone=2) [ 31.185092] page_type: f5(slab) [ 31.185332] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.186005] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.186672] page dumped because: kasan: bad access detected [ 31.187045] [ 31.187259] Memory state around the buggy address: [ 31.187678] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.188175] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.188599] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.188968] ^ [ 31.189414] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.190066] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.190673] ================================================================== [ 31.775369] ================================================================== [ 31.775869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 31.776535] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.777200] [ 31.777447] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.778044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.778426] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.779411] Call Trace: [ 31.780022] <TASK> [ 31.780246] dump_stack_lvl+0x73/0xb0 [ 31.780809] print_report+0xd1/0x640 [ 31.781238] ? __virt_addr_valid+0x1db/0x2d0 [ 31.781758] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.782346] kasan_report+0x102/0x140 [ 31.782892] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.783343] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.783945] __asan_report_load8_noabort+0x18/0x20 [ 31.784385] kasan_atomics_helper+0x4f32/0x5450 [ 31.785090] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.785611] ? ret_from_fork_asm+0x1a/0x30 [ 31.786006] ? ret_from_fork+0x41/0x80 [ 31.786535] ? kthread+0x257/0x310 [ 31.787013] kasan_atomics+0x1dd/0x310 [ 31.787366] ? __pfx_kasan_atomics+0x10/0x10 [ 31.787788] ? __pfx_read_tsc+0x10/0x10 [ 31.788171] ? ktime_get_ts64+0x86/0x230 [ 31.788556] kunit_try_run_case+0x1b3/0x490 [ 31.788995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.789603] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.790185] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.790689] ? __kthread_parkme+0x82/0x160 [ 31.791126] ? preempt_count_sub+0x50/0x80 [ 31.791686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.792245] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.792856] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.793289] kthread+0x257/0x310 [ 31.794192] ? __pfx_kthread+0x10/0x10 [ 31.794696] ret_from_fork+0x41/0x80 [ 31.795110] ? __pfx_kthread+0x10/0x10 [ 31.795497] ret_from_fork_asm+0x1a/0x30 [ 31.795878] </TASK> [ 31.796657] [ 31.797176] Allocated by task 274: [ 31.797419] kasan_save_stack+0x3d/0x60 [ 31.797894] kasan_save_track+0x18/0x40 [ 31.798830] kasan_save_alloc_info+0x3b/0x50 [ 31.799393] __kasan_kmalloc+0xb7/0xc0 [ 31.800033] __kmalloc_cache_noprof+0x184/0x410 [ 31.800420] kasan_atomics+0x96/0x310 [ 31.801385] kunit_try_run_case+0x1b3/0x490 [ 31.801765] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.802380] kthread+0x257/0x310 [ 31.802857] ret_from_fork+0x41/0x80 [ 31.803360] ret_from_fork_asm+0x1a/0x30 [ 31.803674] [ 31.803884] The buggy address belongs to the object at ffff888102a59b80 [ 31.803884] which belongs to the cache kmalloc-64 of size 64 [ 31.804760] The buggy address is located 0 bytes to the right of [ 31.804760] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.806378] [ 31.807162] The buggy address belongs to the physical page: [ 31.807516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.808231] flags: 0x200000000000000(node=0|zone=2) [ 31.808983] page_type: f5(slab) [ 31.809241] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.810308] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.810804] page dumped because: kasan: bad access detected [ 31.811269] [ 31.811445] Memory state around the buggy address: [ 31.812318] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.813090] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.813505] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.814423] ^ [ 31.814863] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.815666] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.816446] ================================================================== [ 30.030198] ================================================================== [ 30.031126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 30.031742] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.032581] [ 30.032762] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.033507] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.034105] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.034637] Call Trace: [ 30.034897] <TASK> [ 30.035319] dump_stack_lvl+0x73/0xb0 [ 30.035972] print_report+0xd1/0x640 [ 30.036781] ? __virt_addr_valid+0x1db/0x2d0 [ 30.037559] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.037945] kasan_report+0x102/0x140 [ 30.038232] ? kasan_atomics_helper+0x4b3c/0x5450 [ 30.038803] ? kasan_atomics_helper+0x4b3c/0x5450 [ 30.039478] __asan_report_store4_noabort+0x1b/0x30 [ 30.039999] kasan_atomics_helper+0x4b3c/0x5450 [ 30.040501] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.040982] ? ret_from_fork_asm+0x1a/0x30 [ 30.041406] ? ret_from_fork+0x41/0x80 [ 30.041885] ? kthread+0x257/0x310 [ 30.042248] kasan_atomics+0x1dd/0x310 [ 30.042724] ? __pfx_kasan_atomics+0x10/0x10 [ 30.043107] ? __pfx_read_tsc+0x10/0x10 [ 30.043596] ? ktime_get_ts64+0x86/0x230 [ 30.044033] kunit_try_run_case+0x1b3/0x490 [ 30.044355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.044935] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.045523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.046106] ? __kthread_parkme+0x82/0x160 [ 30.046607] ? preempt_count_sub+0x50/0x80 [ 30.047139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.047702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.047916] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.048166] kthread+0x257/0x310 [ 30.048602] ? __pfx_kthread+0x10/0x10 [ 30.048914] ret_from_fork+0x41/0x80 [ 30.049346] ? __pfx_kthread+0x10/0x10 [ 30.049682] ret_from_fork_asm+0x1a/0x30 [ 30.050139] </TASK> [ 30.050414] [ 30.050654] Allocated by task 274: [ 30.050995] kasan_save_stack+0x3d/0x60 [ 30.051363] kasan_save_track+0x18/0x40 [ 30.051824] kasan_save_alloc_info+0x3b/0x50 [ 30.052245] __kasan_kmalloc+0xb7/0xc0 [ 30.052673] __kmalloc_cache_noprof+0x184/0x410 [ 30.053064] kasan_atomics+0x96/0x310 [ 30.053390] kunit_try_run_case+0x1b3/0x490 [ 30.053818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.054226] kthread+0x257/0x310 [ 30.054576] ret_from_fork+0x41/0x80 [ 30.054888] ret_from_fork_asm+0x1a/0x30 [ 30.055232] [ 30.055382] The buggy address belongs to the object at ffff888102a59b80 [ 30.055382] which belongs to the cache kmalloc-64 of size 64 [ 30.056355] The buggy address is located 0 bytes to the right of [ 30.056355] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.057229] [ 30.057514] The buggy address belongs to the physical page: [ 30.057995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.058393] flags: 0x200000000000000(node=0|zone=2) [ 30.058921] page_type: f5(slab) [ 30.059288] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.060000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.060521] page dumped because: kasan: bad access detected [ 30.060815] [ 30.060958] Memory state around the buggy address: [ 30.061378] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.062067] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.062722] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.063341] ^ [ 30.063840] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.064301] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.064828] ================================================================== [ 29.987572] ================================================================== [ 29.989803] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 29.992438] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.993091] [ 29.993332] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.995212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.995646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.996331] Call Trace: [ 29.997031] <TASK> [ 29.997408] dump_stack_lvl+0x73/0xb0 [ 29.997965] print_report+0xd1/0x640 [ 29.998534] ? __virt_addr_valid+0x1db/0x2d0 [ 29.999135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.999773] kasan_report+0x102/0x140 [ 30.000243] ? kasan_atomics_helper+0x4a1/0x5450 [ 30.000830] ? kasan_atomics_helper+0x4a1/0x5450 [ 30.001260] kasan_check_range+0x10c/0x1c0 [ 30.001665] __kasan_check_write+0x18/0x20 [ 30.002100] kasan_atomics_helper+0x4a1/0x5450 [ 30.002620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.003165] ? ret_from_fork_asm+0x1a/0x30 [ 30.003734] ? ret_from_fork+0x41/0x80 [ 30.004101] ? kthread+0x257/0x310 [ 30.004545] kasan_atomics+0x1dd/0x310 [ 30.005039] ? __pfx_kasan_atomics+0x10/0x10 [ 30.005430] ? __pfx_read_tsc+0x10/0x10 [ 30.005892] ? ktime_get_ts64+0x86/0x230 [ 30.006314] kunit_try_run_case+0x1b3/0x490 [ 30.006793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.007260] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.007668] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.008143] ? __kthread_parkme+0x82/0x160 [ 30.008611] ? preempt_count_sub+0x50/0x80 [ 30.008895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.009390] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.009979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.010520] kthread+0x257/0x310 [ 30.010888] ? __pfx_kthread+0x10/0x10 [ 30.011326] ret_from_fork+0x41/0x80 [ 30.011692] ? __pfx_kthread+0x10/0x10 [ 30.011958] ret_from_fork_asm+0x1a/0x30 [ 30.012507] </TASK> [ 30.012785] [ 30.013025] Allocated by task 274: [ 30.013377] kasan_save_stack+0x3d/0x60 [ 30.013765] kasan_save_track+0x18/0x40 [ 30.014019] kasan_save_alloc_info+0x3b/0x50 [ 30.014311] __kasan_kmalloc+0xb7/0xc0 [ 30.014775] __kmalloc_cache_noprof+0x184/0x410 [ 30.015238] kasan_atomics+0x96/0x310 [ 30.015617] kunit_try_run_case+0x1b3/0x490 [ 30.016036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.016638] kthread+0x257/0x310 [ 30.016954] ret_from_fork+0x41/0x80 [ 30.017226] ret_from_fork_asm+0x1a/0x30 [ 30.017529] [ 30.017738] The buggy address belongs to the object at ffff888102a59b80 [ 30.017738] which belongs to the cache kmalloc-64 of size 64 [ 30.018757] The buggy address is located 0 bytes to the right of [ 30.018757] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.019802] [ 30.020005] The buggy address belongs to the physical page: [ 30.020312] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.020849] flags: 0x200000000000000(node=0|zone=2) [ 30.021326] page_type: f5(slab) [ 30.021729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.022400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.023005] page dumped because: kasan: bad access detected [ 30.023579] [ 30.023786] Memory state around the buggy address: [ 30.024066] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.024808] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.025189] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.025553] ^ [ 30.026169] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.027770] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.028855] ================================================================== [ 31.601257] ================================================================== [ 31.601778] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 31.602567] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.603147] [ 31.603407] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.604000] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.604481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.605231] Call Trace: [ 31.605439] <TASK> [ 31.605782] dump_stack_lvl+0x73/0xb0 [ 31.606278] print_report+0xd1/0x640 [ 31.606780] ? __virt_addr_valid+0x1db/0x2d0 [ 31.607227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.607707] kasan_report+0x102/0x140 [ 31.608185] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.608765] ? kasan_atomics_helper+0x19e4/0x5450 [ 31.609233] kasan_check_range+0x10c/0x1c0 [ 31.609713] __kasan_check_write+0x18/0x20 [ 31.609989] kasan_atomics_helper+0x19e4/0x5450 [ 31.610489] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.610961] ? ret_from_fork_asm+0x1a/0x30 [ 31.611446] ? ret_from_fork+0x41/0x80 [ 31.611895] ? kthread+0x257/0x310 [ 31.612223] kasan_atomics+0x1dd/0x310 [ 31.612532] ? __pfx_kasan_atomics+0x10/0x10 [ 31.613168] ? __pfx_read_tsc+0x10/0x10 [ 31.613602] ? ktime_get_ts64+0x86/0x230 [ 31.613954] kunit_try_run_case+0x1b3/0x490 [ 31.614359] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.614904] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.615386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.615889] ? __kthread_parkme+0x82/0x160 [ 31.616314] ? preempt_count_sub+0x50/0x80 [ 31.616688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.617039] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.617606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.618191] kthread+0x257/0x310 [ 31.618593] ? __pfx_kthread+0x10/0x10 [ 31.618995] ret_from_fork+0x41/0x80 [ 31.619402] ? __pfx_kthread+0x10/0x10 [ 31.619804] ret_from_fork_asm+0x1a/0x30 [ 31.620266] </TASK> [ 31.620572] [ 31.620732] Allocated by task 274: [ 31.621017] kasan_save_stack+0x3d/0x60 [ 31.621407] kasan_save_track+0x18/0x40 [ 31.621855] kasan_save_alloc_info+0x3b/0x50 [ 31.622300] __kasan_kmalloc+0xb7/0xc0 [ 31.622841] __kmalloc_cache_noprof+0x184/0x410 [ 31.623340] kasan_atomics+0x96/0x310 [ 31.623884] kunit_try_run_case+0x1b3/0x490 [ 31.624354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.624885] kthread+0x257/0x310 [ 31.625248] ret_from_fork+0x41/0x80 [ 31.625593] ret_from_fork_asm+0x1a/0x30 [ 31.625945] [ 31.626192] The buggy address belongs to the object at ffff888102a59b80 [ 31.626192] which belongs to the cache kmalloc-64 of size 64 [ 31.627644] The buggy address is located 0 bytes to the right of [ 31.627644] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.629161] [ 31.629326] The buggy address belongs to the physical page: [ 31.632405] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.633827] flags: 0x200000000000000(node=0|zone=2) [ 31.634514] page_type: f5(slab) [ 31.634934] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.635452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.636071] page dumped because: kasan: bad access detected [ 31.636417] [ 31.636569] Memory state around the buggy address: [ 31.637010] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.637779] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.638246] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.638898] ^ [ 31.639229] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.639901] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.640574] ================================================================== [ 31.118418] ================================================================== [ 31.119166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 31.119754] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.120323] [ 31.120610] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.121363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.121691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.122337] Call Trace: [ 31.122618] <TASK> [ 31.122898] dump_stack_lvl+0x73/0xb0 [ 31.123317] print_report+0xd1/0x640 [ 31.123760] ? __virt_addr_valid+0x1db/0x2d0 [ 31.124144] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.124533] kasan_report+0x102/0x140 [ 31.124817] ? kasan_atomics_helper+0x13b6/0x5450 [ 31.125286] ? kasan_atomics_helper+0x13b6/0x5450 [ 31.125792] kasan_check_range+0x10c/0x1c0 [ 31.126244] __kasan_check_read+0x15/0x20 [ 31.126590] kasan_atomics_helper+0x13b6/0x5450 [ 31.127028] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.127566] ? ret_from_fork_asm+0x1a/0x30 [ 31.127912] ? ret_from_fork+0x41/0x80 [ 31.128324] ? kthread+0x257/0x310 [ 31.128660] kasan_atomics+0x1dd/0x310 [ 31.128944] ? __pfx_kasan_atomics+0x10/0x10 [ 31.129387] ? __pfx_read_tsc+0x10/0x10 [ 31.129831] ? ktime_get_ts64+0x86/0x230 [ 31.130267] kunit_try_run_case+0x1b3/0x490 [ 31.130750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.131187] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.131611] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.132095] ? __kthread_parkme+0x82/0x160 [ 31.132554] ? preempt_count_sub+0x50/0x80 [ 31.132867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.133333] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.133822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.134308] kthread+0x257/0x310 [ 31.134610] ? __pfx_kthread+0x10/0x10 [ 31.134873] ret_from_fork+0x41/0x80 [ 31.135208] ? __pfx_kthread+0x10/0x10 [ 31.135640] ret_from_fork_asm+0x1a/0x30 [ 31.136086] </TASK> [ 31.136368] [ 31.136625] Allocated by task 274: [ 31.136975] kasan_save_stack+0x3d/0x60 [ 31.137392] kasan_save_track+0x18/0x40 [ 31.137823] kasan_save_alloc_info+0x3b/0x50 [ 31.138262] __kasan_kmalloc+0xb7/0xc0 [ 31.138670] __kmalloc_cache_noprof+0x184/0x410 [ 31.138987] kasan_atomics+0x96/0x310 [ 31.139397] kunit_try_run_case+0x1b3/0x490 [ 31.139820] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.140284] kthread+0x257/0x310 [ 31.140595] ret_from_fork+0x41/0x80 [ 31.140915] ret_from_fork_asm+0x1a/0x30 [ 31.142870] [ 31.143116] The buggy address belongs to the object at ffff888102a59b80 [ 31.143116] which belongs to the cache kmalloc-64 of size 64 [ 31.145073] The buggy address is located 0 bytes to the right of [ 31.145073] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.145909] [ 31.146140] The buggy address belongs to the physical page: [ 31.146601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.147303] flags: 0x200000000000000(node=0|zone=2) [ 31.147728] page_type: f5(slab) [ 31.147967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.148364] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.149036] page dumped because: kasan: bad access detected [ 31.149561] [ 31.149764] Memory state around the buggy address: [ 31.150211] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.150816] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.151353] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.151798] ^ [ 31.152237] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.152660] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.153232] ================================================================== [ 32.159847] ================================================================== [ 32.160549] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 32.161209] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.161760] [ 32.162035] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.162766] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.163016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.163831] Call Trace: [ 32.164143] <TASK> [ 32.164477] dump_stack_lvl+0x73/0xb0 [ 32.164886] print_report+0xd1/0x640 [ 32.165304] ? __virt_addr_valid+0x1db/0x2d0 [ 32.165729] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.166190] kasan_report+0x102/0x140 [ 32.166672] ? kasan_atomics_helper+0x4fb4/0x5450 [ 32.167178] ? kasan_atomics_helper+0x4fb4/0x5450 [ 32.167696] __asan_report_load8_noabort+0x18/0x20 [ 32.168130] kasan_atomics_helper+0x4fb4/0x5450 [ 32.168631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.169162] ? ret_from_fork_asm+0x1a/0x30 [ 32.169584] ? ret_from_fork+0x41/0x80 [ 32.169927] ? kthread+0x257/0x310 [ 32.170351] kasan_atomics+0x1dd/0x310 [ 32.170800] ? __pfx_kasan_atomics+0x10/0x10 [ 32.171206] ? __pfx_read_tsc+0x10/0x10 [ 32.171693] ? ktime_get_ts64+0x86/0x230 [ 32.172307] kunit_try_run_case+0x1b3/0x490 [ 32.172875] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.173318] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.173916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.174561] ? __kthread_parkme+0x82/0x160 [ 32.175152] ? preempt_count_sub+0x50/0x80 [ 32.175764] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.176336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.176850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.177578] kthread+0x257/0x310 [ 32.178040] ? __pfx_kthread+0x10/0x10 [ 32.178674] ret_from_fork+0x41/0x80 [ 32.179148] ? __pfx_kthread+0x10/0x10 [ 32.179681] ret_from_fork_asm+0x1a/0x30 [ 32.180292] </TASK> [ 32.180613] [ 32.180865] Allocated by task 274: [ 32.181377] kasan_save_stack+0x3d/0x60 [ 32.181852] kasan_save_track+0x18/0x40 [ 32.182176] kasan_save_alloc_info+0x3b/0x50 [ 32.182659] __kasan_kmalloc+0xb7/0xc0 [ 32.183129] __kmalloc_cache_noprof+0x184/0x410 [ 32.183587] kasan_atomics+0x96/0x310 [ 32.184084] kunit_try_run_case+0x1b3/0x490 [ 32.184552] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.185232] kthread+0x257/0x310 [ 32.185636] ret_from_fork+0x41/0x80 [ 32.186045] ret_from_fork_asm+0x1a/0x30 [ 32.186558] [ 32.186776] The buggy address belongs to the object at ffff888102a59b80 [ 32.186776] which belongs to the cache kmalloc-64 of size 64 [ 32.187690] The buggy address is located 0 bytes to the right of [ 32.187690] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.188724] [ 32.188903] The buggy address belongs to the physical page: [ 32.189538] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.190189] flags: 0x200000000000000(node=0|zone=2) [ 32.190746] page_type: f5(slab) [ 32.191126] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.191616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.192301] page dumped because: kasan: bad access detected [ 32.192827] [ 32.192997] Memory state around the buggy address: [ 32.193548] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.194095] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.194764] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.195366] ^ [ 32.195841] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.196383] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.197115] ================================================================== [ 30.183204] ================================================================== [ 30.184429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 30.185099] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.185841] [ 30.186032] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.186660] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.187283] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.188255] Call Trace: [ 30.188558] <TASK> [ 30.188804] dump_stack_lvl+0x73/0xb0 [ 30.189311] print_report+0xd1/0x640 [ 30.189617] ? __virt_addr_valid+0x1db/0x2d0 [ 30.189921] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.190968] kasan_report+0x102/0x140 [ 30.191393] ? kasan_atomics_helper+0x730/0x5450 [ 30.191956] ? kasan_atomics_helper+0x730/0x5450 [ 30.192613] kasan_check_range+0x10c/0x1c0 [ 30.193739] __kasan_check_write+0x18/0x20 [ 30.194432] kasan_atomics_helper+0x730/0x5450 [ 30.195411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.196301] ? ret_from_fork_asm+0x1a/0x30 [ 30.196683] ? ret_from_fork+0x41/0x80 [ 30.197078] ? kthread+0x257/0x310 [ 30.197455] kasan_atomics+0x1dd/0x310 [ 30.198319] ? __pfx_kasan_atomics+0x10/0x10 [ 30.198890] ? __pfx_read_tsc+0x10/0x10 [ 30.199441] ? ktime_get_ts64+0x86/0x230 [ 30.199992] kunit_try_run_case+0x1b3/0x490 [ 30.200429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.201081] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.201486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.202019] ? __kthread_parkme+0x82/0x160 [ 30.202560] ? preempt_count_sub+0x50/0x80 [ 30.202878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.203414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.204047] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.205093] kthread+0x257/0x310 [ 30.205411] ? __pfx_kthread+0x10/0x10 [ 30.206123] ret_from_fork+0x41/0x80 [ 30.206731] ? __pfx_kthread+0x10/0x10 [ 30.207077] ret_from_fork_asm+0x1a/0x30 [ 30.207456] </TASK> [ 30.207728] [ 30.207939] Allocated by task 274: [ 30.209034] kasan_save_stack+0x3d/0x60 [ 30.209378] kasan_save_track+0x18/0x40 [ 30.209919] kasan_save_alloc_info+0x3b/0x50 [ 30.210256] __kasan_kmalloc+0xb7/0xc0 [ 30.210905] __kmalloc_cache_noprof+0x184/0x410 [ 30.211504] kasan_atomics+0x96/0x310 [ 30.212189] kunit_try_run_case+0x1b3/0x490 [ 30.212630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.213215] kthread+0x257/0x310 [ 30.213950] ret_from_fork+0x41/0x80 [ 30.214260] ret_from_fork_asm+0x1a/0x30 [ 30.214756] [ 30.214919] The buggy address belongs to the object at ffff888102a59b80 [ 30.214919] which belongs to the cache kmalloc-64 of size 64 [ 30.215766] The buggy address is located 0 bytes to the right of [ 30.215766] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.217203] [ 30.217794] The buggy address belongs to the physical page: [ 30.218516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.219024] flags: 0x200000000000000(node=0|zone=2) [ 30.219475] page_type: f5(slab) [ 30.219747] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.220782] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.221438] page dumped because: kasan: bad access detected [ 30.222260] [ 30.222444] Memory state around the buggy address: [ 30.222911] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.223448] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.223911] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.225436] ^ [ 30.226139] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.226959] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.227508] ================================================================== [ 31.817798] ================================================================== [ 31.818944] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 31.819513] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.820683] [ 31.820868] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.822286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.823086] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.823737] Call Trace: [ 31.823933] <TASK> [ 31.824221] dump_stack_lvl+0x73/0xb0 [ 31.825150] print_report+0xd1/0x640 [ 31.825760] ? __virt_addr_valid+0x1db/0x2d0 [ 31.826335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.826990] kasan_report+0x102/0x140 [ 31.827338] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.828151] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.828526] kasan_check_range+0x10c/0x1c0 [ 31.829278] __kasan_check_write+0x18/0x20 [ 31.829676] kasan_atomics_helper+0x1ce2/0x5450 [ 31.830103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.830890] ? ret_from_fork_asm+0x1a/0x30 [ 31.831254] ? ret_from_fork+0x41/0x80 [ 31.831806] ? kthread+0x257/0x310 [ 31.832314] kasan_atomics+0x1dd/0x310 [ 31.833102] ? __pfx_kasan_atomics+0x10/0x10 [ 31.833478] ? __pfx_read_tsc+0x10/0x10 [ 31.834268] ? ktime_get_ts64+0x86/0x230 [ 31.834666] kunit_try_run_case+0x1b3/0x490 [ 31.835373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.835829] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.836288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.837587] ? __kthread_parkme+0x82/0x160 [ 31.837937] ? preempt_count_sub+0x50/0x80 [ 31.838522] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.839220] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.840007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.840650] kthread+0x257/0x310 [ 31.840993] ? __pfx_kthread+0x10/0x10 [ 31.841706] ret_from_fork+0x41/0x80 [ 31.842311] ? __pfx_kthread+0x10/0x10 [ 31.842682] ret_from_fork_asm+0x1a/0x30 [ 31.843145] </TASK> [ 31.843416] [ 31.843719] Allocated by task 274: [ 31.844000] kasan_save_stack+0x3d/0x60 [ 31.844290] kasan_save_track+0x18/0x40 [ 31.844825] kasan_save_alloc_info+0x3b/0x50 [ 31.845454] __kasan_kmalloc+0xb7/0xc0 [ 31.845977] __kmalloc_cache_noprof+0x184/0x410 [ 31.846335] kasan_atomics+0x96/0x310 [ 31.846594] kunit_try_run_case+0x1b3/0x490 [ 31.847091] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.847856] kthread+0x257/0x310 [ 31.848301] ret_from_fork+0x41/0x80 [ 31.848725] ret_from_fork_asm+0x1a/0x30 [ 31.849034] [ 31.849264] The buggy address belongs to the object at ffff888102a59b80 [ 31.849264] which belongs to the cache kmalloc-64 of size 64 [ 31.850162] The buggy address is located 0 bytes to the right of [ 31.850162] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.851381] [ 31.851541] The buggy address belongs to the physical page: [ 31.851827] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.852706] flags: 0x200000000000000(node=0|zone=2) [ 31.853254] page_type: f5(slab) [ 31.853599] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.854488] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.854950] page dumped because: kasan: bad access detected [ 31.855264] [ 31.855411] Memory state around the buggy address: [ 31.855681] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.856359] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.857256] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.858103] ^ [ 31.858465] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.858973] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.859608] ================================================================== [ 29.830136] ================================================================== [ 29.830738] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 29.831286] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.831776] [ 29.831936] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.833089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.833465] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.834744] Call Trace: [ 29.834945] <TASK> [ 29.835153] dump_stack_lvl+0x73/0xb0 [ 29.836033] print_report+0xd1/0x640 [ 29.836426] ? __virt_addr_valid+0x1db/0x2d0 [ 29.837141] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.837450] kasan_report+0x102/0x140 [ 29.837876] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.838259] ? kasan_atomics_helper+0x4b8a/0x5450 [ 29.839259] __asan_report_load4_noabort+0x18/0x20 [ 29.839930] kasan_atomics_helper+0x4b8a/0x5450 [ 29.840378] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.840955] ? ret_from_fork_asm+0x1a/0x30 [ 29.841282] ? ret_from_fork+0x41/0x80 [ 29.841907] ? kthread+0x257/0x310 [ 29.842272] kasan_atomics+0x1dd/0x310 [ 29.842925] ? __pfx_kasan_atomics+0x10/0x10 [ 29.843445] ? __pfx_read_tsc+0x10/0x10 [ 29.844105] ? ktime_get_ts64+0x86/0x230 [ 29.844459] kunit_try_run_case+0x1b3/0x490 [ 29.844738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.845133] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.846047] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.846616] ? __kthread_parkme+0x82/0x160 [ 29.846868] ? preempt_count_sub+0x50/0x80 [ 29.847296] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.847767] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.848388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.849195] kthread+0x257/0x310 [ 29.849816] ? __pfx_kthread+0x10/0x10 [ 29.850249] ret_from_fork+0x41/0x80 [ 29.850769] ? __pfx_kthread+0x10/0x10 [ 29.851479] ret_from_fork_asm+0x1a/0x30 [ 29.851911] </TASK> [ 29.852141] [ 29.852280] Allocated by task 274: [ 29.852612] kasan_save_stack+0x3d/0x60 [ 29.853107] kasan_save_track+0x18/0x40 [ 29.853367] kasan_save_alloc_info+0x3b/0x50 [ 29.854266] __kasan_kmalloc+0xb7/0xc0 [ 29.854639] __kmalloc_cache_noprof+0x184/0x410 [ 29.855126] kasan_atomics+0x96/0x310 [ 29.855731] kunit_try_run_case+0x1b3/0x490 [ 29.856010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.856717] kthread+0x257/0x310 [ 29.857167] ret_from_fork+0x41/0x80 [ 29.857423] ret_from_fork_asm+0x1a/0x30 [ 29.858050] [ 29.858272] The buggy address belongs to the object at ffff888102a59b80 [ 29.858272] which belongs to the cache kmalloc-64 of size 64 [ 29.859023] The buggy address is located 0 bytes to the right of [ 29.859023] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 29.860528] [ 29.860742] The buggy address belongs to the physical page: [ 29.861346] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 29.862239] flags: 0x200000000000000(node=0|zone=2) [ 29.862915] page_type: f5(slab) [ 29.863215] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.864420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.864893] page dumped because: kasan: bad access detected [ 29.865309] [ 29.865478] Memory state around the buggy address: [ 29.865914] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.867083] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.867798] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.868746] ^ [ 29.869171] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.870102] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.870679] ================================================================== [ 30.549874] ================================================================== [ 30.550851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 30.551579] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.552097] [ 30.552345] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.553142] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.553551] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.554223] Call Trace: [ 30.554592] <TASK> [ 30.554930] dump_stack_lvl+0x73/0xb0 [ 30.555362] print_report+0xd1/0x640 [ 30.555835] ? __virt_addr_valid+0x1db/0x2d0 [ 30.556233] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.556839] kasan_report+0x102/0x140 [ 30.557168] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.557677] ? kasan_atomics_helper+0x4a86/0x5450 [ 30.558143] __asan_report_load4_noabort+0x18/0x20 [ 30.558695] kasan_atomics_helper+0x4a86/0x5450 [ 30.559076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.559631] ? ret_from_fork_asm+0x1a/0x30 [ 30.560034] ? ret_from_fork+0x41/0x80 [ 30.560355] ? kthread+0x257/0x310 [ 30.560810] kasan_atomics+0x1dd/0x310 [ 30.561207] ? __pfx_kasan_atomics+0x10/0x10 [ 30.561706] ? __pfx_read_tsc+0x10/0x10 [ 30.562098] ? ktime_get_ts64+0x86/0x230 [ 30.562415] kunit_try_run_case+0x1b3/0x490 [ 30.562880] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.563283] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.563749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.564153] ? __kthread_parkme+0x82/0x160 [ 30.564622] ? preempt_count_sub+0x50/0x80 [ 30.565114] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.565513] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.566137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.566737] kthread+0x257/0x310 [ 30.567050] ? __pfx_kthread+0x10/0x10 [ 30.567479] ret_from_fork+0x41/0x80 [ 30.567886] ? __pfx_kthread+0x10/0x10 [ 30.568292] ret_from_fork_asm+0x1a/0x30 [ 30.568740] </TASK> [ 30.569009] [ 30.569271] Allocated by task 274: [ 30.569618] kasan_save_stack+0x3d/0x60 [ 30.570011] kasan_save_track+0x18/0x40 [ 30.570284] kasan_save_alloc_info+0x3b/0x50 [ 30.570612] __kasan_kmalloc+0xb7/0xc0 [ 30.570869] __kmalloc_cache_noprof+0x184/0x410 [ 30.571260] kasan_atomics+0x96/0x310 [ 30.571721] kunit_try_run_case+0x1b3/0x490 [ 30.572167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.572715] kthread+0x257/0x310 [ 30.573085] ret_from_fork+0x41/0x80 [ 30.573544] ret_from_fork_asm+0x1a/0x30 [ 30.573952] [ 30.574203] The buggy address belongs to the object at ffff888102a59b80 [ 30.574203] which belongs to the cache kmalloc-64 of size 64 [ 30.575275] The buggy address is located 0 bytes to the right of [ 30.575275] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.576086] [ 30.576347] The buggy address belongs to the physical page: [ 30.576894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.577465] flags: 0x200000000000000(node=0|zone=2) [ 30.577916] page_type: f5(slab) [ 30.578274] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.578932] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.579413] page dumped because: kasan: bad access detected [ 30.579924] [ 30.580155] Memory state around the buggy address: [ 30.580573] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.581119] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.581708] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.582079] ^ [ 30.582363] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.582764] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.583157] ================================================================== [ 31.044889] ================================================================== [ 31.045601] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 31.046353] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.046840] [ 31.047025] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.047838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.048276] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.049074] Call Trace: [ 31.049377] <TASK> [ 31.049678] dump_stack_lvl+0x73/0xb0 [ 31.049981] print_report+0xd1/0x640 [ 31.050486] ? __virt_addr_valid+0x1db/0x2d0 [ 31.050945] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.051513] kasan_report+0x102/0x140 [ 31.051801] ? kasan_atomics_helper+0x12e7/0x5450 [ 31.052166] ? kasan_atomics_helper+0x12e7/0x5450 [ 31.052706] kasan_check_range+0x10c/0x1c0 [ 31.053188] __kasan_check_write+0x18/0x20 [ 31.053689] kasan_atomics_helper+0x12e7/0x5450 [ 31.054068] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.054636] ? ret_from_fork_asm+0x1a/0x30 [ 31.054929] ? ret_from_fork+0x41/0x80 [ 31.055219] ? kthread+0x257/0x310 [ 31.055622] kasan_atomics+0x1dd/0x310 [ 31.056024] ? __pfx_kasan_atomics+0x10/0x10 [ 31.056545] ? __pfx_read_tsc+0x10/0x10 [ 31.056950] ? ktime_get_ts64+0x86/0x230 [ 31.057381] kunit_try_run_case+0x1b3/0x490 [ 31.057905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.058359] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.058799] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.059175] ? __kthread_parkme+0x82/0x160 [ 31.059491] ? preempt_count_sub+0x50/0x80 [ 31.059820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.060324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.060932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.061531] kthread+0x257/0x310 [ 31.061910] ? __pfx_kthread+0x10/0x10 [ 31.062331] ret_from_fork+0x41/0x80 [ 31.062799] ? __pfx_kthread+0x10/0x10 [ 31.063168] ret_from_fork_asm+0x1a/0x30 [ 31.063619] </TASK> [ 31.063931] [ 31.064163] Allocated by task 274: [ 31.064564] kasan_save_stack+0x3d/0x60 [ 31.064926] kasan_save_track+0x18/0x40 [ 31.065296] kasan_save_alloc_info+0x3b/0x50 [ 31.065759] __kasan_kmalloc+0xb7/0xc0 [ 31.066171] __kmalloc_cache_noprof+0x184/0x410 [ 31.066662] kasan_atomics+0x96/0x310 [ 31.067003] kunit_try_run_case+0x1b3/0x490 [ 31.067295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.067657] kthread+0x257/0x310 [ 31.067893] ret_from_fork+0x41/0x80 [ 31.068332] ret_from_fork_asm+0x1a/0x30 [ 31.068791] [ 31.069005] The buggy address belongs to the object at ffff888102a59b80 [ 31.069005] which belongs to the cache kmalloc-64 of size 64 [ 31.070039] The buggy address is located 0 bytes to the right of [ 31.070039] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.070922] [ 31.071108] The buggy address belongs to the physical page: [ 31.071655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.072123] flags: 0x200000000000000(node=0|zone=2) [ 31.072660] page_type: f5(slab) [ 31.073047] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.073526] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.073896] page dumped because: kasan: bad access detected [ 31.074202] [ 31.074349] Memory state around the buggy address: [ 31.074786] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.075408] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.076113] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.076754] ^ [ 31.077256] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.078764] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.080125] ================================================================== [ 30.854492] ================================================================== [ 30.855438] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 30.855846] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.856432] [ 30.857082] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.857987] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.858274] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.858910] Call Trace: [ 30.859278] <TASK> [ 30.859585] dump_stack_lvl+0x73/0xb0 [ 30.860018] print_report+0xd1/0x640 [ 30.860332] ? __virt_addr_valid+0x1db/0x2d0 [ 30.860687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.861324] kasan_report+0x102/0x140 [ 30.861736] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.862095] ? kasan_atomics_helper+0x4a1e/0x5450 [ 30.862543] __asan_report_load4_noabort+0x18/0x20 [ 30.863008] kasan_atomics_helper+0x4a1e/0x5450 [ 30.863423] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.863882] ? ret_from_fork_asm+0x1a/0x30 [ 30.864186] ? ret_from_fork+0x41/0x80 [ 30.864587] ? kthread+0x257/0x310 [ 30.865031] kasan_atomics+0x1dd/0x310 [ 30.865441] ? __pfx_kasan_atomics+0x10/0x10 [ 30.865900] ? __pfx_read_tsc+0x10/0x10 [ 30.866324] ? ktime_get_ts64+0x86/0x230 [ 30.866687] kunit_try_run_case+0x1b3/0x490 [ 30.867162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.867495] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.867959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.868289] ? __kthread_parkme+0x82/0x160 [ 30.868596] ? preempt_count_sub+0x50/0x80 [ 30.869010] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.869532] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.870243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.870851] kthread+0x257/0x310 [ 30.871187] ? __pfx_kthread+0x10/0x10 [ 30.871588] ret_from_fork+0x41/0x80 [ 30.871852] ? __pfx_kthread+0x10/0x10 [ 30.872154] ret_from_fork_asm+0x1a/0x30 [ 30.872598] </TASK> [ 30.872950] [ 30.873176] Allocated by task 274: [ 30.873527] kasan_save_stack+0x3d/0x60 [ 30.873922] kasan_save_track+0x18/0x40 [ 30.874327] kasan_save_alloc_info+0x3b/0x50 [ 30.874631] __kasan_kmalloc+0xb7/0xc0 [ 30.875099] __kmalloc_cache_noprof+0x184/0x410 [ 30.875437] kasan_atomics+0x96/0x310 [ 30.875798] kunit_try_run_case+0x1b3/0x490 [ 30.876094] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.876443] kthread+0x257/0x310 [ 30.876811] ret_from_fork+0x41/0x80 [ 30.877208] ret_from_fork_asm+0x1a/0x30 [ 30.877668] [ 30.877862] The buggy address belongs to the object at ffff888102a59b80 [ 30.877862] which belongs to the cache kmalloc-64 of size 64 [ 30.878985] The buggy address is located 0 bytes to the right of [ 30.878985] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.879747] [ 30.879903] The buggy address belongs to the physical page: [ 30.880203] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.880604] flags: 0x200000000000000(node=0|zone=2) [ 30.880901] page_type: f5(slab) [ 30.881166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.881927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.882651] page dumped because: kasan: bad access detected [ 30.883163] [ 30.883370] Memory state around the buggy address: [ 30.884002] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.884517] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.885105] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.885462] ^ [ 30.885903] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.886538] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.887118] ================================================================== [ 29.744463] ================================================================== [ 29.745725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 29.746293] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.747435] [ 29.748237] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.748877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.749266] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.749864] Call Trace: [ 29.750672] <TASK> [ 29.750862] dump_stack_lvl+0x73/0xb0 [ 29.751319] print_report+0xd1/0x640 [ 29.752169] ? __virt_addr_valid+0x1db/0x2d0 [ 29.752529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.753297] kasan_report+0x102/0x140 [ 29.754018] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.754435] ? kasan_atomics_helper+0x4bbe/0x5450 [ 29.755226] __asan_report_load4_noabort+0x18/0x20 [ 29.755937] kasan_atomics_helper+0x4bbe/0x5450 [ 29.756303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.756917] ? ret_from_fork_asm+0x1a/0x30 [ 29.757527] ? ret_from_fork+0x41/0x80 [ 29.757852] ? kthread+0x257/0x310 [ 29.758198] kasan_atomics+0x1dd/0x310 [ 29.759019] ? __pfx_kasan_atomics+0x10/0x10 [ 29.759401] ? __pfx_read_tsc+0x10/0x10 [ 29.760047] ? ktime_get_ts64+0x86/0x230 [ 29.760721] kunit_try_run_case+0x1b3/0x490 [ 29.761098] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.762116] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.762492] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.763516] ? __kthread_parkme+0x82/0x160 [ 29.763865] ? preempt_count_sub+0x50/0x80 [ 29.764266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.764944] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.765450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.766407] kthread+0x257/0x310 [ 29.767035] ? __pfx_kthread+0x10/0x10 [ 29.767424] ret_from_fork+0x41/0x80 [ 29.767707] ? __pfx_kthread+0x10/0x10 [ 29.768028] ret_from_fork_asm+0x1a/0x30 [ 29.768472] </TASK> [ 29.769258] [ 29.769393] Allocated by task 274: [ 29.769652] kasan_save_stack+0x3d/0x60 [ 29.770103] kasan_save_track+0x18/0x40 [ 29.771193] kasan_save_alloc_info+0x3b/0x50 [ 29.771532] __kasan_kmalloc+0xb7/0xc0 [ 29.771693] __kmalloc_cache_noprof+0x184/0x410 [ 29.771854] kasan_atomics+0x96/0x310 [ 29.771991] kunit_try_run_case+0x1b3/0x490 [ 29.772224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.772652] kthread+0x257/0x310 [ 29.773024] ret_from_fork+0x41/0x80 [ 29.773951] ret_from_fork_asm+0x1a/0x30 [ 29.774754] [ 29.774986] The buggy address belongs to the object at ffff888102a59b80 [ 29.774986] which belongs to the cache kmalloc-64 of size 64 [ 29.775999] The buggy address is located 0 bytes to the right of [ 29.775999] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 29.776879] [ 29.777079] The buggy address belongs to the physical page: [ 29.777806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 29.778420] flags: 0x200000000000000(node=0|zone=2) [ 29.778904] page_type: f5(slab) [ 29.779269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.779969] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.780548] page dumped because: kasan: bad access detected [ 29.780947] [ 29.781198] Memory state around the buggy address: [ 29.781607] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.782256] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.782876] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.783316] ^ [ 29.783822] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784526] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784887] ================================================================== [ 31.560857] ================================================================== [ 31.561394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 31.562773] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.563539] [ 31.563746] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.565023] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.565377] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.566292] Call Trace: [ 31.566600] <TASK> [ 31.566799] dump_stack_lvl+0x73/0xb0 [ 31.567419] print_report+0xd1/0x640 [ 31.567942] ? __virt_addr_valid+0x1db/0x2d0 [ 31.568503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.568954] kasan_report+0x102/0x140 [ 31.569419] ? kasan_atomics_helper+0x194b/0x5450 [ 31.569980] ? kasan_atomics_helper+0x194b/0x5450 [ 31.570667] kasan_check_range+0x10c/0x1c0 [ 31.571086] __kasan_check_write+0x18/0x20 [ 31.571527] kasan_atomics_helper+0x194b/0x5450 [ 31.571993] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.572529] ? ret_from_fork_asm+0x1a/0x30 [ 31.572844] ? ret_from_fork+0x41/0x80 [ 31.573342] ? kthread+0x257/0x310 [ 31.573845] kasan_atomics+0x1dd/0x310 [ 31.574377] ? __pfx_kasan_atomics+0x10/0x10 [ 31.575173] ? __pfx_read_tsc+0x10/0x10 [ 31.575703] ? ktime_get_ts64+0x86/0x230 [ 31.576248] kunit_try_run_case+0x1b3/0x490 [ 31.576717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.577228] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.577965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.578406] ? __kthread_parkme+0x82/0x160 [ 31.578597] ? preempt_count_sub+0x50/0x80 [ 31.578756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.578920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.579219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.579839] kthread+0x257/0x310 [ 31.580318] ? __pfx_kthread+0x10/0x10 [ 31.580714] ret_from_fork+0x41/0x80 [ 31.581070] ? __pfx_kthread+0x10/0x10 [ 31.581519] ret_from_fork_asm+0x1a/0x30 [ 31.582185] </TASK> [ 31.582478] [ 31.582735] Allocated by task 274: [ 31.583135] kasan_save_stack+0x3d/0x60 [ 31.583507] kasan_save_track+0x18/0x40 [ 31.583982] kasan_save_alloc_info+0x3b/0x50 [ 31.584370] __kasan_kmalloc+0xb7/0xc0 [ 31.584764] __kmalloc_cache_noprof+0x184/0x410 [ 31.585275] kasan_atomics+0x96/0x310 [ 31.585888] kunit_try_run_case+0x1b3/0x490 [ 31.586336] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.587041] kthread+0x257/0x310 [ 31.587302] ret_from_fork+0x41/0x80 [ 31.587786] ret_from_fork_asm+0x1a/0x30 [ 31.588234] [ 31.588520] The buggy address belongs to the object at ffff888102a59b80 [ 31.588520] which belongs to the cache kmalloc-64 of size 64 [ 31.589377] The buggy address is located 0 bytes to the right of [ 31.589377] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.590755] [ 31.591045] The buggy address belongs to the physical page: [ 31.591529] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.592204] flags: 0x200000000000000(node=0|zone=2) [ 31.592774] page_type: f5(slab) [ 31.593120] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.593799] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.594448] page dumped because: kasan: bad access detected [ 31.595023] [ 31.596102] Memory state around the buggy address: [ 31.596406] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.596776] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.597516] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.598323] ^ [ 31.598890] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.599335] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.599879] ================================================================== [ 31.900724] ================================================================== [ 31.901176] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 31.902071] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.902464] [ 31.902679] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.903635] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.903884] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.904524] Call Trace: [ 31.904761] <TASK> [ 31.905018] dump_stack_lvl+0x73/0xb0 [ 31.905431] print_report+0xd1/0x640 [ 31.905960] ? __virt_addr_valid+0x1db/0x2d0 [ 31.906413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.906875] kasan_report+0x102/0x140 [ 31.907171] ? kasan_atomics_helper+0x1e13/0x5450 [ 31.907474] ? kasan_atomics_helper+0x1e13/0x5450 [ 31.908013] kasan_check_range+0x10c/0x1c0 [ 31.908666] __kasan_check_write+0x18/0x20 [ 31.909113] kasan_atomics_helper+0x1e13/0x5450 [ 31.909604] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.910072] ? ret_from_fork_asm+0x1a/0x30 [ 31.910367] ? ret_from_fork+0x41/0x80 [ 31.910628] ? kthread+0x257/0x310 [ 31.910882] kasan_atomics+0x1dd/0x310 [ 31.911329] ? __pfx_kasan_atomics+0x10/0x10 [ 31.911944] ? __pfx_read_tsc+0x10/0x10 [ 31.912435] ? ktime_get_ts64+0x86/0x230 [ 31.912894] kunit_try_run_case+0x1b3/0x490 [ 31.913356] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.913699] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.914011] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.914555] ? __kthread_parkme+0x82/0x160 [ 31.914936] ? preempt_count_sub+0x50/0x80 [ 31.915611] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.916085] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.916667] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.917001] kthread+0x257/0x310 [ 31.917273] ? __pfx_kthread+0x10/0x10 [ 31.917580] ret_from_fork+0x41/0x80 [ 31.917982] ? __pfx_kthread+0x10/0x10 [ 31.918429] ret_from_fork_asm+0x1a/0x30 [ 31.919137] </TASK> [ 31.919440] [ 31.919665] Allocated by task 274: [ 31.919948] kasan_save_stack+0x3d/0x60 [ 31.920369] kasan_save_track+0x18/0x40 [ 31.920810] kasan_save_alloc_info+0x3b/0x50 [ 31.922139] __kasan_kmalloc+0xb7/0xc0 [ 31.922412] __kmalloc_cache_noprof+0x184/0x410 [ 31.922723] kasan_atomics+0x96/0x310 [ 31.922979] kunit_try_run_case+0x1b3/0x490 [ 31.924275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.924942] kthread+0x257/0x310 [ 31.925355] ret_from_fork+0x41/0x80 [ 31.925809] ret_from_fork_asm+0x1a/0x30 [ 31.926294] [ 31.926656] The buggy address belongs to the object at ffff888102a59b80 [ 31.926656] which belongs to the cache kmalloc-64 of size 64 [ 31.928005] The buggy address is located 0 bytes to the right of [ 31.928005] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.929276] [ 31.929563] The buggy address belongs to the physical page: [ 31.929884] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.930767] flags: 0x200000000000000(node=0|zone=2) [ 31.931330] page_type: f5(slab) [ 31.931761] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.932367] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.933189] page dumped because: kasan: bad access detected [ 31.933815] [ 31.934284] Memory state around the buggy address: [ 31.934820] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.935550] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.936026] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.936505] ^ [ 31.936798] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.937419] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.938145] ================================================================== [ 30.775383] ================================================================== [ 30.776111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 30.776717] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.777354] [ 30.777644] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.778338] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.778812] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.779398] Call Trace: [ 30.779776] <TASK> [ 30.780041] dump_stack_lvl+0x73/0xb0 [ 30.780520] print_report+0xd1/0x640 [ 30.780906] ? __virt_addr_valid+0x1db/0x2d0 [ 30.781419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.781925] kasan_report+0x102/0x140 [ 30.782373] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.782781] ? kasan_atomics_helper+0x4a38/0x5450 [ 30.783227] __asan_report_load4_noabort+0x18/0x20 [ 30.783766] kasan_atomics_helper+0x4a38/0x5450 [ 30.784241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.784758] ? ret_from_fork_asm+0x1a/0x30 [ 30.785230] ? ret_from_fork+0x41/0x80 [ 30.785659] ? kthread+0x257/0x310 [ 30.786019] kasan_atomics+0x1dd/0x310 [ 30.786473] ? __pfx_kasan_atomics+0x10/0x10 [ 30.786891] ? __pfx_read_tsc+0x10/0x10 [ 30.787271] ? ktime_get_ts64+0x86/0x230 [ 30.787755] kunit_try_run_case+0x1b3/0x490 [ 30.788233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.788710] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.789132] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.789712] ? __kthread_parkme+0x82/0x160 [ 30.790172] ? preempt_count_sub+0x50/0x80 [ 30.790709] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.791047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.791407] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.792044] kthread+0x257/0x310 [ 30.792523] ? __pfx_kthread+0x10/0x10 [ 30.792994] ret_from_fork+0x41/0x80 [ 30.793480] ? __pfx_kthread+0x10/0x10 [ 30.793918] ret_from_fork_asm+0x1a/0x30 [ 30.794425] </TASK> [ 30.794841] [ 30.795113] Allocated by task 274: [ 30.795580] kasan_save_stack+0x3d/0x60 [ 30.796085] kasan_save_track+0x18/0x40 [ 30.796576] kasan_save_alloc_info+0x3b/0x50 [ 30.797094] __kasan_kmalloc+0xb7/0xc0 [ 30.797649] __kmalloc_cache_noprof+0x184/0x410 [ 30.798188] kasan_atomics+0x96/0x310 [ 30.798557] kunit_try_run_case+0x1b3/0x490 [ 30.799076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.799630] kthread+0x257/0x310 [ 30.799787] ret_from_fork+0x41/0x80 [ 30.799925] ret_from_fork_asm+0x1a/0x30 [ 30.800090] [ 30.800175] The buggy address belongs to the object at ffff888102a59b80 [ 30.800175] which belongs to the cache kmalloc-64 of size 64 [ 30.800592] The buggy address is located 0 bytes to the right of [ 30.800592] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.801159] [ 30.801987] The buggy address belongs to the physical page: [ 30.802812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.803835] flags: 0x200000000000000(node=0|zone=2) [ 30.804394] page_type: f5(slab) [ 30.804815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.805581] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.806308] page dumped because: kasan: bad access detected [ 30.806764] [ 30.806975] Memory state around the buggy address: [ 30.807507] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.808189] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.808908] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.809606] ^ [ 30.809887] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.810495] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.810851] ================================================================== [ 29.787457] ================================================================== [ 29.788100] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 29.788733] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.789387] [ 29.789626] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.790870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.791291] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.792227] Call Trace: [ 29.792688] <TASK> [ 29.793080] dump_stack_lvl+0x73/0xb0 [ 29.793500] print_report+0xd1/0x640 [ 29.793842] ? __virt_addr_valid+0x1db/0x2d0 [ 29.794550] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.795094] kasan_report+0x102/0x140 [ 29.795408] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.795770] ? kasan_atomics_helper+0x4ba4/0x5450 [ 29.796263] __asan_report_store4_noabort+0x1b/0x30 [ 29.796783] kasan_atomics_helper+0x4ba4/0x5450 [ 29.797258] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.797695] ? ret_from_fork_asm+0x1a/0x30 [ 29.798562] ? ret_from_fork+0x41/0x80 [ 29.798859] ? kthread+0x257/0x310 [ 29.799134] kasan_atomics+0x1dd/0x310 [ 29.800004] ? __pfx_kasan_atomics+0x10/0x10 [ 29.800567] ? __pfx_read_tsc+0x10/0x10 [ 29.801131] ? ktime_get_ts64+0x86/0x230 [ 29.801630] kunit_try_run_case+0x1b3/0x490 [ 29.801981] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.802504] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.802892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.803490] ? __kthread_parkme+0x82/0x160 [ 29.803814] ? preempt_count_sub+0x50/0x80 [ 29.804258] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.804879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.805678] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.806331] kthread+0x257/0x310 [ 29.806695] ? __pfx_kthread+0x10/0x10 [ 29.807380] ret_from_fork+0x41/0x80 [ 29.807947] ? __pfx_kthread+0x10/0x10 [ 29.808451] ret_from_fork_asm+0x1a/0x30 [ 29.809089] </TASK> [ 29.809518] [ 29.809935] Allocated by task 274: [ 29.810192] kasan_save_stack+0x3d/0x60 [ 29.810613] kasan_save_track+0x18/0x40 [ 29.810971] kasan_save_alloc_info+0x3b/0x50 [ 29.811838] __kasan_kmalloc+0xb7/0xc0 [ 29.812362] __kmalloc_cache_noprof+0x184/0x410 [ 29.813241] kasan_atomics+0x96/0x310 [ 29.813756] kunit_try_run_case+0x1b3/0x490 [ 29.814034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.814880] kthread+0x257/0x310 [ 29.815161] ret_from_fork+0x41/0x80 [ 29.815932] ret_from_fork_asm+0x1a/0x30 [ 29.816292] [ 29.816482] The buggy address belongs to the object at ffff888102a59b80 [ 29.816482] which belongs to the cache kmalloc-64 of size 64 [ 29.817678] The buggy address is located 0 bytes to the right of [ 29.817678] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 29.818921] [ 29.819193] The buggy address belongs to the physical page: [ 29.819703] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 29.821129] flags: 0x200000000000000(node=0|zone=2) [ 29.821520] page_type: f5(slab) [ 29.821823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.822644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.823229] page dumped because: kasan: bad access detected [ 29.823403] [ 29.823546] Memory state around the buggy address: [ 29.823837] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.824461] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.825157] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.825772] ^ [ 29.826438] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.826974] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.827550] ================================================================== [ 31.518780] ================================================================== [ 31.519620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 31.520260] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.520939] [ 31.521216] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.522275] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.522818] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.523700] Call Trace: [ 31.523947] <TASK> [ 31.524255] dump_stack_lvl+0x73/0xb0 [ 31.524829] print_report+0xd1/0x640 [ 31.525293] ? __virt_addr_valid+0x1db/0x2d0 [ 31.525883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.526534] kasan_report+0x102/0x140 [ 31.527067] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.527632] ? kasan_atomics_helper+0x18b2/0x5450 [ 31.528046] kasan_check_range+0x10c/0x1c0 [ 31.528609] __kasan_check_write+0x18/0x20 [ 31.528866] kasan_atomics_helper+0x18b2/0x5450 [ 31.529373] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.529875] ? ret_from_fork_asm+0x1a/0x30 [ 31.530367] ? ret_from_fork+0x41/0x80 [ 31.530746] ? kthread+0x257/0x310 [ 31.531187] kasan_atomics+0x1dd/0x310 [ 31.531677] ? __pfx_kasan_atomics+0x10/0x10 [ 31.532022] ? __pfx_read_tsc+0x10/0x10 [ 31.532492] ? ktime_get_ts64+0x86/0x230 [ 31.532913] kunit_try_run_case+0x1b3/0x490 [ 31.533353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.533828] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.534231] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.534740] ? __kthread_parkme+0x82/0x160 [ 31.535129] ? preempt_count_sub+0x50/0x80 [ 31.535637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.536003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.536615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.537075] kthread+0x257/0x310 [ 31.537337] ? __pfx_kthread+0x10/0x10 [ 31.537802] ret_from_fork+0x41/0x80 [ 31.538221] ? __pfx_kthread+0x10/0x10 [ 31.538733] ret_from_fork_asm+0x1a/0x30 [ 31.539201] </TASK> [ 31.539488] [ 31.539645] Allocated by task 274: [ 31.539869] kasan_save_stack+0x3d/0x60 [ 31.540189] kasan_save_track+0x18/0x40 [ 31.540696] kasan_save_alloc_info+0x3b/0x50 [ 31.541201] __kasan_kmalloc+0xb7/0xc0 [ 31.541629] __kmalloc_cache_noprof+0x184/0x410 [ 31.542132] kasan_atomics+0x96/0x310 [ 31.542563] kunit_try_run_case+0x1b3/0x490 [ 31.542927] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.543913] kthread+0x257/0x310 [ 31.544289] ret_from_fork+0x41/0x80 [ 31.545713] ret_from_fork_asm+0x1a/0x30 [ 31.546021] [ 31.546284] The buggy address belongs to the object at ffff888102a59b80 [ 31.546284] which belongs to the cache kmalloc-64 of size 64 [ 31.547700] The buggy address is located 0 bytes to the right of [ 31.547700] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.549036] [ 31.549314] The buggy address belongs to the physical page: [ 31.550259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.551232] flags: 0x200000000000000(node=0|zone=2) [ 31.551615] page_type: f5(slab) [ 31.552088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.553176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.553618] page dumped because: kasan: bad access detected [ 31.554426] [ 31.554628] Memory state around the buggy address: [ 31.554900] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.555462] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.556032] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.557040] ^ [ 31.557674] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.558247] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.559071] ================================================================== [ 30.428831] ================================================================== [ 30.430156] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 30.430929] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.431528] [ 30.431734] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.432599] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.432977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.433789] Call Trace: [ 30.434004] <TASK> [ 30.434961] dump_stack_lvl+0x73/0xb0 [ 30.435237] print_report+0xd1/0x640 [ 30.435897] ? __virt_addr_valid+0x1db/0x2d0 [ 30.436472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.437120] kasan_report+0x102/0x140 [ 30.437721] ? kasan_atomics_helper+0xac8/0x5450 [ 30.438222] ? kasan_atomics_helper+0xac8/0x5450 [ 30.438413] kasan_check_range+0x10c/0x1c0 [ 30.439036] __kasan_check_write+0x18/0x20 [ 30.439523] kasan_atomics_helper+0xac8/0x5450 [ 30.439937] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.440376] ? ret_from_fork_asm+0x1a/0x30 [ 30.440764] ? ret_from_fork+0x41/0x80 [ 30.441710] ? kthread+0x257/0x310 [ 30.441992] kasan_atomics+0x1dd/0x310 [ 30.442310] ? __pfx_kasan_atomics+0x10/0x10 [ 30.442923] ? __pfx_read_tsc+0x10/0x10 [ 30.443800] ? ktime_get_ts64+0x86/0x230 [ 30.444156] kunit_try_run_case+0x1b3/0x490 [ 30.444770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.445176] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.445573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.446377] ? __kthread_parkme+0x82/0x160 [ 30.447082] ? preempt_count_sub+0x50/0x80 [ 30.447739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.448129] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.449265] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.449985] kthread+0x257/0x310 [ 30.450313] ? __pfx_kthread+0x10/0x10 [ 30.450821] ret_from_fork+0x41/0x80 [ 30.451216] ? __pfx_kthread+0x10/0x10 [ 30.452030] ret_from_fork_asm+0x1a/0x30 [ 30.452395] </TASK> [ 30.452630] [ 30.453064] Allocated by task 274: [ 30.453412] kasan_save_stack+0x3d/0x60 [ 30.454259] kasan_save_track+0x18/0x40 [ 30.454845] kasan_save_alloc_info+0x3b/0x50 [ 30.455486] __kasan_kmalloc+0xb7/0xc0 [ 30.456098] __kmalloc_cache_noprof+0x184/0x410 [ 30.456751] kasan_atomics+0x96/0x310 [ 30.457084] kunit_try_run_case+0x1b3/0x490 [ 30.457406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.458423] kthread+0x257/0x310 [ 30.458786] ret_from_fork+0x41/0x80 [ 30.459129] ret_from_fork_asm+0x1a/0x30 [ 30.459521] [ 30.459696] The buggy address belongs to the object at ffff888102a59b80 [ 30.459696] which belongs to the cache kmalloc-64 of size 64 [ 30.460532] The buggy address is located 0 bytes to the right of [ 30.460532] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.461558] [ 30.461722] The buggy address belongs to the physical page: [ 30.462027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.462908] flags: 0x200000000000000(node=0|zone=2) [ 30.463501] page_type: f5(slab) [ 30.463904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.464772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.465376] page dumped because: kasan: bad access detected [ 30.465713] [ 30.465991] Memory state around the buggy address: [ 30.466537] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.467216] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.467867] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.468515] ^ [ 30.468976] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.469567] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.470249] ================================================================== [ 32.011381] ================================================================== [ 32.012851] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 32.013710] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.014216] [ 32.014399] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.015071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.015503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.016229] Call Trace: [ 32.016583] <TASK> [ 32.016820] dump_stack_lvl+0x73/0xb0 [ 32.017136] print_report+0xd1/0x640 [ 32.017408] ? __virt_addr_valid+0x1db/0x2d0 [ 32.017759] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.018114] kasan_report+0x102/0x140 [ 32.018548] ? kasan_atomics_helper+0x4f73/0x5450 [ 32.019019] ? kasan_atomics_helper+0x4f73/0x5450 [ 32.019555] __asan_report_load8_noabort+0x18/0x20 [ 32.020040] kasan_atomics_helper+0x4f73/0x5450 [ 32.020569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.021036] ? ret_from_fork_asm+0x1a/0x30 [ 32.021517] ? ret_from_fork+0x41/0x80 [ 32.021922] ? kthread+0x257/0x310 [ 32.022309] kasan_atomics+0x1dd/0x310 [ 32.022766] ? __pfx_kasan_atomics+0x10/0x10 [ 32.023193] ? __pfx_read_tsc+0x10/0x10 [ 32.023620] ? ktime_get_ts64+0x86/0x230 [ 32.024036] kunit_try_run_case+0x1b3/0x490 [ 32.024386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.024914] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.025341] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.025856] ? __kthread_parkme+0x82/0x160 [ 32.026285] ? preempt_count_sub+0x50/0x80 [ 32.026623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.027102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.027591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.027982] kthread+0x257/0x310 [ 32.028371] ? __pfx_kthread+0x10/0x10 [ 32.028806] ret_from_fork+0x41/0x80 [ 32.029137] ? __pfx_kthread+0x10/0x10 [ 32.029405] ret_from_fork_asm+0x1a/0x30 [ 32.029744] </TASK> [ 32.029998] [ 32.030218] Allocated by task 274: [ 32.030589] kasan_save_stack+0x3d/0x60 [ 32.030987] kasan_save_track+0x18/0x40 [ 32.031400] kasan_save_alloc_info+0x3b/0x50 [ 32.031858] __kasan_kmalloc+0xb7/0xc0 [ 32.032228] __kmalloc_cache_noprof+0x184/0x410 [ 32.032669] kasan_atomics+0x96/0x310 [ 32.032956] kunit_try_run_case+0x1b3/0x490 [ 32.033400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.033813] kthread+0x257/0x310 [ 32.034171] ret_from_fork+0x41/0x80 [ 32.034543] ret_from_fork_asm+0x1a/0x30 [ 32.034876] [ 32.035030] The buggy address belongs to the object at ffff888102a59b80 [ 32.035030] which belongs to the cache kmalloc-64 of size 64 [ 32.035637] The buggy address is located 0 bytes to the right of [ 32.035637] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.036317] [ 32.036567] The buggy address belongs to the physical page: [ 32.037075] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.037758] flags: 0x200000000000000(node=0|zone=2) [ 32.038237] page_type: f5(slab) [ 32.038590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.039268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.039940] page dumped because: kasan: bad access detected [ 32.040377] [ 32.040626] Memory state around the buggy address: [ 32.040964] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.041537] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.042038] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.042411] ^ [ 32.042738] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.043106] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.043754] ================================================================== [ 30.472256] ================================================================== [ 30.472939] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 30.474471] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.475037] [ 30.475294] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.476393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.476840] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.477494] Call Trace: [ 30.477864] <TASK> [ 30.478212] dump_stack_lvl+0x73/0xb0 [ 30.478627] print_report+0xd1/0x640 [ 30.479089] ? __virt_addr_valid+0x1db/0x2d0 [ 30.479648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.480225] kasan_report+0x102/0x140 [ 30.480717] ? kasan_atomics_helper+0xb6b/0x5450 [ 30.481237] ? kasan_atomics_helper+0xb6b/0x5450 [ 30.481782] kasan_check_range+0x10c/0x1c0 [ 30.482273] __kasan_check_write+0x18/0x20 [ 30.482760] kasan_atomics_helper+0xb6b/0x5450 [ 30.483306] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.483727] ? ret_from_fork_asm+0x1a/0x30 [ 30.484260] ? ret_from_fork+0x41/0x80 [ 30.484733] ? kthread+0x257/0x310 [ 30.485204] kasan_atomics+0x1dd/0x310 [ 30.485703] ? __pfx_kasan_atomics+0x10/0x10 [ 30.486212] ? __pfx_read_tsc+0x10/0x10 [ 30.486662] ? ktime_get_ts64+0x86/0x230 [ 30.487107] kunit_try_run_case+0x1b3/0x490 [ 30.487610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.488141] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.488623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.489189] ? __kthread_parkme+0x82/0x160 [ 30.489676] ? preempt_count_sub+0x50/0x80 [ 30.490130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.490678] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.491242] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.491853] kthread+0x257/0x310 [ 30.492270] ? __pfx_kthread+0x10/0x10 [ 30.492736] ret_from_fork+0x41/0x80 [ 30.492999] ? __pfx_kthread+0x10/0x10 [ 30.493276] ret_from_fork_asm+0x1a/0x30 [ 30.493730] </TASK> [ 30.494007] [ 30.494329] Allocated by task 274: [ 30.494817] kasan_save_stack+0x3d/0x60 [ 30.495272] kasan_save_track+0x18/0x40 [ 30.495756] kasan_save_alloc_info+0x3b/0x50 [ 30.496212] __kasan_kmalloc+0xb7/0xc0 [ 30.496527] __kmalloc_cache_noprof+0x184/0x410 [ 30.496819] kasan_atomics+0x96/0x310 [ 30.497288] kunit_try_run_case+0x1b3/0x490 [ 30.497875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.498541] kthread+0x257/0x310 [ 30.498929] ret_from_fork+0x41/0x80 [ 30.499385] ret_from_fork_asm+0x1a/0x30 [ 30.499833] [ 30.500130] The buggy address belongs to the object at ffff888102a59b80 [ 30.500130] which belongs to the cache kmalloc-64 of size 64 [ 30.501122] The buggy address is located 0 bytes to the right of [ 30.501122] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.501747] [ 30.502037] The buggy address belongs to the physical page: [ 30.502708] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.503485] flags: 0x200000000000000(node=0|zone=2) [ 30.504020] page_type: f5(slab) [ 30.504432] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.505190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.505703] page dumped because: kasan: bad access detected [ 30.506265] [ 30.506576] Memory state around the buggy address: [ 30.507018] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.507677] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.508217] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.508911] ^ [ 30.509336] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.510010] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.510621] ================================================================== [ 29.949451] ================================================================== [ 29.950138] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 29.952086] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.952869] [ 29.953128] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.954017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.954367] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.954999] Call Trace: [ 29.955223] <TASK> [ 29.955412] dump_stack_lvl+0x73/0xb0 [ 29.955864] print_report+0xd1/0x640 [ 29.956323] ? __virt_addr_valid+0x1db/0x2d0 [ 29.956796] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.957407] kasan_report+0x102/0x140 [ 29.957887] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.958412] ? kasan_atomics_helper+0x4b56/0x5450 [ 29.958782] __asan_report_load4_noabort+0x18/0x20 [ 29.959301] kasan_atomics_helper+0x4b56/0x5450 [ 29.959687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.960283] ? ret_from_fork_asm+0x1a/0x30 [ 29.960613] ? ret_from_fork+0x41/0x80 [ 29.961028] ? kthread+0x257/0x310 [ 29.961402] kasan_atomics+0x1dd/0x310 [ 29.961857] ? __pfx_kasan_atomics+0x10/0x10 [ 29.962217] ? __pfx_read_tsc+0x10/0x10 [ 29.962725] ? ktime_get_ts64+0x86/0x230 [ 29.963009] kunit_try_run_case+0x1b3/0x490 [ 29.963322] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.963617] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.963911] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.964379] ? __kthread_parkme+0x82/0x160 [ 29.964764] ? preempt_count_sub+0x50/0x80 [ 29.965214] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.965893] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.966482] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.967002] kthread+0x257/0x310 [ 29.967380] ? __pfx_kthread+0x10/0x10 [ 29.967830] ret_from_fork+0x41/0x80 [ 29.968271] ? __pfx_kthread+0x10/0x10 [ 29.968868] ret_from_fork_asm+0x1a/0x30 [ 29.969190] </TASK> [ 29.969370] [ 29.969593] Allocated by task 274: [ 29.969968] kasan_save_stack+0x3d/0x60 [ 29.970428] kasan_save_track+0x18/0x40 [ 29.970858] kasan_save_alloc_info+0x3b/0x50 [ 29.971200] __kasan_kmalloc+0xb7/0xc0 [ 29.971637] __kmalloc_cache_noprof+0x184/0x410 [ 29.972137] kasan_atomics+0x96/0x310 [ 29.972429] kunit_try_run_case+0x1b3/0x490 [ 29.972879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.973266] kthread+0x257/0x310 [ 29.973737] ret_from_fork+0x41/0x80 [ 29.974080] ret_from_fork_asm+0x1a/0x30 [ 29.974437] [ 29.974653] The buggy address belongs to the object at ffff888102a59b80 [ 29.974653] which belongs to the cache kmalloc-64 of size 64 [ 29.975438] The buggy address is located 0 bytes to the right of [ 29.975438] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 29.976254] [ 29.976511] The buggy address belongs to the physical page: [ 29.976930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 29.977605] flags: 0x200000000000000(node=0|zone=2) [ 29.978014] page_type: f5(slab) [ 29.978375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.978857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.979545] page dumped because: kasan: bad access detected [ 29.979881] [ 29.980129] Memory state around the buggy address: [ 29.980555] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.980992] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.981372] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.981717] ^ [ 29.981989] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.982729] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.983349] ================================================================== [ 30.267619] ================================================================== [ 30.268129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 30.268654] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.269136] [ 30.269391] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.270249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.270770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.271528] Call Trace: [ 30.271867] <TASK> [ 30.272188] dump_stack_lvl+0x73/0xb0 [ 30.272685] print_report+0xd1/0x640 [ 30.273104] ? __virt_addr_valid+0x1db/0x2d0 [ 30.273622] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.274021] kasan_report+0x102/0x140 [ 30.274422] ? kasan_atomics_helper+0x861/0x5450 [ 30.274849] ? kasan_atomics_helper+0x861/0x5450 [ 30.275213] kasan_check_range+0x10c/0x1c0 [ 30.275504] __kasan_check_write+0x18/0x20 [ 30.275771] kasan_atomics_helper+0x861/0x5450 [ 30.276257] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.276851] ? ret_from_fork_asm+0x1a/0x30 [ 30.277298] ? ret_from_fork+0x41/0x80 [ 30.277738] ? kthread+0x257/0x310 [ 30.278141] kasan_atomics+0x1dd/0x310 [ 30.278611] ? __pfx_kasan_atomics+0x10/0x10 [ 30.279089] ? __pfx_read_tsc+0x10/0x10 [ 30.279391] ? ktime_get_ts64+0x86/0x230 [ 30.279804] kunit_try_run_case+0x1b3/0x490 [ 30.280259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.280891] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.281415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.281864] ? __kthread_parkme+0x82/0x160 [ 30.282330] ? preempt_count_sub+0x50/0x80 [ 30.282717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.283232] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.283921] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.284321] kthread+0x257/0x310 [ 30.284720] ? __pfx_kthread+0x10/0x10 [ 30.285246] ret_from_fork+0x41/0x80 [ 30.285790] ? __pfx_kthread+0x10/0x10 [ 30.286166] ret_from_fork_asm+0x1a/0x30 [ 30.286557] </TASK> [ 30.286832] [ 30.287029] Allocated by task 274: [ 30.287395] kasan_save_stack+0x3d/0x60 [ 30.288005] kasan_save_track+0x18/0x40 [ 30.288425] kasan_save_alloc_info+0x3b/0x50 [ 30.288818] __kasan_kmalloc+0xb7/0xc0 [ 30.289172] __kmalloc_cache_noprof+0x184/0x410 [ 30.289679] kasan_atomics+0x96/0x310 [ 30.290093] kunit_try_run_case+0x1b3/0x490 [ 30.290517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.290855] kthread+0x257/0x310 [ 30.291222] ret_from_fork+0x41/0x80 [ 30.291683] ret_from_fork_asm+0x1a/0x30 [ 30.292072] [ 30.292229] The buggy address belongs to the object at ffff888102a59b80 [ 30.292229] which belongs to the cache kmalloc-64 of size 64 [ 30.292879] The buggy address is located 0 bytes to the right of [ 30.292879] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.294022] [ 30.294285] The buggy address belongs to the physical page: [ 30.294771] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.295184] flags: 0x200000000000000(node=0|zone=2) [ 30.295590] page_type: f5(slab) [ 30.295951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.296723] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.297399] page dumped because: kasan: bad access detected [ 30.297786] [ 30.297935] Memory state around the buggy address: [ 30.298366] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.299023] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.299614] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.300231] ^ [ 30.300673] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.301118] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.301782] ================================================================== [ 30.066467] ================================================================== [ 30.067007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 30.067665] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.068167] [ 30.068424] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.069189] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.069643] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.070193] Call Trace: [ 30.070553] <TASK> [ 30.070860] dump_stack_lvl+0x73/0xb0 [ 30.071227] print_report+0xd1/0x640 [ 30.071672] ? __virt_addr_valid+0x1db/0x2d0 [ 30.071972] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.072319] kasan_report+0x102/0x140 [ 