Date
Dec. 4, 2024, 3:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 37.643395] ================================================================== [ 37.644357] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 37.645930] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.647000] [ 37.647292] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.648533] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.649855] Hardware name: linux,dummy-virt (DT) [ 37.650590] Call trace: [ 37.651092] show_stack+0x20/0x38 (C) [ 37.651771] dump_stack_lvl+0x8c/0xd0 [ 37.652421] print_report+0x118/0x5e0 [ 37.653078] kasan_report+0xc8/0x118 [ 37.653717] kasan_check_range+0x100/0x1a8 [ 37.654446] __kasan_check_write+0x20/0x30 [ 37.655129] kasan_atomics_helper+0xca0/0x4858 [ 37.655854] kasan_atomics+0x198/0x2e8 [ 37.656576] kunit_try_run_case+0x14c/0x3d0 [ 37.657338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.658184] kthread+0x24c/0x2d0 [ 37.658850] ret_from_fork+0x10/0x20 [ 37.659522] [ 37.659891] Allocated by task 253: [ 37.660483] kasan_save_stack+0x3c/0x68 [ 37.661246] kasan_save_track+0x20/0x40 [ 37.662018] kasan_save_alloc_info+0x40/0x58 [ 37.662752] __kasan_kmalloc+0xd4/0xd8 [ 37.663372] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.664119] kasan_atomics+0xb8/0x2e8 [ 37.664784] kunit_try_run_case+0x14c/0x3d0 [ 37.665474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.666268] kthread+0x24c/0x2d0 [ 37.666991] ret_from_fork+0x10/0x20 [ 37.667708] [ 37.668098] The buggy address belongs to the object at fff00000c6767080 [ 37.668098] which belongs to the cache kmalloc-64 of size 64 [ 37.668874] The buggy address is located 0 bytes to the right of [ 37.668874] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.670692] [ 37.671186] The buggy address belongs to the physical page: [ 37.671952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.673065] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.673947] page_type: f5(slab) [ 37.674531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.675562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.676534] page dumped because: kasan: bad access detected [ 37.677315] [ 37.677679] Memory state around the buggy address: [ 37.678408] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.679453] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.680406] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.681287] ^ [ 37.682015] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.682954] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.683926] ================================================================== [ 37.886319] ================================================================== [ 37.887927] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 37.889220] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.890572] [ 37.890984] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.892061] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.892659] Hardware name: linux,dummy-virt (DT) [ 37.893439] Call trace: [ 37.893843] show_stack+0x20/0x38 (C) [ 37.894466] dump_stack_lvl+0x8c/0xd0 [ 37.895151] print_report+0x118/0x5e0 [ 37.895804] kasan_report+0xc8/0x118 [ 37.896378] kasan_check_range+0x100/0x1a8 [ 37.897034] __kasan_check_write+0x20/0x30 [ 37.897588] kasan_atomics_helper+0xe44/0x4858 [ 37.898349] kasan_atomics+0x198/0x2e8 [ 37.898976] kunit_try_run_case+0x14c/0x3d0 [ 37.899320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.899773] kthread+0x24c/0x2d0 [ 37.900330] ret_from_fork+0x10/0x20 [ 37.901084] [ 37.901396] Allocated by task 253: [ 37.902141] kasan_save_stack+0x3c/0x68 [ 37.902740] kasan_save_track+0x20/0x40 [ 37.903549] kasan_save_alloc_info+0x40/0x58 [ 37.904231] __kasan_kmalloc+0xd4/0xd8 [ 37.904913] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.905528] kasan_atomics+0xb8/0x2e8 [ 37.906103] kunit_try_run_case+0x14c/0x3d0 [ 37.906789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.907447] kthread+0x24c/0x2d0 [ 37.908093] ret_from_fork+0x10/0x20 [ 37.908586] [ 37.908955] The buggy address belongs to the object at fff00000c6767080 [ 37.908955] which belongs to the cache kmalloc-64 of size 64 [ 37.910383] The buggy address is located 0 bytes to the right of [ 37.910383] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.911826] [ 37.912165] The buggy address belongs to the physical page: [ 37.913069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.913897] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.914872] page_type: f5(slab) [ 37.915356] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.916428] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.917372] page dumped because: kasan: bad access detected [ 37.918027] [ 37.918416] Memory state around the buggy address: [ 37.919126] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.919971] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.920894] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.921787] ^ [ 37.922388] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.923299] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.924224] ================================================================== [ 38.248189] ================================================================== [ 38.249018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 38.249913] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.250797] [ 38.251202] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.252316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.253089] Hardware name: linux,dummy-virt (DT) [ 38.253842] Call trace: [ 38.254288] show_stack+0x20/0x38 (C) [ 38.254847] dump_stack_lvl+0x8c/0xd0 [ 38.255524] print_report+0x118/0x5e0 [ 38.256156] kasan_report+0xc8/0x118 [ 38.256732] kasan_check_range+0x100/0x1a8 [ 38.257469] __kasan_check_write+0x20/0x30 [ 38.258147] kasan_atomics_helper+0x1190/0x4858 [ 38.258945] kasan_atomics+0x198/0x2e8 [ 38.259493] kunit_try_run_case+0x14c/0x3d0 [ 38.260086] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.261059] kthread+0x24c/0x2d0 [ 38.261700] ret_from_fork+0x10/0x20 [ 38.262300] [ 38.262639] Allocated by task 253: [ 38.263142] kasan_save_stack+0x3c/0x68 [ 38.263857] kasan_save_track+0x20/0x40 [ 38.264387] kasan_save_alloc_info+0x40/0x58 [ 38.265038] __kasan_kmalloc+0xd4/0xd8 [ 38.265641] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.266216] kasan_atomics+0xb8/0x2e8 [ 38.266923] kunit_try_run_case+0x14c/0x3d0 [ 38.267524] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.268299] kthread+0x24c/0x2d0 [ 38.268787] ret_from_fork+0x10/0x20 [ 38.269461] [ 38.269777] The buggy address belongs to the object at fff00000c6767080 [ 38.269777] which belongs to the cache kmalloc-64 of size 64 [ 38.271190] The buggy address is located 0 bytes to the right of [ 38.271190] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.272741] [ 38.273141] The buggy address belongs to the physical page: [ 38.273920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.274988] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.275794] page_type: f5(slab) [ 38.276375] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.277310] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.278243] page dumped because: kasan: bad access detected [ 38.278964] [ 38.279290] Memory state around the buggy address: [ 38.279926] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.280785] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.281591] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.282536] ^ [ 38.283297] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.284229] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.285095] ================================================================== [ 38.085497] ================================================================== [ 38.086397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 38.087368] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.088162] [ 38.088738] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.090185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.090863] Hardware name: linux,dummy-virt (DT) [ 38.091535] Call trace: [ 38.092056] show_stack+0x20/0x38 (C) [ 38.092797] dump_stack_lvl+0x8c/0xd0 [ 38.093411] print_report+0x118/0x5e0 [ 38.094141] kasan_report+0xc8/0x118 [ 38.094841] kasan_check_range+0x100/0x1a8 [ 38.095526] __kasan_check_write+0x20/0x30 [ 38.096269] kasan_atomics_helper+0xff0/0x4858 [ 38.097039] kasan_atomics+0x198/0x2e8 [ 38.097708] kunit_try_run_case+0x14c/0x3d0 [ 38.098417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.099353] kthread+0x24c/0x2d0 [ 38.100002] ret_from_fork+0x10/0x20 [ 38.100658] [ 38.101020] Allocated by task 253: [ 38.101684] kasan_save_stack+0x3c/0x68 [ 38.102402] kasan_save_track+0x20/0x40 [ 38.103079] kasan_save_alloc_info+0x40/0x58 [ 38.103816] __kasan_kmalloc+0xd4/0xd8 [ 38.104461] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.105148] kasan_atomics+0xb8/0x2e8 [ 38.105788] kunit_try_run_case+0x14c/0x3d0 [ 38.106508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.107375] kthread+0x24c/0x2d0 [ 38.108068] ret_from_fork+0x10/0x20 [ 38.108739] [ 38.109087] The buggy address belongs to the object at fff00000c6767080 [ 38.109087] which belongs to the cache kmalloc-64 of size 64 [ 38.110692] The buggy address is located 0 bytes to the right of [ 38.110692] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.112205] [ 38.112747] The buggy address belongs to the physical page: [ 38.113537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.114740] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.115728] page_type: f5(slab) [ 38.116370] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.117468] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.118311] page dumped because: kasan: bad access detected [ 38.119165] [ 38.119693] Memory state around the buggy address: [ 38.120405] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.121434] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.122489] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.123439] ^ [ 38.124133] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.125107] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.126005] ================================================================== [ 37.237396] ================================================================== [ 37.238771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 37.239642] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.240500] [ 37.240913] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.242466] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.243168] Hardware name: linux,dummy-virt (DT) [ 37.243903] Call trace: [ 37.244411] show_stack+0x20/0x38 (C) [ 37.245163] dump_stack_lvl+0x8c/0xd0 [ 37.245896] print_report+0x118/0x5e0 [ 37.246563] kasan_report+0xc8/0x118 [ 37.247359] kasan_check_range+0x100/0x1a8 [ 37.248094] __kasan_check_write+0x20/0x30 [ 37.248955] kasan_atomics_helper+0x934/0x4858 [ 37.249710] kasan_atomics+0x198/0x2e8 [ 37.250370] kunit_try_run_case+0x14c/0x3d0 [ 37.251098] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.251945] kthread+0x24c/0x2d0 [ 37.252536] ret_from_fork+0x10/0x20 [ 37.253173] [ 37.253524] Allocated by task 253: [ 37.254252] kasan_save_stack+0x3c/0x68 [ 37.255017] kasan_save_track+0x20/0x40 [ 37.255657] kasan_save_alloc_info+0x40/0x58 [ 37.256306] __kasan_kmalloc+0xd4/0xd8 [ 37.256962] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.257691] kasan_atomics+0xb8/0x2e8 [ 37.258337] kunit_try_run_case+0x14c/0x3d0 [ 37.259137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.259937] kthread+0x24c/0x2d0 [ 37.260495] ret_from_fork+0x10/0x20 [ 37.261061] [ 37.261406] The buggy address belongs to the object at fff00000c6767080 [ 37.261406] which belongs to the cache kmalloc-64 of size 64 [ 37.263031] The buggy address is located 0 bytes to the right of [ 37.263031] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.264617] [ 37.265146] The buggy address belongs to the physical page: [ 37.265933] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.267017] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.267900] page_type: f5(slab) [ 37.268473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.269502] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.270450] page dumped because: kasan: bad access detected [ 37.271228] [ 37.271581] Memory state around the buggy address: [ 37.272382] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.273358] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.274316] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.275248] ^ [ 37.276021] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.276965] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.277871] ================================================================== [ 38.769796] ================================================================== [ 38.770760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 38.772185] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.773210] [ 38.773684] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.774882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.775650] Hardware name: linux,dummy-virt (DT) [ 38.776303] Call trace: [ 38.776883] show_stack+0x20/0x38 (C) [ 38.777387] dump_stack_lvl+0x8c/0xd0 [ 38.778120] print_report+0x118/0x5e0 [ 38.778758] kasan_report+0xc8/0x118 [ 38.779520] __asan_report_load8_noabort+0x20/0x30 [ 38.780250] kasan_atomics_helper+0x3df4/0x4858 [ 38.781009] kasan_atomics+0x198/0x2e8 [ 38.781506] kunit_try_run_case+0x14c/0x3d0 [ 38.782236] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.783014] kthread+0x24c/0x2d0 [ 38.783716] ret_from_fork+0x10/0x20 [ 38.784357] [ 38.784799] Allocated by task 253: [ 38.785245] kasan_save_stack+0x3c/0x68 [ 38.785873] kasan_save_track+0x20/0x40 [ 38.786612] kasan_save_alloc_info+0x40/0x58 [ 38.787262] __kasan_kmalloc+0xd4/0xd8 [ 38.787923] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.788588] kasan_atomics+0xb8/0x2e8 [ 38.789249] kunit_try_run_case+0x14c/0x3d0 [ 38.790005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.790727] kthread+0x24c/0x2d0 [ 38.791203] ret_from_fork+0x10/0x20 [ 38.791869] [ 38.792253] The buggy address belongs to the object at fff00000c6767080 [ 38.792253] which belongs to the cache kmalloc-64 of size 64 [ 38.793598] The buggy address is located 0 bytes to the right of [ 38.793598] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.795189] [ 38.795515] The buggy address belongs to the physical page: [ 38.796186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.797188] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.798096] page_type: f5(slab) [ 38.798618] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.799718] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.800704] page dumped because: kasan: bad access detected [ 38.801415] [ 38.801772] Memory state around the buggy address: [ 38.802338] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.803218] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.804153] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.805066] ^ [ 38.805576] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.806453] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.807466] ================================================================== [ 37.926261] ================================================================== [ 37.927294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 37.928117] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.929063] [ 37.929404] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.930681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.931315] Hardware name: linux,dummy-virt (DT) [ 37.931926] Call trace: [ 37.932393] show_stack+0x20/0x38 (C) [ 37.933136] dump_stack_lvl+0x8c/0xd0 [ 37.933735] print_report+0x118/0x5e0 [ 37.934414] kasan_report+0xc8/0x118 [ 37.934938] __asan_report_store8_noabort+0x20/0x30 [ 37.935758] kasan_atomics_helper+0x3e5c/0x4858 [ 37.936442] kasan_atomics+0x198/0x2e8 [ 37.937123] kunit_try_run_case+0x14c/0x3d0 [ 37.937799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.938465] kthread+0x24c/0x2d0 [ 37.939129] ret_from_fork+0x10/0x20 [ 37.939697] [ 37.940062] Allocated by task 253: [ 37.940608] kasan_save_stack+0x3c/0x68 [ 37.941154] kasan_save_track+0x20/0x40 [ 37.941839] kasan_save_alloc_info+0x40/0x58 [ 37.942428] __kasan_kmalloc+0xd4/0xd8 [ 37.943137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.943787] kasan_atomics+0xb8/0x2e8 [ 37.944343] kunit_try_run_case+0x14c/0x3d0 [ 37.945105] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.945840] kthread+0x24c/0x2d0 [ 37.946289] ret_from_fork+0x10/0x20 [ 37.947049] [ 37.947419] The buggy address belongs to the object at fff00000c6767080 [ 37.947419] which belongs to the cache kmalloc-64 of size 64 [ 37.948595] The buggy address is located 0 bytes to the right of [ 37.948595] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.950186] [ 37.950512] The buggy address belongs to the physical page: [ 37.951264] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.952362] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.953113] page_type: f5(slab) [ 37.953693] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.954657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.955547] page dumped because: kasan: bad access detected [ 37.956193] [ 37.956551] Memory state around the buggy address: [ 37.957200] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.958065] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.959024] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.959902] ^ [ 37.960497] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.961445] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.962297] ================================================================== [ 38.166774] ================================================================== [ 38.167718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 38.168543] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.169323] [ 38.169783] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.171258] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.171987] Hardware name: linux,dummy-virt (DT) [ 38.172605] Call trace: [ 38.173058] show_stack+0x20/0x38 (C) [ 38.173696] dump_stack_lvl+0x8c/0xd0 [ 38.174365] print_report+0x118/0x5e0 [ 38.174860] kasan_report+0xc8/0x118 [ 38.175527] kasan_check_range+0x100/0x1a8 [ 38.176168] __kasan_check_write+0x20/0x30 [ 38.176813] kasan_atomics_helper+0x10c0/0x4858 [ 38.177466] kasan_atomics+0x198/0x2e8 [ 38.178131] kunit_try_run_case+0x14c/0x3d0 [ 38.178778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.179551] kthread+0x24c/0x2d0 [ 38.180195] ret_from_fork+0x10/0x20 [ 38.180824] [ 38.181187] Allocated by task 253: [ 38.181721] kasan_save_stack+0x3c/0x68 [ 38.182291] kasan_save_track+0x20/0x40 [ 38.182955] kasan_save_alloc_info+0x40/0x58 [ 38.183699] __kasan_kmalloc+0xd4/0xd8 [ 38.184277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.184907] kasan_atomics+0xb8/0x2e8 [ 38.185527] kunit_try_run_case+0x14c/0x3d0 [ 38.186121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.186928] kthread+0x24c/0x2d0 [ 38.187504] ret_from_fork+0x10/0x20 [ 38.188028] [ 38.188472] The buggy address belongs to the object at fff00000c6767080 [ 38.188472] which belongs to the cache kmalloc-64 of size 64 [ 38.189884] The buggy address is located 0 bytes to the right of [ 38.189884] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.191298] [ 38.191648] The buggy address belongs to the physical page: [ 38.192324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.193263] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.194003] page_type: f5(slab) [ 38.194578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.195538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.196423] page dumped because: kasan: bad access detected [ 38.197138] [ 38.197458] Memory state around the buggy address: [ 38.198129] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.198926] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.199932] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.200773] ^ [ 38.201435] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.202361] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.203304] ================================================================== [ 38.205404] ================================================================== [ 38.206960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 38.207739] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.208190] [ 38.208379] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.209431] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.210091] Hardware name: linux,dummy-virt (DT) [ 38.211102] Call trace: [ 38.211773] show_stack+0x20/0x38 (C) [ 38.212533] dump_stack_lvl+0x8c/0xd0 [ 38.213315] print_report+0x118/0x5e0 [ 38.214111] kasan_report+0xc8/0x118 [ 38.214737] kasan_check_range+0x100/0x1a8 [ 38.215361] __kasan_check_write+0x20/0x30 [ 38.216063] kasan_atomics_helper+0x1128/0x4858 [ 38.216752] kasan_atomics+0x198/0x2e8 [ 38.217477] kunit_try_run_case+0x14c/0x3d0 [ 38.218152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.218979] kthread+0x24c/0x2d0 [ 38.219574] ret_from_fork+0x10/0x20 [ 38.220317] [ 38.220683] Allocated by task 253: [ 38.221392] kasan_save_stack+0x3c/0x68 [ 38.222078] kasan_save_track+0x20/0x40 [ 38.222722] kasan_save_alloc_info+0x40/0x58 [ 38.223442] __kasan_kmalloc+0xd4/0xd8 [ 38.224043] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.224809] kasan_atomics+0xb8/0x2e8 [ 38.225440] kunit_try_run_case+0x14c/0x3d0 [ 38.226108] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.226959] kthread+0x24c/0x2d0 [ 38.227669] ret_from_fork+0x10/0x20 [ 38.228307] [ 38.228663] The buggy address belongs to the object at fff00000c6767080 [ 38.228663] which belongs to the cache kmalloc-64 of size 64 [ 38.230278] The buggy address is located 0 bytes to the right of [ 38.230278] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.231929] [ 38.232383] The buggy address belongs to the physical page: [ 38.233173] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.234216] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.235092] page_type: f5(slab) [ 38.235711] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.236721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.237682] page dumped because: kasan: bad access detected [ 38.238455] [ 38.238860] Memory state around the buggy address: [ 38.239562] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.240613] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.241547] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.242477] ^ [ 38.243230] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.244280] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.245195] ================================================================== [ 37.111017] ================================================================== [ 37.111783] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 37.112701] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.113537] [ 37.113993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.115379] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.115886] Hardware name: linux,dummy-virt (DT) [ 37.116699] Call trace: [ 37.117121] show_stack+0x20/0x38 (C) [ 37.117781] dump_stack_lvl+0x8c/0xd0 [ 37.118445] print_report+0x118/0x5e0 [ 37.119055] kasan_report+0xc8/0x118 [ 37.119690] kasan_check_range+0x100/0x1a8 [ 37.120356] __kasan_check_write+0x20/0x30 [ 37.120979] kasan_atomics_helper+0x7cc/0x4858 [ 37.121760] kasan_atomics+0x198/0x2e8 [ 37.122370] kunit_try_run_case+0x14c/0x3d0 [ 37.123005] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.123731] kthread+0x24c/0x2d0 [ 37.124380] ret_from_fork+0x10/0x20 [ 37.124998] [ 37.125366] Allocated by task 253: [ 37.125996] kasan_save_stack+0x3c/0x68 [ 37.126568] kasan_save_track+0x20/0x40 [ 37.127206] kasan_save_alloc_info+0x40/0x58 [ 37.127808] __kasan_kmalloc+0xd4/0xd8 [ 37.128564] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.129178] kasan_atomics+0xb8/0x2e8 [ 37.129918] kunit_try_run_case+0x14c/0x3d0 [ 37.130455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.131463] kthread+0x24c/0x2d0 [ 37.132061] ret_from_fork+0x10/0x20 [ 37.132692] [ 37.133030] The buggy address belongs to the object at fff00000c6767080 [ 37.133030] which belongs to the cache kmalloc-64 of size 64 [ 37.134950] The buggy address is located 0 bytes to the right of [ 37.134950] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.136491] [ 37.136832] The buggy address belongs to the physical page: [ 37.137619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.138722] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.139653] page_type: f5(slab) [ 37.140238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.141183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.142079] page dumped because: kasan: bad access detected [ 37.142795] [ 37.143068] Memory state around the buggy address: [ 37.143801] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.144899] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.145908] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.146755] ^ [ 37.147405] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.148257] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.149212] ================================================================== [ 37.442587] ================================================================== [ 37.443656] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 37.444457] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.445226] [ 37.445804] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.447134] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.447765] Hardware name: linux,dummy-virt (DT) [ 37.448442] Call trace: [ 37.448818] show_stack+0x20/0x38 (C) [ 37.449538] dump_stack_lvl+0x8c/0xd0 [ 37.450117] print_report+0x118/0x5e0 [ 37.450681] kasan_report+0xc8/0x118 [ 37.451333] __asan_report_load4_noabort+0x20/0x30 [ 37.452033] kasan_atomics_helper+0x3dcc/0x4858 [ 37.452740] kasan_atomics+0x198/0x2e8 [ 37.453386] kunit_try_run_case+0x14c/0x3d0 [ 37.454021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.454728] kthread+0x24c/0x2d0 [ 37.455294] ret_from_fork+0x10/0x20 [ 37.455936] [ 37.456290] Allocated by task 253: [ 37.456893] kasan_save_stack+0x3c/0x68 [ 37.457416] kasan_save_track+0x20/0x40 [ 37.458097] kasan_save_alloc_info+0x40/0x58 [ 37.458653] __kasan_kmalloc+0xd4/0xd8 [ 37.459309] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.459940] kasan_atomics+0xb8/0x2e8 [ 37.460453] kunit_try_run_case+0x14c/0x3d0 [ 37.461085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.461908] kthread+0x24c/0x2d0 [ 37.462514] ret_from_fork+0x10/0x20 [ 37.463120] [ 37.463462] The buggy address belongs to the object at fff00000c6767080 [ 37.463462] which belongs to the cache kmalloc-64 of size 64 [ 37.465049] The buggy address is located 0 bytes to the right of [ 37.465049] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.466346] [ 37.466683] The buggy address belongs to the physical page: [ 37.467380] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.468432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.469330] page_type: f5(slab) [ 37.470019] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.471025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.471995] page dumped because: kasan: bad access detected [ 37.472692] [ 37.473057] Memory state around the buggy address: [ 37.473760] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.474698] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.475613] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.476469] ^ [ 37.477119] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.478045] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.479033] ================================================================== [ 37.559576] ================================================================== [ 37.560441] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 37.561456] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.563126] [ 37.563720] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.564989] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.565682] Hardware name: linux,dummy-virt (DT) [ 37.566412] Call trace: [ 37.566817] show_stack+0x20/0x38 (C) [ 37.567392] dump_stack_lvl+0x8c/0xd0 [ 37.568037] print_report+0x118/0x5e0 [ 37.568671] kasan_report+0xc8/0x118 [ 37.569577] kasan_check_range+0x100/0x1a8 [ 37.570295] __kasan_check_write+0x20/0x30 [ 37.571084] kasan_atomics_helper+0xc08/0x4858 [ 37.571811] kasan_atomics+0x198/0x2e8 [ 37.572529] kunit_try_run_case+0x14c/0x3d0 [ 37.573238] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.574060] kthread+0x24c/0x2d0 [ 37.574709] ret_from_fork+0x10/0x20 [ 37.575412] [ 37.575771] Allocated by task 253: [ 37.576478] kasan_save_stack+0x3c/0x68 [ 37.577022] kasan_save_track+0x20/0x40 [ 37.577766] kasan_save_alloc_info+0x40/0x58 [ 37.578439] __kasan_kmalloc+0xd4/0xd8 [ 37.579192] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.579857] kasan_atomics+0xb8/0x2e8 [ 37.580567] kunit_try_run_case+0x14c/0x3d0 [ 37.581204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.582019] kthread+0x24c/0x2d0 [ 37.582693] ret_from_fork+0x10/0x20 [ 37.583327] [ 37.583733] The buggy address belongs to the object at fff00000c6767080 [ 37.583733] which belongs to the cache kmalloc-64 of size 64 [ 37.585504] The buggy address is located 0 bytes to the right of [ 37.585504] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.587145] [ 37.587461] The buggy address belongs to the physical page: [ 37.588235] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.589619] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.590787] page_type: f5(slab) [ 37.591698] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.592795] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.593884] page dumped because: kasan: bad access detected [ 37.594871] [ 37.595252] Memory state around the buggy address: [ 37.596159] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.597293] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.598244] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.599478] ^ [ 37.600151] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.601342] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.602445] ================================================================== [ 37.685849] ================================================================== [ 37.686889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 37.687978] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.689382] [ 37.689716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.691387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.692100] Hardware name: linux,dummy-virt (DT) [ 37.692721] Call trace: [ 37.693040] show_stack+0x20/0x38 (C) [ 37.693690] dump_stack_lvl+0x8c/0xd0 [ 37.694280] print_report+0x118/0x5e0 [ 37.694899] kasan_report+0xc8/0x118 [ 37.695510] __asan_report_load4_noabort+0x20/0x30 [ 37.696182] kasan_atomics_helper+0x3dd8/0x4858 [ 37.696859] kasan_atomics+0x198/0x2e8 [ 37.697512] kunit_try_run_case+0x14c/0x3d0 [ 37.698135] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.698807] kthread+0x24c/0x2d0 [ 37.699279] ret_from_fork+0x10/0x20 [ 37.700080] [ 37.700496] Allocated by task 253: [ 37.701089] kasan_save_stack+0x3c/0x68 [ 37.701724] kasan_save_track+0x20/0x40 [ 37.702372] kasan_save_alloc_info+0x40/0x58 [ 37.702938] __kasan_kmalloc+0xd4/0xd8 [ 37.703654] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.704292] kasan_atomics+0xb8/0x2e8 [ 37.704941] kunit_try_run_case+0x14c/0x3d0 [ 37.705533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.706299] kthread+0x24c/0x2d0 [ 37.706809] ret_from_fork+0x10/0x20 [ 37.707603] [ 37.707981] The buggy address belongs to the object at fff00000c6767080 [ 37.707981] which belongs to the cache kmalloc-64 of size 64 [ 37.709326] The buggy address is located 0 bytes to the right of [ 37.709326] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.710946] [ 37.711346] The buggy address belongs to the physical page: [ 37.712119] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.713084] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.713985] page_type: f5(slab) [ 37.714473] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.715451] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.716352] page dumped because: kasan: bad access detected [ 37.717120] [ 37.717436] Memory state around the buggy address: [ 37.718096] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.718948] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.719885] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.720807] ^ [ 37.721465] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.722467] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.723355] ================================================================== [ 38.128567] ================================================================== [ 38.129992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 38.130876] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.131348] [ 38.131539] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.132165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.132445] Hardware name: linux,dummy-virt (DT) [ 38.132866] Call trace: [ 38.133219] show_stack+0x20/0x38 (C) [ 38.134328] dump_stack_lvl+0x8c/0xd0 [ 38.135498] print_report+0x118/0x5e0 [ 38.136266] kasan_report+0xc8/0x118 [ 38.136811] kasan_check_range+0x100/0x1a8 [ 38.137412] __kasan_check_write+0x20/0x30 [ 38.138094] kasan_atomics_helper+0x1058/0x4858 [ 38.138702] kasan_atomics+0x198/0x2e8 [ 38.139395] kunit_try_run_case+0x14c/0x3d0 [ 38.139985] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.140784] kthread+0x24c/0x2d0 [ 38.141417] ret_from_fork+0x10/0x20 [ 38.142047] [ 38.142397] Allocated by task 253: [ 38.142988] kasan_save_stack+0x3c/0x68 [ 38.143566] kasan_save_track+0x20/0x40 [ 38.144213] kasan_save_alloc_info+0x40/0x58 [ 38.144778] __kasan_kmalloc+0xd4/0xd8 [ 38.145404] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.146032] kasan_atomics+0xb8/0x2e8 [ 38.146686] kunit_try_run_case+0x14c/0x3d0 [ 38.147334] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.148236] kthread+0x24c/0x2d0 [ 38.148764] ret_from_fork+0x10/0x20 [ 38.149360] [ 38.149687] The buggy address belongs to the object at fff00000c6767080 [ 38.149687] which belongs to the cache kmalloc-64 of size 64 [ 38.151250] The buggy address is located 0 bytes to the right of [ 38.151250] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.152647] [ 38.152998] The buggy address belongs to the physical page: [ 38.153717] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.154600] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.155500] page_type: f5(slab) [ 38.156022] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.156989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.157920] page dumped because: kasan: bad access detected [ 38.158571] [ 38.158975] Memory state around the buggy address: [ 38.159589] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.160467] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.161278] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.162224] ^ [ 38.162853] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.163827] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.164683] ================================================================== [ 37.320134] ================================================================== [ 37.320998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 37.322747] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.323866] [ 37.324248] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.325584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.326217] Hardware name: linux,dummy-virt (DT) [ 37.326898] Call trace: [ 37.327498] show_stack+0x20/0x38 (C) [ 37.328138] dump_stack_lvl+0x8c/0xd0 [ 37.328897] print_report+0x118/0x5e0 [ 37.329573] kasan_report+0xc8/0x118 [ 37.330325] kasan_check_range+0x100/0x1a8 [ 37.331119] __kasan_check_write+0x20/0x30 [ 37.331878] kasan_atomics_helper+0xa04/0x4858 [ 37.332651] kasan_atomics+0x198/0x2e8 [ 37.333294] kunit_try_run_case+0x14c/0x3d0 [ 37.333990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.334817] kthread+0x24c/0x2d0 [ 37.335496] ret_from_fork+0x10/0x20 [ 37.336132] [ 37.336555] Allocated by task 253: [ 37.337173] kasan_save_stack+0x3c/0x68 [ 37.337910] kasan_save_track+0x20/0x40 [ 37.338456] kasan_save_alloc_info+0x40/0x58 [ 37.339280] __kasan_kmalloc+0xd4/0xd8 [ 37.339865] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.340671] kasan_atomics+0xb8/0x2e8 [ 37.341372] kunit_try_run_case+0x14c/0x3d0 [ 37.342200] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.343027] kthread+0x24c/0x2d0 [ 37.343746] ret_from_fork+0x10/0x20 [ 37.344461] [ 37.344813] The buggy address belongs to the object at fff00000c6767080 [ 37.344813] which belongs to the cache kmalloc-64 of size 64 [ 37.346485] The buggy address is located 0 bytes to the right of [ 37.346485] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.348222] [ 37.348708] The buggy address belongs to the physical page: [ 37.349403] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.350602] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.351436] page_type: f5(slab) [ 37.352030] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.353019] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.353827] page dumped because: kasan: bad access detected [ 37.354544] [ 37.354988] Memory state around the buggy address: [ 37.355662] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.356521] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.357391] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.358319] ^ [ 37.358964] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.359898] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.360801] ================================================================== [ 38.731006] ================================================================== [ 38.731817] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 38.734075] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.734929] [ 38.735242] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.736318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.736808] Hardware name: linux,dummy-virt (DT) [ 38.737546] Call trace: [ 38.737990] show_stack+0x20/0x38 (C) [ 38.738496] dump_stack_lvl+0x8c/0xd0 [ 38.739234] print_report+0x118/0x5e0 [ 38.739961] kasan_report+0xc8/0x118 [ 38.740646] kasan_check_range+0x100/0x1a8 [ 38.741350] __kasan_check_write+0x20/0x30 [ 38.742021] kasan_atomics_helper+0x1644/0x4858 [ 38.742667] kasan_atomics+0x198/0x2e8 [ 38.743298] kunit_try_run_case+0x14c/0x3d0 [ 38.744033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.744746] kthread+0x24c/0x2d0 [ 38.745359] ret_from_fork+0x10/0x20 [ 38.745936] [ 38.746318] Allocated by task 253: [ 38.746970] kasan_save_stack+0x3c/0x68 [ 38.747689] kasan_save_track+0x20/0x40 [ 38.748273] kasan_save_alloc_info+0x40/0x58 [ 38.748842] __kasan_kmalloc+0xd4/0xd8 [ 38.749487] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.750100] kasan_atomics+0xb8/0x2e8 [ 38.750789] kunit_try_run_case+0x14c/0x3d0 [ 38.751416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.752176] kthread+0x24c/0x2d0 [ 38.752678] ret_from_fork+0x10/0x20 [ 38.753176] [ 38.753577] The buggy address belongs to the object at fff00000c6767080 [ 38.753577] which belongs to the cache kmalloc-64 of size 64 [ 38.754964] The buggy address is located 0 bytes to the right of [ 38.754964] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.756402] [ 38.756779] The buggy address belongs to the physical page: [ 38.757499] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.758452] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.759161] page_type: f5(slab) [ 38.759680] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.760642] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.761558] page dumped because: kasan: bad access detected [ 38.762315] [ 38.762683] Memory state around the buggy address: [ 38.763187] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.764171] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.765007] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.765957] ^ [ 38.766520] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.767475] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.768379] ================================================================== [ 37.604575] ================================================================== [ 37.605472] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 37.606782] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.607700] [ 37.608054] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.609244] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.609777] Hardware name: linux,dummy-virt (DT) [ 37.610587] Call trace: [ 37.611261] show_stack+0x20/0x38 (C) [ 37.611982] dump_stack_lvl+0x8c/0xd0 [ 37.612567] print_report+0x118/0x5e0 [ 37.613146] kasan_report+0xc8/0x118 [ 37.613802] __asan_report_load4_noabort+0x20/0x30 [ 37.614557] kasan_atomics_helper+0x3de4/0x4858 [ 37.615259] kasan_atomics+0x198/0x2e8 [ 37.615889] kunit_try_run_case+0x14c/0x3d0 [ 37.616458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.617260] kthread+0x24c/0x2d0 [ 37.617899] ret_from_fork+0x10/0x20 [ 37.618453] [ 37.618834] Allocated by task 253: [ 37.619409] kasan_save_stack+0x3c/0x68 [ 37.619973] kasan_save_track+0x20/0x40 [ 37.620648] kasan_save_alloc_info+0x40/0x58 [ 37.621292] __kasan_kmalloc+0xd4/0xd8 [ 37.621832] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.622614] kasan_atomics+0xb8/0x2e8 [ 37.623129] kunit_try_run_case+0x14c/0x3d0 [ 37.623840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.624571] kthread+0x24c/0x2d0 [ 37.625240] ret_from_fork+0x10/0x20 [ 37.625819] [ 37.626197] The buggy address belongs to the object at fff00000c6767080 [ 37.626197] which belongs to the cache kmalloc-64 of size 64 [ 37.627671] The buggy address is located 0 bytes to the right of [ 37.627671] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.629177] [ 37.629500] The buggy address belongs to the physical page: [ 37.630131] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.631103] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.632098] page_type: f5(slab) [ 37.632563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.633605] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.634536] page dumped because: kasan: bad access detected [ 37.635233] [ 37.635577] Memory state around the buggy address: [ 37.636216] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.637035] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.637920] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.638927] ^ [ 37.639582] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.640503] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.641395] ================================================================== [ 37.024815] ================================================================== [ 37.025586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 37.026506] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.027817] [ 37.029157] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.030550] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.031136] Hardware name: linux,dummy-virt (DT) [ 37.031983] Call trace: [ 37.032315] show_stack+0x20/0x38 (C) [ 37.033119] dump_stack_lvl+0x8c/0xd0 [ 37.033710] print_report+0x118/0x5e0 [ 37.034321] kasan_report+0xc8/0x118 [ 37.035102] kasan_check_range+0x100/0x1a8 [ 37.035894] __kasan_check_write+0x20/0x30 [ 37.036573] kasan_atomics_helper+0x6ec/0x4858 [ 37.037305] kasan_atomics+0x198/0x2e8 [ 37.037969] kunit_try_run_case+0x14c/0x3d0 [ 37.038728] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.039547] kthread+0x24c/0x2d0 [ 37.040241] ret_from_fork+0x10/0x20 [ 37.040887] [ 37.041229] Allocated by task 253: [ 37.041952] kasan_save_stack+0x3c/0x68 [ 37.042663] kasan_save_track+0x20/0x40 [ 37.043385] kasan_save_alloc_info+0x40/0x58 [ 37.044066] __kasan_kmalloc+0xd4/0xd8 [ 37.044718] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.045535] kasan_atomics+0xb8/0x2e8 [ 37.046155] kunit_try_run_case+0x14c/0x3d0 [ 37.046844] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.047708] kthread+0x24c/0x2d0 [ 37.048317] ret_from_fork+0x10/0x20 [ 37.048981] [ 37.049325] The buggy address belongs to the object at fff00000c6767080 [ 37.049325] which belongs to the cache kmalloc-64 of size 64 [ 37.050887] The buggy address is located 0 bytes to the right of [ 37.050887] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.052594] [ 37.053055] The buggy address belongs to the physical page: [ 37.053860] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.054961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.055871] page_type: f5(slab) [ 37.056565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.057600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.058597] page dumped because: kasan: bad access detected [ 37.059491] [ 37.059984] Memory state around the buggy address: [ 37.060756] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.061753] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.062751] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.063698] ^ [ 37.064483] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.065513] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.066407] ================================================================== [ 37.193381] ================================================================== [ 37.195175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 37.196713] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.197914] [ 37.198375] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.199917] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.200698] Hardware name: linux,dummy-virt (DT) [ 37.201459] Call trace: [ 37.201907] show_stack+0x20/0x38 (C) [ 37.202514] dump_stack_lvl+0x8c/0xd0 [ 37.203339] print_report+0x118/0x5e0 [ 37.204007] kasan_report+0xc8/0x118 [ 37.204697] __asan_report_load4_noabort+0x20/0x30 [ 37.205425] kasan_atomics_helper+0x42d8/0x4858 [ 