30.072794] ? kasan_atomics_helper+0x566/0x5450 [ 30.073282] ? kasan_atomics_helper+0x566/0x5450 [ 30.073795] kasan_check_range+0x10c/0x1c0 [ 30.074239] __kasan_check_write+0x18/0x20 [ 30.074716] kasan_atomics_helper+0x566/0x5450 [ 30.075182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.075728] ? ret_from_fork_asm+0x1a/0x30 [ 30.076211] ? ret_from_fork+0x41/0x80 [ 30.076648] ? kthread+0x257/0x310 [ 30.077047] kasan_atomics+0x1dd/0x310 [ 30.077336] ? __pfx_kasan_atomics+0x10/0x10 [ 30.077830] ? __pfx_read_tsc+0x10/0x10 [ 30.078268] ? ktime_get_ts64+0x86/0x230 [ 30.078770] kunit_try_run_case+0x1b3/0x490 [ 30.079240] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.079682] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.080128] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.080659] ? __kthread_parkme+0x82/0x160 [ 30.080892] ? preempt_count_sub+0x50/0x80 [ 30.081292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.081789] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.082225] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.082811] kthread+0x257/0x310 [ 30.083186] ? __pfx_kthread+0x10/0x10 [ 30.083559] ret_from_fork+0x41/0x80 [ 30.083988] ? __pfx_kthread+0x10/0x10 [ 30.084345] ret_from_fork_asm+0x1a/0x30 [ 30.084786] </TASK> [ 30.085069] [ 30.085302] Allocated by task 274: [ 30.085680] kasan_save_stack+0x3d/0x60 [ 30.086074] kasan_save_track+0x18/0x40 [ 30.086534] kasan_save_alloc_info+0x3b/0x50 [ 30.086879] __kasan_kmalloc+0xb7/0xc0 [ 30.087307] __kmalloc_cache_noprof+0x184/0x410 [ 30.087711] kasan_atomics+0x96/0x310 [ 30.088131] kunit_try_run_case+0x1b3/0x490 [ 30.088599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.088952] kthread+0x257/0x310 [ 30.089203] ret_from_fork+0x41/0x80 [ 30.089496] ret_from_fork_asm+0x1a/0x30 [ 30.089758] [ 30.089901] The buggy address belongs to the object at ffff888102a59b80 [ 30.089901] which belongs to the cache kmalloc-64 of size 64 [ 30.090887] The buggy address is located 0 bytes to the right of [ 30.090887] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.091951] [ 30.092188] The buggy address belongs to the physical page: [ 30.092713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.093360] flags: 0x200000000000000(node=0|zone=2) [ 30.093772] page_type: f5(slab) [ 30.094004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.094699] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.095371] page dumped because: kasan: bad access detected [ 30.095791] [ 30.095942] Memory state around the buggy address: [ 30.096340] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.097016] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.097613] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.097961] ^ [ 30.098399] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099086] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.099753] ================================================================== [ 30.696438] ================================================================== [ 30.698491] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 30.699165] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.700242] [ 30.701197] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.702170] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.702662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.703493] Call Trace: [ 30.703866] <TASK> [ 30.704206] dump_stack_lvl+0x73/0xb0 [ 30.704710] print_report+0xd1/0x640 [ 30.705192] ? __virt_addr_valid+0x1db/0x2d0 [ 30.705741] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.706329] kasan_report+0x102/0x140 [ 30.706824] ? kasan_atomics_helper+0xf11/0x5450 [ 30.707362] ? kasan_atomics_helper+0xf11/0x5450 [ 30.707931] kasan_check_range+0x10c/0x1c0 [ 30.708388] __kasan_check_write+0x18/0x20 [ 30.708922] kasan_atomics_helper+0xf11/0x5450 [ 30.709388] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.709727] ? ret_from_fork_asm+0x1a/0x30 [ 30.710276] ? ret_from_fork+0x41/0x80 [ 30.710723] ? kthread+0x257/0x310 [ 30.711094] kasan_atomics+0x1dd/0x310 [ 30.711605] ? __pfx_kasan_atomics+0x10/0x10 [ 30.712136] ? __pfx_read_tsc+0x10/0x10 [ 30.712572] ? ktime_get_ts64+0x86/0x230 [ 30.712858] kunit_try_run_case+0x1b3/0x490 [ 30.713291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.713948] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.714520] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.714934] ? __kthread_parkme+0x82/0x160 [ 30.715466] ? preempt_count_sub+0x50/0x80 [ 30.715970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.716360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.716903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.717580] kthread+0x257/0x310 [ 30.717964] ? __pfx_kthread+0x10/0x10 [ 30.718469] ret_from_fork+0x41/0x80 [ 30.718773] ? __pfx_kthread+0x10/0x10 [ 30.719041] ret_from_fork_asm+0x1a/0x30 [ 30.719517] </TASK> [ 30.719793] [ 30.720005] Allocated by task 274: [ 30.720525] kasan_save_stack+0x3d/0x60 [ 30.720978] kasan_save_track+0x18/0x40 [ 30.721388] kasan_save_alloc_info+0x3b/0x50 [ 30.721713] __kasan_kmalloc+0xb7/0xc0 [ 30.721959] __kmalloc_cache_noprof+0x184/0x410 [ 30.722557] kasan_atomics+0x96/0x310 [ 30.723142] kunit_try_run_case+0x1b3/0x490 [ 30.723713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.724230] kthread+0x257/0x310 [ 30.724562] ret_from_fork+0x41/0x80 [ 30.724913] ret_from_fork_asm+0x1a/0x30 [ 30.725397] [ 30.725669] The buggy address belongs to the object at ffff888102a59b80 [ 30.725669] which belongs to the cache kmalloc-64 of size 64 [ 30.726608] The buggy address is located 0 bytes to the right of [ 30.726608] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.727581] [ 30.727824] The buggy address belongs to the physical page: [ 30.728145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.728875] flags: 0x200000000000000(node=0|zone=2) [ 30.729366] page_type: f5(slab) [ 30.729797] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.730345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.731027] page dumped because: kasan: bad access detected [ 30.731615] [ 30.731838] Memory state around the buggy address: [ 30.732270] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.732870] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.733546] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.734082] ^ [ 30.734628] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.735159] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.735721] ================================================================== [ 30.661313] ================================================================== [ 30.662012] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 30.662762] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.663395] [ 30.663669] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.664590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.664867] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.665316] Call Trace: [ 30.665572] <TASK> [ 30.665771] dump_stack_lvl+0x73/0xb0 [ 30.666257] print_report+0xd1/0x640 [ 30.666703] ? __virt_addr_valid+0x1db/0x2d0 [ 30.667173] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.667765] kasan_report+0x102/0x140 [ 30.668208] ? kasan_atomics_helper+0xe79/0x5450 [ 30.668749] ? kasan_atomics_helper+0xe79/0x5450 [ 30.669237] kasan_check_range+0x10c/0x1c0 [ 30.669745] __kasan_check_write+0x18/0x20 [ 30.670189] kasan_atomics_helper+0xe79/0x5450 [ 30.670602] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.671027] ? ret_from_fork_asm+0x1a/0x30 [ 30.671595] ? ret_from_fork+0x41/0x80 [ 30.671928] ? kthread+0x257/0x310 [ 30.672209] kasan_atomics+0x1dd/0x310 [ 30.672615] ? __pfx_kasan_atomics+0x10/0x10 [ 30.673071] ? __pfx_read_tsc+0x10/0x10 [ 30.673538] ? ktime_get_ts64+0x86/0x230 [ 30.673968] kunit_try_run_case+0x1b3/0x490 [ 30.674431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.674787] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.675149] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.675684] ? __kthread_parkme+0x82/0x160 [ 30.676131] ? preempt_count_sub+0x50/0x80 [ 30.676641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.677121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.677584] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.678143] kthread+0x257/0x310 [ 30.678557] ? __pfx_kthread+0x10/0x10 [ 30.678943] ret_from_fork+0x41/0x80 [ 30.679222] ? __pfx_kthread+0x10/0x10 [ 30.679526] ret_from_fork_asm+0x1a/0x30 [ 30.679817] </TASK> [ 30.680005] [ 30.680173] Allocated by task 274: [ 30.680408] kasan_save_stack+0x3d/0x60 [ 30.680730] kasan_save_track+0x18/0x40 [ 30.681100] kasan_save_alloc_info+0x3b/0x50 [ 30.681596] __kasan_kmalloc+0xb7/0xc0 [ 30.681991] __kmalloc_cache_noprof+0x184/0x410 [ 30.682488] kasan_atomics+0x96/0x310 [ 30.682879] kunit_try_run_case+0x1b3/0x490 [ 30.683290] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.683833] kthread+0x257/0x310 [ 30.684234] ret_from_fork+0x41/0x80 [ 30.684668] ret_from_fork_asm+0x1a/0x30 [ 30.685015] [ 30.685187] The buggy address belongs to the object at ffff888102a59b80 [ 30.685187] which belongs to the cache kmalloc-64 of size 64 [ 30.685771] The buggy address is located 0 bytes to the right of [ 30.685771] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.686827] [ 30.687064] The buggy address belongs to the physical page: [ 30.687601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.688280] flags: 0x200000000000000(node=0|zone=2) [ 30.688786] page_type: f5(slab) [ 30.689023] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.689423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.690027] page dumped because: kasan: bad access detected [ 30.690603] [ 30.690851] Memory state around the buggy address: [ 30.691271] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.691830] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.692333] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.694039] ^ [ 30.694351] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.694710] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.695074] ================================================================== [ 31.276856] ================================================================== [ 31.277488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 31.278593] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.279772] [ 31.279980] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.280733] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.281065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.282046] Call Trace: [ 31.282268] <TASK> [ 31.282885] dump_stack_lvl+0x73/0xb0 [ 31.283242] print_report+0xd1/0x640 [ 31.284081] ? __virt_addr_valid+0x1db/0x2d0 [ 31.284723] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.285048] kasan_report+0x102/0x140 [ 31.286076] ? kasan_atomics_helper+0x151e/0x5450 [ 31.286432] ? kasan_atomics_helper+0x151e/0x5450 [ 31.287175] kasan_check_range+0x10c/0x1c0 [ 31.287825] __kasan_check_write+0x18/0x20 [ 31.288167] kasan_atomics_helper+0x151e/0x5450 [ 31.288928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.289330] ? ret_from_fork_asm+0x1a/0x30 [ 31.290134] ? ret_from_fork+0x41/0x80 [ 31.290443] ? kthread+0x257/0x310 [ 31.291023] kasan_atomics+0x1dd/0x310 [ 31.291638] ? __pfx_kasan_atomics+0x10/0x10 [ 31.291954] ? __pfx_read_tsc+0x10/0x10 [ 31.292355] ? ktime_get_ts64+0x86/0x230 [ 31.293267] kunit_try_run_case+0x1b3/0x490 [ 31.293621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.294208] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.294675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.295069] ? __kthread_parkme+0x82/0x160 [ 31.295427] ? preempt_count_sub+0x50/0x80 [ 31.296430] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.296838] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.297463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.298189] kthread+0x257/0x310 [ 31.299113] ? __pfx_kthread+0x10/0x10 [ 31.299443] ret_from_fork+0x41/0x80 [ 31.299944] ? __pfx_kthread+0x10/0x10 [ 31.300435] ret_from_fork_asm+0x1a/0x30 [ 31.301203] </TASK> [ 31.301521] [ 31.301718] Allocated by task 274: [ 31.301975] kasan_save_stack+0x3d/0x60 [ 31.302312] kasan_save_track+0x18/0x40 [ 31.303429] kasan_save_alloc_info+0x3b/0x50 [ 31.303807] __kasan_kmalloc+0xb7/0xc0 [ 31.304487] __kmalloc_cache_noprof+0x184/0x410 [ 31.304811] kasan_atomics+0x96/0x310 [ 31.305040] kunit_try_run_case+0x1b3/0x490 [ 31.305403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.306536] kthread+0x257/0x310 [ 31.306854] ret_from_fork+0x41/0x80 [ 31.307116] ret_from_fork_asm+0x1a/0x30 [ 31.307890] [ 31.308121] The buggy address belongs to the object at ffff888102a59b80 [ 31.308121] which belongs to the cache kmalloc-64 of size 64 [ 31.308923] The buggy address is located 0 bytes to the right of [ 31.308923] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.309949] [ 31.310824] The buggy address belongs to the physical page: [ 31.311154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.312117] flags: 0x200000000000000(node=0|zone=2) [ 31.312696] page_type: f5(slab) [ 31.313048] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.313941] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.314642] page dumped because: kasan: bad access detected [ 31.315273] [ 31.315816] Memory state around the buggy address: [ 31.316135] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.317157] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.317614] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.318535] ^ [ 31.318961] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.319460] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.320605] ================================================================== [ 31.860756] ================================================================== [ 31.861271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 31.862013] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.862432] [ 31.862610] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.863573] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.863971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.864789] Call Trace: [ 31.865012] <TASK> [ 31.865362] dump_stack_lvl+0x73/0xb0 [ 31.865802] print_report+0xd1/0x640 [ 31.866265] ? __virt_addr_valid+0x1db/0x2d0 [ 31.866961] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.867386] kasan_report+0x102/0x140 [ 31.867830] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.868441] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.868950] kasan_check_range+0x10c/0x1c0 [ 31.869272] __kasan_check_write+0x18/0x20 [ 31.869882] kasan_atomics_helper+0x1d7b/0x5450 [ 31.870317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.871030] ? ret_from_fork_asm+0x1a/0x30 [ 31.871446] ? ret_from_fork+0x41/0x80 [ 31.871892] ? kthread+0x257/0x310 [ 31.872184] kasan_atomics+0x1dd/0x310 [ 31.872467] ? __pfx_kasan_atomics+0x10/0x10 [ 31.872865] ? __pfx_read_tsc+0x10/0x10 [ 31.873367] ? ktime_get_ts64+0x86/0x230 [ 31.873798] kunit_try_run_case+0x1b3/0x490 [ 31.874262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.874810] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.875378] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.875946] ? __kthread_parkme+0x82/0x160 [ 31.876373] ? preempt_count_sub+0x50/0x80 [ 31.876967] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.877431] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.878086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.878580] kthread+0x257/0x310 [ 31.878956] ? __pfx_kthread+0x10/0x10 [ 31.879243] ret_from_fork+0x41/0x80 [ 31.879500] ? __pfx_kthread+0x10/0x10 [ 31.879930] ret_from_fork_asm+0x1a/0x30 [ 31.880539] </TASK> [ 31.880816] [ 31.881025] Allocated by task 274: [ 31.881391] kasan_save_stack+0x3d/0x60 [ 31.881891] kasan_save_track+0x18/0x40 [ 31.882270] kasan_save_alloc_info+0x3b/0x50 [ 31.882959] __kasan_kmalloc+0xb7/0xc0 [ 31.883241] __kmalloc_cache_noprof+0x184/0x410 [ 31.883528] kasan_atomics+0x96/0x310 [ 31.883776] kunit_try_run_case+0x1b3/0x490 [ 31.884272] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.884873] kthread+0x257/0x310 [ 31.885375] ret_from_fork+0x41/0x80 [ 31.885905] ret_from_fork_asm+0x1a/0x30 [ 31.886341] [ 31.886695] The buggy address belongs to the object at ffff888102a59b80 [ 31.886695] which belongs to the cache kmalloc-64 of size 64 [ 31.887611] The buggy address is located 0 bytes to the right of [ 31.887611] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.888288] [ 31.888458] The buggy address belongs to the physical page: [ 31.888944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.889909] flags: 0x200000000000000(node=0|zone=2) [ 31.892491] page_type: f5(slab) [ 31.893036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.893508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.893876] page dumped because: kasan: bad access detected [ 31.895023] [ 31.895244] Memory state around the buggy address: [ 31.895818] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.896490] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.897114] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.897872] ^ [ 31.898333] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.898933] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.899347] ================================================================== [ 31.976579] ================================================================== [ 31.977177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 31.977847] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.978331] [ 31.978622] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.979524] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.979915] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.980584] Call Trace: [ 31.980791] <TASK> [ 31.981070] dump_stack_lvl+0x73/0xb0 [ 31.981596] print_report+0xd1/0x640 [ 31.982034] ? __virt_addr_valid+0x1db/0x2d0 [ 31.982572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.983099] kasan_report+0x102/0x140 [ 31.983424] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.983906] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.984468] kasan_check_range+0x10c/0x1c0 [ 31.984928] __kasan_check_write+0x18/0x20 [ 31.985373] kasan_atomics_helper+0x1f44/0x5450 [ 31.985903] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.986334] ? ret_from_fork_asm+0x1a/0x30 [ 31.986811] ? ret_from_fork+0x41/0x80 [ 31.987206] ? kthread+0x257/0x310 [ 31.987597] kasan_atomics+0x1dd/0x310 [ 31.988029] ? __pfx_kasan_atomics+0x10/0x10 [ 31.988483] ? __pfx_read_tsc+0x10/0x10 [ 31.988939] ? ktime_get_ts64+0x86/0x230 [ 31.989242] kunit_try_run_case+0x1b3/0x490 [ 31.989758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.990267] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.990697] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.991137] ? __kthread_parkme+0x82/0x160 [ 31.991679] ? preempt_count_sub+0x50/0x80 [ 31.992156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.992625] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.993188] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.993701] kthread+0x257/0x310 [ 31.994091] ? __pfx_kthread+0x10/0x10 [ 31.994489] ret_from_fork+0x41/0x80 [ 31.994836] ? __pfx_kthread+0x10/0x10 [ 31.995120] ret_from_fork_asm+0x1a/0x30 [ 31.995419] </TASK> [ 31.995656] [ 31.995808] Allocated by task 274: [ 31.996032] kasan_save_stack+0x3d/0x60 [ 31.996509] kasan_save_track+0x18/0x40 [ 31.996914] kasan_save_alloc_info+0x3b/0x50 [ 31.997363] __kasan_kmalloc+0xb7/0xc0 [ 31.997769] __kmalloc_cache_noprof+0x184/0x410 [ 31.998234] kasan_atomics+0x96/0x310 [ 31.998656] kunit_try_run_case+0x1b3/0x490 [ 31.999076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.999601] kthread+0x257/0x310 [ 31.999960] ret_from_fork+0x41/0x80 [ 32.000357] ret_from_fork_asm+0x1a/0x30 [ 32.000815] [ 32.001019] The buggy address belongs to the object at ffff888102a59b80 [ 32.001019] which belongs to the cache kmalloc-64 of size 64 [ 32.002001] The buggy address is located 0 bytes to the right of [ 32.002001] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.002870] [ 32.003022] The buggy address belongs to the physical page: [ 32.003374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.004076] flags: 0x200000000000000(node=0|zone=2) [ 32.004577] page_type: f5(slab) [ 32.004981] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.005408] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.005825] page dumped because: kasan: bad access detected [ 32.006154] [ 32.006367] Memory state around the buggy address: [ 32.006852] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.007510] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.008137] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.008770] ^ [ 32.009181] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.009747] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.010118] ================================================================== [ 31.939650] ================================================================== [ 31.940235] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 31.940792] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.941486] [ 31.941736] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.942503] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.942906] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.943612] Call Trace: [ 31.943921] <TASK> [ 31.944214] dump_stack_lvl+0x73/0xb0 [ 31.944767] print_report+0xd1/0x640 [ 31.945107] ? __virt_addr_valid+0x1db/0x2d0 [ 31.945615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.946121] kasan_report+0x102/0x140 [ 31.946601] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.947088] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.947586] kasan_check_range+0x10c/0x1c0 [ 31.948050] __kasan_check_write+0x18/0x20 [ 31.948557] kasan_atomics_helper+0x1eab/0x5450 [ 31.949015] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.949387] ? ret_from_fork_asm+0x1a/0x30 [ 31.949836] ? ret_from_fork+0x41/0x80 [ 31.950242] ? kthread+0x257/0x310 [ 31.950628] kasan_atomics+0x1dd/0x310 [ 31.951038] ? __pfx_kasan_atomics+0x10/0x10 [ 31.951624] ? __pfx_read_tsc+0x10/0x10 [ 31.951983] ? ktime_get_ts64+0x86/0x230 [ 31.952284] kunit_try_run_case+0x1b3/0x490 [ 31.952796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.953337] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.953877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.954419] ? __kthread_parkme+0x82/0x160 [ 31.954855] ? preempt_count_sub+0x50/0x80 [ 31.955330] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.955866] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.956356] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.956925] kthread+0x257/0x310 [ 31.957335] ? __pfx_kthread+0x10/0x10 [ 31.957801] ret_from_fork+0x41/0x80 [ 31.958199] ? __pfx_kthread+0x10/0x10 [ 31.958533] ret_from_fork_asm+0x1a/0x30 [ 31.958959] </TASK> [ 31.959246] [ 31.959524] Allocated by task 274: [ 31.959902] kasan_save_stack+0x3d/0x60 [ 31.960269] kasan_save_track+0x18/0x40 [ 31.960648] kasan_save_alloc_info+0x3b/0x50 [ 31.961006] __kasan_kmalloc+0xb7/0xc0 [ 31.961380] __kmalloc_cache_noprof+0x184/0x410 [ 31.961874] kasan_atomics+0x96/0x310 [ 31.962282] kunit_try_run_case+0x1b3/0x490 [ 31.962752] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.963270] kthread+0x257/0x310 [ 31.963664] ret_from_fork+0x41/0x80 [ 31.964047] ret_from_fork_asm+0x1a/0x30 [ 31.964542] [ 31.964846] The buggy address belongs to the object at ffff888102a59b80 [ 31.964846] which belongs to the cache kmalloc-64 of size 64 [ 31.965835] The buggy address is located 0 bytes to the right of [ 31.965835] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.966698] [ 31.966859] The buggy address belongs to the physical page: [ 31.967384] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.968101] flags: 0x200000000000000(node=0|zone=2) [ 31.968522] page_type: f5(slab) [ 31.968843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.969509] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.970149] page dumped because: kasan: bad access detected [ 31.970679] [ 31.970898] Memory state around the buggy address: [ 31.971334] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.972006] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.972684] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.973315] ^ [ 31.973708] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.974321] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.974993] ================================================================== [ 30.971654] ================================================================== [ 30.972748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 30.973228] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.973725] [ 30.973968] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.974577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.974896] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.975503] Call Trace: [ 30.975806] <TASK> [ 30.976088] dump_stack_lvl+0x73/0xb0 [ 30.976471] print_report+0xd1/0x640 [ 30.976777] ? __virt_addr_valid+0x1db/0x2d0 [ 30.977223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.977763] kasan_report+0x102/0x140 [ 30.978168] ? kasan_atomics_helper+0x1218/0x5450 [ 30.978519] ? kasan_atomics_helper+0x1218/0x5450 [ 30.978999] kasan_check_range+0x10c/0x1c0 [ 30.979363] __kasan_check_write+0x18/0x20 [ 30.979744] kasan_atomics_helper+0x1218/0x5450 [ 30.980203] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.980627] ? ret_from_fork_asm+0x1a/0x30 [ 30.981072] ? ret_from_fork+0x41/0x80 [ 30.981475] ? kthread+0x257/0x310 [ 30.981776] kasan_atomics+0x1dd/0x310 [ 30.982190] ? __pfx_kasan_atomics+0x10/0x10 [ 30.982635] ? __pfx_read_tsc+0x10/0x10 [ 30.982965] ? ktime_get_ts64+0x86/0x230 [ 30.983329] kunit_try_run_case+0x1b3/0x490 [ 30.983806] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.984164] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.984576] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.984893] ? __kthread_parkme+0x82/0x160 [ 30.985674] ? preempt_count_sub+0x50/0x80 [ 30.986122] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.986898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.987481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.987990] kthread+0x257/0x310 [ 30.988371] ? __pfx_kthread+0x10/0x10 [ 30.988771] ret_from_fork+0x41/0x80 [ 30.989214] ? __pfx_kthread+0x10/0x10 [ 30.989644] ret_from_fork_asm+0x1a/0x30 [ 30.989985] </TASK> [ 30.990268] [ 30.990516] Allocated by task 274: [ 30.990791] kasan_save_stack+0x3d/0x60 [ 30.991194] kasan_save_track+0x18/0x40 [ 30.991561] kasan_save_alloc_info+0x3b/0x50 [ 30.991986] __kasan_kmalloc+0xb7/0xc0 [ 30.992269] __kmalloc_cache_noprof+0x184/0x410 [ 30.992765] kasan_atomics+0x96/0x310 [ 30.993043] kunit_try_run_case+0x1b3/0x490 [ 30.993335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.993689] kthread+0x257/0x310 [ 30.993929] ret_from_fork+0x41/0x80 [ 30.994336] ret_from_fork_asm+0x1a/0x30 [ 30.994744] [ 30.994956] The buggy address belongs to the object at ffff888102a59b80 [ 30.994956] which belongs to the cache kmalloc-64 of size 64 [ 30.995941] The buggy address is located 0 bytes to the right of [ 30.995941] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.996990] [ 30.997216] The buggy address belongs to the physical page: [ 30.997623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.998182] flags: 0x200000000000000(node=0|zone=2) [ 30.998536] page_type: f5(slab) [ 30.998773] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.999216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.999889] page dumped because: kasan: bad access detected [ 31.000384] [ 31.000639] Memory state around the buggy address: [ 31.001066] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.001698] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.002301] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.002938] ^ [ 31.003374] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.003849] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.004224] ================================================================== [ 30.230412] ================================================================== [ 30.230930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 30.231672] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.232395] [ 30.232982] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.233641] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.234285] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.234911] Call Trace: [ 30.235473] <TASK> [ 30.235753] dump_stack_lvl+0x73/0xb0 [ 30.236173] print_report+0xd1/0x640 [ 30.236616] ? __virt_addr_valid+0x1db/0x2d0 [ 30.236997] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.237540] kasan_report+0x102/0x140 [ 30.237862] ? kasan_atomics_helper+0x7c8/0x5450 [ 30.238367] ? kasan_atomics_helper+0x7c8/0x5450 [ 30.238767] kasan_check_range+0x10c/0x1c0 [ 30.239246] __kasan_check_write+0x18/0x20 [ 30.239541] kasan_atomics_helper+0x7c8/0x5450 [ 30.240166] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.240644] ? ret_from_fork_asm+0x1a/0x30 [ 30.241331] ? ret_from_fork+0x41/0x80 [ 30.241633] ? kthread+0x257/0x310 [ 30.241904] kasan_atomics+0x1dd/0x310 [ 30.242456] ? __pfx_kasan_atomics+0x10/0x10 [ 30.243035] ? __pfx_read_tsc+0x10/0x10 [ 30.243459] ? ktime_get_ts64+0x86/0x230 [ 30.243837] kunit_try_run_case+0x1b3/0x490 [ 30.244295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.244722] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.245386] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.245772] ? __kthread_parkme+0x82/0x160 [ 30.246070] ? preempt_count_sub+0x50/0x80 [ 30.246594] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.247110] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.247782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.248260] kthread+0x257/0x310 [ 30.248584] ? __pfx_kthread+0x10/0x10 [ 30.249012] ret_from_fork+0x41/0x80 [ 30.249456] ? __pfx_kthread+0x10/0x10 [ 30.249862] ret_from_fork_asm+0x1a/0x30 [ 30.250282] </TASK> [ 30.250473] [ 30.250643] Allocated by task 274: [ 30.251217] kasan_save_stack+0x3d/0x60 [ 30.251671] kasan_save_track+0x18/0x40 [ 30.252083] kasan_save_alloc_info+0x3b/0x50 [ 30.252500] __kasan_kmalloc+0xb7/0xc0 [ 30.252909] __kmalloc_cache_noprof+0x184/0x410 [ 30.253286] kasan_atomics+0x96/0x310 [ 30.253770] kunit_try_run_case+0x1b3/0x490 [ 30.254116] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.254522] kthread+0x257/0x310 [ 30.254984] ret_from_fork+0x41/0x80 [ 30.255385] ret_from_fork_asm+0x1a/0x30 [ 30.255716] [ 30.255922] The buggy address belongs to the object at ffff888102a59b80 [ 30.255922] which belongs to the cache kmalloc-64 of size 64 [ 30.257176] The buggy address is located 0 bytes to the right of [ 30.257176] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.258381] [ 30.258627] The buggy address belongs to the physical page: [ 30.258981] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.259609] flags: 0x200000000000000(node=0|zone=2) [ 30.259910] page_type: f5(slab) [ 30.260229] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.260962] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.261675] page dumped because: kasan: bad access detected [ 30.262151] [ 30.262361] Memory state around the buggy address: [ 30.262701] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.263267] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.264161] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.264749] ^ [ 30.265036] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.265620] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.266204] ================================================================== [ 32.275912] ================================================================== [ 32.276817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 32.277578] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.278517] [ 32.278785] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.279914] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.280430] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.281432] Call Trace: [ 32.281861] <TASK> [ 32.282245] dump_stack_lvl+0x73/0xb0 [ 32.282813] print_report+0xd1/0x640 [ 32.283324] ? __virt_addr_valid+0x1db/0x2d0 [ 32.283989] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.284592] kasan_report+0x102/0x140 [ 32.285192] ? kasan_atomics_helper+0x224d/0x5450 [ 32.285382] ? kasan_atomics_helper+0x224d/0x5450 [ 32.285841] kasan_check_range+0x10c/0x1c0 [ 32.286160] __kasan_check_write+0x18/0x20 [ 32.286602] kasan_atomics_helper+0x224d/0x5450 [ 32.287030] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.287357] ? ret_from_fork_asm+0x1a/0x30 [ 32.287761] ? ret_from_fork+0x41/0x80 [ 32.288198] ? kthread+0x257/0x310 [ 32.288614] kasan_atomics+0x1dd/0x310 [ 32.288961] ? __pfx_kasan_atomics+0x10/0x10 [ 32.289417] ? __pfx_read_tsc+0x10/0x10 [ 32.289855] ? ktime_get_ts64+0x86/0x230 [ 32.290209] kunit_try_run_case+0x1b3/0x490 [ 32.290686] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.291019] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.291345] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.291856] ? __kthread_parkme+0x82/0x160 [ 32.292296] ? preempt_count_sub+0x50/0x80 [ 32.292765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.293228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.293697] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.294032] kthread+0x257/0x310 [ 32.294426] ? __pfx_kthread+0x10/0x10 [ 32.294905] ret_from_fork+0x41/0x80 [ 32.295313] ? __pfx_kthread+0x10/0x10 [ 32.295745] ret_from_fork_asm+0x1a/0x30 [ 32.296135] </TASK> [ 32.296321] [ 32.296516] Allocated by task 274: [ 32.296740] kasan_save_stack+0x3d/0x60 [ 32.297151] kasan_save_track+0x18/0x40 [ 32.297569] kasan_save_alloc_info+0x3b/0x50 [ 32.297977] __kasan_kmalloc+0xb7/0xc0 [ 32.298379] __kmalloc_cache_noprof+0x184/0x410 [ 32.298872] kasan_atomics+0x96/0x310 [ 32.299272] kunit_try_run_case+0x1b3/0x490 [ 32.299743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.300139] kthread+0x257/0x310 [ 32.300475] ret_from_fork+0x41/0x80 [ 32.300776] ret_from_fork_asm+0x1a/0x30 [ 32.301186] [ 32.301380] The buggy address belongs to the object at ffff888102a59b80 [ 32.301380] which belongs to the cache kmalloc-64 of size 64 [ 32.302628] The buggy address is located 0 bytes to the right of [ 32.302628] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.304214] [ 32.304472] The buggy address belongs to the physical page: [ 32.305014] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.305770] flags: 0x200000000000000(node=0|zone=2) [ 32.306146] page_type: f5(slab) [ 32.306385] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.306810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.307325] page dumped because: kasan: bad access detected [ 32.307912] [ 32.308178] Memory state around the buggy address: [ 32.308725] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.309349] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.310041] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.310708] ^ [ 32.311177] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.311644] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.312000] ================================================================== [ 30.341861] ================================================================== [ 30.342867] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 30.343494] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.344138] [ 30.344378] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.345192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.345661] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.346274] Call Trace: [ 30.346619] <TASK> [ 30.346865] dump_stack_lvl+0x73/0xb0 [ 30.347306] print_report+0xd1/0x640 [ 30.347953] ? __virt_addr_valid+0x1db/0x2d0 [ 30.348405] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.348879] kasan_report+0x102/0x140 [ 30.349249] ? kasan_atomics_helper+0x993/0x5450 [ 30.349642] ? kasan_atomics_helper+0x993/0x5450 [ 30.350045] kasan_check_range+0x10c/0x1c0 [ 30.350640] __kasan_check_write+0x18/0x20 [ 30.351085] kasan_atomics_helper+0x993/0x5450 [ 30.351563] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.352050] ? ret_from_fork_asm+0x1a/0x30 [ 30.352531] ? ret_from_fork+0x41/0x80 [ 30.352965] ? kthread+0x257/0x310 [ 30.353367] kasan_atomics+0x1dd/0x310 [ 30.353769] ? __pfx_kasan_atomics+0x10/0x10 [ 30.354079] ? __pfx_read_tsc+0x10/0x10 [ 30.354348] ? ktime_get_ts64+0x86/0x230 [ 30.354908] kunit_try_run_case+0x1b3/0x490 [ 30.355389] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.355866] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.356428] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.356971] ? __kthread_parkme+0x82/0x160 [ 30.357413] ? preempt_count_sub+0x50/0x80 [ 30.357756] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.358067] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.358738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.359328] kthread+0x257/0x310 [ 30.359826] ? __pfx_kthread+0x10/0x10 [ 30.360217] ret_from_fork+0x41/0x80 [ 30.360501] ? __pfx_kthread+0x10/0x10 [ 30.360758] ret_from_fork_asm+0x1a/0x30 [ 30.362144] </TASK> [ 30.362507] [ 30.362747] Allocated by task 274: [ 30.363154] kasan_save_stack+0x3d/0x60 [ 30.363669] kasan_save_track+0x18/0x40 [ 30.366457] kasan_save_alloc_info+0x3b/0x50 [ 30.367384] __kasan_kmalloc+0xb7/0xc0 [ 30.367705] __kmalloc_cache_noprof+0x184/0x410 [ 30.368167] kasan_atomics+0x96/0x310 [ 30.368550] kunit_try_run_case+0x1b3/0x490 [ 30.368922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.369834] kthread+0x257/0x310 [ 30.370100] ret_from_fork+0x41/0x80 [ 30.370349] ret_from_fork_asm+0x1a/0x30 [ 30.370623] [ 30.370772] The buggy address belongs to the object at ffff888102a59b80 [ 30.370772] which belongs to the cache kmalloc-64 of size 64 [ 30.371331] The buggy address is located 0 bytes to the right of [ 30.371331] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.371891] [ 30.372047] The buggy address belongs to the physical page: [ 30.374360] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.375703] flags: 0x200000000000000(node=0|zone=2) [ 30.376111] page_type: f5(slab) [ 30.376386] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.377267] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.378246] page dumped because: kasan: bad access detected [ 30.379097] [ 30.379497] Memory state around the buggy address: [ 30.379785] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.380409] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.380853] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.381599] ^ [ 30.382076] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.382547] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.383150] ================================================================== [ 29.914191] ================================================================== [ 29.914894] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 29.915823] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.916272] [ 29.916451] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.917725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.918150] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.918952] Call Trace: [ 29.919716] <TASK> [ 29.920014] dump_stack_lvl+0x73/0xb0 [ 29.920610] print_report+0xd1/0x640 [ 29.920901] ? __virt_addr_valid+0x1db/0x2d0 [ 29.921369] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.921801] kasan_report+0x102/0x140 [ 29.922086] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.922512] ? kasan_atomics_helper+0x3e0/0x5450 [ 29.923113] kasan_check_range+0x10c/0x1c0 [ 29.923543] __kasan_check_read+0x15/0x20 [ 29.923907] kasan_atomics_helper+0x3e0/0x5450 [ 29.924218] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.924862] ? ret_from_fork_asm+0x1a/0x30 [ 29.925279] ? ret_from_fork+0x41/0x80 [ 29.925652] ? kthread+0x257/0x310 [ 29.926070] kasan_atomics+0x1dd/0x310 [ 29.926397] ? __pfx_kasan_atomics+0x10/0x10 [ 29.926687] ? __pfx_read_tsc+0x10/0x10 [ 29.926949] ? ktime_get_ts64+0x86/0x230 [ 29.927382] kunit_try_run_case+0x1b3/0x490 [ 29.927924] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.928420] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.928902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.929400] ? __kthread_parkme+0x82/0x160 [ 29.929856] ? preempt_count_sub+0x50/0x80 [ 29.930188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.930778] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.931379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.931877] kthread+0x257/0x310 [ 29.932162] ? __pfx_kthread+0x10/0x10 [ 29.932437] ret_from_fork+0x41/0x80 [ 29.932899] ? __pfx_kthread+0x10/0x10 [ 29.933351] ret_from_fork_asm+0x1a/0x30 [ 29.933972] </TASK> [ 29.934273] [ 29.934433] Allocated by task 274: [ 29.934742] kasan_save_stack+0x3d/0x60 [ 29.935013] kasan_save_track+0x18/0x40 [ 29.935273] kasan_save_alloc_info+0x3b/0x50 [ 29.935601] __kasan_kmalloc+0xb7/0xc0 [ 29.936066] __kmalloc_cache_noprof+0x184/0x410 [ 29.936562] kasan_atomics+0x96/0x310 [ 29.936982] kunit_try_run_case+0x1b3/0x490 [ 29.937414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.937797] kthread+0x257/0x310 [ 29.938162] ret_from_fork+0x41/0x80 [ 29.938616] ret_from_fork_asm+0x1a/0x30 [ 29.938884] [ 29.939032] The buggy address belongs to the object at ffff888102a59b80 [ 29.939032] which belongs to the cache kmalloc-64 of size 64 [ 29.939695] The buggy address is located 0 bytes to the right of [ 29.939695] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 29.940789] [ 29.941011] The buggy address belongs to the physical page: [ 29.941516] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 29.942010] flags: 0x200000000000000(node=0|zone=2) [ 29.942531] page_type: f5(slab) [ 29.942885] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.943370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.944228] page dumped because: kasan: bad access detected [ 29.944916] [ 29.945087] Memory state around the buggy address: [ 29.945360] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.945986] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.946651] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.947092] ^ [ 29.947570] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.948128] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.948489] ================================================================== [ 30.303310] ================================================================== [ 30.304094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 30.304667] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.305114] [ 30.305435] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.306786] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.307270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.307888] Call Trace: [ 30.308326] <TASK> [ 30.308649] dump_stack_lvl+0x73/0xb0 [ 30.309130] print_report+0xd1/0x640 [ 30.309464] ? __virt_addr_valid+0x1db/0x2d0 [ 30.309887] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.310405] kasan_report+0x102/0x140 [ 30.310779] ? kasan_atomics_helper+0x8fa/0x5450 [ 30.311171] ? kasan_atomics_helper+0x8fa/0x5450 [ 30.311510] kasan_check_range+0x10c/0x1c0 [ 30.311799] __kasan_check_write+0x18/0x20 [ 30.312118] kasan_atomics_helper+0x8fa/0x5450 [ 30.312596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.313075] ? ret_from_fork_asm+0x1a/0x30 [ 30.313521] ? ret_from_fork+0x41/0x80 [ 30.313931] ? kthread+0x257/0x310 [ 30.314330] kasan_atomics+0x1dd/0x310 [ 30.314987] ? __pfx_kasan_atomics+0x10/0x10 [ 30.315440] ? __pfx_read_tsc+0x10/0x10 [ 30.315903] ? ktime_get_ts64+0x86/0x230 [ 30.316368] kunit_try_run_case+0x1b3/0x490 [ 30.316827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.317343] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.317823] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.318351] ? __kthread_parkme+0x82/0x160 [ 30.318804] ? preempt_count_sub+0x50/0x80 [ 30.319182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.319661] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.320238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.320901] kthread+0x257/0x310 [ 30.321296] ? __pfx_kthread+0x10/0x10 [ 30.321804] ret_from_fork+0x41/0x80 [ 30.322254] ? __pfx_kthread+0x10/0x10 [ 30.322755] ret_from_fork_asm+0x1a/0x30 [ 30.323086] </TASK> [ 30.323276] [ 30.323422] Allocated by task 274: [ 30.323831] kasan_save_stack+0x3d/0x60 [ 30.324269] kasan_save_track+0x18/0x40 [ 30.324839] kasan_save_alloc_info+0x3b/0x50 [ 30.325345] __kasan_kmalloc+0xb7/0xc0 [ 30.325896] __kmalloc_cache_noprof+0x184/0x410 [ 30.326288] kasan_atomics+0x96/0x310 [ 30.326716] kunit_try_run_case+0x1b3/0x490 [ 30.327298] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.327876] kthread+0x257/0x310 [ 30.328237] ret_from_fork+0x41/0x80 [ 30.328689] ret_from_fork_asm+0x1a/0x30 [ 30.329034] [ 30.329261] The buggy address belongs to the object at ffff888102a59b80 [ 30.329261] which belongs to the cache kmalloc-64 of size 64 [ 30.329956] The buggy address is located 0 bytes to the right of [ 30.329956] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.330922] [ 30.331261] The buggy address belongs to the physical page: [ 30.331912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.332492] flags: 0x200000000000000(node=0|zone=2) [ 30.332960] page_type: f5(slab) [ 30.333250] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.334129] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.334513] page dumped because: kasan: bad access detected [ 30.334797] [ 30.334947] Memory state around the buggy address: [ 30.335349] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.336047] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.336957] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.337605] ^ [ 30.338039] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.338693] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.339047] ================================================================== [ 31.361525] ================================================================== [ 31.363045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 31.363857] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.364541] [ 31.364777] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.365698] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.366113] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.366857] Call Trace: [ 31.367206] <TASK> [ 31.367526] dump_stack_lvl+0x73/0xb0 [ 31.367904] print_report+0xd1/0x640 [ 31.368353] ? __virt_addr_valid+0x1db/0x2d0 [ 31.368851] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.369409] kasan_report+0x102/0x140 [ 31.369755] ? kasan_atomics_helper+0x1650/0x5450 [ 31.370247] ? kasan_atomics_helper+0x1650/0x5450 [ 31.370788] kasan_check_range+0x10c/0x1c0 [ 31.371177] __kasan_check_write+0x18/0x20 [ 31.371682] kasan_atomics_helper+0x1650/0x5450 [ 31.372076] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.372589] ? ret_from_fork_asm+0x1a/0x30 [ 31.373046] ? ret_from_fork+0x41/0x80 [ 31.373397] ? kthread+0x257/0x310 [ 31.373835] kasan_atomics+0x1dd/0x310 [ 31.374156] ? __pfx_kasan_atomics+0x10/0x10 [ 31.374650] ? __pfx_read_tsc+0x10/0x10 [ 31.375134] ? ktime_get_ts64+0x86/0x230 [ 31.375618] kunit_try_run_case+0x1b3/0x490 [ 31.375915] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.376236] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.376791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.377301] ? __kthread_parkme+0x82/0x160 [ 31.377743] ? preempt_count_sub+0x50/0x80 [ 31.378232] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.378749] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.379312] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.379693] kthread+0x257/0x310 [ 31.380026] ? __pfx_kthread+0x10/0x10 [ 31.380498] ret_from_fork+0x41/0x80 [ 31.380911] ? __pfx_kthread+0x10/0x10 [ 31.381332] ret_from_fork_asm+0x1a/0x30 [ 31.381797] </TASK> [ 31.382084] [ 31.382322] Allocated by task 274: [ 31.382693] kasan_save_stack+0x3d/0x60 [ 31.383070] kasan_save_track+0x18/0x40 [ 31.383498] kasan_save_alloc_info+0x3b/0x50 [ 31.383914] __kasan_kmalloc+0xb7/0xc0 [ 31.384191] __kmalloc_cache_noprof+0x184/0x410 [ 31.384531] kasan_atomics+0x96/0x310 [ 31.384846] kunit_try_run_case+0x1b3/0x490 [ 31.385297] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.385905] kthread+0x257/0x310 [ 31.386323] ret_from_fork+0x41/0x80 [ 31.386771] ret_from_fork_asm+0x1a/0x30 [ 31.387270] [ 31.387606] The buggy address belongs to the object at ffff888102a59b80 [ 31.387606] which belongs to the cache kmalloc-64 of size 64 [ 31.388678] The buggy address is located 0 bytes to the right of [ 31.388678] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.389787] [ 31.390089] The buggy address belongs to the physical page: [ 31.390511] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.391188] flags: 0x200000000000000(node=0|zone=2) [ 31.391730] page_type: f5(slab) [ 31.391973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.392783] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.393555] page dumped because: kasan: bad access detected [ 31.394043] [ 31.394212] Memory state around the buggy address: [ 31.394507] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.395125] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.395830] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.396493] ^ [ 31.396939] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.397418] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.397816] ================================================================== [ 31.321721] ================================================================== [ 31.323167] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 31.323717] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.324283] [ 31.324744] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.325231] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.325554] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.326123] Call Trace: [ 31.326329] <TASK> [ 31.326542] dump_stack_lvl+0x73/0xb0 [ 31.327104] print_report+0xd1/0x640 [ 31.327629] ? __virt_addr_valid+0x1db/0x2d0 [ 31.328170] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.328810] kasan_report+0x102/0x140 [ 31.329163] ? kasan_atomics_helper+0x15b7/0x5450 [ 31.329773] ? kasan_atomics_helper+0x15b7/0x5450 [ 31.330378] kasan_check_range+0x10c/0x1c0 [ 31.330916] __kasan_check_write+0x18/0x20 [ 31.331430] kasan_atomics_helper+0x15b7/0x5450 [ 31.331835] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.332326] ? ret_from_fork_asm+0x1a/0x30 [ 31.332918] ? ret_from_fork+0x41/0x80 [ 31.333431] ? kthread+0x257/0x310 [ 31.333986] kasan_atomics+0x1dd/0x310 [ 31.334547] ? __pfx_kasan_atomics+0x10/0x10 [ 31.334993] ? __pfx_read_tsc+0x10/0x10 [ 31.335484] ? ktime_get_ts64+0x86/0x230 [ 31.335958] kunit_try_run_case+0x1b3/0x490 [ 31.336474] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.337067] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.337493] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.338044] ? __kthread_parkme+0x82/0x160 [ 31.338524] ? preempt_count_sub+0x50/0x80 [ 31.339030] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.339547] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.340180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.340735] kthread+0x257/0x310 [ 31.341158] ? __pfx_kthread+0x10/0x10 [ 31.341651] ret_from_fork+0x41/0x80 [ 31.342153] ? __pfx_kthread+0x10/0x10 [ 31.342501] ret_from_fork_asm+0x1a/0x30 [ 31.343035] </TASK> [ 31.343327] [ 31.343638] Allocated by task 274: [ 31.343951] kasan_save_stack+0x3d/0x60 [ 31.344413] kasan_save_track+0x18/0x40 [ 31.344869] kasan_save_alloc_info+0x3b/0x50 [ 31.345194] __kasan_kmalloc+0xb7/0xc0 [ 31.345601] __kmalloc_cache_noprof+0x184/0x410 [ 31.346049] kasan_atomics+0x96/0x310 [ 31.346504] kunit_try_run_case+0x1b3/0x490 [ 31.346782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.347393] kthread+0x257/0x310 [ 31.347866] ret_from_fork+0x41/0x80 [ 31.348337] ret_from_fork_asm+0x1a/0x30 [ 31.348795] [ 31.349098] The buggy address belongs to the object at ffff888102a59b80 [ 31.349098] which belongs to the cache kmalloc-64 of size 64 [ 31.349845] The buggy address is located 0 bytes to the right of [ 31.349845] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.350896] [ 31.351072] The buggy address belongs to the physical page: [ 31.351692] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.352411] flags: 0x200000000000000(node=0|zone=2) [ 31.352989] page_type: f5(slab) [ 31.353317] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.354083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.354804] page dumped because: kasan: bad access detected [ 31.355282] [ 31.355524] Memory state around the buggy address: [ 31.356111] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.356762] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.357299] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.357962] ^ [ 31.358519] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359049] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.359738] ================================================================== [ 31.684713] ================================================================== [ 31.685252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 31.685983] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.686509] [ 31.686712] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.688391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.688697] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.690109] Call Trace: [ 31.690323] <TASK> [ 31.690503] dump_stack_lvl+0x73/0xb0 [ 31.691288] print_report+0xd1/0x640 [ 31.692099] ? __virt_addr_valid+0x1db/0x2d0 [ 31.692467] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.693160] kasan_report+0x102/0x140 [ 31.693536] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.694238] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.694817] kasan_check_range+0x10c/0x1c0 [ 31.695228] __kasan_check_write+0x18/0x20 [ 31.696110] kasan_atomics_helper+0x1b23/0x5450 [ 31.696671] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.697066] ? ret_from_fork_asm+0x1a/0x30 [ 31.697351] ? ret_from_fork+0x41/0x80 [ 31.697997] ? kthread+0x257/0x310 [ 31.698899] kasan_atomics+0x1dd/0x310 [ 31.699250] ? __pfx_kasan_atomics+0x10/0x10 [ 31.699874] ? __pfx_read_tsc+0x10/0x10 [ 31.700246] ? ktime_get_ts64+0x86/0x230 [ 31.700601] kunit_try_run_case+0x1b3/0x490 [ 31.701366] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.702031] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.702902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.703288] ? __kthread_parkme+0x82/0x160 [ 31.703669] ? preempt_count_sub+0x50/0x80 [ 31.704067] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.704515] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.704982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.706086] kthread+0x257/0x310 [ 31.706643] ? __pfx_kthread+0x10/0x10 [ 31.707155] ret_from_fork+0x41/0x80 [ 31.707935] ? __pfx_kthread+0x10/0x10 [ 31.708272] ret_from_fork_asm+0x1a/0x30 [ 31.708831] </TASK> [ 31.709314] [ 31.709535] Allocated by task 274: [ 31.710037] kasan_save_stack+0x3d/0x60 [ 31.710418] kasan_save_track+0x18/0x40 [ 31.710832] kasan_save_alloc_info+0x3b/0x50 [ 31.711161] __kasan_kmalloc+0xb7/0xc0 [ 31.711604] __kmalloc_cache_noprof+0x184/0x410 [ 31.711995] kasan_atomics+0x96/0x310 [ 31.712393] kunit_try_run_case+0x1b3/0x490 [ 31.712825] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.713297] kthread+0x257/0x310 [ 31.713993] ret_from_fork+0x41/0x80 [ 31.714548] ret_from_fork_asm+0x1a/0x30 [ 31.715182] [ 31.715393] The buggy address