37.206136] kasan_atomics+0x198/0x2e8 [ 37.206744] kunit_try_run_case+0x14c/0x3d0 [ 37.207534] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.208438] kthread+0x24c/0x2d0 [ 37.209009] ret_from_fork+0x10/0x20 [ 37.209683] [ 37.210040] Allocated by task 253: [ 37.210620] kasan_save_stack+0x3c/0x68 [ 37.211325] kasan_save_track+0x20/0x40 [ 37.211885] kasan_save_alloc_info+0x40/0x58 [ 37.212722] __kasan_kmalloc+0xd4/0xd8 [ 37.213353] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.214066] kasan_atomics+0xb8/0x2e8 [ 37.214721] kunit_try_run_case+0x14c/0x3d0 [ 37.215418] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.216198] kthread+0x24c/0x2d0 [ 37.216817] ret_from_fork+0x10/0x20 [ 37.217459] [ 37.217907] The buggy address belongs to the object at fff00000c6767080 [ 37.217907] which belongs to the cache kmalloc-64 of size 64 [ 37.219435] The buggy address is located 0 bytes to the right of [ 37.219435] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.221041] [ 37.221532] The buggy address belongs to the physical page: [ 37.222350] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.223436] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.224297] page_type: f5(slab) [ 37.224871] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.225972] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.227071] page dumped because: kasan: bad access detected [ 37.227866] [ 37.228299] Memory state around the buggy address: [ 37.229013] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.230065] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.231042] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.232010] ^ [ 37.232734] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.233692] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.234566] ================================================================== [ 36.328983] ================================================================== [ 36.330523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 36.333554] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.334856] [ 36.335409] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.336676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.337441] Hardware name: linux,dummy-virt (DT) [ 36.338953] Call trace: [ 36.339679] show_stack+0x20/0x38 (C) [ 36.340268] dump_stack_lvl+0x8c/0xd0 [ 36.340946] print_report+0x118/0x5e0 [ 36.341566] kasan_report+0xc8/0x118 [ 36.342159] __asan_report_store4_noabort+0x20/0x30 [ 36.342969] kasan_atomics_helper+0x3f7c/0x4858 [ 36.343712] kasan_atomics+0x198/0x2e8 [ 36.344661] kunit_try_run_case+0x14c/0x3d0 [ 36.345325] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.346116] kthread+0x24c/0x2d0 [ 36.347234] ret_from_fork+0x10/0x20 [ 36.347831] [ 36.348129] Allocated by task 253: [ 36.348669] kasan_save_stack+0x3c/0x68 [ 36.349359] kasan_save_track+0x20/0x40 [ 36.349904] kasan_save_alloc_info+0x40/0x58 [ 36.350798] __kasan_kmalloc+0xd4/0xd8 [ 36.352144] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.352674] kasan_atomics+0xb8/0x2e8 [ 36.354012] kunit_try_run_case+0x14c/0x3d0 [ 36.354641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.355364] kthread+0x24c/0x2d0 [ 36.356353] ret_from_fork+0x10/0x20 [ 36.357117] [ 36.357610] The buggy address belongs to the object at fff00000c6767080 [ 36.357610] which belongs to the cache kmalloc-64 of size 64 [ 36.359508] The buggy address is located 0 bytes to the right of [ 36.359508] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.361261] [ 36.361553] The buggy address belongs to the physical page: [ 36.362321] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.363358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.364197] page_type: f5(slab) [ 36.364766] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.365926] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.366958] page dumped because: kasan: bad access detected [ 36.367550] [ 36.367908] Memory state around the buggy address: [ 36.368475] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.369421] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.371297] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.372445] ^ [ 36.373084] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.374709] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.375375] ================================================================== [ 36.983383] ================================================================== [ 36.984413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 36.985512] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.987422] [ 36.987797] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.989863] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.990834] Hardware name: linux,dummy-virt (DT) [ 36.991579] Call trace: [ 36.991985] show_stack+0x20/0x38 (C) [ 36.992654] dump_stack_lvl+0x8c/0xd0 [ 36.993339] print_report+0x118/0x5e0 [ 36.993880] kasan_report+0xc8/0x118 [ 36.994532] kasan_check_range+0x100/0x1a8 [ 36.995198] __kasan_check_write+0x20/0x30 [ 36.995852] kasan_atomics_helper+0x684/0x4858 [ 36.996520] kasan_atomics+0x198/0x2e8 [ 36.997122] kunit_try_run_case+0x14c/0x3d0 [ 36.997701] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.998544] kthread+0x24c/0x2d0 [ 36.999100] ret_from_fork+0x10/0x20 [ 36.999679] [ 36.999963] Allocated by task 253: [ 37.000515] kasan_save_stack+0x3c/0x68 [ 37.001168] kasan_save_track+0x20/0x40 [ 37.001769] kasan_save_alloc_info+0x40/0x58 [ 37.002315] __kasan_kmalloc+0xd4/0xd8 [ 37.003016] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.003519] kasan_atomics+0xb8/0x2e8 [ 37.004201] kunit_try_run_case+0x14c/0x3d0 [ 37.004774] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.005527] kthread+0x24c/0x2d0 [ 37.006007] ret_from_fork+0x10/0x20 [ 37.006735] [ 37.007126] The buggy address belongs to the object at fff00000c6767080 [ 37.007126] which belongs to the cache kmalloc-64 of size 64 [ 37.008617] The buggy address is located 0 bytes to the right of [ 37.008617] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.010200] [ 37.010499] The buggy address belongs to the physical page: [ 37.011412] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.012278] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.013153] page_type: f5(slab) [ 37.013814] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.014756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.015768] page dumped because: kasan: bad access detected [ 37.016397] [ 37.016732] Memory state around the buggy address: [ 37.017366] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.018493] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.019374] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.020294] ^ [ 37.020943] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.021869] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.022719] ================================================================== [ 37.804578] ================================================================== [ 37.805518] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 37.806923] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.808216] [ 37.808970] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.810235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.810780] Hardware name: linux,dummy-virt (DT) [ 37.811547] Call trace: [ 37.812093] show_stack+0x20/0x38 (C) [ 37.812737] dump_stack_lvl+0x8c/0xd0 [ 37.813365] print_report+0x118/0x5e0 [ 37.813999] kasan_report+0xc8/0x118 [ 37.814655] kasan_check_range+0x100/0x1a8 [ 37.815239] __kasan_check_read+0x20/0x30 [ 37.815927] kasan_atomics_helper+0xdd4/0x4858 [ 37.816598] kasan_atomics+0x198/0x2e8 [ 37.817208] kunit_try_run_case+0x14c/0x3d0 [ 37.817861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.818606] kthread+0x24c/0x2d0 [ 37.819297] ret_from_fork+0x10/0x20 [ 37.819901] [ 37.820214] Allocated by task 253: [ 37.820726] kasan_save_stack+0x3c/0x68 [ 37.821414] kasan_save_track+0x20/0x40 [ 37.821968] kasan_save_alloc_info+0x40/0x58 [ 37.822608] __kasan_kmalloc+0xd4/0xd8 [ 37.823447] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.824121] kasan_atomics+0xb8/0x2e8 [ 37.824773] kunit_try_run_case+0x14c/0x3d0 [ 37.825364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.826148] kthread+0x24c/0x2d0 [ 37.826662] ret_from_fork+0x10/0x20 [ 37.827266] [ 37.827574] The buggy address belongs to the object at fff00000c6767080 [ 37.827574] which belongs to the cache kmalloc-64 of size 64 [ 37.829120] The buggy address is located 0 bytes to the right of [ 37.829120] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.830564] [ 37.830925] The buggy address belongs to the physical page: [ 37.831760] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.832733] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.833657] page_type: f5(slab) [ 37.834272] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.835351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.836268] page dumped because: kasan: bad access detected [ 37.836944] [ 37.837302] Memory state around the buggy address: [ 37.837939] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.838895] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.839718] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.840579] ^ [ 37.841277] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.842080] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.843101] ================================================================== [ 36.704679] ================================================================== [ 36.705462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 36.706877] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.708406] [ 36.708983] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.711426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.712705] Hardware name: linux,dummy-virt (DT) [ 36.713040] Call trace: [ 36.713252] show_stack+0x20/0x38 (C) [ 36.713566] dump_stack_lvl+0x8c/0xd0 [ 36.715066] print_report+0x118/0x5e0 [ 36.715996] kasan_report+0xc8/0x118 [ 36.716785] kasan_check_range+0x100/0x1a8 [ 36.717447] __kasan_check_write+0x20/0x30 [ 36.718374] kasan_atomics_helper+0x414/0x4858 [ 36.719316] kasan_atomics+0x198/0x2e8 [ 36.719998] kunit_try_run_case+0x14c/0x3d0 [ 36.720661] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.721445] kthread+0x24c/0x2d0 [ 36.722040] ret_from_fork+0x10/0x20 [ 36.722746] [ 36.723040] Allocated by task 253: [ 36.724079] kasan_save_stack+0x3c/0x68 [ 36.724699] kasan_save_track+0x20/0x40 [ 36.725273] kasan_save_alloc_info+0x40/0x58 [ 36.726524] __kasan_kmalloc+0xd4/0xd8 [ 36.727020] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.727484] kasan_atomics+0xb8/0x2e8 [ 36.728490] kunit_try_run_case+0x14c/0x3d0 [ 36.729184] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.730784] kthread+0x24c/0x2d0 [ 36.731211] ret_from_fork+0x10/0x20 [ 36.731784] [ 36.732105] The buggy address belongs to the object at fff00000c6767080 [ 36.732105] which belongs to the cache kmalloc-64 of size 64 [ 36.733389] The buggy address is located 0 bytes to the right of [ 36.733389] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.735719] [ 36.736100] The buggy address belongs to the physical page: [ 36.736927] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.738513] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.739542] page_type: f5(slab) [ 36.740076] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.741244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.742662] page dumped because: kasan: bad access detected [ 36.743439] [ 36.743763] Memory state around the buggy address: [ 36.744399] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.745330] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.746643] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.748263] ^ [ 36.749396] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.751085] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.752731] ================================================================== [ 37.481012] ================================================================== [ 37.481899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 37.482781] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.483786] [ 37.484245] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.485426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.486123] Hardware name: linux,dummy-virt (DT) [ 37.486710] Call trace: [ 37.487259] show_stack+0x20/0x38 (C) [ 37.487989] dump_stack_lvl+0x8c/0xd0 [ 37.488693] print_report+0x118/0x5e0 [ 37.489338] kasan_report+0xc8/0x118 [ 37.489919] kasan_check_range+0x100/0x1a8 [ 37.490533] __kasan_check_write+0x20/0x30 [ 37.491240] kasan_atomics_helper+0xb70/0x4858 [ 37.492007] kasan_atomics+0x198/0x2e8 [ 37.492671] kunit_try_run_case+0x14c/0x3d0 [ 37.493342] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.494162] kthread+0x24c/0x2d0 [ 37.494824] ret_from_fork+0x10/0x20 [ 37.495403] [ 37.495752] Allocated by task 253: [ 37.496301] kasan_save_stack+0x3c/0x68 [ 37.496984] kasan_save_track+0x20/0x40 [ 37.497546] kasan_save_alloc_info+0x40/0x58 [ 37.498234] __kasan_kmalloc+0xd4/0xd8 [ 37.498891] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.499552] kasan_atomics+0xb8/0x2e8 [ 37.500091] kunit_try_run_case+0x14c/0x3d0 [ 37.500703] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.501384] kthread+0x24c/0x2d0 [ 37.501936] ret_from_fork+0x10/0x20 [ 37.502504] [ 37.502970] The buggy address belongs to the object at fff00000c6767080 [ 37.502970] which belongs to the cache kmalloc-64 of size 64 [ 37.504280] The buggy address is located 0 bytes to the right of [ 37.504280] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.505839] [ 37.506307] The buggy address belongs to the physical page: [ 37.507068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.508043] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.508981] page_type: f5(slab) [ 37.509357] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.510340] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.511370] page dumped because: kasan: bad access detected [ 37.512079] [ 37.512385] Memory state around the buggy address: [ 37.513049] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.513886] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.514826] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.515690] ^ [ 37.516324] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.517152] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.518065] ================================================================== [ 36.427002] ================================================================== [ 36.427787] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 36.428541] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.429678] [ 36.430151] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.431461] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.432427] Hardware name: linux,dummy-virt (DT) [ 36.433378] Call trace: [ 36.434115] show_stack+0x20/0x38 (C) [ 36.434607] dump_stack_lvl+0x8c/0xd0 [ 36.435234] print_report+0x118/0x5e0 [ 36.436037] kasan_report+0xc8/0x118 [ 36.436692] kasan_check_range+0x100/0x1a8 [ 36.437446] __kasan_check_write+0x20/0x30 [ 36.438394] kasan_atomics_helper+0x24c/0x4858 [ 36.439070] kasan_atomics+0x198/0x2e8 [ 36.439683] kunit_try_run_case+0x14c/0x3d0 [ 36.440271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.441056] kthread+0x24c/0x2d0 [ 36.441692] ret_from_fork+0x10/0x20 [ 36.442458] [ 36.443382] Allocated by task 253: [ 36.444056] kasan_save_stack+0x3c/0x68 [ 36.444876] kasan_save_track+0x20/0x40 [ 36.445410] kasan_save_alloc_info+0x40/0x58 [ 36.446051] __kasan_kmalloc+0xd4/0xd8 [ 36.446480] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.447019] kasan_atomics+0xb8/0x2e8 [ 36.447681] kunit_try_run_case+0x14c/0x3d0 [ 36.448265] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.449235] kthread+0x24c/0x2d0 [ 36.449794] ret_from_fork+0x10/0x20 [ 36.451106] [ 36.451572] The buggy address belongs to the object at fff00000c6767080 [ 36.451572] which belongs to the cache kmalloc-64 of size 64 [ 36.453415] The buggy address is located 0 bytes to the right of [ 36.453415] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.455120] [ 36.455310] The buggy address belongs to the physical page: [ 36.455687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.456971] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.457705] page_type: f5(slab) [ 36.458602] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.459714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.461189] page dumped because: kasan: bad access detected [ 36.462052] [ 36.462699] Memory state around the buggy address: [ 36.463961] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.465198] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.466057] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.466877] ^ [ 36.467504] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.468993] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.470114] ================================================================== [ 38.531693] ================================================================== [ 38.532333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 38.533868] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.534837] [ 38.535191] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.536453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.536968] Hardware name: linux,dummy-virt (DT) [ 38.537726] Call trace: [ 38.538118] show_stack+0x20/0x38 (C) [ 38.538890] dump_stack_lvl+0x8c/0xd0 [ 38.539554] print_report+0x118/0x5e0 [ 38.540074] kasan_report+0xc8/0x118 [ 38.540768] kasan_check_range+0x100/0x1a8 [ 38.541351] __kasan_check_write+0x20/0x30 [ 38.542129] kasan_atomics_helper+0x147c/0x4858 [ 38.542812] kasan_atomics+0x198/0x2e8 [ 38.543469] kunit_try_run_case+0x14c/0x3d0 [ 38.544173] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.544996] kthread+0x24c/0x2d0 [ 38.545607] ret_from_fork+0x10/0x20 [ 38.546316] [ 38.546794] Allocated by task 253: [ 38.547376] kasan_save_stack+0x3c/0x68 [ 38.547932] kasan_save_track+0x20/0x40 [ 38.548588] kasan_save_alloc_info+0x40/0x58 [ 38.549203] __kasan_kmalloc+0xd4/0xd8 [ 38.549967] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.550647] kasan_atomics+0xb8/0x2e8 [ 38.551322] kunit_try_run_case+0x14c/0x3d0 [ 38.551868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.552830] kthread+0x24c/0x2d0 [ 38.553352] ret_from_fork+0x10/0x20 [ 38.554019] [ 38.554324] The buggy address belongs to the object at fff00000c6767080 [ 38.554324] which belongs to the cache kmalloc-64 of size 64 [ 38.555920] The buggy address is located 0 bytes to the right of [ 38.555920] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.557376] [ 38.557764] The buggy address belongs to the physical page: [ 38.558457] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.559442] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.560270] page_type: f5(slab) [ 38.560884] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.561867] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.562772] page dumped because: kasan: bad access detected [ 38.563465] [ 38.563802] Memory state around the buggy address: [ 38.564483] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.565256] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.566257] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.567156] ^ [ 38.567730] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.568614] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.569519] ================================================================== [ 36.851178] ================================================================== [ 36.852067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 36.852798] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.853680] [ 36.854611] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.856884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.857642] Hardware name: linux,dummy-virt (DT) [ 36.858613] Call trace: [ 36.859006] show_stack+0x20/0x38 (C) [ 36.859811] dump_stack_lvl+0x8c/0xd0 [ 36.860373] print_report+0x118/0x5e0 [ 36.861054] kasan_report+0xc8/0x118 [ 36.861645] kasan_check_range+0x100/0x1a8 [ 36.862674] __kasan_check_write+0x20/0x30 [ 36.863516] kasan_atomics_helper+0x54c/0x4858 [ 36.864249] kasan_atomics+0x198/0x2e8 [ 36.864904] kunit_try_run_case+0x14c/0x3d0 [ 36.865922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.866752] kthread+0x24c/0x2d0 [ 36.867284] ret_from_fork+0x10/0x20 [ 36.867704] [ 36.868097] Allocated by task 253: [ 36.868581] kasan_save_stack+0x3c/0x68 [ 36.869088] kasan_save_track+0x20/0x40 [ 36.869946] kasan_save_alloc_info+0x40/0x58 [ 36.870890] __kasan_kmalloc+0xd4/0xd8 [ 36.871646] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.872257] kasan_atomics+0xb8/0x2e8 [ 36.872861] kunit_try_run_case+0x14c/0x3d0 [ 36.873571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.874712] kthread+0x24c/0x2d0 [ 36.875983] ret_from_fork+0x10/0x20 [ 36.876582] [ 36.877078] The buggy address belongs to the object at fff00000c6767080 [ 36.877078] which belongs to the cache kmalloc-64 of size 64 [ 36.879076] The buggy address is located 0 bytes to the right of [ 36.879076] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.881124] [ 36.881325] The buggy address belongs to the physical page: [ 36.882157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.883306] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.884185] page_type: f5(slab) [ 36.884694] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.885580] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.886882] page dumped because: kasan: bad access detected [ 36.887744] [ 36.888095] Memory state around the buggy address: [ 36.889003] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.890072] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.891290] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.892255] ^ [ 36.892959] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.894042] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.895992] ================================================================== [ 38.688940] ================================================================== [ 38.690648] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 38.691838] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.692943] [ 38.693808] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.695071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.695592] Hardware name: linux,dummy-virt (DT) [ 38.696303] Call trace: [ 38.696759] show_stack+0x20/0x38 (C) [ 38.697434] dump_stack_lvl+0x8c/0xd0 [ 38.698148] print_report+0x118/0x5e0 [ 38.698880] kasan_report+0xc8/0x118 [ 38.699585] __asan_report_load8_noabort+0x20/0x30 [ 38.700367] kasan_atomics_helper+0x3db0/0x4858 [ 38.701077] kasan_atomics+0x198/0x2e8 [ 38.701728] kunit_try_run_case+0x14c/0x3d0 [ 38.702472] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.703336] kthread+0x24c/0x2d0 [ 38.703963] ret_from_fork+0x10/0x20 [ 38.704595] [ 38.705015] Allocated by task 253: [ 38.705605] kasan_save_stack+0x3c/0x68 [ 38.706356] kasan_save_track+0x20/0x40 [ 38.707081] kasan_save_alloc_info+0x40/0x58 [ 38.707828] __kasan_kmalloc+0xd4/0xd8 [ 38.708489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.709201] kasan_atomics+0xb8/0x2e8 [ 38.709846] kunit_try_run_case+0x14c/0x3d0 [ 38.710593] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.711439] kthread+0x24c/0x2d0 [ 38.711974] ret_from_fork+0x10/0x20 [ 38.712679] [ 38.713021] The buggy address belongs to the object at fff00000c6767080 [ 38.713021] which belongs to the cache kmalloc-64 of size 64 [ 38.714464] The buggy address is located 0 bytes to the right of [ 38.714464] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.716062] [ 38.716557] The buggy address belongs to the physical page: [ 38.717355] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.718396] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.719326] page_type: f5(slab) [ 38.719829] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.720948] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.721941] page dumped because: kasan: bad access detected [ 38.722780] [ 38.723235] Memory state around the buggy address: [ 38.723875] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.724712] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.725587] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.726453] ^ [ 38.727077] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.728005] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.728888] ================================================================== [ 38.932121] ================================================================== [ 38.932872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 38.934268] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.935393] [ 38.935757] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.937195] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.937718] Hardware name: linux,dummy-virt (DT) [ 38.938408] Call trace: [ 38.938958] show_stack+0x20/0x38 (C) [ 38.939493] dump_stack_lvl+0x8c/0xd0 [ 38.940171] print_report+0x118/0x5e0 [ 38.940754] kasan_report+0xc8/0x118 [ 38.941396] __asan_report_load8_noabort+0x20/0x30 [ 38.942006] kasan_atomics_helper+0x3e20/0x4858 [ 38.942763] kasan_atomics+0x198/0x2e8 [ 38.943472] kunit_try_run_case+0x14c/0x3d0 [ 38.944077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.944960] kthread+0x24c/0x2d0 [ 38.945527] ret_from_fork+0x10/0x20 [ 38.946100] [ 38.946440] Allocated by task 253: [ 38.946938] kasan_save_stack+0x3c/0x68 [ 38.947526] kasan_save_track+0x20/0x40 [ 38.948185] kasan_save_alloc_info+0x40/0x58 [ 38.948700] __kasan_kmalloc+0xd4/0xd8 [ 38.949438] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.950126] kasan_atomics+0xb8/0x2e8 [ 38.950690] kunit_try_run_case+0x14c/0x3d0 [ 38.951299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.952105] kthread+0x24c/0x2d0 [ 38.952737] ret_from_fork+0x10/0x20 [ 38.953270] [ 38.953662] The buggy address belongs to the object at fff00000c6767080 [ 38.953662] which belongs to the cache kmalloc-64 of size 64 [ 38.955097] The buggy address is located 0 bytes to the right of [ 38.955097] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.956524] [ 38.956902] The buggy address belongs to the physical page: [ 38.957686] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.958804] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.959684] page_type: f5(slab) [ 38.960156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.961182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.962163] page dumped because: kasan: bad access detected [ 38.962876] [ 38.963228] Memory state around the buggy address: [ 38.963967] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.964826] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.965711] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.966648] ^ [ 38.967267] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.968184] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.969077] ================================================================== [ 36.518173] ================================================================== [ 36.519841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 36.520925] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.522840] [ 36.523346] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.524494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.525125] Hardware name: linux,dummy-virt (DT) [ 36.525444] Call trace: [ 36.525733] show_stack+0x20/0x38 (C) [ 36.527076] dump_stack_lvl+0x8c/0xd0 [ 36.527694] print_report+0x118/0x5e0 [ 36.528396] kasan_report+0xc8/0x118 [ 36.529021] __asan_report_load4_noabort+0x20/0x30 [ 36.529936] kasan_atomics_helper+0x40fc/0x4858 [ 36.530692] kasan_atomics+0x198/0x2e8 [ 36.531177] kunit_try_run_case+0x14c/0x3d0 [ 36.531909] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.532583] kthread+0x24c/0x2d0 [ 36.533255] ret_from_fork+0x10/0x20 [ 36.533969] [ 36.534251] Allocated by task 253: [ 36.534995] kasan_save_stack+0x3c/0x68 [ 36.535667] kasan_save_track+0x20/0x40 [ 36.536437] kasan_save_alloc_info+0x40/0x58 [ 36.537386] __kasan_kmalloc+0xd4/0xd8 [ 36.538230] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.539230] kasan_atomics+0xb8/0x2e8 [ 36.539991] kunit_try_run_case+0x14c/0x3d0 [ 36.540794] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.541556] kthread+0x24c/0x2d0 [ 36.542379] ret_from_fork+0x10/0x20 [ 36.542927] [ 36.543319] The buggy address belongs to the object at fff00000c6767080 [ 36.543319] which belongs to the cache kmalloc-64 of size 64 [ 36.545283] The buggy address is located 0 bytes to the right of [ 36.545283] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.547183] [ 36.547505] The buggy address belongs to the physical page: [ 36.548121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.549365] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.550674] page_type: f5(slab) [ 36.551097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.552986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.554057] page dumped because: kasan: bad access detected [ 36.556100] [ 36.556354] Memory state around the buggy address: [ 36.556732] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.557581] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.558415] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.559407] ^ [ 36.560302] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.561726] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.562823] ================================================================== [ 38.889974] ================================================================== [ 38.890946] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 38.891854] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.892690] [ 38.893177] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.894758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.895397] Hardware name: linux,dummy-virt (DT) [ 38.896055] Call trace: [ 38.896595] show_stack+0x20/0x38 (C) [ 38.897316] dump_stack_lvl+0x8c/0xd0 [ 38.898002] print_report+0x118/0x5e0 [ 38.898658] kasan_report+0xc8/0x118 [ 38.899340] kasan_check_range+0x100/0x1a8 [ 38.900080] __kasan_check_write+0x20/0x30 [ 38.900775] kasan_atomics_helper+0x175c/0x4858 [ 38.901541] kasan_atomics+0x198/0x2e8 [ 38.902201] kunit_try_run_case+0x14c/0x3d0 [ 38.902937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.903734] kthread+0x24c/0x2d0 [ 38.904372] ret_from_fork+0x10/0x20 [ 38.905014] [ 38.905349] Allocated by task 253: [ 38.905958] kasan_save_stack+0x3c/0x68 [ 38.906612] kasan_save_track+0x20/0x40 [ 38.907319] kasan_save_alloc_info+0x40/0x58 [ 38.908058] __kasan_kmalloc+0xd4/0xd8 [ 38.908794] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.909509] kasan_atomics+0xb8/0x2e8 [ 38.910156] kunit_try_run_case+0x14c/0x3d0 [ 38.910846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.911684] kthread+0x24c/0x2d0 [ 38.912259] ret_from_fork+0x10/0x20 [ 38.912992] [ 38.913409] The buggy address belongs to the object at fff00000c6767080 [ 38.913409] which belongs to the cache kmalloc-64 of size 64 [ 38.915104] The buggy address is located 0 bytes to the right of [ 38.915104] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.916726] [ 38.917241] The buggy address belongs to the physical page: [ 38.917977] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.919150] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.920075] page_type: f5(slab) [ 38.920763] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.921827] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.922829] page dumped because: kasan: bad access detected [ 38.923647] [ 38.923986] Memory state around the buggy address: [ 38.924748] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.925845] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.926844] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.927981] ^ [ 38.928715] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.929715] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.930597] ================================================================== [ 36.754855] ================================================================== [ 36.756019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 36.757391] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.759060] [ 36.759704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.761013] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.761547] Hardware name: linux,dummy-virt (DT) [ 36.762182] Call trace: [ 36.762566] show_stack+0x20/0x38 (C) [ 36.763546] dump_stack_lvl+0x8c/0xd0 [ 36.764143] print_report+0x118/0x5e0 [ 36.764853] kasan_report+0xc8/0x118 [ 36.765417] kasan_check_range+0x100/0x1a8 [ 36.766473] __kasan_check_write+0x20/0x30 [ 36.767152] kasan_atomics_helper+0x47c/0x4858 [ 36.767775] kasan_atomics+0x198/0x2e8 [ 36.768330] kunit_try_run_case+0x14c/0x3d0 [ 36.769311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.770466] kthread+0x24c/0x2d0 [ 36.771386] ret_from_fork+0x10/0x20 [ 36.772105] [ 36.772430] Allocated by task 253: [ 36.772919] kasan_save_stack+0x3c/0x68 [ 36.773450] kasan_save_track+0x20/0x40 [ 36.774765] kasan_save_alloc_info+0x40/0x58 [ 36.775234] __kasan_kmalloc+0xd4/0xd8 [ 36.776093] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.776911] kasan_atomics+0xb8/0x2e8 [ 36.777580] kunit_try_run_case+0x14c/0x3d0 [ 36.778731] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.779471] kthread+0x24c/0x2d0 [ 36.780094] ret_from_fork+0x10/0x20 [ 36.780770] [ 36.781117] The buggy address belongs to the object at fff00000c6767080 [ 36.781117] which belongs to the cache kmalloc-64 of size 64 [ 36.783180] The buggy address is located 0 bytes to the right of [ 36.783180] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.784573] [ 36.785060] The buggy address belongs to the physical page: [ 36.786213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.787439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.788332] page_type: f5(slab) [ 36.788880] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.790001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.791031] page dumped because: kasan: bad access detected [ 36.791882] [ 36.792187] Memory state around the buggy address: [ 36.793193] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.794863] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.796439] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.797216] ^ [ 36.798150] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.799104] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.800024] ================================================================== [ 36.659327] ================================================================== [ 36.660275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 36.661119] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.662463] [ 36.663134] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.664393] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.665460] Hardware name: linux,dummy-virt (DT) [ 36.666253] Call trace: [ 36.666949] show_stack+0x20/0x38 (C) [ 36.667367] dump_stack_lvl+0x8c/0xd0 [ 36.668043] print_report+0x118/0x5e0 [ 36.668829] kasan_report+0xc8/0x118 [ 36.669475] kasan_check_range+0x100/0x1a8 [ 36.670425] __kasan_check_write+0x20/0x30 [ 36.671472] kasan_atomics_helper+0x3ac/0x4858 [ 36.672087] kasan_atomics+0x198/0x2e8 [ 36.672723] kunit_try_run_case+0x14c/0x3d0 [ 36.673361] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.674157] kthread+0x24c/0x2d0 [ 36.674802] ret_from_fork+0x10/0x20 [ 36.675502] [ 36.675836] Allocated by task 253: [ 36.676434] kasan_save_stack+0x3c/0x68 [ 36.677114] kasan_save_track+0x20/0x40 [ 36.677769] kasan_save_alloc_info+0x40/0x58 [ 36.679029] __kasan_kmalloc+0xd4/0xd8 [ 36.680708] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.681343] kasan_atomics+0xb8/0x2e8 [ 36.681933] kunit_try_run_case+0x14c/0x3d0 [ 36.682537] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.683290] kthread+0x24c/0x2d0 [ 36.684023] ret_from_fork+0x10/0x20 [ 36.684569] [ 36.685068] The buggy address belongs to the object at fff00000c6767080 [ 36.685068] which belongs to the cache kmalloc-64 of size 64 [ 36.687328] The buggy address is located 0 bytes to the right of [ 36.687328] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.688812] [ 36.689125] The buggy address belongs to the physical page: [ 36.690114] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.691192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.692022] page_type: f5(slab) [ 36.692677] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.693684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.695196] page dumped because: kasan: bad access detected [ 36.695943] [ 36.696381] Memory state around the buggy address: [ 36.697137] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.697935] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.699182] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.700185] ^ [ 36.701075] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.702018] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.703307] ================================================================== [ 36.281290] ================================================================== [ 36.283456] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 36.284435] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.285130] [ 36.285479] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.287566] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.288281] Hardware name: linux,dummy-virt (DT) [ 36.288918] Call trace: [ 36.289309] show_stack+0x20/0x38 (C) [ 36.290250] dump_stack_lvl+0x8c/0xd0 [ 36.290925] print_report+0x118/0x5e0 [ 36.291447] kasan_report+0xc8/0x118 [ 36.292143] __asan_report_load4_noabort+0x20/0x30 [ 36.292981] kasan_atomics_helper+0x40a8/0x4858 [ 36.293846] kasan_atomics+0x198/0x2e8 [ 36.294802] kunit_try_run_case+0x14c/0x3d0 [ 36.295581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.296500] kthread+0x24c/0x2d0 [ 36.297050] ret_from_fork+0x10/0x20 [ 36.297381] [ 36.297558] Allocated by task 253: [ 36.298764] kasan_save_stack+0x3c/0x68 [ 36.299840] kasan_save_track+0x20/0x40 [ 36.300824] kasan_save_alloc_info+0x40/0x58 [ 36.301657] __kasan_kmalloc+0xd4/0xd8 [ 36.302481] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.302977] kasan_atomics+0xb8/0x2e8 [ 36.304061] kunit_try_run_case+0x14c/0x3d0 [ 36.304931] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.305701] kthread+0x24c/0x2d0 [ 36.306770] ret_from_fork+0x10/0x20 [ 36.307354] [ 36.307841] The buggy address belongs to the object at fff00000c6767080 [ 36.307841] which belongs to the cache kmalloc-64 of size 64 [ 36.309230] The buggy address is located 0 bytes to the right of [ 36.309230] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.311414] [ 36.311761] The buggy address belongs to the physical page: [ 36.312462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.313568] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.315208] page_type: f5(slab) [ 36.315853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.316808] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.317720] page dumped because: kasan: bad access detected [ 36.318401] [ 36.319206] Memory state around the buggy address: [ 36.319969] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.320959] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.322451] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.323175] ^ [ 36.323808] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.324895] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.326501] ================================================================== [ 37.068472] ================================================================== [ 37.069382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 37.070690] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.072235] [ 37.072837] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.074224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.075006] Hardware name: linux,dummy-virt (DT) [ 37.075809] Call trace: [ 37.076406] show_stack+0x20/0x38 (C) [ 37.077104] dump_stack_lvl+0x8c/0xd0 [ 37.077838] print_report+0x118/0x5e0 [ 37.078583] kasan_report+0xc8/0x118 [ 37.079283] kasan_check_range+0x100/0x1a8 [ 37.079893] __kasan_check_write+0x20/0x30 [ 37.080487] kasan_atomics_helper+0x760/0x4858 [ 37.081257] kasan_atomics+0x198/0x2e8 [ 37.082034] kunit_try_run_case+0x14c/0x3d0 [ 37.082693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.083662] kthread+0x24c/0x2d0 [ 37.084340] ret_from_fork+0x10/0x20 [ 37.085033] [ 37.085386] Allocated by task 253: [ 37.086059] kasan_save_stack+0x3c/0x68 [ 37.086732] kasan_save_track+0x20/0x40 [ 37.087352] kasan_save_alloc_info+0x40/0x58 [ 37.087999] __kasan_kmalloc+0xd4/0xd8 [ 37.088719] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.089430] kasan_atomics+0xb8/0x2e8 [ 37.090134] kunit_try_run_case+0x14c/0x3d0 [ 37.090922] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.091729] kthread+0x24c/0x2d0 [ 37.092409] ret_from_fork+0x10/0x20 [ 37.093014] [ 37.093431] The buggy address belongs to the object at fff00000c6767080 [ 37.093431] which belongs to the cache kmalloc-64 of size 64 [ 37.094940] The buggy address is located 0 bytes to the right of [ 37.094940] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.096590] [ 37.097060] The buggy address belongs to the physical page: [ 37.097839] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.098864] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.099906] page_type: f5(slab) [ 37.100360] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.101181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.102279] page dumped because: kasan: bad access detected [ 37.103051] [ 37.103360] Memory state around the buggy address: [ 37.103991] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.104888] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.105814] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.106813] ^ [ 37.107587] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.108413] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.109347] ================================================================== [ 36.898753] ================================================================== [ 36.899545] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 36.900996] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.902497] [ 36.903004] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.905016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.905712] Hardware name: linux,dummy-virt (DT) [ 36.906430] Call trace: [ 36.906945] show_stack+0x20/0x38 (C) [ 36.907710] dump_stack_lvl+0x8c/0xd0 [ 36.908379] print_report+0x118/0x5e0 [ 36.909044] kasan_report+0xc8/0x118 [ 36.909766] kasan_check_range+0x100/0x1a8 [ 36.910486] __kasan_check_write+0x20/0x30 [ 36.911285] kasan_atomics_helper+0x5b4/0x4858 [ 36.912040] kasan_atomics+0x198/0x2e8 [ 36.912717] kunit_try_run_case+0x14c/0x3d0 [ 36.913500] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.914309] kthread+0x24c/0x2d0 [ 36.914953] ret_from_fork+0x10/0x20 [ 36.915590] [ 36.915906] Allocated by task 253: [ 36.916432] kasan_save_stack+0x3c/0x68 [ 36.917123] kasan_save_track+0x20/0x40 [ 36.917749] kasan_save_alloc_info+0x40/0x58 [ 36.918488] __kasan_kmalloc+0xd4/0xd8 [ 36.919133] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.919834] kasan_atomics+0xb8/0x2e8 [ 36.920442] kunit_try_run_case+0x14c/0x3d0 [ 36.921069] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.921929] kthread+0x24c/0x2d0 [ 36.922606] ret_from_fork+0x10/0x20 [ 36.923251] [ 36.923688] The buggy address belongs to the object at fff00000c6767080 [ 36.923688] which belongs to the cache kmalloc-64 of size 64 [ 36.925164] The buggy address is located 0 bytes to the right of [ 36.925164] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.927235] [ 36.927565] The buggy address belongs to the physical page: [ 36.928485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.929557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.930445] page_type: f5(slab) [ 36.931069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.932142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.933093] page dumped because: kasan: bad access detected [ 36.933878] [ 36.934281] Memory state around the buggy address: [ 36.934967] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.936008] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.936956] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.937967] ^ [ 36.938707] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.939803] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.940701] ================================================================== [ 37.401654] ================================================================== [ 37.402499] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 37.403378] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.405740] [ 37.406113] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.407562] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.408179] Hardware name: linux,dummy-virt (DT) [ 37.408719] Call trace: [ 37.409139] show_stack+0x20/0x38 (C) [ 37.409830] dump_stack_lvl+0x8c/0xd0 [ 37.410479] print_report+0x118/0x5e0 [ 37.411096] kasan_report+0xc8/0x118 [ 37.411770] kasan_check_range+0x100/0x1a8 [ 37.412488] __kasan_check_write+0x20/0x30 [ 37.413115] kasan_atomics_helper+0xad4/0x4858 [ 37.413775] kasan_atomics+0x198/0x2e8 [ 37.414386] kunit_try_run_case+0x14c/0x3d0 [ 37.415059] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.415746] kthread+0x24c/0x2d0 [ 37.416365] ret_from_fork+0x10/0x20 [ 37.417032] [ 37.417339] Allocated by task 253: [ 37.417937] kasan_save_stack+0x3c/0x68 [ 37.418466] kasan_save_track+0x20/0x40 [ 37.419189] kasan_save_alloc_info+0x40/0x58 [ 37.419785] __kasan_kmalloc+0xd4/0xd8 [ 37.420454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.421114] kasan_atomics+0xb8/0x2e8 [ 37.421609] kunit_try_run_case+0x14c/0x3d0 [ 37.422313] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.422989] kthread+0x24c/0x2d0 [ 37.423606] ret_from_fork+0x10/0x20 [ 37.424251] [ 37.424532] The buggy address belongs to the