belongs to the object at ffff888102a59b80 [ 31.715393] which belongs to the cache kmalloc-64 of size 64 [ 31.716854] The buggy address is located 0 bytes to the right of [ 31.716854] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.717647] [ 31.718073] The buggy address belongs to the physical page: [ 31.719042] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.719986] flags: 0x200000000000000(node=0|zone=2) [ 31.720393] page_type: f5(slab) [ 31.720807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.721729] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.722382] page dumped because: kasan: bad access detected [ 31.723122] [ 31.723682] Memory state around the buggy address: [ 31.724090] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.724900] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.725645] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.726084] ^ [ 31.726498] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.727289] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.727859] ================================================================== [ 32.045328] ================================================================== [ 32.046016] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 32.046714] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.047358] [ 32.049279] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.050117] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.050502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.052541] Call Trace: [ 32.052842] <TASK> [ 32.053131] dump_stack_lvl+0x73/0xb0 [ 32.053606] print_report+0xd1/0x640 [ 32.054011] ? __virt_addr_valid+0x1db/0x2d0 [ 32.054521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.055108] kasan_report+0x102/0x140 [ 32.055558] ? kasan_atomics_helper+0x2007/0x5450 [ 32.056021] ? kasan_atomics_helper+0x2007/0x5450 [ 32.056548] kasan_check_range+0x10c/0x1c0 [ 32.056984] __kasan_check_write+0x18/0x20 [ 32.057412] kasan_atomics_helper+0x2007/0x5450 [ 32.057901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.058228] ? ret_from_fork_asm+0x1a/0x30 [ 32.058569] ? ret_from_fork+0x41/0x80 [ 32.058843] ? kthread+0x257/0x310 [ 32.059127] kasan_atomics+0x1dd/0x310 [ 32.059586] ? __pfx_kasan_atomics+0x10/0x10 [ 32.060043] ? __pfx_read_tsc+0x10/0x10 [ 32.060519] ? ktime_get_ts64+0x86/0x230 [ 32.060904] kunit_try_run_case+0x1b3/0x490 [ 32.061360] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.061862] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.062325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.062839] ? __kthread_parkme+0x82/0x160 [ 32.063271] ? preempt_count_sub+0x50/0x80 [ 32.063747] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.064230] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.064818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.065183] kthread+0x257/0x310 [ 32.065592] ? __pfx_kthread+0x10/0x10 [ 32.065954] ret_from_fork+0x41/0x80 [ 32.066354] ? __pfx_kthread+0x10/0x10 [ 32.066786] ret_from_fork_asm+0x1a/0x30 [ 32.067129] </TASK> [ 32.067321] [ 32.067509] Allocated by task 274: [ 32.067738] kasan_save_stack+0x3d/0x60 [ 32.068010] kasan_save_track+0x18/0x40 [ 32.068430] kasan_save_alloc_info+0x3b/0x50 [ 32.068902] __kasan_kmalloc+0xb7/0xc0 [ 32.069302] __kmalloc_cache_noprof+0x184/0x410 [ 32.069799] kasan_atomics+0x96/0x310 [ 32.070199] kunit_try_run_case+0x1b3/0x490 [ 32.070650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.071153] kthread+0x257/0x310 [ 32.071553] ret_from_fork+0x41/0x80 [ 32.071934] ret_from_fork_asm+0x1a/0x30 [ 32.072311] [ 32.072560] The buggy address belongs to the object at ffff888102a59b80 [ 32.072560] which belongs to the cache kmalloc-64 of size 64 [ 32.073124] The buggy address is located 0 bytes to the right of [ 32.073124] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.074154] [ 32.074373] The buggy address belongs to the physical page: [ 32.074924] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.075610] flags: 0x200000000000000(node=0|zone=2) [ 32.076009] page_type: f5(slab) [ 32.076366] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.076951] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.077428] page dumped because: kasan: bad access detected [ 32.077879] [ 32.078030] Memory state around the buggy address: [ 32.080144] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.080769] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.081257] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.081846] ^ [ 32.083643] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.084171] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.084548] ================================================================== [ 29.872491] ================================================================== [ 29.874170] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 29.874724] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 29.875413] [ 29.875709] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 29.876749] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.877192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.877984] Call Trace: [ 29.878321] <TASK> [ 29.878785] dump_stack_lvl+0x73/0xb0 [ 29.879100] print_report+0xd1/0x640 [ 29.879703] ? __virt_addr_valid+0x1db/0x2d0 [ 29.880179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.880681] kasan_report+0x102/0x140 [ 29.881002] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.881532] ? kasan_atomics_helper+0x4b70/0x5450 [ 29.881948] __asan_report_store4_noabort+0x1b/0x30 [ 29.882401] kasan_atomics_helper+0x4b70/0x5450 [ 29.882865] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.883276] ? ret_from_fork_asm+0x1a/0x30 [ 29.883821] ? ret_from_fork+0x41/0x80 [ 29.884300] ? kthread+0x257/0x310 [ 29.884572] kasan_atomics+0x1dd/0x310 [ 29.885296] ? __pfx_kasan_atomics+0x10/0x10 [ 29.885795] ? __pfx_read_tsc+0x10/0x10 [ 29.886420] ? ktime_get_ts64+0x86/0x230 [ 29.887106] kunit_try_run_case+0x1b3/0x490 [ 29.887605] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.887970] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.888347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.888920] ? __kthread_parkme+0x82/0x160 [ 29.889318] ? preempt_count_sub+0x50/0x80 [ 29.889744] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.890278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.890948] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.891404] kthread+0x257/0x310 [ 29.892068] ? __pfx_kthread+0x10/0x10 [ 29.892565] ret_from_fork+0x41/0x80 [ 29.893128] ? __pfx_kthread+0x10/0x10 [ 29.893665] ret_from_fork_asm+0x1a/0x30 [ 29.894153] </TASK> [ 29.894423] [ 29.894713] Allocated by task 274: [ 29.894952] kasan_save_stack+0x3d/0x60 [ 29.895439] kasan_save_track+0x18/0x40 [ 29.896281] kasan_save_alloc_info+0x3b/0x50 [ 29.896943] __kasan_kmalloc+0xb7/0xc0 [ 29.897433] __kmalloc_cache_noprof+0x184/0x410 [ 29.898174] kasan_atomics+0x96/0x310 [ 29.898499] kunit_try_run_case+0x1b3/0x490 [ 29.899288] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.899769] kthread+0x257/0x310 [ 29.900224] ret_from_fork+0x41/0x80 [ 29.900524] ret_from_fork_asm+0x1a/0x30 [ 29.901007] [ 29.901232] The buggy address belongs to the object at ffff888102a59b80 [ 29.901232] which belongs to the cache kmalloc-64 of size 64 [ 29.901997] The buggy address is located 0 bytes to the right of [ 29.901997] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 29.903138] [ 29.903287] The buggy address belongs to the physical page: [ 29.904354] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 29.905120] flags: 0x200000000000000(node=0|zone=2) [ 29.905929] page_type: f5(slab) [ 29.906519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.906940] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.907594] page dumped because: kasan: bad access detected [ 29.907970] [ 29.908171] Memory state around the buggy address: [ 29.908456] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.909018] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.909548] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.910367] ^ [ 29.910646] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.911357] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.911919] ================================================================== [ 30.928817] ================================================================== [ 30.929526] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 30.930237] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.931354] [ 30.932231] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.933021] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.933425] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.934924] Call Trace: [ 30.935548] <TASK> [ 30.935770] dump_stack_lvl+0x73/0xb0 [ 30.936134] print_report+0xd1/0x640 [ 30.936423] ? __virt_addr_valid+0x1db/0x2d0 [ 30.936849] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.937609] kasan_report+0x102/0x140 [ 30.937908] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.938383] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.938703] __asan_report_load4_noabort+0x18/0x20 [ 30.939244] kasan_atomics_helper+0x4a04/0x5450 [ 30.939764] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.940110] ? ret_from_fork_asm+0x1a/0x30 [ 30.940566] ? ret_from_fork+0x41/0x80 [ 30.940974] ? kthread+0x257/0x310 [ 30.941365] kasan_atomics+0x1dd/0x310 [ 30.941741] ? __pfx_kasan_atomics+0x10/0x10 [ 30.942038] ? __pfx_read_tsc+0x10/0x10 [ 30.942631] ? ktime_get_ts64+0x86/0x230 [ 30.943112] kunit_try_run_case+0x1b3/0x490 [ 30.943638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.944153] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.944705] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.945257] ? __kthread_parkme+0x82/0x160 [ 30.945754] ? preempt_count_sub+0x50/0x80 [ 30.946332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.946860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.947528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.948119] kthread+0x257/0x310 [ 30.948537] ? __pfx_kthread+0x10/0x10 [ 30.949036] ret_from_fork+0x41/0x80 [ 30.949524] ? __pfx_kthread+0x10/0x10 [ 30.949945] ret_from_fork_asm+0x1a/0x30 [ 30.950404] </TASK> [ 30.950699] [ 30.950905] Allocated by task 274: [ 30.951237] kasan_save_stack+0x3d/0x60 [ 30.952305] kasan_save_track+0x18/0x40 [ 30.952689] kasan_save_alloc_info+0x3b/0x50 [ 30.953108] __kasan_kmalloc+0xb7/0xc0 [ 30.953573] __kmalloc_cache_noprof+0x184/0x410 [ 30.954027] kasan_atomics+0x96/0x310 [ 30.954534] kunit_try_run_case+0x1b3/0x490 [ 30.955102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.955711] kthread+0x257/0x310 [ 30.955953] ret_from_fork+0x41/0x80 [ 30.956393] ret_from_fork_asm+0x1a/0x30 [ 30.957198] [ 30.957406] The buggy address belongs to the object at ffff888102a59b80 [ 30.957406] which belongs to the cache kmalloc-64 of size 64 [ 30.958861] The buggy address is located 0 bytes to the right of [ 30.958861] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.959931] [ 30.960418] The buggy address belongs to the physical page: [ 30.960949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.962038] flags: 0x200000000000000(node=0|zone=2) [ 30.962410] page_type: f5(slab) [ 30.962874] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.963779] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.964144] page dumped because: kasan: bad access detected [ 30.964943] [ 30.965175] Memory state around the buggy address: [ 30.965866] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.966427] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.967147] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.968109] ^ [ 30.968727] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.969412] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.970219] ================================================================== [ 30.888426] ================================================================== [ 30.888905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 30.889935] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.890639] [ 30.890900] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.891875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.892328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.893184] Call Trace: [ 30.893520] <TASK> [ 30.893819] dump_stack_lvl+0x73/0xb0 [ 30.894275] print_report+0xd1/0x640 [ 30.894890] ? __virt_addr_valid+0x1db/0x2d0 [ 30.895403] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.895997] kasan_report+0x102/0x140 [ 30.896478] ? kasan_atomics_helper+0x1149/0x5450 [ 30.896993] ? kasan_atomics_helper+0x1149/0x5450 [ 30.897544] kasan_check_range+0x10c/0x1c0 [ 30.898015] __kasan_check_write+0x18/0x20 [ 30.898502] kasan_atomics_helper+0x1149/0x5450 [ 30.899038] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.899668] ? ret_from_fork_asm+0x1a/0x30 [ 30.900154] ? ret_from_fork+0x41/0x80 [ 30.900611] ? kthread+0x257/0x310 [ 30.901096] kasan_atomics+0x1dd/0x310 [ 30.901443] ? __pfx_kasan_atomics+0x10/0x10 [ 30.901765] ? __pfx_read_tsc+0x10/0x10 [ 30.902037] ? ktime_get_ts64+0x86/0x230 [ 30.902340] kunit_try_run_case+0x1b3/0x490 [ 30.902659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.902965] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.903275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.903580] ? __kthread_parkme+0x82/0x160 [ 30.903853] ? preempt_count_sub+0x50/0x80 [ 30.904230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.904833] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.905464] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.906099] kthread+0x257/0x310 [ 30.906512] ? __pfx_kthread+0x10/0x10 [ 30.906948] ret_from_fork+0x41/0x80 [ 30.907392] ? __pfx_kthread+0x10/0x10 [ 30.907827] ret_from_fork_asm+0x1a/0x30 [ 30.908324] </TASK> [ 30.908718] [ 30.908946] Allocated by task 274: [ 30.909724] kasan_save_stack+0x3d/0x60 [ 30.910487] kasan_save_track+0x18/0x40 [ 30.911316] kasan_save_alloc_info+0x3b/0x50 [ 30.911930] __kasan_kmalloc+0xb7/0xc0 [ 30.912109] __kmalloc_cache_noprof+0x184/0x410 [ 30.912273] kasan_atomics+0x96/0x310 [ 30.912424] kunit_try_run_case+0x1b3/0x490 [ 30.913205] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.913763] kthread+0x257/0x310 [ 30.914141] ret_from_fork+0x41/0x80 [ 30.914539] ret_from_fork_asm+0x1a/0x30 [ 30.915132] [ 30.915346] The buggy address belongs to the object at ffff888102a59b80 [ 30.915346] which belongs to the cache kmalloc-64 of size 64 [ 30.916905] The buggy address is located 0 bytes to the right of [ 30.916905] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.918249] [ 30.918415] The buggy address belongs to the physical page: [ 30.919115] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.919562] flags: 0x200000000000000(node=0|zone=2) [ 30.920289] page_type: f5(slab) [ 30.920652] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.921309] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.921817] page dumped because: kasan: bad access detected [ 30.922291] [ 30.922937] Memory state around the buggy address: [ 30.923402] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.924216] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.924632] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.925285] ^ [ 30.925778] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.926377] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.927349] ================================================================== [ 30.737073] ================================================================== [ 30.737505] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 30.738315] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.738967] [ 30.739277] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.739881] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.740273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.740906] Call Trace: [ 30.741092] <TASK> [ 30.741251] dump_stack_lvl+0x73/0xb0 [ 30.741811] print_report+0xd1/0x640 [ 30.742334] ? __virt_addr_valid+0x1db/0x2d0 [ 30.742826] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.743586] kasan_report+0x102/0x140 [ 30.744025] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.744517] ? kasan_atomics_helper+0xfaa/0x5450 [ 30.745013] kasan_check_range+0x10c/0x1c0 [ 30.745413] __kasan_check_write+0x18/0x20 [ 30.745713] kasan_atomics_helper+0xfaa/0x5450 [ 30.746006] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.746640] ? ret_from_fork_asm+0x1a/0x30 [ 30.747048] ? ret_from_fork+0x41/0x80 [ 30.747507] ? kthread+0x257/0x310 [ 30.747952] kasan_atomics+0x1dd/0x310 [ 30.748483] ? __pfx_kasan_atomics+0x10/0x10 [ 30.748991] ? __pfx_read_tsc+0x10/0x10 [ 30.749409] ? ktime_get_ts64+0x86/0x230 [ 30.749878] kunit_try_run_case+0x1b3/0x490 [ 30.750190] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.750552] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.751145] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.751731] ? __kthread_parkme+0x82/0x160 [ 30.752231] ? preempt_count_sub+0x50/0x80 [ 30.752765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.754246] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.754805] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.755161] kthread+0x257/0x310 [ 30.755407] ? __pfx_kthread+0x10/0x10 [ 30.755679] ret_from_fork+0x41/0x80 [ 30.756272] ? __pfx_kthread+0x10/0x10 [ 30.756820] ret_from_fork_asm+0x1a/0x30 [ 30.757305] </TASK> [ 30.757736] [ 30.757978] Allocated by task 274: [ 30.758524] kasan_save_stack+0x3d/0x60 [ 30.759031] kasan_save_track+0x18/0x40 [ 30.759585] kasan_save_alloc_info+0x3b/0x50 [ 30.760129] __kasan_kmalloc+0xb7/0xc0 [ 30.760651] __kmalloc_cache_noprof+0x184/0x410 [ 30.761191] kasan_atomics+0x96/0x310 [ 30.761689] kunit_try_run_case+0x1b3/0x490 [ 30.762227] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.762861] kthread+0x257/0x310 [ 30.763259] ret_from_fork+0x41/0x80 [ 30.763797] ret_from_fork_asm+0x1a/0x30 [ 30.764274] [ 30.764583] The buggy address belongs to the object at ffff888102a59b80 [ 30.764583] which belongs to the cache kmalloc-64 of size 64 [ 30.765688] The buggy address is located 0 bytes to the right of [ 30.765688] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.766813] [ 30.766910] The buggy address belongs to the physical page: [ 30.767121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.767605] flags: 0x200000000000000(node=0|zone=2) [ 30.768016] page_type: f5(slab) [ 30.768380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.768827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.769480] page dumped because: kasan: bad access detected [ 30.769999] [ 30.770226] Memory state around the buggy address: [ 30.770617] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.771264] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.771778] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.772423] ^ [ 30.772924] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.773370] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.773787] ================================================================== [ 30.627136] ================================================================== [ 30.627529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 30.628263] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.628834] [ 30.629100] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.629865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.630137] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.630896] Call Trace: [ 30.631215] <TASK> [ 30.631557] dump_stack_lvl+0x73/0xb0 [ 30.631981] print_report+0xd1/0x640 [ 30.632405] ? __virt_addr_valid+0x1db/0x2d0 [ 30.632828] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.633198] kasan_report+0x102/0x140 [ 30.633676] ? kasan_atomics_helper+0xde1/0x5450 [ 30.634157] ? kasan_atomics_helper+0xde1/0x5450 [ 30.634684] kasan_check_range+0x10c/0x1c0 [ 30.635046] __kasan_check_write+0x18/0x20 [ 30.635344] kasan_atomics_helper+0xde1/0x5450 [ 30.635848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.636375] ? ret_from_fork_asm+0x1a/0x30 [ 30.636858] ? ret_from_fork+0x41/0x80 [ 30.637297] ? kthread+0x257/0x310 [ 30.637615] kasan_atomics+0x1dd/0x310 [ 30.637912] ? __pfx_kasan_atomics+0x10/0x10 [ 30.638393] ? __pfx_read_tsc+0x10/0x10 [ 30.638842] ? ktime_get_ts64+0x86/0x230 [ 30.639310] kunit_try_run_case+0x1b3/0x490 [ 30.639702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.640011] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.640496] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.640999] ? __kthread_parkme+0x82/0x160 [ 30.641471] ? preempt_count_sub+0x50/0x80 [ 30.641905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.642422] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.642971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.643488] kthread+0x257/0x310 [ 30.643868] ? __pfx_kthread+0x10/0x10 [ 30.644232] ret_from_fork+0x41/0x80 [ 30.644558] ? __pfx_kthread+0x10/0x10 [ 30.644901] ret_from_fork_asm+0x1a/0x30 [ 30.645410] </TASK> [ 30.645716] [ 30.645939] Allocated by task 274: [ 30.646303] kasan_save_stack+0x3d/0x60 [ 30.646777] kasan_save_track+0x18/0x40 [ 30.647120] kasan_save_alloc_info+0x3b/0x50 [ 30.647539] __kasan_kmalloc+0xb7/0xc0 [ 30.647799] __kmalloc_cache_noprof+0x184/0x410 [ 30.648106] kasan_atomics+0x96/0x310 [ 30.648367] kunit_try_run_case+0x1b3/0x490 [ 30.648814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.649354] kthread+0x257/0x310 [ 30.649746] ret_from_fork+0x41/0x80 [ 30.650148] ret_from_fork_asm+0x1a/0x30 [ 30.650618] [ 30.650832] The buggy address belongs to the object at ffff888102a59b80 [ 30.650832] which belongs to the cache kmalloc-64 of size 64 [ 30.651537] The buggy address is located 0 bytes to the right of [ 30.651537] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.652608] [ 30.652803] The buggy address belongs to the physical page: [ 30.653272] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.653809] flags: 0x200000000000000(node=0|zone=2) [ 30.654137] page_type: f5(slab) [ 30.654519] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.655168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.655844] page dumped because: kasan: bad access detected [ 30.656280] [ 30.656477] Memory state around the buggy address: [ 30.656759] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.657149] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.657806] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.658467] ^ [ 30.658919] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.659545] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.659949] ================================================================== [ 30.141534] ================================================================== [ 30.142477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 30.143827] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.145712] [ 30.145969] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.146813] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.147192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.147802] Call Trace: [ 30.148787] <TASK> [ 30.148992] dump_stack_lvl+0x73/0xb0 [ 30.149251] print_report+0xd1/0x640 [ 30.149960] ? __virt_addr_valid+0x1db/0x2d0 [ 30.150335] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.151521] kasan_report+0x102/0x140 [ 30.151835] ? kasan_atomics_helper+0x698/0x5450 [ 30.152241] ? kasan_atomics_helper+0x698/0x5450 [ 30.152986] kasan_check_range+0x10c/0x1c0 [ 30.153347] __kasan_check_write+0x18/0x20 [ 30.154132] kasan_atomics_helper+0x698/0x5450 [ 30.154483] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.155173] ? ret_from_fork_asm+0x1a/0x30 [ 30.155696] ? ret_from_fork+0x41/0x80 [ 30.156033] ? kthread+0x257/0x310 [ 30.156387] kasan_atomics+0x1dd/0x310 [ 30.157352] ? __pfx_kasan_atomics+0x10/0x10 [ 30.157735] ? __pfx_read_tsc+0x10/0x10 [ 30.158050] ? ktime_get_ts64+0x86/0x230 [ 30.158704] kunit_try_run_case+0x1b3/0x490 [ 30.159299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.159922] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.160318] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.160764] ? __kthread_parkme+0x82/0x160 [ 30.161205] ? preempt_count_sub+0x50/0x80 [ 30.161651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.161947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.162593] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.163209] kthread+0x257/0x310 [ 30.163649] ? __pfx_kthread+0x10/0x10 [ 30.164031] ret_from_fork+0x41/0x80 [ 30.164352] ? __pfx_kthread+0x10/0x10 [ 30.164875] ret_from_fork_asm+0x1a/0x30 [ 30.165337] </TASK> [ 30.165711] [ 30.165881] Allocated by task 274: [ 30.166276] kasan_save_stack+0x3d/0x60 [ 30.166809] kasan_save_track+0x18/0x40 [ 30.167197] kasan_save_alloc_info+0x3b/0x50 [ 30.167752] __kasan_kmalloc+0xb7/0xc0 [ 30.168150] __kmalloc_cache_noprof+0x184/0x410 [ 30.168631] kasan_atomics+0x96/0x310 [ 30.169075] kunit_try_run_case+0x1b3/0x490 [ 30.169522] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.169856] kthread+0x257/0x310 [ 30.170118] ret_from_fork+0x41/0x80 [ 30.170561] ret_from_fork_asm+0x1a/0x30 [ 30.170969] [ 30.171258] The buggy address belongs to the object at ffff888102a59b80 [ 30.171258] which belongs to the cache kmalloc-64 of size 64 [ 30.172455] The buggy address is located 0 bytes to the right of [ 30.172455] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.173094] [ 30.173425] The buggy address belongs to the physical page: [ 30.174157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.175087] flags: 0x200000000000000(node=0|zone=2) [ 30.175622] page_type: f5(slab) [ 30.175951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.176663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.177323] page dumped because: kasan: bad access detected [ 30.177699] [ 30.177849] Memory state around the buggy address: [ 30.178152] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.179040] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.179740] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.180114] ^ [ 30.180406] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.181095] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.181680] ================================================================== [ 32.313525] ================================================================== [ 32.314231] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 32.315019] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.315698] [ 32.315924] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.316824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.317237] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.317989] Call Trace: [ 32.318306] <TASK> [ 32.318598] dump_stack_lvl+0x73/0xb0 [ 32.318888] print_report+0xd1/0x640 [ 32.319222] ? __virt_addr_valid+0x1db/0x2d0 [ 32.319782] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.320314] kasan_report+0x102/0x140 [ 32.320799] ? kasan_atomics_helper+0x5117/0x5450 [ 32.321135] ? kasan_atomics_helper+0x5117/0x5450 [ 32.321678] __asan_report_load8_noabort+0x18/0x20 [ 32.322200] kasan_atomics_helper+0x5117/0x5450 [ 32.322701] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.323123] ? ret_from_fork_asm+0x1a/0x30 [ 32.323502] ? ret_from_fork+0x41/0x80 [ 32.323901] ? kthread+0x257/0x310 [ 32.324309] kasan_atomics+0x1dd/0x310 [ 32.324828] ? __pfx_kasan_atomics+0x10/0x10 [ 32.325284] ? __pfx_read_tsc+0x10/0x10 [ 32.325760] ? ktime_get_ts64+0x86/0x230 [ 32.326231] kunit_try_run_case+0x1b3/0x490 [ 32.326702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.327016] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.327521] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.327902] ? __kthread_parkme+0x82/0x160 [ 32.328367] ? preempt_count_sub+0x50/0x80 [ 32.328856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.329376] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.329879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.330234] kthread+0x257/0x310 [ 32.330525] ? __pfx_kthread+0x10/0x10 [ 32.330917] ret_from_fork+0x41/0x80 [ 32.331333] ? __pfx_kthread+0x10/0x10 [ 32.331826] ret_from_fork_asm+0x1a/0x30 [ 32.332330] </TASK> [ 32.332661] [ 32.332874] Allocated by task 274: [ 32.333433] kasan_save_stack+0x3d/0x60 [ 32.334606] kasan_save_track+0x18/0x40 [ 32.335096] kasan_save_alloc_info+0x3b/0x50 [ 32.335553] __kasan_kmalloc+0xb7/0xc0 [ 32.335937] __kmalloc_cache_noprof+0x184/0x410 [ 32.336278] kasan_atomics+0x96/0x310 [ 32.336545] kunit_try_run_case+0x1b3/0x490 [ 32.336822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.337304] kthread+0x257/0x310 [ 32.337743] ret_from_fork+0x41/0x80 [ 32.338144] ret_from_fork_asm+0x1a/0x30 [ 32.338587] [ 32.338801] The buggy address belongs to the object at ffff888102a59b80 [ 32.338801] which belongs to the cache kmalloc-64 of size 64 [ 32.339839] The buggy address is located 0 bytes to the right of [ 32.339839] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.340875] [ 32.341113] The buggy address belongs to the physical page: [ 32.341520] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.342123] flags: 0x200000000000000(node=0|zone=2) [ 32.342605] page_type: f5(slab) [ 32.342967] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.343532] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.344123] page dumped because: kasan: bad access detected [ 32.344517] [ 32.344671] Memory state around the buggy address: [ 32.345007] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.345378] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.346094] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.346775] ^ [ 32.347295] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.347968] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.348653] ================================================================== [ 32.123846] ================================================================== [ 32.124382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 32.124852] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.126516] [ 32.126771] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.127515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.127909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.128579] Call Trace: [ 32.128843] <TASK> [ 32.129133] dump_stack_lvl+0x73/0xb0 [ 32.129570] print_report+0xd1/0x640 [ 32.129906] ? __virt_addr_valid+0x1db/0x2d0 [ 32.130247] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.130640] kasan_report+0x102/0x140 [ 32.131047] ? kasan_atomics_helper+0x20c9/0x5450 [ 32.131565] ? kasan_atomics_helper+0x20c9/0x5450 [ 32.132048] kasan_check_range+0x10c/0x1c0 [ 32.132529] __kasan_check_write+0x18/0x20 [ 32.132867] kasan_atomics_helper+0x20c9/0x5450 [ 32.133261] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.133680] ? ret_from_fork_asm+0x1a/0x30 [ 32.133971] ? ret_from_fork+0x41/0x80 [ 32.134361] ? kthread+0x257/0x310 [ 32.134830] kasan_atomics+0x1dd/0x310 [ 32.135259] ? __pfx_kasan_atomics+0x10/0x10 [ 32.135607] ? __pfx_read_tsc+0x10/0x10 [ 32.136003] ? ktime_get_ts64+0x86/0x230 [ 32.136364] kunit_try_run_case+0x1b3/0x490 [ 32.136713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.137012] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.137540] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.138034] ? __kthread_parkme+0x82/0x160 [ 32.138511] ? preempt_count_sub+0x50/0x80 [ 32.138932] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.139414] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.139973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.141469] kthread+0x257/0x310 [ 32.141734] ? __pfx_kthread+0x10/0x10 [ 32.141994] ret_from_fork+0x41/0x80 [ 32.142270] ? __pfx_kthread+0x10/0x10 [ 32.142671] ret_from_fork_asm+0x1a/0x30 [ 32.143192] </TASK> [ 32.143393] [ 32.143581] Allocated by task 274: [ 32.143959] kasan_save_stack+0x3d/0x60 [ 32.144426] kasan_save_track+0x18/0x40 [ 32.144877] kasan_save_alloc_info+0x3b/0x50 [ 32.145333] __kasan_kmalloc+0xb7/0xc0 [ 32.145701] __kmalloc_cache_noprof+0x184/0x410 [ 32.146181] kasan_atomics+0x96/0x310 [ 32.146489] kunit_try_run_case+0x1b3/0x490 [ 32.146777] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.147244] kthread+0x257/0x310 [ 32.147649] ret_from_fork+0x41/0x80 [ 32.148026] ret_from_fork_asm+0x1a/0x30 [ 32.148520] [ 32.148776] The buggy address belongs to the object at ffff888102a59b80 [ 32.148776] which belongs to the cache kmalloc-64 of size 64 [ 32.149548] The buggy address is located 0 bytes to the right of [ 32.149548] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.150573] [ 32.150795] The buggy address belongs to the physical page: [ 32.151328] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.151912] flags: 0x200000000000000(node=0|zone=2) [ 32.152414] page_type: f5(slab) [ 32.152806] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.153315] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.153986] page dumped because: kasan: bad access detected [ 32.154431] [ 32.154624] Memory state around the buggy address: [ 32.155131] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.155794] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.156289] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.156903] ^ [ 32.157399] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.157848] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.158421] ================================================================== [ 31.477670] ================================================================== [ 31.479676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 31.480669] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.481190] [ 31.481485] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.482619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.483127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.484025] Call Trace: [ 31.484483] <TASK> [ 31.484742] dump_stack_lvl+0x73/0xb0 [ 31.485130] print_report+0xd1/0x640 [ 31.485541] ? __virt_addr_valid+0x1db/0x2d0 [ 31.485914] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.486545] kasan_report+0x102/0x140 [ 31.486992] ? kasan_atomics_helper+0x1819/0x5450 [ 31.487563] ? kasan_atomics_helper+0x1819/0x5450 [ 31.488033] kasan_check_range+0x10c/0x1c0 [ 31.488583] __kasan_check_write+0x18/0x20 [ 31.489045] kasan_atomics_helper+0x1819/0x5450 [ 31.489631] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.490071] ? ret_from_fork_asm+0x1a/0x30 [ 31.490527] ? ret_from_fork+0x41/0x80 [ 31.491021] ? kthread+0x257/0x310 [ 31.491419] kasan_atomics+0x1dd/0x310 [ 31.491924] ? __pfx_kasan_atomics+0x10/0x10 [ 31.492358] ? __pfx_read_tsc+0x10/0x10 [ 31.492714] ? ktime_get_ts64+0x86/0x230 [ 31.493260] kunit_try_run_case+0x1b3/0x490 [ 31.493818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.494303] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.494814] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.495332] ? __kthread_parkme+0x82/0x160 [ 31.495791] ? preempt_count_sub+0x50/0x80 [ 31.496244] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.496672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.497285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.497908] kthread+0x257/0x310 [ 31.498233] ? __pfx_kthread+0x10/0x10 [ 31.498732] ret_from_fork+0x41/0x80 [ 31.499142] ? __pfx_kthread+0x10/0x10 [ 31.499569] ret_from_fork_asm+0x1a/0x30 [ 31.500019] </TASK> [ 31.500336] [ 31.500604] Allocated by task 274: [ 31.501016] kasan_save_stack+0x3d/0x60 [ 31.501493] kasan_save_track+0x18/0x40 [ 31.501952] kasan_save_alloc_info+0x3b/0x50 [ 31.502380] __kasan_kmalloc+0xb7/0xc0 [ 31.502848] __kmalloc_cache_noprof+0x184/0x410 [ 31.503227] kasan_atomics+0x96/0x310 [ 31.503732] kunit_try_run_case+0x1b3/0x490 [ 31.504228] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.504761] kthread+0x257/0x310 [ 31.505097] ret_from_fork+0x41/0x80 [ 31.505590] ret_from_fork_asm+0x1a/0x30 [ 31.505920] [ 31.506154] The buggy address belongs to the object at ffff888102a59b80 [ 31.506154] which belongs to the cache kmalloc-64 of size 64 [ 31.507031] The buggy address is located 0 bytes to the right of [ 31.507031] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.508090] [ 31.508370] The buggy address belongs to the physical page: [ 31.508871] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.509599] flags: 0x200000000000000(node=0|zone=2) [ 31.510118] page_type: f5(slab) [ 31.510518] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.511002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.511737] page dumped because: kasan: bad access detected [ 31.512197] [ 31.512350] Memory state around the buggy address: [ 31.512896] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.513486] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.514021] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.514685] ^ [ 31.515083] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.515787] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.516307] ================================================================== [ 31.081181] ================================================================== [ 31.082035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 31.082759] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.083269] [ 31.083582] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.084236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.084681] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.085300] Call Trace: [ 31.085655] <TASK> [ 31.085907] dump_stack_lvl+0x73/0xb0 [ 31.086340] print_report+0xd1/0x640 [ 31.086800] ? __virt_addr_valid+0x1db/0x2d0 [ 31.087217] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.087773] kasan_report+0x102/0x140 [ 31.088216] ? kasan_atomics_helper+0x49d0/0x5450 [ 31.088675] ? kasan_atomics_helper+0x49d0/0x5450 [ 31.089180] __asan_report_load4_noabort+0x18/0x20 [ 31.089595] kasan_atomics_helper+0x49d0/0x5450 [ 31.089901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.090340] ? ret_from_fork_asm+0x1a/0x30 [ 31.090854] ? ret_from_fork+0x41/0x80 [ 31.091270] ? kthread+0x257/0x310 [ 31.091729] kasan_atomics+0x1dd/0x310 [ 31.092165] ? __pfx_kasan_atomics+0x10/0x10 [ 31.092698] ? __pfx_read_tsc+0x10/0x10 [ 31.093084] ? ktime_get_ts64+0x86/0x230 [ 31.093407] kunit_try_run_case+0x1b3/0x490 [ 31.093929] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.094320] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.094872] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.095213] ? __kthread_parkme+0x82/0x160 [ 31.095706] ? preempt_count_sub+0x50/0x80 [ 31.096161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.096669] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.097211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.097729] kthread+0x257/0x310 [ 31.098098] ? __pfx_kthread+0x10/0x10 [ 31.098581] ret_from_fork+0x41/0x80 [ 31.098924] ? __pfx_kthread+0x10/0x10 [ 31.099214] ret_from_fork_asm+0x1a/0x30 [ 31.099570] </TASK> [ 31.099801] [ 31.099960] Allocated by task 274: [ 31.100204] kasan_save_stack+0x3d/0x60 [ 31.100535] kasan_save_track+0x18/0x40 [ 31.100789] kasan_save_alloc_info+0x3b/0x50 [ 31.101221] __kasan_kmalloc+0xb7/0xc0 [ 31.101623] __kmalloc_cache_noprof+0x184/0x410 [ 31.102072] kasan_atomics+0x96/0x310 [ 31.102479] kunit_try_run_case+0x1b3/0x490 [ 31.102903] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.103416] kthread+0x257/0x310 [ 31.103810] ret_from_fork+0x41/0x80 [ 31.104195] ret_from_fork_asm+0x1a/0x30 [ 31.104593] [ 31.104746] The buggy address belongs to the object at ffff888102a59b80 [ 31.104746] which belongs to the cache kmalloc-64 of size 64 [ 31.105386] The buggy address is located 0 bytes to the right of [ 31.105386] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.106411] [ 31.106672] The buggy address belongs to the physical page: [ 31.107153] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.107739] flags: 0x200000000000000(node=0|zone=2) [ 31.108135] page_type: f5(slab) [ 31.108496] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.109760] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.110871] page dumped because: kasan: bad access detected [ 31.111327] [ 31.111532] Memory state around the buggy address: [ 31.111881] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.114216] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.115037] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.115594] ^ [ 31.115922] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.116478] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.116934] ================================================================== [ 32.085868] ================================================================== [ 32.086523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 32.087198] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.087849] [ 32.088101] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.088967] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.089378] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.090138] Call Trace: [ 32.090474] <TASK> [ 32.090759] dump_stack_lvl+0x73/0xb0 [ 32.091200] print_report+0xd1/0x640 [ 32.091647] ? __virt_addr_valid+0x1db/0x2d0 [ 32.092076] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.092425] kasan_report+0x102/0x140 [ 32.092734] ? kasan_atomics_helper+0x4f9a/0x5450 [ 32.093121] ? kasan_atomics_helper+0x4f9a/0x5450 [ 32.093640] __asan_report_load8_noabort+0x18/0x20 [ 32.094121] kasan_atomics_helper+0x4f9a/0x5450 [ 32.094615] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.095145] ? ret_from_fork_asm+0x1a/0x30 [ 32.095626] ? ret_from_fork+0x41/0x80 [ 32.095959] ? kthread+0x257/0x310 [ 32.096246] kasan_atomics+0x1dd/0x310 [ 32.096573] ? __pfx_kasan_atomics+0x10/0x10 [ 32.096953] ? __pfx_read_tsc+0x10/0x10 [ 32.097364] ? ktime_get_ts64+0x86/0x230 [ 32.097812] kunit_try_run_case+0x1b3/0x490 [ 32.098263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.098774] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.099263] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.099770] ? __kthread_parkme+0x82/0x160 [ 32.100191] ? preempt_count_sub+0x50/0x80 [ 32.100665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.101126] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.101517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.102024] kthread+0x257/0x310 [ 32.102398] ? __pfx_kthread+0x10/0x10 [ 32.102838] ret_from_fork+0x41/0x80 [ 32.103243] ? __pfx_kthread+0x10/0x10 [ 32.103576] ret_from_fork_asm+0x1a/0x30 [ 32.104017] </TASK> [ 32.104256] [ 32.104419] Allocated by task 274: [ 32.104829] kasan_save_stack+0x3d/0x60 [ 32.105240] kasan_save_track+0x18/0x40 [ 32.105661] kasan_save_alloc_info+0x3b/0x50 [ 32.106109] __kasan_kmalloc+0xb7/0xc0 [ 32.106420] __kmalloc_cache_noprof+0x184/0x410 [ 32.106756] kasan_atomics+0x96/0x310 [ 32.107142] kunit_try_run_case+0x1b3/0x490 [ 32.107566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.108081] kthread+0x257/0x310 [ 32.108438] ret_from_fork+0x41/0x80 [ 32.108789] ret_from_fork_asm+0x1a/0x30 [ 32.110695] [ 32.111676] The buggy address belongs to the object at ffff888102a59b80 [ 32.111676] which belongs to the cache kmalloc-64 of size 64 [ 32.113573] The buggy address is located 0 bytes to the right of [ 32.113573] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.114500] [ 32.114668] The buggy address belongs to the physical page: [ 32.115493] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.116123] flags: 0x200000000000000(node=0|zone=2) [ 32.116431] page_type: f5(slab) [ 32.116823] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.117389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.117926] page dumped because: kasan: bad access detected [ 32.118277] [ 32.118526] Memory state around the buggy address: [ 32.118948] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.119491] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.120003] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.120627] ^ [ 32.120978] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.121697] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.122165] ================================================================== [ 31.192087] ================================================================== [ 31.192713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 31.193347] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.193893] [ 31.194153] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.194815] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.195069] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.195737] Call Trace: [ 31.196038] <TASK> [ 31.196325] dump_stack_lvl+0x73/0xb0 [ 31.196682] print_report+0xd1/0x640 [ 31.196961] ? __virt_addr_valid+0x1db/0x2d0 [ 31.197408] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.197968] kasan_report+0x102/0x140 [ 31.198368] ? kasan_atomics_helper+0x1468/0x5450 [ 31.198860] ? kasan_atomics_helper+0x1468/0x5450 [ 31.199320] kasan_check_range+0x10c/0x1c0 [ 31.199659] __kasan_check_write+0x18/0x20 [ 31.199972] kasan_atomics_helper+0x1468/0x5450 [ 31.200498] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.200968] ? ret_from_fork_asm+0x1a/0x30 [ 31.201846] ? ret_from_fork+0x41/0x80 [ 31.202270] ? kthread+0x257/0x310 [ 31.202671] kasan_atomics+0x1dd/0x310 [ 31.203090] ? __pfx_kasan_atomics+0x10/0x10 [ 31.204319] ? __pfx_read_tsc+0x10/0x10 [ 31.204879] ? ktime_get_ts64+0x86/0x230 [ 31.205464] kunit_try_run_case+0x1b3/0x490 [ 31.206033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.206567] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.206915] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.207688] ? __kthread_parkme+0x82/0x160 [ 31.208244] ? preempt_count_sub+0x50/0x80 [ 31.208743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.209281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.209660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.210378] kthread+0x257/0x310 [ 31.210875] ? __pfx_kthread+0x10/0x10 [ 31.211393] ret_from_fork+0x41/0x80 [ 31.211901] ? __pfx_kthread+0x10/0x10 [ 31.212363] ret_from_fork_asm+0x1a/0x30 [ 31.212936] </TASK> [ 31.213172] [ 31.213343] Allocated by task 274: [ 31.213780] kasan_save_stack+0x3d/0x60 [ 31.214210] kasan_save_track+0x18/0x40 [ 31.214621] kasan_save_alloc_info+0x3b/0x50 [ 31.215029] __kasan_kmalloc+0xb7/0xc0 [ 31.215476] __kmalloc_cache_noprof+0x184/0x410 [ 31.215900] kasan_atomics+0x96/0x310 [ 31.216349] kunit_try_run_case+0x1b3/0x490 [ 31.216770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.217283] kthread+0x257/0x310 [ 31.217672] ret_from_fork+0x41/0x80 [ 31.217933] ret_from_fork_asm+0x1a/0x30 [ 31.218372] [ 31.218618] The buggy address belongs to the object at ffff888102a59b80 [ 31.218618] which belongs to the cache kmalloc-64 of size 64 [ 31.219642] The buggy address is located 0 bytes to the right of [ 31.219642] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.220552] [ 31.220801] The buggy address belongs to the physical page: [ 31.221233] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.221783] flags: 0x200000000000000(node=0|zone=2) [ 31.222301] page_type: f5(slab) [ 31.222689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.223357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.224018] page dumped because: kasan: bad access detected [ 31.224605] [ 31.224759] Memory state around the buggy address: [ 31.225100] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.225763] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.226233] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.226897] ^ [ 31.227348] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.227867] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.228325] ================================================================== [ 31.229523] ================================================================== [ 31.230509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 31.231091] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.231663] [ 31.231942] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.233511] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.233767] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.235847] Call Trace: [ 31.236107] <TASK> [ 31.236307] dump_stack_lvl+0x73/0xb0 [ 31.237131] print_report+0xd1/0x640 [ 31.237436] ? __virt_addr_valid+0x1db/0x2d0 [ 31.238190] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.238840] kasan_report+0x102/0x140 [ 31.239207] ? kasan_atomics_helper+0x50d6/0x5450 [ 31.239903] ? kasan_atomics_helper+0x50d6/0x5450 [ 31.240508] __asan_report_store8_noabort+0x1b/0x30 [ 31.241049] kasan_atomics_helper+0x50d6/0x5450 [ 31.241398] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.241729] ? ret_from_fork_asm+0x1a/0x30 [ 31.242178] ? ret_from_fork+0x41/0x80 [ 31.242694] ? kthread+0x257/0x310 [ 31.243380] kasan_atomics+0x1dd/0x310 [ 31.243896] ? __pfx_kasan_atomics+0x10/0x10 [ 31.244745] ? __pfx_read_tsc+0x10/0x10 [ 31.245203] ? ktime_get_ts64+0x86/0x230 [ 31.245739] kunit_try_run_case+0x1b3/0x490 [ 31.246156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.246953] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.247614] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.248112] ? __kthread_parkme+0x82/0x160 [ 31.248822] ? preempt_count_sub+0x50/0x80 [ 31.249268] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.249997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.250862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.251290] kthread+0x257/0x310 [ 31.251834] ? __pfx_kthread+0x10/0x10 [ 31.252153] ret_from_fork+0x41/0x80 [ 31.252813] ? __pfx_kthread+0x10/0x10 [ 31.253240] ret_from_fork_asm+0x1a/0x30 [ 31.253880] </TASK> [ 31.254208] [ 31.254688] Allocated by task 274: [ 31.255008] kasan_save_stack+0x3d/0x60 [ 31.255372] kasan_save_track+0x18/0x40 [ 31.256192] kasan_save_alloc_info+0x3b/0x50 [ 31.256913] __kasan_kmalloc+0xb7/0xc0 [ 31.257257] __kmalloc_cache_noprof+0x184/0x410 [ 31.258032] kasan_atomics+0x96/0x310 [ 31.258995] kunit_try_run_case+0x1b3/0x490 [ 31.259383] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.260285] kthread+0x257/0x310 [ 31.260839] ret_from_fork+0x41/0x80 [ 31.261241] ret_from_fork_asm+0x1a/0x30 [ 31.262037] [ 31.262215] The buggy address belongs to the object at ffff888102a59b80 [ 31.262215] which belongs to the cache kmalloc-64 of size 64 [ 31.263136] The buggy address is located 0 bytes to the right of [ 31.263136] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.264281] [ 31.265093] The buggy address belongs to the physical page: [ 31.265451] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.266411] flags: 0x200000000000000(node=0|zone=2) [ 31.266868] page_type: f5(slab) [ 31.267147] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.268161] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.268557] page dumped because: kasan: bad access detected [ 31.269109] [ 31.269260] Memory state around the buggy address: [ 31.269789] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.270268] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.271680] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.272142] ^ [ 31.273000] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.273478] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.274220] ================================================================== [ 31.005348] ================================================================== [ 31.006047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 31.006746] Read of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.007356] [ 31.007629] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.008506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.008802] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.009250] Call Trace: [ 31.009487] <TASK> [ 31.009768] dump_stack_lvl+0x73/0xb0 [ 31.010212] print_report+0xd1/0x640 [ 31.010646] ? __virt_addr_valid+0x1db/0x2d0 [ 31.011112] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.011677] kasan_report+0x102/0x140 [ 31.012090] ? kasan_atomics_helper+0x49ea/0x5450 [ 31.012604] ? kasan_atomics_helper+0x49ea/0x5450 [ 31.012987] __asan_report_load4_noabort+0x18/0x20 [ 31.013319] kasan_atomics_helper+0x49ea/0x5450 [ 31.013666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.014157] ? ret_from_fork_asm+0x1a/0x30 [ 31.014619] ? ret_from_fork+0x41/0x80 [ 31.015022] ? kthread+0x257/0x310 [ 31.017075] kasan_atomics+0x1dd/0x310 [ 31.017514] ? __pfx_kasan_atomics+0x10/0x10 [ 31.017945] ? __pfx_read_tsc+0x10/0x10 [ 31.018374] ? ktime_get_ts64+0x86/0x230 [ 31.018787] kunit_try_run_case+0x1b3/0x490 [ 31.021646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.022172] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.022645] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.023156] ? __kthread_parkme+0x82/0x160 [ 31.023464] ? preempt_count_sub+0x50/0x80 [ 31.023879] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.024324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.024743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.025179] kthread+0x257/0x310 [ 31.025581] ? __pfx_kthread+0x10/0x10 [ 31.025965] ret_from_fork+0x41/0x80 [ 31.026379] ? __pfx_kthread+0x10/0x10 [ 31.026776] ret_from_fork_asm+0x1a/0x30 [ 31.027096] </TASK> [ 31.027375] [ 31.027639] Allocated by task 274: [ 31.027993] kasan_save_stack+0x3d/0x60 [ 31.028496] kasan_save_track+0x18/0x40 [ 31.028877] kasan_save_alloc_info+0x3b/0x50 [ 31.029168] __kasan_kmalloc+0xb7/0xc0 [ 31.029573] __kmalloc_cache_noprof+0x184/0x410 [ 31.030027] kasan_atomics+0x96/0x310 [ 31.030584] kunit_try_run_case+0x1b3/0x490 [ 31.030874] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.031210] kthread+0x257/0x310 [ 31.031596] ret_from_fork+0x41/0x80 [ 31.032005] ret_from_fork_asm+0x1a/0x30 [ 31.032475] [ 31.032695] The buggy address belongs to the object at ffff888102a59b80 [ 31.032695] which belongs to the cache kmalloc-64 of size 64 [ 31.033610] The buggy address is located 0 bytes to the right of [ 31.033610] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.034258] [ 31.034522] The buggy address belongs to the physical page: [ 31.035016] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.035738] flags: 0x200000000000000(node=0|zone=2) [ 31.036198] page_type: f5(slab) [ 31.036586] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.037136] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.037758] page dumped because: kasan: bad access detected [ 31.038218] [ 31.038372] Memory state around the buggy address: [ 31.038690] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.039313] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.039962] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.040615] ^ [ 31.041076] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.041508] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.041995] ================================================================== [ 30.101010] ================================================================== [ 30.102511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 30.103351] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.104040] [ 30.104326] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.105182] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.105651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.106389] Call Trace: [ 30.106725] <TASK> [ 30.106918] dump_stack_lvl+0x73/0xb0 [ 30.107223] print_report+0xd1/0x640 [ 30.107804] ? __virt_addr_valid+0x1db/0x2d0 [ 30.108278] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.108956] kasan_report+0x102/0x140 [ 30.109381] ? kasan_atomics_helper+0x5ff/0x5450 [ 30.109877] ? kasan_atomics_helper+0x5ff/0x5450 [ 30.110398] kasan_check_range+0x10c/0x1c0 [ 30.110878] __kasan_check_write+0x18/0x20 [ 30.111374] kasan_atomics_helper+0x5ff/0x5450 [ 30.112632] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.113138] ? ret_from_fork_asm+0x1a/0x30 [ 30.113587] ? ret_from_fork+0x41/0x80 [ 30.113989] ? kthread+0x257/0x310 [ 30.116927] kasan_atomics+0x1dd/0x310 [ 30.117380] ? __pfx_kasan_atomics+0x10/0x10 [ 30.117822] ? __pfx_read_tsc+0x10/0x10 [ 30.118209] ? ktime_get_ts64+0x86/0x230 [ 30.118715] kunit_try_run_case+0x1b3/0x490 [ 30.119049] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.119601] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.120034] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.120608] ? __kthread_parkme+0x82/0x160 [ 30.120965] ? preempt_count_sub+0x50/0x80 [ 30.121273] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.121819] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.122390] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.122932] kthread+0x257/0x310 [ 30.123204] ? __pfx_kthread+0x10/0x10 [ 30.123688] ret_from_fork+0x41/0x80 [ 30.124103] ? __pfx_kthread+0x10/0x10 [ 30.124551] ret_from_fork_asm+0x1a/0x30 [ 30.124911] </TASK> [ 30.125226] [ 30.125478] Allocated by task 274: [ 30.125713] kasan_save_stack+0x3d/0x60 [ 30.126151] kasan_save_track+0x18/0x40 [ 30.126639] kasan_save_alloc_info+0x3b/0x50 [ 30.127096] __kasan_kmalloc+0xb7/0xc0 [ 30.127492] __kmalloc_cache_noprof+0x184/0x410 [ 30.127834] kasan_atomics+0x96/0x310 [ 30.128117] kunit_try_run_case+0x1b3/0x490 [ 30.128618] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.129139] kthread+0x257/0x310 [ 30.129414] ret_from_fork+0x41/0x80 [ 30.129882] ret_from_fork_asm+0x1a/0x30 [ 30.130214] [ 30.130369] The buggy address belongs to the object at ffff888102a59b80 [ 30.130369] which belongs to the cache kmalloc-64 of size 64 [ 30.131175] The buggy address is located 0 bytes to the right of [ 30.131175] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.132227] [ 30.132520] The buggy address belongs to the physical page: [ 30.132864] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.133507] flags: 0x200000000000000(node=0|zone=2) [ 30.133808] page_type: f5(slab) [ 30.134156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.134947] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.135650] page dumped because: kasan: bad access detected [ 30.136132] [ 30.136284] Memory state around the buggy address: [ 30.136803] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.137411] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.137855] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.138519] ^ [ 30.138908] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.139513] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.139905] ================================================================== [ 32.198934] ================================================================== [ 32.199379] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 32.200228] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.200832] [ 32.201141] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.201895] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.202353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.202988] Call Trace: [ 32.203306] <TASK> [ 32.203676] dump_stack_lvl+0x73/0xb0 [ 32.204167] print_report+0xd1/0x640 [ 32.204560] ? __virt_addr_valid+0x1db/0x2d0 [ 32.205148] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.205685] kasan_report+0x102/0x140 [ 32.206109] ? kasan_atomics_helper+0x218b/0x5450 [ 32.206605] ? kasan_atomics_helper+0x218b/0x5450 [ 32.207088] kasan_check_range+0x10c/0x1c0 [ 32.207489] __kasan_check_write+0x18/0x20 [ 32.207912] kasan_atomics_helper+0x218b/0x5450 [ 32.208502] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.208966] ? ret_from_fork_asm+0x1a/0x30 [ 32.209479] ? ret_from_fork+0x41/0x80 [ 32.209896] ? kthread+0x257/0x310 [ 32.210305] kasan_atomics+0x1dd/0x310 [ 32.210746] ? __pfx_kasan_atomics+0x10/0x10 [ 32.211233] ? __pfx_read_tsc+0x10/0x10 [ 32.211558] ? ktime_get_ts64+0x86/0x230 [ 32.212086] kunit_try_run_case+0x1b3/0x490 [ 32.212651] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.213183] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.213742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.214167] ? __kthread_parkme+0x82/0x160 [ 32.214486] ? preempt_count_sub+0x50/0x80 [ 32.215013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.215591] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.216226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.216771] kthread+0x257/0x310 [ 32.217209] ? __pfx_kthread+0x10/0x10 [ 32.217518] ret_from_fork+0x41/0x80 [ 32.217926] ? __pfx_kthread+0x10/0x10 [ 32.218310] ret_from_fork_asm+0x1a/0x30 [ 32.218824] </TASK> [ 32.219132] [ 32.219345] Allocated by task 274: [ 32.219739] kasan_save_stack+0x3d/0x60 [ 32.220145] kasan_save_track+0x18/0x40 [ 32.220583] kasan_save_alloc_info+0x3b/0x50 [ 32.221014] __kasan_kmalloc+0xb7/0xc0 [ 32.221424] __kmalloc_cache_noprof+0x184/0x410 [ 32.221988] kasan_atomics+0x96/0x310 [ 32.222398] kunit_try_run_case+0x1b3/0x490 [ 32.222931] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.223549] kthread+0x257/0x310 [ 32.223968] ret_from_fork+0x41/0x80 [ 32.224464] ret_from_fork_asm+0x1a/0x30 [ 32.224994] [ 32.225226] The buggy address belongs to the object at ffff888102a59b80 [ 32.225226] which belongs to the cache kmalloc-64 of size 64 [ 32.226285] The buggy address is located 0 bytes to the right of [ 32.226285] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.227209] [ 32.227410] The buggy address belongs to the physical page: [ 32.227720] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.228137] flags: 0x200000000000000(node=0|zone=2) [ 32.228617] page_type: f5(slab) [ 32.228971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.229772] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.230423] page dumped because: kasan: bad access detected [ 32.230944] [ 32.231234] Memory state around the buggy address: [ 32.231638] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.232276] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.232940] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.234405] ^ [ 32.234992] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.235376] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.236526] ================================================================== [ 30.812672] ================================================================== [ 30.813127] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 30.813532] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.814210] [ 30.814427] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.816036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.816433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.817893] Call Trace: [ 30.818180] <TASK> [ 30.818374] dump_stack_lvl+0x73/0xb0 [ 30.819343] print_report+0xd1/0x640 [ 30.819962] ? __virt_addr_valid+0x1db/0x2d0 [ 30.820343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.820955] kasan_report+0x102/0x140 [ 30.821371] ? kasan_atomics_helper+0x107a/0x5450 [ 30.821912] ? kasan_atomics_helper+0x107a/0x5450 [ 30.822386] kasan_check_range+0x10c/0x1c0 [ 30.822715] __kasan_check_write+0x18/0x20 [ 30.823215] kasan_atomics_helper+0x107a/0x5450 [ 30.823845] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.824192] ? ret_from_fork_asm+0x1a/0x30 [ 30.824898] ? ret_from_fork+0x41/0x80 [ 30.825337] ? kthread+0x257/0x310 [ 30.825701] kasan_atomics+0x1dd/0x310 [ 30.826048] ? __pfx_kasan_atomics+0x10/0x10 [ 30.826404] ? __pfx_read_tsc+0x10/0x10 [ 30.826939] ? ktime_get_ts64+0x86/0x230 [ 30.827321] kunit_try_run_case+0x1b3/0x490 [ 30.827625] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.828137] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.828653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.829159] ? __kthread_parkme+0x82/0x160 [ 30.829827] ? preempt_count_sub+0x50/0x80 [ 30.830290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.831340] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.831945] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.832387] kthread+0x257/0x310 [ 30.832900] ? __pfx_kthread+0x10/0x10 [ 30.833256] ret_from_fork+0x41/0x80 [ 30.834198] ? __pfx_kthread+0x10/0x10 [ 30.834785] ret_from_fork_asm+0x1a/0x30 [ 30.835261] </TASK> [ 30.835457] [ 30.835646] Allocated by task 274: [ 30.835918] kasan_save_stack+0x3d/0x60 [ 30.836232] kasan_save_track+0x18/0x40 [ 30.837164] kasan_save_alloc_info+0x3b/0x50 [ 30.837467] __kasan_kmalloc+0xb7/0xc0 [ 30.838173] __kmalloc_cache_noprof+0x184/0x410 [ 30.838993] kasan_atomics+0x96/0x310 [ 30.839488] kunit_try_run_case+0x1b3/0x490 [ 30.840115] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.840759] kthread+0x257/0x310 [ 30.841113] ret_from_fork+0x41/0x80 [ 30.841427] ret_from_fork_asm+0x1a/0x30 [ 30.842106] [ 30.842267] The buggy address belongs to the object at ffff888102a59b80 [ 30.842267] which belongs to the cache kmalloc-64 of size 64 [ 30.843823] The buggy address is located 0 bytes to the right of [ 30.843823] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.844802] [ 30.845331] The buggy address belongs to the physical page: [ 30.845976] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.846957] flags: 0x200000000000000(node=0|zone=2) [ 30.847655] page_type: f5(slab) [ 30.848043] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.848793] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.849365] page dumped because: kasan: bad access detected [ 30.849635] [ 30.849829] Memory state around the buggy address: [ 30.850400] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.850886] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.851420] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.851928] ^ [ 30.852291] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.852912] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.853656] ================================================================== [ 31.729043] ================================================================== [ 31.729946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 31.731212] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.732439] [ 31.732913] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.733762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.734118] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.735160] Call Trace: [ 31.735397] <TASK> [ 31.735939] dump_stack_lvl+0x73/0xb0 [ 31.736287] print_report+0xd1/0x640 [ 31.737338] ? __virt_addr_valid+0x1db/0x2d0 [ 31.738025] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.738440] kasan_report+0x102/0x140 [ 31.739032] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.739432] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.740317] kasan_check_range+0x10c/0x1c0 [ 31.740732] __kasan_check_write+0x18/0x20 [ 31.741150] kasan_atomics_helper+0x1c19/0x5450 [ 31.741797] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.742354] ? ret_from_fork_asm+0x1a/0x30 [ 31.742950] ? ret_from_fork+0x41/0x80 [ 31.743267] ? kthread+0x257/0x310 [ 31.743998] kasan_atomics+0x1dd/0x310 [ 31.744340] ? __pfx_kasan_atomics+0x10/0x10 [ 31.744970] ? __pfx_read_tsc+0x10/0x10 [ 31.745323] ? ktime_get_ts64+0x86/0x230 [ 31.746138] kunit_try_run_case+0x1b3/0x490 [ 31.746434] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.747351] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.747788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.748181] ? __kthread_parkme+0x82/0x160 [ 31.748866] ? preempt_count_sub+0x50/0x80 [ 31.749233] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.749650] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.750531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.751181] kthread+0x257/0x310 [ 31.751663] ? __pfx_kthread+0x10/0x10 [ 31.752163] ret_from_fork+0x41/0x80 [ 31.752497] ? __pfx_kthread+0x10/0x10 [ 31.753133] ret_from_fork_asm+0x1a/0x30 [ 31.753687] </TASK> [ 31.753872] [ 31.754095] Allocated by task 274: [ 31.754434] kasan_save_stack+0x3d/0x60 [ 31.755405] kasan_save_track+0x18/0x40 [ 31.755731] kasan_save_alloc_info+0x3b/0x50 [ 31.756071] __kasan_kmalloc+0xb7/0xc0 [ 31.756415] __kmalloc_cache_noprof+0x184/0x410 [ 31.757185] kasan_atomics+0x96/0x310 [ 31.757567] kunit_try_run_case+0x1b3/0x490 [ 31.758430] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.758881] kthread+0x257/0x310 [ 31.759249] ret_from_fork+0x41/0x80 [ 31.759593] ret_from_fork_asm+0x1a/0x30 [ 31.759957] [ 31.760592] The buggy address belongs to the object at ffff888102a59b80 [ 31.760592] which belongs to the cache kmalloc-64 of size 64 [ 31.761216] The buggy address is located 0 bytes to the right of [ 31.761216] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.762593] [ 31.762817] The buggy address belongs to the physical page: [ 31.763323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.764359] flags: 0x200000000000000(node=0|zone=2) [ 31.764911] page_type: f5(slab) [ 31.765497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.766255] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.767100] page dumped because: kasan: bad access detected [ 31.767717] [ 31.767901] Memory state around the buggy address: [ 31.768688] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.769339] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.770385] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.771202] ^ [ 31.771583] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.772196] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.773209] ================================================================== [ 32.238604] ================================================================== [ 32.239157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 32.239628] Read of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 32.239910] [ 32.240014] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 32.240633] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.241157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.242047] Call Trace: [ 32.242468] <TASK> [ 32.242769] dump_stack_lvl+0x73/0xb0 [ 32.243304] print_report+0xd1/0x640 [ 32.243849] ? __virt_addr_valid+0x1db/0x2d0 [ 32.244305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.244997] kasan_report+0x102/0x140 [ 32.245516] ? kasan_atomics_helper+0x4fa7/0x5450 [ 32.246086] ? kasan_atomics_helper+0x4fa7/0x5450 [ 32.246639] __asan_report_load8_noabort+0x18/0x20 [ 32.247182] kasan_atomics_helper+0x4fa7/0x5450 [ 32.247718] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.248505] ? ret_from_fork_asm+0x1a/0x30 [ 32.248826] ? ret_from_fork+0x41/0x80 [ 32.249200] ? kthread+0x257/0x310 [ 32.249862] kasan_atomics+0x1dd/0x310 [ 32.250178] ? __pfx_kasan_atomics+0x10/0x10 [ 32.250480] ? __pfx_read_tsc+0x10/0x10 [ 32.250914] ? ktime_get_ts64+0x86/0x230 [ 32.251350] kunit_try_run_case+0x1b3/0x490 [ 32.252035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.252363] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.252680] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.253208] ? __kthread_parkme+0x82/0x160 [ 32.253696] ? preempt_count_sub+0x50/0x80 [ 32.254009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.254528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.255076] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.255410] kthread+0x257/0x310 [ 32.255807] ? __pfx_kthread+0x10/0x10 [ 32.256286] ret_from_fork+0x41/0x80 [ 32.256776] ? __pfx_kthread+0x10/0x10 [ 32.257226] ret_from_fork_asm+0x1a/0x30 [ 32.257667] </TASK> [ 32.257938] [ 32.258190] Allocated by task 274: [ 32.258527] kasan_save_stack+0x3d/0x60 [ 32.258840] kasan_save_track+0x18/0x40 [ 32.259233] kasan_save_alloc_info+0x3b/0x50 [ 32.259604] __kasan_kmalloc+0xb7/0xc0 [ 32.260027] __kmalloc_cache_noprof+0x184/0x410 [ 32.260565] kasan_atomics+0x96/0x310 [ 32.261186] kunit_try_run_case+0x1b3/0x490 [ 32.261683] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.262150] kthread+0x257/0x310 [ 32.262393] ret_from_fork+0x41/0x80 [ 32.262784] ret_from_fork_asm+0x1a/0x30 [ 32.263266] [ 32.263500] The buggy address belongs to the object at ffff888102a59b80 [ 32.263500] which belongs to the cache kmalloc-64 of size 64 [ 32.264481] The buggy address is located 0 bytes to the right of [ 32.264481] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 32.265285] [ 32.265530] The buggy address belongs to the physical page: [ 32.266095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 32.266957] flags: 0x200000000000000(node=0|zone=2) [ 32.267362] page_type: f5(slab) [ 32.267694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.268482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.268958] page dumped because: kasan: bad access detected [ 32.269337] [ 32.269567] Memory state around the buggy address: [ 32.270010] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.270937] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.271583] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.272198] ^ [ 32.273261] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.274069] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.274659] ================================================================== [ 30.512854] ================================================================== [ 30.513845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 30.514471] Write of size 4 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 30.515001] [ 30.515271] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 30.516210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.516627] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.517343] Call Trace: [ 30.517740] <TASK> [ 30.518100] dump_stack_lvl+0x73/0xb0 [ 30.518559] print_report+0xd1/0x640 [ 30.518961] ? __virt_addr_valid+0x1db/0x2d0 [ 30.519478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.519999] kasan_report+0x102/0x140 [ 30.520486] ? kasan_atomics_helper+0xc71/0x5450 [ 30.520976] ? kasan_atomics_helper+0xc71/0x5450 [ 30.521413] kasan_check_range+0x10c/0x1c0 [ 30.521939] __kasan_check_write+0x18/0x20 [ 30.522390] kasan_atomics_helper+0xc71/0x5450 [ 30.522883] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.523524] ? ret_from_fork_asm+0x1a/0x30 [ 30.523950] ? ret_from_fork+0x41/0x80 [ 30.524396] ? kthread+0x257/0x310 [ 30.524932] kasan_atomics+0x1dd/0x310 [ 30.525546] ? __pfx_kasan_atomics+0x10/0x10 [ 30.525927] ? __pfx_read_tsc+0x10/0x10 [ 30.526378] ? ktime_get_ts64+0x86/0x230 [ 30.526910] kunit_try_run_case+0x1b3/0x490 [ 30.527371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.527927] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.528407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.528955] ? __kthread_parkme+0x82/0x160 [ 30.529394] ? preempt_count_sub+0x50/0x80 [ 30.529911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.530424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.531037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.531665] kthread+0x257/0x310 [ 30.532016] ? __pfx_kthread+0x10/0x10 [ 30.532533] ret_from_fork+0x41/0x80 [ 30.532878] ? __pfx_kthread+0x10/0x10 [ 30.533276] ret_from_fork_asm+0x1a/0x30 [ 30.533757] </TASK> [ 30.533968] [ 30.534134] Allocated by task 274: [ 30.534359] kasan_save_stack+0x3d/0x60 [ 30.534726] kasan_save_track+0x18/0x40 [ 30.535179] kasan_save_alloc_info+0x3b/0x50 [ 30.535660] __kasan_kmalloc+0xb7/0xc0 [ 30.536068] __kmalloc_cache_noprof+0x184/0x410 [ 30.536590] kasan_atomics+0x96/0x310 [ 30.537021] kunit_try_run_case+0x1b3/0x490 [ 30.537528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.538032] kthread+0x257/0x310 [ 30.538471] ret_from_fork+0x41/0x80 [ 30.538868] ret_from_fork_asm+0x1a/0x30 [ 30.539316] [ 30.539598] The buggy address belongs to the object at ffff888102a59b80 [ 30.539598] which belongs to the cache kmalloc-64 of size 64 [ 30.540343] The buggy address is located 0 bytes to the right of [ 30.540343] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 30.541184] [ 30.541429] The buggy address belongs to the physical page: [ 30.541983] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 30.542621] flags: 0x200000000000000(node=0|zone=2) [ 30.543112] page_type: f5(slab) [ 30.543380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.543808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.544198] page dumped because: kasan: bad access detected [ 30.544552] [ 30.544850] Memory state around the buggy address: [ 30.545312] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.545969] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.546631] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.547275] ^ [ 30.547654] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.548234] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.548759] ================================================================== [ 31.441956] ================================================================== [ 31.442853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 31.443646] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.444149] [ 31.444448] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.445104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.445584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.446361] Call Trace: [ 31.446721] <TASK> [ 31.446933] dump_stack_lvl+0x73/0xb0 [ 31.447925] print_report+0xd1/0x640 [ 31.448312] ? __virt_addr_valid+0x1db/0x2d0 [ 31.448636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.449221] kasan_report+0x102/0x140 [ 31.449595] ? kasan_atomics_helper+0x1780/0x5450 [ 31.450111] ? kasan_atomics_helper+0x1780/0x5450 [ 31.450521] kasan_check_range+0x10c/0x1c0 [ 31.450973] __kasan_check_write+0x18/0x20 [ 31.451485] kasan_atomics_helper+0x1780/0x5450 [ 31.451832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.452383] ? ret_from_fork_asm+0x1a/0x30 [ 31.452745] ? ret_from_fork+0x41/0x80 [ 31.453224] ? kthread+0x257/0x310 [ 31.453630] kasan_atomics+0x1dd/0x310 [ 31.453913] ? __pfx_kasan_atomics+0x10/0x10 [ 31.454401] ? __pfx_read_tsc+0x10/0x10 [ 31.454925] ? ktime_get_ts64+0x86/0x230 [ 31.455402] kunit_try_run_case+0x1b3/0x490 [ 31.455798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.456298] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.456685] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.457025] ? __kthread_parkme+0x82/0x160 [ 31.457537] ? preempt_count_sub+0x50/0x80 [ 31.457966] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.458359] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.458878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.459457] kthread+0x257/0x310 [ 31.459830] ? __pfx_kthread+0x10/0x10 [ 31.460301] ret_from_fork+0x41/0x80 [ 31.460689] ? __pfx_kthread+0x10/0x10 [ 31.461117] ret_from_fork_asm+0x1a/0x30 [ 31.461422] </TASK> [ 31.461741] [ 31.461996] Allocated by task 274: [ 31.462397] kasan_save_stack+0x3d/0x60 [ 31.462850] kasan_save_track+0x18/0x40 [ 31.463289] kasan_save_alloc_info+0x3b/0x50 [ 31.463666] __kasan_kmalloc+0xb7/0xc0 [ 31.464108] __kmalloc_cache_noprof+0x184/0x410 [ 31.464549] kasan_atomics+0x96/0x310 [ 31.465034] kunit_try_run_case+0x1b3/0x490 [ 31.465497] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.465833] kthread+0x257/0x310 [ 31.466089] ret_from_fork+0x41/0x80 [ 31.466537] ret_from_fork_asm+0x1a/0x30 [ 31.466933] [ 31.467195] The buggy address belongs to the object at ffff888102a59b80 [ 31.467195] which belongs to the cache kmalloc-64 of size 64 [ 31.468049] The buggy address is located 0 bytes to the right of [ 31.468049] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.469077] [ 31.469314] The buggy address belongs to the physical page: [ 31.469796] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.470412] flags: 0x200000000000000(node=0|zone=2) [ 31.470866] page_type: f5(slab) [ 31.471256] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.471821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.472411] page dumped because: kasan: bad access detected [ 31.472834] [ 31.473068] Memory state around the buggy address: [ 31.473476] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.474120] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.474745] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.475122] ^ [ 31.475406] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.475902] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.476555] ================================================================== [ 31.399880] ================================================================== [ 31.401218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 31.401896] Write of size 8 at addr ffff888102a59bb0 by task kunit_try_catch/274 [ 31.403484] [ 31.403788] CPU: 1 UID: 0 PID: 274 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241203 #1 [ 31.404837] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.405295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.406046] Call Trace: [ 31.406359] <TASK> [ 31.406702] dump_stack_lvl+0x73/0xb0 [ 31.407194] print_report+0xd1/0x640 [ 31.407636] ? __virt_addr_valid+0x1db/0x2d0 [ 31.408137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.408716] kasan_report+0x102/0x140 [ 31.409197] ? kasan_atomics_helper+0x16e8/0x5450 [ 31.409720] ? kasan_atomics_helper+0x16e8/0x5450 [ 31.410158] kasan_check_range+0x10c/0x1c0 [ 31.410693] __kasan_check_write+0x18/0x20 [ 31.411202] kasan_atomics_helper+0x16e8/0x5450 [ 31.411774] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.412243] ? ret_from_fork_asm+0x1a/0x30 [ 31.412828] ? ret_from_fork+0x41/0x80 [ 31.413121] ? kthread+0x257/0x310 [ 31.413382] kasan_atomics+0x1dd/0x310 [ 31.413999] ? __pfx_kasan_atomics+0x10/0x10 [ 31.414554] ? __pfx_read_tsc+0x10/0x10 [ 31.415074] ? ktime_get_ts64+0x86/0x230 [ 31.415593] kunit_try_run_case+0x1b3/0x490 [ 31.416182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.417517] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.417917] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.418253] ? __kthread_parkme+0x82/0x160 [ 31.418636] ? preempt_count_sub+0x50/0x80 [ 31.419034] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.419775] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.420472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.420946] kthread+0x257/0x310 [ 31.421178] ? __pfx_kthread+0x10/0x10 [ 31.421575] ret_from_fork+0x41/0x80 [ 31.422122] ? __pfx_kthread+0x10/0x10 [ 31.422665] ret_from_fork_asm+0x1a/0x30 [ 31.423229] </TASK> [ 31.423624] [ 31.423952] Allocated by task 274: [ 31.424469] kasan_save_stack+0x3d/0x60 [ 31.425029] kasan_save_track+0x18/0x40 [ 31.425552] kasan_save_alloc_info+0x3b/0x50 [ 31.426001] __kasan_kmalloc+0xb7/0xc0 [ 31.426304] __kmalloc_cache_noprof+0x184/0x410 [ 31.426852] kasan_atomics+0x96/0x310 [ 31.427174] kunit_try_run_case+0x1b3/0x490 [ 31.427686] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.428250] kthread+0x257/0x310 [ 31.428653] ret_from_fork+0x41/0x80 [ 31.429181] ret_from_fork_asm+0x1a/0x30 [ 31.429643] [ 31.429926] The buggy address belongs to the object at ffff888102a59b80 [ 31.429926] which belongs to the cache kmalloc-64 of size 64 [ 31.430805] The buggy address is located 0 bytes to the right of [ 31.430805] allocated 48-byte region [ffff888102a59b80, ffff888102a59bb0) [ 31.431726] [ 31.431951] The buggy address belongs to the physical page: [ 31.432616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a59 [ 31.433266] flags: 0x200000000000000(node=0|zone=2) [ 31.433791] page_type: f5(slab) [ 31.434141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.434905] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.435483] page dumped because: kasan: bad access detected [ 31.435955] [ 31.436238] Memory state around the buggy address: [ 31.436629] ffff888102a59a80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.437374] ffff888102a59b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.437923] >ffff888102a59b80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.438620] ^ [ 31.439001] ffff888102a59c00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.439697] ffff888102a59c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.440211] ==================================================================