object at fff00000c6767080 [ 37.424532] which belongs to the cache kmalloc-64 of size 64 [ 37.426482] The buggy address is located 0 bytes to the right of [ 37.426482] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.427945] [ 37.428275] The buggy address belongs to the physical page: [ 37.429145] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.430104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.431054] page_type: f5(slab) [ 37.431647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.432570] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.433517] page dumped because: kasan: bad access detected [ 37.434228] [ 37.434571] Memory state around the buggy address: [ 37.435237] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.436095] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.437247] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.438113] ^ [ 37.438841] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.439714] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.440530] ================================================================== [ 36.564748] ================================================================== [ 36.565754] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 36.567809] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.568758] [ 36.569201] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.570505] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.571067] Hardware name: linux,dummy-virt (DT) [ 36.572177] Call trace: [ 36.572539] show_stack+0x20/0x38 (C) [ 36.573308] dump_stack_lvl+0x8c/0xd0 [ 36.574210] print_report+0x118/0x5e0 [ 36.575100] kasan_report+0xc8/0x118 [ 36.575893] kasan_check_range+0x100/0x1a8 [ 36.576568] __kasan_check_write+0x20/0x30 [ 36.577161] kasan_atomics_helper+0x32c/0x4858 [ 36.578315] kasan_atomics+0x198/0x2e8 [ 36.579129] kunit_try_run_case+0x14c/0x3d0 [ 36.579857] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.580552] kthread+0x24c/0x2d0 [ 36.581149] ret_from_fork+0x10/0x20 [ 36.582193] [ 36.582488] Allocated by task 253: [ 36.583017] kasan_save_stack+0x3c/0x68 [ 36.583714] kasan_save_track+0x20/0x40 [ 36.584264] kasan_save_alloc_info+0x40/0x58 [ 36.585033] __kasan_kmalloc+0xd4/0xd8 [ 36.585526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.586863] kasan_atomics+0xb8/0x2e8 [ 36.587872] kunit_try_run_case+0x14c/0x3d0 [ 36.588834] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.589437] kthread+0x24c/0x2d0 [ 36.590252] ret_from_fork+0x10/0x20 [ 36.591237] [ 36.591545] The buggy address belongs to the object at fff00000c6767080 [ 36.591545] which belongs to the cache kmalloc-64 of size 64 [ 36.593084] The buggy address is located 0 bytes to the right of [ 36.593084] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.595025] [ 36.595398] The buggy address belongs to the physical page: [ 36.596240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.597300] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.598509] page_type: f5(slab) [ 36.599341] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.600466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.601496] page dumped because: kasan: bad access detected [ 36.602271] [ 36.602835] Memory state around the buggy address: [ 36.603926] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.605066] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.606151] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.607262] ^ [ 36.607920] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.609109] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.610261] ================================================================== [ 38.407953] ================================================================== [ 38.408839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 38.409740] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.410584] [ 38.410955] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.412382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.412936] Hardware name: linux,dummy-virt (DT) [ 38.413512] Call trace: [ 38.414243] show_stack+0x20/0x38 (C) [ 38.414877] dump_stack_lvl+0x8c/0xd0 [ 38.415470] print_report+0x118/0x5e0 [ 38.416393] kasan_report+0xc8/0x118 [ 38.417171] kasan_check_range+0x100/0x1a8 [ 38.417926] __kasan_check_write+0x20/0x30 [ 38.418662] kasan_atomics_helper+0x1384/0x4858 [ 38.419408] kasan_atomics+0x198/0x2e8 [ 38.420117] kunit_try_run_case+0x14c/0x3d0 [ 38.420957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.421726] kthread+0x24c/0x2d0 [ 38.422255] ret_from_fork+0x10/0x20 [ 38.423151] [ 38.423488] Allocated by task 253: [ 38.424017] kasan_save_stack+0x3c/0x68 [ 38.424526] kasan_save_track+0x20/0x40 [ 38.425336] kasan_save_alloc_info+0x40/0x58 [ 38.426155] __kasan_kmalloc+0xd4/0xd8 [ 38.426802] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.427606] kasan_atomics+0xb8/0x2e8 [ 38.428235] kunit_try_run_case+0x14c/0x3d0 [ 38.428907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.429699] kthread+0x24c/0x2d0 [ 38.430260] ret_from_fork+0x10/0x20 [ 38.430965] [ 38.431314] The buggy address belongs to the object at fff00000c6767080 [ 38.431314] which belongs to the cache kmalloc-64 of size 64 [ 38.432945] The buggy address is located 0 bytes to the right of [ 38.432945] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.434533] [ 38.435057] The buggy address belongs to the physical page: [ 38.435872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.436950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.437866] page_type: f5(slab) [ 38.438440] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.439505] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.440441] page dumped because: kasan: bad access detected [ 38.441246] [ 38.441529] Memory state around the buggy address: [ 38.442290] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.443386] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.444308] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.445227] ^ [ 38.445939] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.446859] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.447384] ================================================================== [ 37.844585] ================================================================== [ 37.845658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 37.846835] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.848510] [ 37.849106] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.850245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.850830] Hardware name: linux,dummy-virt (DT) [ 37.851765] Call trace: [ 37.852199] show_stack+0x20/0x38 (C) [ 37.852846] dump_stack_lvl+0x8c/0xd0 [ 37.853519] print_report+0x118/0x5e0 [ 37.854237] kasan_report+0xc8/0x118 [ 37.854937] __asan_report_load8_noabort+0x20/0x30 [ 37.855704] kasan_atomics_helper+0x3f58/0x4858 [ 37.856412] kasan_atomics+0x198/0x2e8 [ 37.857039] kunit_try_run_case+0x14c/0x3d0 [ 37.857697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.858509] kthread+0x24c/0x2d0 [ 37.859145] ret_from_fork+0x10/0x20 [ 37.859875] [ 37.860214] Allocated by task 253: [ 37.860863] kasan_save_stack+0x3c/0x68 [ 37.861471] kasan_save_track+0x20/0x40 [ 37.862216] kasan_save_alloc_info+0x40/0x58 [ 37.863012] __kasan_kmalloc+0xd4/0xd8 [ 37.863682] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.864369] kasan_atomics+0xb8/0x2e8 [ 37.865029] kunit_try_run_case+0x14c/0x3d0 [ 37.865729] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.866547] kthread+0x24c/0x2d0 [ 37.867169] ret_from_fork+0x10/0x20 [ 37.867789] [ 37.868194] The buggy address belongs to the object at fff00000c6767080 [ 37.868194] which belongs to the cache kmalloc-64 of size 64 [ 37.869580] The buggy address is located 0 bytes to the right of [ 37.869580] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.871183] [ 37.871683] The buggy address belongs to the physical page: [ 37.872445] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.873485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.874439] page_type: f5(slab) [ 37.875059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.876012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.876938] page dumped because: kasan: bad access detected [ 37.877696] [ 37.878084] Memory state around the buggy address: [ 37.878805] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.879892] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.880854] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.881785] ^ [ 37.882497] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.883393] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.884290] ================================================================== [ 36.472505] ================================================================== [ 36.473409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 36.474278] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.475699] [ 36.476023] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.477539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.478782] Hardware name: linux,dummy-virt (DT) [ 36.479582] Call trace: [ 36.479959] show_stack+0x20/0x38 (C) [ 36.480798] dump_stack_lvl+0x8c/0xd0 [ 36.481596] print_report+0x118/0x5e0 [ 36.482253] kasan_report+0xc8/0x118 [ 36.483286] kasan_check_range+0x100/0x1a8 [ 36.483923] __kasan_check_read+0x20/0x30 [ 36.484563] kasan_atomics_helper+0x2b0/0x4858 [ 36.485196] kasan_atomics+0x198/0x2e8 [ 36.485948] kunit_try_run_case+0x14c/0x3d0 [ 36.486295] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.486750] kthread+0x24c/0x2d0 [ 36.487579] ret_from_fork+0x10/0x20 [ 36.488738] [ 36.489266] Allocated by task 253: [ 36.490186] kasan_save_stack+0x3c/0x68 [ 36.490852] kasan_save_track+0x20/0x40 [ 36.491551] kasan_save_alloc_info+0x40/0x58 [ 36.492253] __kasan_kmalloc+0xd4/0xd8 [ 36.492897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.493588] kasan_atomics+0xb8/0x2e8 [ 36.494597] kunit_try_run_case+0x14c/0x3d0 [ 36.495976] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.496770] kthread+0x24c/0x2d0 [ 36.497464] ret_from_fork+0x10/0x20 [ 36.498535] [ 36.499029] The buggy address belongs to the object at fff00000c6767080 [ 36.499029] which belongs to the cache kmalloc-64 of size 64 [ 36.500536] The buggy address is located 0 bytes to the right of [ 36.500536] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.502150] [ 36.502618] The buggy address belongs to the physical page: [ 36.503837] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.504894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.506080] page_type: f5(slab) [ 36.506594] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.507791] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.508774] page dumped because: kasan: bad access detected [ 36.509532] [ 36.510380] Memory state around the buggy address: [ 36.511146] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.512208] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.513158] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.514589] ^ [ 36.515103] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.515576] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.516176] ================================================================== [ 38.326168] ================================================================== [ 38.326999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 38.328155] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.329259] [ 38.329704] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.330988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.331844] Hardware name: linux,dummy-virt (DT) [ 38.332465] Call trace: [ 38.332929] show_stack+0x20/0x38 (C) [ 38.333687] dump_stack_lvl+0x8c/0xd0 [ 38.334206] print_report+0x118/0x5e0 [ 38.334925] kasan_report+0xc8/0x118 [ 38.335607] kasan_check_range+0x100/0x1a8 [ 38.336283] __kasan_check_write+0x20/0x30 [ 38.337057] kasan_atomics_helper+0x126c/0x4858 [ 38.337713] kasan_atomics+0x198/0x2e8 [ 38.338379] kunit_try_run_case+0x14c/0x3d0 [ 38.339133] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.340000] kthread+0x24c/0x2d0 [ 38.340659] ret_from_fork+0x10/0x20 [ 38.341218] [ 38.341609] Allocated by task 253: [ 38.342169] kasan_save_stack+0x3c/0x68 [ 38.342898] kasan_save_track+0x20/0x40 [ 38.343474] kasan_save_alloc_info+0x40/0x58 [ 38.344126] __kasan_kmalloc+0xd4/0xd8 [ 38.344649] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.345340] kasan_atomics+0xb8/0x2e8 [ 38.345941] kunit_try_run_case+0x14c/0x3d0 [ 38.346568] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.347208] kthread+0x24c/0x2d0 [ 38.347810] ret_from_fork+0x10/0x20 [ 38.348302] [ 38.348781] The buggy address belongs to the object at fff00000c6767080 [ 38.348781] which belongs to the cache kmalloc-64 of size 64 [ 38.350215] The buggy address is located 0 bytes to the right of [ 38.350215] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.351678] [ 38.352014] The buggy address belongs to the physical page: [ 38.352776] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.353769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.354592] page_type: f5(slab) [ 38.355161] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.356188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.357093] page dumped because: kasan: bad access detected [ 38.357834] [ 38.358149] Memory state around the buggy address: [ 38.358760] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.359578] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.360570] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.361512] ^ [ 38.362118] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.363051] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.363898] ================================================================== [ 38.003779] ================================================================== [ 38.004592] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 38.005398] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.006794] [ 38.007277] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.008578] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.009137] Hardware name: linux,dummy-virt (DT) [ 38.009775] Call trace: [ 38.010240] show_stack+0x20/0x38 (C) [ 38.010845] dump_stack_lvl+0x8c/0xd0 [ 38.011425] print_report+0x118/0x5e0 [ 38.011991] kasan_report+0xc8/0x118 [ 38.012578] kasan_check_range+0x100/0x1a8 [ 38.013224] __kasan_check_write+0x20/0x30 [ 38.013904] kasan_atomics_helper+0xf20/0x4858 [ 38.014591] kasan_atomics+0x198/0x2e8 [ 38.015188] kunit_try_run_case+0x14c/0x3d0 [ 38.015853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.016716] kthread+0x24c/0x2d0 [ 38.017245] ret_from_fork+0x10/0x20 [ 38.017845] [ 38.018214] Allocated by task 253: [ 38.018784] kasan_save_stack+0x3c/0x68 [ 38.019355] kasan_save_track+0x20/0x40 [ 38.019950] kasan_save_alloc_info+0x40/0x58 [ 38.020694] __kasan_kmalloc+0xd4/0xd8 [ 38.021243] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.021946] kasan_atomics+0xb8/0x2e8 [ 38.022479] kunit_try_run_case+0x14c/0x3d0 [ 38.023271] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.024015] kthread+0x24c/0x2d0 [ 38.024543] ret_from_fork+0x10/0x20 [ 38.025293] [ 38.025607] The buggy address belongs to the object at fff00000c6767080 [ 38.025607] which belongs to the cache kmalloc-64 of size 64 [ 38.027273] The buggy address is located 0 bytes to the right of [ 38.027273] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.029303] [ 38.029695] The buggy address belongs to the physical page: [ 38.030409] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.031270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.032199] page_type: f5(slab) [ 38.032683] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.033662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.034282] page dumped because: kasan: bad access detected [ 38.034660] [ 38.034987] Memory state around the buggy address: [ 38.035667] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.036673] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.037558] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.038412] ^ [ 38.039154] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.040028] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.040988] ================================================================== [ 38.366547] ================================================================== [ 38.367497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 38.368515] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.369666] [ 38.370143] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.371490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.372073] Hardware name: linux,dummy-virt (DT) [ 38.372841] Call trace: [ 38.373558] show_stack+0x20/0x38 (C) [ 38.374393] dump_stack_lvl+0x8c/0xd0 [ 38.374795] print_report+0x118/0x5e0 [ 38.375511] kasan_report+0xc8/0x118 [ 38.376334] kasan_check_range+0x100/0x1a8 [ 38.377062] __kasan_check_write+0x20/0x30 [ 38.377764] kasan_atomics_helper+0x12d8/0x4858 [ 38.378484] kasan_atomics+0x198/0x2e8 [ 38.379138] kunit_try_run_case+0x14c/0x3d0 [ 38.379910] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.380721] kthread+0x24c/0x2d0 [ 38.381332] ret_from_fork+0x10/0x20 [ 38.382011] [ 38.382342] Allocated by task 253: [ 38.382948] kasan_save_stack+0x3c/0x68 [ 38.383738] kasan_save_track+0x20/0x40 [ 38.384380] kasan_save_alloc_info+0x40/0x58 [ 38.385072] __kasan_kmalloc+0xd4/0xd8 [ 38.385707] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.386526] kasan_atomics+0xb8/0x2e8 [ 38.387171] kunit_try_run_case+0x14c/0x3d0 [ 38.387885] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.388926] kthread+0x24c/0x2d0 [ 38.389400] ret_from_fork+0x10/0x20 [ 38.389906] [ 38.390294] The buggy address belongs to the object at fff00000c6767080 [ 38.390294] which belongs to the cache kmalloc-64 of size 64 [ 38.391751] The buggy address is located 0 bytes to the right of [ 38.391751] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.393241] [ 38.393560] The buggy address belongs to the physical page: [ 38.394255] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.395249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.396171] page_type: f5(slab) [ 38.396613] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.397568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.398497] page dumped because: kasan: bad access detected [ 38.399272] [ 38.399598] Memory state around the buggy address: [ 38.400236] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.401175] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.402082] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.403075] ^ [ 38.403714] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.404579] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.405511] ================================================================== [ 38.492054] ================================================================== [ 38.493051] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 38.495072] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.496156] [ 38.496566] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.497760] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.498335] Hardware name: linux,dummy-virt (DT) [ 38.498969] Call trace: [ 38.499420] show_stack+0x20/0x38 (C) [ 38.500000] dump_stack_lvl+0x8c/0xd0 [ 38.500604] print_report+0x118/0x5e0 [ 38.501228] kasan_report+0xc8/0x118 [ 38.501843] kasan_check_range+0x100/0x1a8 [ 38.502559] __kasan_check_write+0x20/0x30 [ 38.503104] kasan_atomics_helper+0x1414/0x4858 [ 38.503919] kasan_atomics+0x198/0x2e8 [ 38.504509] kunit_try_run_case+0x14c/0x3d0 [ 38.505232] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.506061] kthread+0x24c/0x2d0 [ 38.506703] ret_from_fork+0x10/0x20 [ 38.507256] [ 38.507743] Allocated by task 253: [ 38.508307] kasan_save_stack+0x3c/0x68 [ 38.508943] kasan_save_track+0x20/0x40 [ 38.509503] kasan_save_alloc_info+0x40/0x58 [ 38.510275] __kasan_kmalloc+0xd4/0xd8 [ 38.510856] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.511648] kasan_atomics+0xb8/0x2e8 [ 38.512210] kunit_try_run_case+0x14c/0x3d0 [ 38.512802] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.513459] kthread+0x24c/0x2d0 [ 38.514080] ret_from_fork+0x10/0x20 [ 38.514572] [ 38.515047] The buggy address belongs to the object at fff00000c6767080 [ 38.515047] which belongs to the cache kmalloc-64 of size 64 [ 38.516513] The buggy address is located 0 bytes to the right of [ 38.516513] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.518063] [ 38.518377] The buggy address belongs to the physical page: [ 38.519070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.520078] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.520920] page_type: f5(slab) [ 38.521404] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.522343] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.523369] page dumped because: kasan: bad access detected [ 38.524075] [ 38.524386] Memory state around the buggy address: [ 38.525040] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.525919] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.526837] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.527782] ^ [ 38.528410] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.529274] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.530190] ================================================================== [ 37.963832] ================================================================== [ 37.964529] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 37.965620] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.966933] [ 37.967312] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.968520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.969088] Hardware name: linux,dummy-virt (DT) [ 37.969838] Call trace: [ 37.970297] show_stack+0x20/0x38 (C) [ 37.971119] dump_stack_lvl+0x8c/0xd0 [ 37.971756] print_report+0x118/0x5e0 [ 37.972339] kasan_report+0xc8/0x118 [ 37.972888] kasan_check_range+0x100/0x1a8 [ 37.973589] __kasan_check_write+0x20/0x30 [ 37.974236] kasan_atomics_helper+0xeb8/0x4858 [ 37.974885] kasan_atomics+0x198/0x2e8 [ 37.975490] kunit_try_run_case+0x14c/0x3d0 [ 37.976170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.976962] kthread+0x24c/0x2d0 [ 37.977494] ret_from_fork+0x10/0x20 [ 37.977988] [ 37.978386] Allocated by task 253: [ 37.978970] kasan_save_stack+0x3c/0x68 [ 37.979662] kasan_save_track+0x20/0x40 [ 37.980215] kasan_save_alloc_info+0x40/0x58 [ 37.980897] __kasan_kmalloc+0xd4/0xd8 [ 37.981412] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.982213] kasan_atomics+0xb8/0x2e8 [ 37.982796] kunit_try_run_case+0x14c/0x3d0 [ 37.983380] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.984131] kthread+0x24c/0x2d0 [ 37.984760] ret_from_fork+0x10/0x20 [ 37.985303] [ 37.985618] The buggy address belongs to the object at fff00000c6767080 [ 37.985618] which belongs to the cache kmalloc-64 of size 64 [ 37.987122] The buggy address is located 0 bytes to the right of [ 37.987122] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.988497] [ 37.988890] The buggy address belongs to the physical page: [ 37.989575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.990519] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.991471] page_type: f5(slab) [ 37.991986] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.992899] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.993806] page dumped because: kasan: bad access detected [ 37.994456] [ 37.994793] Memory state around the buggy address: [ 37.995457] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.996422] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.997388] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.998253] ^ [ 37.998942] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.999802] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.000697] ================================================================== [ 37.363065] ================================================================== [ 37.363877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 37.364732] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.365515] [ 37.365993] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.367122] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.367930] Hardware name: linux,dummy-virt (DT) [ 37.368509] Call trace: [ 37.369012] show_stack+0x20/0x38 (C) [ 37.369585] dump_stack_lvl+0x8c/0xd0 [ 37.370277] print_report+0x118/0x5e0 [ 37.370893] kasan_report+0xc8/0x118 [ 37.371458] kasan_check_range+0x100/0x1a8 [ 37.372127] __kasan_check_write+0x20/0x30 [ 37.372870] kasan_atomics_helper+0xa6c/0x4858 [ 37.373482] kasan_atomics+0x198/0x2e8 [ 37.374119] kunit_try_run_case+0x14c/0x3d0 [ 37.374724] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.375530] kthread+0x24c/0x2d0 [ 37.376130] ret_from_fork+0x10/0x20 [ 37.376718] [ 37.377099] Allocated by task 253: [ 37.377672] kasan_save_stack+0x3c/0x68 [ 37.378157] kasan_save_track+0x20/0x40 [ 37.378837] kasan_save_alloc_info+0x40/0x58 [ 37.379539] __kasan_kmalloc+0xd4/0xd8 [ 37.380111] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.380727] kasan_atomics+0xb8/0x2e8 [ 37.381342] kunit_try_run_case+0x14c/0x3d0 [ 37.381965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.382663] kthread+0x24c/0x2d0 [ 37.383264] ret_from_fork+0x10/0x20 [ 37.383831] [ 37.384138] The buggy address belongs to the object at fff00000c6767080 [ 37.384138] which belongs to the cache kmalloc-64 of size 64 [ 37.385477] The buggy address is located 0 bytes to the right of [ 37.385477] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.386967] [ 37.387373] The buggy address belongs to the physical page: [ 37.388051] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.389023] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.389934] page_type: f5(slab) [ 37.390481] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.391444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.392362] page dumped because: kasan: bad access detected [ 37.393038] [ 37.393402] Memory state around the buggy address: [ 37.394110] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.394923] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.395910] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.396787] ^ [ 37.397436] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.398318] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.399243] ================================================================== [ 36.801363] ================================================================== [ 36.802742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 36.805138] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.805937] [ 36.806694] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.808062] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.808804] Hardware name: linux,dummy-virt (DT) [ 36.809588] Call trace: [ 36.810177] show_stack+0x20/0x38 (C) [ 36.811050] dump_stack_lvl+0x8c/0xd0 [ 36.811756] print_report+0x118/0x5e0 [ 36.812671] kasan_report+0xc8/0x118 [ 36.813227] kasan_check_range+0x100/0x1a8 [ 36.814091] __kasan_check_write+0x20/0x30 [ 36.814995] kasan_atomics_helper+0x4e4/0x4858 [ 36.815909] kasan_atomics+0x198/0x2e8 [ 36.816521] kunit_try_run_case+0x14c/0x3d0 [ 36.817293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.818458] kthread+0x24c/0x2d0 [ 36.818923] ret_from_fork+0x10/0x20 [ 36.819702] [ 36.819984] Allocated by task 253: [ 36.820786] kasan_save_stack+0x3c/0x68 [ 36.821549] kasan_save_track+0x20/0x40 [ 36.822369] kasan_save_alloc_info+0x40/0x58 [ 36.823210] __kasan_kmalloc+0xd4/0xd8 [ 36.824183] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.825215] kasan_atomics+0xb8/0x2e8 [ 36.825924] kunit_try_run_case+0x14c/0x3d0 [ 36.826657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.828020] kthread+0x24c/0x2d0 [ 36.828604] ret_from_fork+0x10/0x20 [ 36.829289] [ 36.829721] The buggy address belongs to the object at fff00000c6767080 [ 36.829721] which belongs to the cache kmalloc-64 of size 64 [ 36.831572] The buggy address is located 0 bytes to the right of [ 36.831572] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.832894] [ 36.833202] The buggy address belongs to the physical page: [ 36.833968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.835416] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.836408] page_type: f5(slab) [ 36.837097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.838550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.839385] page dumped because: kasan: bad access detected [ 36.840328] [ 36.840705] Memory state around the buggy address: [ 36.841479] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.843091] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.844270] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.845158] ^ [ 36.845884] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.847394] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.848395] ================================================================== [ 38.847797] ================================================================== [ 38.848653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 38.849822] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.850560] [ 38.851116] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.853107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.853840] Hardware name: linux,dummy-virt (DT) [ 38.854542] Call trace: [ 38.855141] show_stack+0x20/0x38 (C) [ 38.855783] dump_stack_lvl+0x8c/0xd0 [ 38.856469] print_report+0x118/0x5e0 [ 38.857102] kasan_report+0xc8/0x118 [ 38.857824] __asan_report_load8_noabort+0x20/0x30 [ 38.858577] kasan_atomics_helper+0x3e10/0x4858 [ 38.859402] kasan_atomics+0x198/0x2e8 [ 38.860100] kunit_try_run_case+0x14c/0x3d0 [ 38.860845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.861751] kthread+0x24c/0x2d0 [ 38.862361] ret_from_fork+0x10/0x20 [ 38.863076] [ 38.863428] Allocated by task 253: [ 38.864061] kasan_save_stack+0x3c/0x68 [ 38.864690] kasan_save_track+0x20/0x40 [ 38.865411] kasan_save_alloc_info+0x40/0x58 [ 38.866083] __kasan_kmalloc+0xd4/0xd8 [ 38.866729] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.867392] kasan_atomics+0xb8/0x2e8 [ 38.868053] kunit_try_run_case+0x14c/0x3d0 [ 38.868767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.869542] kthread+0x24c/0x2d0 [ 38.870145] ret_from_fork+0x10/0x20 [ 38.870790] [ 38.871155] The buggy address belongs to the object at fff00000c6767080 [ 38.871155] which belongs to the cache kmalloc-64 of size 64 [ 38.872807] The buggy address is located 0 bytes to the right of [ 38.872807] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.874361] [ 38.874814] The buggy address belongs to the physical page: [ 38.875586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.876599] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.877665] page_type: f5(slab) [ 38.878233] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.879284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.880242] page dumped because: kasan: bad access detected [ 38.881062] [ 38.881395] Memory state around the buggy address: [ 38.882147] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.883103] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.884091] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.885011] ^ [ 38.885756] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.886689] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.887641] ================================================================== [ 37.280898] ================================================================== [ 37.281805] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 37.283052] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.284229] [ 37.284770] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.286125] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.286714] Hardware name: linux,dummy-virt (DT) [ 37.287414] Call trace: [ 37.287831] show_stack+0x20/0x38 (C) [ 37.288350] dump_stack_lvl+0x8c/0xd0 [ 37.289003] print_report+0x118/0x5e0 [ 37.289724] kasan_report+0xc8/0x118 [ 37.290416] kasan_check_range+0x100/0x1a8 [ 37.290973] __kasan_check_write+0x20/0x30 [ 37.291707] kasan_atomics_helper+0x99c/0x4858 [ 37.292456] kasan_atomics+0x198/0x2e8 [ 37.293154] kunit_try_run_case+0x14c/0x3d0 [ 37.293824] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.294575] kthread+0x24c/0x2d0 [ 37.295113] ret_from_fork+0x10/0x20 [ 37.295794] [ 37.296201] Allocated by task 253: [ 37.296653] kasan_save_stack+0x3c/0x68 [ 37.297359] kasan_save_track+0x20/0x40 [ 37.297946] kasan_save_alloc_info+0x40/0x58 [ 37.298614] __kasan_kmalloc+0xd4/0xd8 [ 37.299218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.299866] kasan_atomics+0xb8/0x2e8 [ 37.300614] kunit_try_run_case+0x14c/0x3d0 [ 37.301182] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.302031] kthread+0x24c/0x2d0 [ 37.302528] ret_from_fork+0x10/0x20 [ 37.303061] [ 37.303528] The buggy address belongs to the object at fff00000c6767080 [ 37.303528] which belongs to the cache kmalloc-64 of size 64 [ 37.304936] The buggy address is located 0 bytes to the right of [ 37.304936] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.306364] [ 37.306797] The buggy address belongs to the physical page: [ 37.307508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.308523] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.309324] page_type: f5(slab) [ 37.309894] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.310822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.311845] page dumped because: kasan: bad access detected [ 37.312522] [ 37.312958] Memory state around the buggy address: [ 37.313660] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.314503] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.315429] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.316310] ^ [ 37.316958] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.317838] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.318688] ================================================================== [ 37.766706] ================================================================== [ 37.767662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 37.768413] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.769258] [ 37.769716] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.771422] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.771960] Hardware name: linux,dummy-virt (DT) [ 37.772618] Call trace: [ 37.773036] show_stack+0x20/0x38 (C) [ 37.773678] dump_stack_lvl+0x8c/0xd0 [ 37.774242] print_report+0x118/0x5e0 [ 37.774852] kasan_report+0xc8/0x118 [ 37.775487] __asan_report_load4_noabort+0x20/0x30 [ 37.776204] kasan_atomics_helper+0x3e04/0x4858 [ 37.776850] kasan_atomics+0x198/0x2e8 [ 37.777509] kunit_try_run_case+0x14c/0x3d0 [ 37.778083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.778942] kthread+0x24c/0x2d0 [ 37.779575] ret_from_fork+0x10/0x20 [ 37.780214] [ 37.780504] Allocated by task 253: [ 37.781015] kasan_save_stack+0x3c/0x68 [ 37.781745] kasan_save_track+0x20/0x40 [ 37.782397] kasan_save_alloc_info+0x40/0x58 [ 37.783034] __kasan_kmalloc+0xd4/0xd8 [ 37.783700] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.784431] kasan_atomics+0xb8/0x2e8 [ 37.784989] kunit_try_run_case+0x14c/0x3d0 [ 37.785498] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.786286] kthread+0x24c/0x2d0 [ 37.786774] ret_from_fork+0x10/0x20 [ 37.787427] [ 37.787808] The buggy address belongs to the object at fff00000c6767080 [ 37.787808] which belongs to the cache kmalloc-64 of size 64 [ 37.789168] The buggy address is located 0 bytes to the right of [ 37.789168] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.790705] [ 37.791087] The buggy address belongs to the physical page: [ 37.791920] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.792780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.793679] page_type: f5(slab) [ 37.794229] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.795236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.796262] page dumped because: kasan: bad access detected [ 37.796953] [ 37.797288] Memory state around the buggy address: [ 37.797893] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.798699] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.799653] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.800533] ^ [ 37.801250] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.802186] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.803080] ================================================================== [ 37.151220] ================================================================== [ 37.152095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 37.152982] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.154131] [ 37.154702] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.155884] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.156697] Hardware name: linux,dummy-virt (DT) [ 37.157267] Call trace: [ 37.157834] show_stack+0x20/0x38 (C) [ 37.158385] dump_stack_lvl+0x8c/0xd0 [ 37.159077] print_report+0x118/0x5e0 [ 37.159734] kasan_report+0xc8/0x118 [ 37.160341] kasan_check_range+0x100/0x1a8 [ 37.161052] __kasan_check_write+0x20/0x30 [ 37.161824] kasan_atomics_helper+0x894/0x4858 [ 37.162539] kasan_atomics+0x198/0x2e8 [ 37.163103] kunit_try_run_case+0x14c/0x3d0 [ 37.163793] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.164686] kthread+0x24c/0x2d0 [ 37.165357] ret_from_fork+0x10/0x20 [ 37.166149] [ 37.166527] Allocated by task 253: [ 37.167133] kasan_save_stack+0x3c/0x68 [ 37.167778] kasan_save_track+0x20/0x40 [ 37.168373] kasan_save_alloc_info+0x40/0x58 [ 37.168993] __kasan_kmalloc+0xd4/0xd8 [ 37.169617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.170356] kasan_atomics+0xb8/0x2e8 [ 37.171064] kunit_try_run_case+0x14c/0x3d0 [ 37.171659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.172495] kthread+0x24c/0x2d0 [ 37.173068] ret_from_fork+0x10/0x20 [ 37.173756] [ 37.174107] The buggy address belongs to the object at fff00000c6767080 [ 37.174107] which belongs to the cache kmalloc-64 of size 64 [ 37.175866] The buggy address is located 0 bytes to the right of [ 37.175866] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.177693] [ 37.178243] The buggy address belongs to the physical page: [ 37.178932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.180121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.181071] page_type: f5(slab) [ 37.181610] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.182804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.183953] page dumped because: kasan: bad access detected [ 37.184870] [ 37.185414] Memory state around the buggy address: [ 37.186191] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.187209] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.188055] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.189158] ^ [ 37.189493] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.190679] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.191745] ================================================================== [ 38.286568] ================================================================== [ 38.287748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 38.288741] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.290290] [ 38.290610] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.291809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.292438] Hardware name: linux,dummy-virt (DT) [ 38.293047] Call trace: [ 38.293428] show_stack+0x20/0x38 (C) [ 38.294135] dump_stack_lvl+0x8c/0xd0 [ 38.294848] print_report+0x118/0x5e0 [ 38.295551] kasan_report+0xc8/0x118 [ 38.296105] kasan_check_range+0x100/0x1a8 [ 38.296825] __kasan_check_write+0x20/0x30 [ 38.297447] kasan_atomics_helper+0x11f8/0x4858 [ 38.298095] kasan_atomics+0x198/0x2e8 [ 38.298594] kunit_try_run_case+0x14c/0x3d0 [ 38.299398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.300168] kthread+0x24c/0x2d0 [ 38.300716] ret_from_fork+0x10/0x20 [ 38.301343] [ 38.301757] Allocated by task 253: [ 38.302247] kasan_save_stack+0x3c/0x68 [ 38.302992] kasan_save_track+0x20/0x40 [ 38.303642] kasan_save_alloc_info+0x40/0x58 [ 38.304352] __kasan_kmalloc+0xd4/0xd8 [ 38.304850] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.305564] kasan_atomics+0xb8/0x2e8 [ 38.306096] kunit_try_run_case+0x14c/0x3d0 [ 38.306791] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.307526] kthread+0x24c/0x2d0 [ 38.308219] ret_from_fork+0x10/0x20 [ 38.308807] [ 38.309182] The buggy address belongs to the object at fff00000c6767080 [ 38.309182] which belongs to the cache kmalloc-64 of size 64 [ 38.310727] The buggy address is located 0 bytes to the right of [ 38.310727] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.312168] [ 38.312512] The buggy address belongs to the physical page: [ 38.313212] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.314144] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.315043] page_type: f5(slab) [ 38.315543] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.316566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.317492] page dumped because: kasan: bad access detected [ 38.318316] [ 38.318672] Memory state around the buggy address: [ 38.319229] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.320185] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.320983] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.321969] ^ [ 38.322608] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.323572] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.324409] ================================================================== [ 36.942425] ================================================================== [ 36.943420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 36.944433] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.945350] [ 36.945803] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.947570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.948283] Hardware name: linux,dummy-virt (DT) [ 36.949075] Call trace: [ 36.949603] show_stack+0x20/0x38 (C) [ 36.950207] dump_stack_lvl+0x8c/0xd0 [ 36.950767] print_report+0x118/0x5e0 [ 36.951325] kasan_report+0xc8/0x118 [ 36.952199] kasan_check_range+0x100/0x1a8 [ 36.952841] __kasan_check_write+0x20/0x30 [ 36.953438] kasan_atomics_helper+0x61c/0x4858 [ 36.954069] kasan_atomics+0x198/0x2e8 [ 36.954734] kunit_try_run_case+0x14c/0x3d0 [ 36.955503] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.956534] kthread+0x24c/0x2d0 [ 36.957272] ret_from_fork+0x10/0x20 [ 36.957726] [ 36.958070] Allocated by task 253: [ 36.958517] kasan_save_stack+0x3c/0x68 [ 36.959042] kasan_save_track+0x20/0x40 [ 36.959692] kasan_save_alloc_info+0x40/0x58 [ 36.960332] __kasan_kmalloc+0xd4/0xd8 [ 36.960899] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.961746] kasan_atomics+0xb8/0x2e8 [ 36.962224] kunit_try_run_case+0x14c/0x3d0 [ 36.962996] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.963781] kthread+0x24c/0x2d0 [ 36.964377] ret_from_fork+0x10/0x20 [ 36.964994] [ 36.965288] The buggy address belongs to the object at fff00000c6767080 [ 36.965288] which belongs to the cache kmalloc-64 of size 64 [ 36.966805] The buggy address is located 0 bytes to the right of [ 36.966805] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.968281] [ 36.968602] The buggy address belongs to the physical page: [ 36.969340] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.970271] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.971115] page_type: f5(slab) [ 36.971728] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.972695] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.973595] page dumped because: kasan: bad access detected [ 36.974286] [ 36.974517] Memory state around the buggy address: [ 36.975356] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.976236] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.977059] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.978059] ^ [ 36.978980] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.980168] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.981291] ================================================================== [ 38.610706] ================================================================== [ 38.611366] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 38.612414] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.613077] [ 38.613380] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.615165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.615956] Hardware name: linux,dummy-virt (DT) [ 38.616862] Call trace: [ 38.617855] show_stack+0x20/0x38 (C) [ 38.618510] dump_stack_lvl+0x8c/0xd0 [ 38.619130] print_report+0x118/0x5e0 [ 38.619918] kasan_report+0xc8/0x118 [ 38.620397] kasan_check_range+0x100/0x1a8 [ 38.621044] __kasan_check_write+0x20/0x30 [ 38.621648] kasan_atomics_helper+0x154c/0x4858 [ 38.622287] kasan_atomics+0x198/0x2e8 [ 38.623082] kunit_try_run_case+0x14c/0x3d0 [ 38.623717] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.624433] kthread+0x24c/0x2d0 [ 38.625172] ret_from_fork+0x10/0x20 [ 38.625871] [ 38.626241] Allocated by task 253: [ 38.626941] kasan_save_stack+0x3c/0x68 [ 38.627584] kasan_save_track+0x20/0x40 [ 38.628091] kasan_save_alloc_info+0x40/0x58 [ 38.628800] __kasan_kmalloc+0xd4/0xd8 [ 38.629400] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.630059] kasan_atomics+0xb8/0x2e8 [ 38.630661] kunit_try_run_case+0x14c/0x3d0 [ 38.631391] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.632012] kthread+0x24c/0x2d0 [ 38.632612] ret_from_fork+0x10/0x20 [ 38.633142] [ 38.633510] The buggy address belongs to the object at fff00000c6767080 [ 38.633510] which belongs to the cache kmalloc-64 of size 64 [ 38.635056] The buggy address is located 0 bytes to the right of [ 38.635056] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.636570] [ 38.636898] The buggy address belongs to the physical page: [ 38.637616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.638692] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.639548] page_type: f5(slab) [ 38.640020] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.641059] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.642002] page dumped because: kasan: bad access detected [ 38.642646] [ 38.643031] Memory state around the buggy address: [ 38.643652] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.644489] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.645398] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.646289] ^ [ 38.646860] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.647855] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.648761] ================================================================== [ 36.377333] ================================================================== [ 36.378708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 36.379454] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.380422] [ 36.380773] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.382421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.383219] Hardware name: linux,dummy-virt (DT) [ 36.383945] Call trace: [ 36.384302] show_stack+0x20/0x38 (C) [ 36.385095] dump_stack_lvl+0x8c/0xd0 [ 36.385751] print_report+0x118/0x5e0 [ 36.387018] kasan_report+0xc8/0x118 [ 36.387663] kasan_check_range+0x100/0x1a8 [ 36.388583] __kasan_check_read+0x20/0x30 [ 36.389269] kasan_atomics_helper+0x1ec/0x4858 [ 36.390702] kasan_atomics+0x198/0x2e8 [ 36.391412] kunit_try_run_case+0x14c/0x3d0 [ 36.392081] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.392469] kthread+0x24c/0x2d0 [ 36.393058] ret_from_fork+0x10/0x20 [ 36.394126] [ 36.394847] Allocated by task 253: [ 36.395558] kasan_save_stack+0x3c/0x68 [ 36.396148] kasan_save_track+0x20/0x40 [ 36.396722] kasan_save_alloc_info+0x40/0x58 [ 36.397372] __kasan_kmalloc+0xd4/0xd8 [ 36.397906] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.399470] kasan_atomics+0xb8/0x2e8 [ 36.400872] kunit_try_run_case+0x14c/0x3d0 [ 36.401507] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.402761] kthread+0x24c/0x2d0 [ 36.403432] ret_from_fork+0x10/0x20 [ 36.404300] [ 36.404749] The buggy address belongs to the object at fff00000c6767080 [ 36.404749] which belongs to the cache kmalloc-64 of size 64 [ 36.406671] The buggy address is located 0 bytes to the right of [ 36.406671] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.408576] [ 36.409215] The buggy address belongs to the physical page: [ 36.410619] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.412074] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.412522] page_type: f5(slab) [ 36.412978] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.414436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.415619] page dumped because: kasan: bad access detected [ 36.416556] [ 36.416992] Memory state around the buggy address: [ 36.417901] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.418827] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.420124] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.421324] ^ [ 36.422160] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.423805] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.424818] ================================================================== [ 38.971127] ================================================================== [ 38.972418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 38.973213] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.974747] [ 38.975403] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.976686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.977247] Hardware name: linux,dummy-virt (DT) [ 38.978030] Call trace: [ 38.978679] show_stack+0x20/0x38 (C) [ 38.979461] dump_stack_lvl+0x8c/0xd0 [ 38.980044] print_report+0x118/0x5e0 [ 38.980775] kasan_report+0xc8/0x118 [ 38.981480] kasan_check_range+0x100/0x1a8 [ 38.982150] __kasan_check_write+0x20/0x30 [ 38.982943] kasan_atomics_helper+0x17ec/0x4858 [ 38.983561] kasan_atomics+0x198/0x2e8 [ 38.984303] kunit_try_run_case+0x14c/0x3d0 [ 38.985131] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.985935] kthread+0x24c/0x2d0 [ 38.986652] ret_from_fork+0x10/0x20 [ 38.987286] [ 38.987718] Allocated by task 253: [ 38.988362] kasan_save_stack+0x3c/0x68 [ 38.989062] kasan_save_track+0x20/0x40 [ 38.989688] kasan_save_alloc_info+0x40/0x58 [ 38.990405] __kasan_kmalloc+0xd4/0xd8 [ 38.990960] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.991504] kasan_atomics+0xb8/0x2e8 [ 38.992078] kunit_try_run_case+0x14c/0x3d0 [ 38.992862] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.993545] kthread+0x24c/0x2d0 [ 38.994095] ret_from_fork+0x10/0x20 [ 38.994922] [ 38.995286] The buggy address belongs to the object at fff00000c6767080 [ 38.995286] which belongs to the cache kmalloc-64 of size 64 [ 38.996849] The buggy address is located 0 bytes to the right of [ 38.996849] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.998433] [ 38.998720] The buggy address belongs to the physical page: [ 38.999407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 39.000506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.001609] page_type: f5(slab) [ 39.002112] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.003217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.004299] page dumped because: kasan: bad access detected [ 39.004951] [ 39.005270] Memory state around the buggy address: [ 39.005915] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.006663] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.007850] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.008742] ^ [ 39.009505] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.010365] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.011337] ================================================================== [ 38.809186] ================================================================== [ 38.810011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 38.810843] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.811938] [ 38.812293] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.813470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.814080] Hardware name: linux,dummy-virt (DT) [ 38.814841] Call trace: [ 38.815218] show_stack+0x20/0x38 (C) [ 38.815873] dump_stack_lvl+0x8c/0xd0 [ 38.816423] print_report+0x118/0x5e0 [ 38.817086] kasan_report+0xc8/0x118 [ 38.817721] kasan_check_range+0x100/0x1a8 [ 38.818481] __kasan_check_write+0x20/0x30 [ 38.819043] kasan_atomics_helper+0x16d0/0x4858 [ 38.819827] kasan_atomics+0x198/0x2e8 [ 38.820547] kunit_try_run_case+0x14c/0x3d0 [ 38.821226] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.822013] kthread+0x24c/0x2d0 [ 38.822733] ret_from_fork+0x10/0x20 [ 38.823249] [ 38.823591] Allocated by task 253: [ 38.824200] kasan_save_stack+0x3c/0x68 [ 38.824772] kasan_save_track+0x20/0x40 [ 38.825395] kasan_save_alloc_info+0x40/0x58 [ 38.826072] __kasan_kmalloc+0xd4/0xd8 [ 38.826647] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.827320] kasan_atomics+0xb8/0x2e8 [ 38.827854] kunit_try_run_case+0x14c/0x3d0 [ 38.828458] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.829339] kthread+0x24c/0x2d0 [ 38.829887] ret_from_fork+0x10/0x20 [ 38.830416] [ 38.830778] The buggy address belongs to the object at fff00000c6767080 [ 38.830778] which belongs to the cache kmalloc-64 of size 64 [ 38.832082] The buggy address is located 0 bytes to the right of [ 38.832082] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.833532] [ 38.833865] The buggy address belongs to the physical page: [ 38.834640] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.835584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.836538] page_type: f5(slab) [ 38.837127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.838025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.839090] page dumped because: kasan: bad access detected [ 38.839913] [ 38.840260] Memory state around the buggy address: [ 38.840919] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.841836] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.842822] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.843671] ^ [ 38.844284] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.845229] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.846086] ================================================================== [ 38.650766] ================================================================== [ 38.651557] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 38.652384] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.653204] [ 38.653718] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.654979] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.655538] Hardware name: linux,dummy-virt (DT) [ 38.656247] Call trace: [ 38.656655] show_stack+0x20/0x38 (C) [ 38.657339] dump_stack_lvl+0x8c/0xd0 [ 38.658036] print_report+0x118/0x5e0 [ 38.658560] kasan_report+0xc8/0x118 [ 38.659214] kasan_check_range+0x100/0x1a8 [ 38.659925] __kasan_check_write+0x20/0x30 [ 38.660579] kasan_atomics_helper+0x15b4/0x4858 [ 38.661266] kasan_atomics+0x198/0x2e8 [ 38.661827] kunit_try_run_case+0x14c/0x3d0 [ 38.662416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.663256] kthread+0x24c/0x2d0 [ 38.663876] ret_from_fork+0x10/0x20 [ 38.664564] [ 38.664886] Allocated by task 253: [ 38.665467] kasan_save_stack+0x3c/0x68 [ 38.666145] kasan_save_track+0x20/0x40 [ 38.666836] kasan_save_alloc_info+0x40/0x58 [ 38.667451] __kasan_kmalloc+0xd4/0xd8 [ 38.668066] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.668895] kasan_atomics+0xb8/0x2e8 [ 38.669400] kunit_try_run_case+0x14c/0x3d0 [ 38.670106] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.670725] kthread+0x24c/0x2d0 [ 38.671322] ret_from_fork+0x10/0x20 [ 38.671928] [ 38.672246] The buggy address belongs to the object at fff00000c6767080 [ 38.672246] which belongs to the cache kmalloc-64 of size 64 [ 38.673569] The buggy address is located 0 bytes to the right of [ 38.673569] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.675111] [ 38.675419] The buggy address belongs to the physical page: [ 38.676270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.677256] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.678090] page_type: f5(slab) [ 38.678581] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.679524] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.680499] page dumped because: kasan: bad access detected [ 38.681248] [ 38.681590] Memory state around the buggy address: [ 38.682245] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.683215] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.684152] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.685040] ^ [ 38.685764] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.686699] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.687547] ================================================================== [ 38.043549] ================================================================== [ 38.044297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 38.045607] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.046848] [ 38.047373] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.048565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.049240] Hardware name: linux,dummy-virt (DT) [ 38.050092] Call trace: [ 38.050438] show_stack+0x20/0x38 (C) [ 38.051201] dump_stack_lvl+0x8c/0xd0 [ 38.051917] print_report+0x118/0x5e0 [ 38.052445] kasan_report+0xc8/0x118 [ 38.053084] kasan_check_range+0x100/0x1a8 [ 38.053834] __kasan_check_write+0x20/0x30 [ 38.054588] kasan_atomics_helper+0xf88/0x4858 [ 38.055364] kasan_atomics+0x198/0x2e8 [ 38.056001] kunit_try_run_case+0x14c/0x3d0 [ 38.056580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.057428] kthread+0x24c/0x2d0 [ 38.058168] ret_from_fork+0x10/0x20 [ 38.058849] [ 38.059260] Allocated by task 253: [ 38.059941] kasan_save_stack+0x3c/0x68 [ 38.060560] kasan_save_track+0x20/0x40 [ 38.061278] kasan_save_alloc_info+0x40/0x58 [ 38.062027] __kasan_kmalloc+0xd4/0xd8 [ 38.062691] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.063417] kasan_atomics+0xb8/0x2e8 [ 38.064023] kunit_try_run_case+0x14c/0x3d0 [ 38.064723] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.065460] kthread+0x24c/0x2d0 [ 38.066050] ret_from_fork+0x10/0x20 [ 38.066762] [ 38.067157] The buggy address belongs to the object at fff00000c6767080 [ 38.067157] which belongs to the cache kmalloc-64 of size 64 [ 38.068768] The buggy address is located 0 bytes to the right of [ 38.068768] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.070417] [ 38.070853] The buggy address belongs to the physical page: [ 38.071586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.072695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.073555] page_type: f5(slab) [ 38.074156] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.075207] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.076183] page dumped because: kasan: bad access detected [ 38.076971] [ 38.077382] Memory state around the buggy address: [ 38.078162] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.079165] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.080187] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.081079] ^ [ 38.081773] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.082783] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.083712] ================================================================== [ 38.449350] ================================================================== [ 38.450575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 38.451562] Read of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.452507] [ 38.452890] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.454404] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.455122] Hardware name: linux,dummy-virt (DT) [ 38.455926] Call trace: [ 38.456358] show_stack+0x20/0x38 (C) [ 38.457097] dump_stack_lvl+0x8c/0xd0 [ 38.457835] print_report+0x118/0x5e0 [ 38.458494] kasan_report+0xc8/0x118 [ 38.459151] __asan_report_load8_noabort+0x20/0x30 [ 38.459912] kasan_atomics_helper+0x3f04/0x4858 [ 38.460602] kasan_atomics+0x198/0x2e8 [ 38.461221] kunit_try_run_case+0x14c/0x3d0 [ 38.461979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.462834] kthread+0x24c/0x2d0 [ 38.463457] ret_from_fork+0x10/0x20 [ 38.464087] [ 38.464499] Allocated by task 253: [ 38.465086] kasan_save_stack+0x3c/0x68 [ 38.465830] kasan_save_track+0x20/0x40 [ 38.466528] kasan_save_alloc_info+0x40/0x58 [ 38.467257] __kasan_kmalloc+0xd4/0xd8 [ 38.467965] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.468707] kasan_atomics+0xb8/0x2e8 [ 38.469322] kunit_try_run_case+0x14c/0x3d0 [ 38.470019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.470820] kthread+0x24c/0x2d0 [ 38.471509] ret_from_fork+0x10/0x20 [ 38.472167] [ 38.472544] The buggy address belongs to the object at fff00000c6767080 [ 38.472544] which belongs to the cache kmalloc-64 of size 64 [ 38.474110] The buggy address is located 0 bytes to the right of [ 38.474110] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.475675] [ 38.476064] The buggy address belongs to the physical page: [ 38.476687] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.477949] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.478860] page_type: f5(slab) [ 38.479459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.480522] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.481493] page dumped because: kasan: bad access detected [ 38.482320] [ 38.482693] Memory state around the buggy address: [ 38.483495] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.484491] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.485462] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.486394] ^ [ 38.487174] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.488106] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.489018] ================================================================== [ 38.572332] ================================================================== [ 38.573080] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 38.573509] Write of size 8 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 38.574166] [ 38.574644] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 38.575904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.576690] Hardware name: linux,dummy-virt (DT) [ 38.577328] Call trace: [ 38.577710] show_stack+0x20/0x38 (C) [ 38.578451] dump_stack_lvl+0x8c/0xd0 [ 38.579000] print_report+0x118/0x5e0 [ 38.579798] kasan_report+0xc8/0x118 [ 38.580390] kasan_check_range+0x100/0x1a8 [ 38.581254] __kasan_check_write+0x20/0x30 [ 38.581875] kasan_atomics_helper+0x14e4/0x4858 [ 38.582745] kasan_atomics+0x198/0x2e8 [ 38.583360] kunit_try_run_case+0x14c/0x3d0 [ 38.583936] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.584834] kthread+0x24c/0x2d0 [ 38.585383] ret_from_fork+0x10/0x20 [ 38.586054] [ 38.586427] Allocated by task 253: [ 38.586933] kasan_save_stack+0x3c/0x68 [ 38.587595] kasan_save_track+0x20/0x40 [ 38.588216] kasan_save_alloc_info+0x40/0x58 [ 38.588847] __kasan_kmalloc+0xd4/0xd8 [ 38.589410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.590104] kasan_atomics+0xb8/0x2e8 [ 38.590682] kunit_try_run_case+0x14c/0x3d0 [ 38.591348] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.592237] kthread+0x24c/0x2d0 [ 38.592876] ret_from_fork+0x10/0x20 [ 38.593390] [ 38.593809] The buggy address belongs to the object at fff00000c6767080 [ 38.593809] which belongs to the cache kmalloc-64 of size 64 [ 38.595126] The buggy address is located 0 bytes to the right of [ 38.595126] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 38.596488] [ 38.596827] The buggy address belongs to the physical page: [ 38.597439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 38.598471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.599369] page_type: f5(slab) [ 38.600110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.601015] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.601973] page dumped because: kasan: bad access detected [ 38.602572] [ 38.602977] Memory state around the buggy address: [ 38.603678] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.604515] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.605445] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.606418] ^ [ 38.607029] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.607998] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.608871] ================================================================== [ 37.520103] ================================================================== [ 37.520963] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 37.522106] Read of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.523050] [ 37.523422] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.525150] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.525875] Hardware name: linux,dummy-virt (DT) [ 37.526472] Call trace: [ 37.527182] show_stack+0x20/0x38 (C) [ 37.527803] dump_stack_lvl+0x8c/0xd0 [ 37.528616] print_report+0x118/0x5e0 [ 37.529110] kasan_report+0xc8/0x118 [ 37.529610] __asan_report_load4_noabort+0x20/0x30 [ 37.530512] kasan_atomics_helper+0x3dbc/0x4858 [ 37.531077] kasan_atomics+0x198/0x2e8 [ 37.532005] kunit_try_run_case+0x14c/0x3d0 [ 37.532815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.533691] kthread+0x24c/0x2d0 [ 37.534229] ret_from_fork+0x10/0x20 [ 37.534896] [ 37.535254] Allocated by task 253: [ 37.535841] kasan_save_stack+0x3c/0x68 [ 37.536463] kasan_save_track+0x20/0x40 [ 37.537111] kasan_save_alloc_info+0x40/0x58 [ 37.537776] __kasan_kmalloc+0xd4/0xd8 [ 37.538403] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.539058] kasan_atomics+0xb8/0x2e8 [ 37.539669] kunit_try_run_case+0x14c/0x3d0 [ 37.540326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.541031] kthread+0x24c/0x2d0 [ 37.541604] ret_from_fork+0x10/0x20 [ 37.542149] [ 37.542507] The buggy address belongs to the object at fff00000c6767080 [ 37.542507] which belongs to the cache kmalloc-64 of size 64 [ 37.544072] The buggy address is located 0 bytes to the right of [ 37.544072] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.545689] [ 37.546005] The buggy address belongs to the physical page: [ 37.546721] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.547683] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.548570] page_type: f5(slab) [ 37.549166] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.550170] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.551057] page dumped because: kasan: bad access detected [ 37.551726] [ 37.552094] Memory state around the buggy address: [ 37.552823] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.553554] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.554471] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.555350] ^ [ 37.556046] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.557031] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.557926] ================================================================== [ 36.612316] ================================================================== [ 36.613094] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 36.614953] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 36.616471] [ 36.617125] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 36.618570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.619420] Hardware name: linux,dummy-virt (DT) [ 36.620187] Call trace: [ 36.620591] show_stack+0x20/0x38 (C) [ 36.621198] dump_stack_lvl+0x8c/0xd0 [ 36.622313] print_report+0x118/0x5e0 [ 36.622863] kasan_report+0xc8/0x118 [ 36.623257] __asan_report_store4_noabort+0x20/0x30 [ 36.623934] kasan_atomics_helper+0x3f94/0x4858 [ 36.624577] kasan_atomics+0x198/0x2e8 [ 36.625107] kunit_try_run_case+0x14c/0x3d0 [ 36.625665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.626504] kthread+0x24c/0x2d0 [ 36.627291] ret_from_fork+0x10/0x20 [ 36.628056] [ 36.628461] Allocated by task 253: [ 36.628976] kasan_save_stack+0x3c/0x68 [ 36.629713] kasan_save_track+0x20/0x40 [ 36.630538] kasan_save_alloc_info+0x40/0x58 [ 36.631576] __kasan_kmalloc+0xd4/0xd8 [ 36.632543] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.633315] kasan_atomics+0xb8/0x2e8 [ 36.633944] kunit_try_run_case+0x14c/0x3d0 [ 36.634768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.635888] kthread+0x24c/0x2d0 [ 36.636288] ret_from_fork+0x10/0x20 [ 36.636759] [ 36.637351] The buggy address belongs to the object at fff00000c6767080 [ 36.637351] which belongs to the cache kmalloc-64 of size 64 [ 36.639855] The buggy address is located 0 bytes to the right of [ 36.639855] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 36.641355] [ 36.642158] The buggy address belongs to the physical page: [ 36.642950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 36.643881] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.644851] page_type: f5(slab) [ 36.645334] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.646971] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.647744] page dumped because: kasan: bad access detected [ 36.648942] [ 36.649252] Memory state around the buggy address: [ 36.650493] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.651552] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.652522] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.653560] ^ [ 36.654563] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.656036] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.656991] ================================================================== [ 37.725066] ================================================================== [ 37.725743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 37.726799] Write of size 4 at addr fff00000c67670b0 by task kunit_try_catch/253 [ 37.728042] [ 37.728494] CPU: 1 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 37.729741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.731092] Hardware name: linux,dummy-virt (DT) [ 37.731659] Call trace: [ 37.732116] show_stack+0x20/0x38 (C) [ 37.733403] dump_stack_lvl+0x8c/0xd0 [ 37.734165] print_report+0x118/0x5e0 [ 37.734832] kasan_report+0xc8/0x118 [ 37.735517] kasan_check_range+0x100/0x1a8 [ 37.736152] __kasan_check_write+0x20/0x30 [ 37.737012] kasan_atomics_helper+0xd3c/0x4858 [ 37.737688] kasan_atomics+0x198/0x2e8 [ 37.738290] kunit_try_run_case+0x14c/0x3d0 [ 37.738670] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.739440] kthread+0x24c/0x2d0 [ 37.740151] ret_from_fork+0x10/0x20 [ 37.740854] [ 37.741219] Allocated by task 253: [ 37.741792] kasan_save_stack+0x3c/0x68 [ 37.742389] kasan_save_track+0x20/0x40 [ 37.743122] kasan_save_alloc_info+0x40/0x58 [ 37.743659] __kasan_kmalloc+0xd4/0xd8 [ 37.744317] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.745000] kasan_atomics+0xb8/0x2e8 [ 37.745650] kunit_try_run_case+0x14c/0x3d0 [ 37.746248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.747196] kthread+0x24c/0x2d0 [ 37.747648] ret_from_fork+0x10/0x20 [ 37.748327] [ 37.748683] The buggy address belongs to the object at fff00000c6767080 [ 37.748683] which belongs to the cache kmalloc-64 of size 64 [ 37.750107] The buggy address is located 0 bytes to the right of [ 37.750107] allocated 48-byte region [fff00000c6767080, fff00000c67670b0) [ 37.751526] [ 37.751855] The buggy address belongs to the physical page: [ 37.752439] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106767 [ 37.753546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.754329] page_type: f5(slab) [ 37.755004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.755955] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.756952] page dumped because: kasan: bad access detected [ 37.757648] [ 37.757996] Memory state around the buggy address: [ 37.758696] fff00000c6766f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.759601] fff00000c6767000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.760409] >fff00000c6767080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.761404] ^ [ 37.761950] fff00000c6767100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.762895] fff00000c6767180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.763826] ==================================================================
[ 29.100851] ================================================================== [ 29.102484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 29.103202] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.104713] [ 29.104991] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.105962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.106403] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.107216] Call Trace: [ 29.107454] <TASK> [ 29.107942] dump_stack_lvl+0x73/0xb0 [ 29.108506] print_report+0xd1/0x640 [ 29.108840] ? __virt_addr_valid+0x1db/0x2d0 [ 29.109612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.110422] kasan_report+0x102/0x140 [ 29.110931] ? kasan_atomics_helper+0x50d6/0x5450 [ 29.111525] ? kasan_atomics_helper+0x50d6/0x5450 [ 29.112184] __asan_report_store8_noabort+0x1b/0x30 [ 29.112738] kasan_atomics_helper+0x50d6/0x5450 [ 29.113053] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.113702] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.114273] ? __schedule+0xc3e/0x2790 [ 29.115074] ? finish_task_switch.isra.0+0x153/0x700 [ 29.115798] ? kasan_atomics+0x153/0x310 [ 29.116323] kasan_atomics+0x1dd/0x310 [ 29.116842] ? __pfx_kasan_atomics+0x10/0x10 [ 29.117683] ? __pfx_read_tsc+0x10/0x10 [ 29.118350] ? ktime_get_ts64+0x86/0x230 [ 29.118710] kunit_try_run_case+0x1b3/0x490 [ 29.119754] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.120357] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.120816] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.122162] ? __kthread_parkme+0x82/0x160 [ 29.122592] ? preempt_count_sub+0x50/0x80 [ 29.122957] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.123440] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.124553] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.125080] kthread+0x257/0x310 [ 29.125320] ? __pfx_kthread+0x10/0x10 [ 29.125584] ret_from_fork+0x41/0x80 [ 29.125770] ? __pfx_kthread+0x10/0x10 [ 29.126200] ret_from_fork_asm+0x1a/0x30 [ 29.126943] </TASK> [ 29.127319] [ 29.127893] Allocated by task 273: [ 29.128586] kasan_save_stack+0x3d/0x60 [ 29.129510] kasan_save_track+0x18/0x40 [ 29.129794] kasan_save_alloc_info+0x3b/0x50 [ 29.130150] __kasan_kmalloc+0xb7/0xc0 [ 29.130590] __kmalloc_cache_noprof+0x184/0x410 [ 29.131024] kasan_atomics+0x96/0x310 [ 29.131389] kunit_try_run_case+0x1b3/0x490 [ 29.131890] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.132444] kthread+0x257/0x310 [ 29.132776] ret_from_fork+0x41/0x80 [ 29.133137] ret_from_fork_asm+0x1a/0x30 [ 29.133653] [ 29.133818] The buggy address belongs to the object at ffff888101afb700 [ 29.133818] which belongs to the cache kmalloc-64 of size 64 [ 29.134972] The buggy address is located 0 bytes to the right of [ 29.134972] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.136054] [ 29.136292] The buggy address belongs to the physical page: [ 29.136968] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.137614] flags: 0x200000000000000(node=0|zone=2) [ 29.138086] page_type: f5(slab) [ 29.138349] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.139176] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.139811] page dumped because: kasan: bad access detected [ 29.140415] [ 29.140629] Memory state around the buggy address: [ 29.141105] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.141764] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.142320] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.143116] ^ [ 29.143516] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.144266] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.144869] ================================================================== [ 27.561417] ================================================================== [ 27.563139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 27.564015] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.565862] [ 27.566059] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.567520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.568203] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.569533] Call Trace: [ 27.569813] <TASK> [ 27.570837] dump_stack_lvl+0x73/0xb0 [ 27.571543] print_report+0xd1/0x640 [ 27.572085] ? __virt_addr_valid+0x1db/0x2d0 [ 27.573073] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.573900] kasan_report+0x102/0x140 [ 27.574093] ? kasan_atomics_helper+0x566/0x5450 [ 27.574474] ? kasan_atomics_helper+0x566/0x5450 [ 27.575157] kasan_check_range+0x10c/0x1c0 [ 27.576286] __kasan_check_write+0x18/0x20 [ 27.577289] kasan_atomics_helper+0x566/0x5450 [ 27.578279] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.578766] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.579580] ? __schedule+0xc3e/0x2790 [ 27.580173] ? finish_task_switch.isra.0+0x153/0x700 [ 27.581059] ? kasan_atomics+0x153/0x310 [ 27.582277] kasan_atomics+0x1dd/0x310 [ 27.582989] ? __pfx_kasan_atomics+0x10/0x10 [ 27.583633] ? __pfx_read_tsc+0x10/0x10 [ 27.584093] ? ktime_get_ts64+0x86/0x230 [ 27.584636] kunit_try_run_case+0x1b3/0x490 [ 27.585567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.586196] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.586622] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.587405] ? __kthread_parkme+0x82/0x160 [ 27.587992] ? preempt_count_sub+0x50/0x80 [ 27.588964] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.589269] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.589652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.590296] kthread+0x257/0x310 [ 27.590650] ? __pfx_kthread+0x10/0x10 [ 27.591419] ret_from_fork+0x41/0x80 [ 27.591809] ? __pfx_kthread+0x10/0x10 [ 27.592236] ret_from_fork_asm+0x1a/0x30 [ 27.592835] </TASK> [ 27.593081] [ 27.593239] Allocated by task 273: [ 27.593770] kasan_save_stack+0x3d/0x60 [ 27.594147] kasan_save_track+0x18/0x40 [ 27.594572] kasan_save_alloc_info+0x3b/0x50 [ 27.595609] __kasan_kmalloc+0xb7/0xc0 [ 27.596093] __kmalloc_cache_noprof+0x184/0x410 [ 27.596636] kasan_atomics+0x96/0x310 [ 27.597402] kunit_try_run_case+0x1b3/0x490 [ 27.598138] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.598626] kthread+0x257/0x310 [ 27.599214] ret_from_fork+0x41/0x80 [ 27.599764] ret_from_fork_asm+0x1a/0x30 [ 27.600256] [ 27.600649] The buggy address belongs to the object at ffff888101afb700 [ 27.600649] which belongs to the cache kmalloc-64 of size 64 [ 27.602112] The buggy address is located 0 bytes to the right of [ 27.602112] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.605530] [ 27.605863] The buggy address belongs to the physical page: [ 27.606192] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.607680] flags: 0x200000000000000(node=0|zone=2) [ 27.609267] page_type: f5(slab) [ 27.609861] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.611380] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.611850] page dumped because: kasan: bad access detected [ 27.612766] [ 27.613379] Memory state around the buggy address: [ 27.613666] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.614086] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.614903] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.616416] ^ [ 27.616917] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.618233] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.618707] ================================================================== [ 28.520702] ================================================================== [ 28.521434] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 28.522305] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.523078] [ 28.523253] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.524382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.524685] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.526619] Call Trace: [ 28.526998] <TASK> [ 28.527610] dump_stack_lvl+0x73/0xb0 [ 28.528439] print_report+0xd1/0x640 [ 28.529077] ? __virt_addr_valid+0x1db/0x2d0 [ 28.529833] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.530620] kasan_report+0x102/0x140 [ 28.531444] ? kasan_atomics_helper+0x4a38/0x5450 [ 28.532381] ? kasan_atomics_helper+0x4a38/0x5450 [ 28.532969] __asan_report_load4_noabort+0x18/0x20 [ 28.533756] kasan_atomics_helper+0x4a38/0x5450 [ 28.534363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.534828] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.535681] ? __schedule+0xc3e/0x2790 [ 28.536462] ? finish_task_switch.isra.0+0x153/0x700 [ 28.537107] ? kasan_atomics+0x153/0x310 [ 28.537528] kasan_atomics+0x1dd/0x310 [ 28.538331] ? __pfx_kasan_atomics+0x10/0x10 [ 28.538737] ? __pfx_read_tsc+0x10/0x10 [ 28.539332] ? ktime_get_ts64+0x86/0x230 [ 28.539744] kunit_try_run_case+0x1b3/0x490 [ 28.540585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.541145] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.541810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.542375] ? __kthread_parkme+0x82/0x160 [ 28.542824] ? preempt_count_sub+0x50/0x80 [ 28.543878] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.544666] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.545682] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.546040] kthread+0x257/0x310 [ 28.546477] ? __pfx_kthread+0x10/0x10 [ 28.546849] ret_from_fork+0x41/0x80 [ 28.547749] ? __pfx_kthread+0x10/0x10 [ 28.548450] ret_from_fork_asm+0x1a/0x30 [ 28.549522] </TASK> [ 28.549760] [ 28.549907] Allocated by task 273: [ 28.550462] kasan_save_stack+0x3d/0x60 [ 28.551674] kasan_save_track+0x18/0x40 [ 28.552077] kasan_save_alloc_info+0x3b/0x50 [ 28.552610] __kasan_kmalloc+0xb7/0xc0 [ 28.553318] __kmalloc_cache_noprof+0x184/0x410 [ 28.554077] kasan_atomics+0x96/0x310 [ 28.554444] kunit_try_run_case+0x1b3/0x490 [ 28.554811] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.555662] kthread+0x257/0x310 [ 28.556406] ret_from_fork+0x41/0x80 [ 28.556787] ret_from_fork_asm+0x1a/0x30 [ 28.557458] [ 28.557624] The buggy address belongs to the object at ffff888101afb700 [ 28.557624] which belongs to the cache kmalloc-64 of size 64 [ 28.559220] The buggy address is located 0 bytes to the right of [ 28.559220] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.560087] [ 28.560636] The buggy address belongs to the physical page: [ 28.561616] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.562353] flags: 0x200000000000000(node=0|zone=2) [ 28.562672] page_type: f5(slab) [ 28.563097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.564229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.565163] page dumped because: kasan: bad access detected [ 28.565642] [ 28.565861] Memory state around the buggy address: [ 28.566711] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.567451] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.568050] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.568915] ^ [ 28.569654] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.570464] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.571402] ================================================================== [ 28.710473] ================================================================== [ 28.711290] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 28.711945] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.712771] [ 28.713149] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.714113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.714676] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.715376] Call Trace: [ 28.715810] <TASK> [ 28.716164] dump_stack_lvl+0x73/0xb0 [ 28.716597] print_report+0xd1/0x640 [ 28.717119] ? __virt_addr_valid+0x1db/0x2d0 [ 28.717724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.718452] kasan_report+0x102/0x140 [ 28.718839] ? kasan_atomics_helper+0x4a04/0x5450 [ 28.719465] ? kasan_atomics_helper+0x4a04/0x5450 [ 28.719999] __asan_report_load4_noabort+0x18/0x20 [ 28.720500] kasan_atomics_helper+0x4a04/0x5450 [ 28.721018] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.721666] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.722120] ? __schedule+0xc3e/0x2790 [ 28.722668] ? finish_task_switch.isra.0+0x153/0x700 [ 28.723239] ? kasan_atomics+0x153/0x310 [ 28.723761] kasan_atomics+0x1dd/0x310 [ 28.724254] ? __pfx_kasan_atomics+0x10/0x10 [ 28.724630] ? __pfx_read_tsc+0x10/0x10 [ 28.725232] ? ktime_get_ts64+0x86/0x230 [ 28.725660] kunit_try_run_case+0x1b3/0x490 [ 28.726100] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.726626] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.727025] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.727610] ? __kthread_parkme+0x82/0x160 [ 28.728105] ? preempt_count_sub+0x50/0x80 [ 28.728694] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.729358] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.730009] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.730562] kthread+0x257/0x310 [ 28.731105] ? __pfx_kthread+0x10/0x10 [ 28.731429] ret_from_fork+0x41/0x80 [ 28.731845] ? __pfx_kthread+0x10/0x10 [ 28.732353] ret_from_fork_asm+0x1a/0x30 [ 28.732923] </TASK> [ 28.733310] [ 28.733539] Allocated by task 273: [ 28.734019] kasan_save_stack+0x3d/0x60 [ 28.734347] kasan_save_track+0x18/0x40 [ 28.734944] kasan_save_alloc_info+0x3b/0x50 [ 28.735288] __kasan_kmalloc+0xb7/0xc0 [ 28.735837] __kmalloc_cache_noprof+0x184/0x410 [ 28.736372] kasan_atomics+0x96/0x310 [ 28.736769] kunit_try_run_case+0x1b3/0x490 [ 28.737354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.737932] kthread+0x257/0x310 [ 28.738361] ret_from_fork+0x41/0x80 [ 28.738770] ret_from_fork_asm+0x1a/0x30 [ 28.739256] [ 28.739595] The buggy address belongs to the object at ffff888101afb700 [ 28.739595] which belongs to the cache kmalloc-64 of size 64 [ 28.740671] The buggy address is located 0 bytes to the right of [ 28.740671] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.741777] [ 28.742285] The buggy address belongs to the physical page: [ 28.742560] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.742867] flags: 0x200000000000000(node=0|zone=2) [ 28.743704] page_type: f5(slab) [ 28.743969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.744551] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.745214] page dumped because: kasan: bad access detected [ 28.745816] [ 28.746032] Memory state around the buggy address: [ 28.746529] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.747187] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.747739] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.748369] ^ [ 28.748746] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.749496] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.750214] ================================================================== [ 29.322640] ================================================================== [ 29.323233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 29.324303] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.325124] [ 29.325338] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.326370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.326881] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.328770] Call Trace: [ 29.329333] <TASK> [ 29.329583] dump_stack_lvl+0x73/0xb0 [ 29.330208] print_report+0xd1/0x640 [ 29.330672] ? __virt_addr_valid+0x1db/0x2d0 [ 29.331211] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.331794] kasan_report+0x102/0x140 [ 29.332395] ? kasan_atomics_helper+0x1780/0x5450 [ 29.332847] ? kasan_atomics_helper+0x1780/0x5450 [ 29.333544] kasan_check_range+0x10c/0x1c0 [ 29.333879] __kasan_check_write+0x18/0x20 [ 29.334458] kasan_atomics_helper+0x1780/0x5450 [ 29.334895] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.335545] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.336073] ? __schedule+0xc3e/0x2790 [ 29.336643] ? finish_task_switch.isra.0+0x153/0x700 [ 29.337263] ? kasan_atomics+0x153/0x310 [ 29.337692] kasan_atomics+0x1dd/0x310 [ 29.338286] ? __pfx_kasan_atomics+0x10/0x10 [ 29.338911] ? __pfx_read_tsc+0x10/0x10 [ 29.339536] ? ktime_get_ts64+0x86/0x230 [ 29.340014] kunit_try_run_case+0x1b3/0x490 [ 29.340589] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.341128] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.341665] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.342278] ? __kthread_parkme+0x82/0x160 [ 29.342830] ? preempt_count_sub+0x50/0x80 [ 29.343447] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.343822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.344643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.345295] kthread+0x257/0x310 [ 29.345647] ? __pfx_kthread+0x10/0x10 [ 29.346186] ret_from_fork+0x41/0x80 [ 29.346684] ? __pfx_kthread+0x10/0x10 [ 29.347230] ret_from_fork_asm+0x1a/0x30 [ 29.347810] </TASK> [ 29.348257] [ 29.348538] Allocated by task 273: [ 29.348795] kasan_save_stack+0x3d/0x60 [ 29.349360] kasan_save_track+0x18/0x40 [ 29.349753] kasan_save_alloc_info+0x3b/0x50 [ 29.350352] __kasan_kmalloc+0xb7/0xc0 [ 29.350708] __kmalloc_cache_noprof+0x184/0x410 [ 29.351292] kasan_atomics+0x96/0x310 [ 29.351721] kunit_try_run_case+0x1b3/0x490 [ 29.352149] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.352886] kthread+0x257/0x310 [ 29.353238] ret_from_fork+0x41/0x80 [ 29.353786] ret_from_fork_asm+0x1a/0x30 [ 29.354261] [ 29.354573] The buggy address belongs to the object at ffff888101afb700 [ 29.354573] which belongs to the cache kmalloc-64 of size 64 [ 29.355777] The buggy address is located 0 bytes to the right of [ 29.355777] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.356885] [ 29.357166] The buggy address belongs to the physical page: [ 29.357783] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.358516] flags: 0x200000000000000(node=0|zone=2) [ 29.359033] page_type: f5(slab) [ 29.359477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.360301] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.361165] page dumped because: kasan: bad access detected [ 29.361697] [ 29.361978] Memory state around the buggy address: [ 29.363127] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.363820] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.364717] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.365241] ^ [ 29.365801] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.366428] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.367095] ================================================================== [ 29.184869] ================================================================== [ 29.185543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 29.186058] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.187216] [ 29.187500] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.188585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.188860] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.189832] Call Trace: [ 29.190221] <TASK> [ 29.190683] dump_stack_lvl+0x73/0xb0 [ 29.191181] print_report+0xd1/0x640 [ 29.193334] ? __virt_addr_valid+0x1db/0x2d0 [ 29.194181] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.194713] kasan_report+0x102/0x140 [ 29.195386] ? kasan_atomics_helper+0x15b7/0x5450 [ 29.195776] ? kasan_atomics_helper+0x15b7/0x5450 [ 29.196302] kasan_check_range+0x10c/0x1c0 [ 29.196664] __kasan_check_write+0x18/0x20 [ 29.197219] kasan_atomics_helper+0x15b7/0x5450 [ 29.197708] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.198211] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.198672] ? __schedule+0xc3e/0x2790 [ 29.199026] ? finish_task_switch.isra.0+0x153/0x700 [ 29.199533] ? kasan_atomics+0x153/0x310 [ 29.199881] kasan_atomics+0x1dd/0x310 [ 29.200416] ? __pfx_kasan_atomics+0x10/0x10 [ 29.200887] ? __pfx_read_tsc+0x10/0x10 [ 29.201416] ? ktime_get_ts64+0x86/0x230 [ 29.201766] kunit_try_run_case+0x1b3/0x490 [ 29.202365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.202826] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.203407] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.203901] ? __kthread_parkme+0x82/0x160 [ 29.204289] ? preempt_count_sub+0x50/0x80 [ 29.204742] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.205297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.205793] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.206463] kthread+0x257/0x310 [ 29.206887] ? __pfx_kthread+0x10/0x10 [ 29.207344] ret_from_fork+0x41/0x80 [ 29.207734] ? __pfx_kthread+0x10/0x10 [ 29.208114] ret_from_fork_asm+0x1a/0x30 [ 29.208647] </TASK> [ 29.209023] [ 29.209202] Allocated by task 273: [ 29.209640] kasan_save_stack+0x3d/0x60 [ 29.210101] kasan_save_track+0x18/0x40 [ 29.210400] kasan_save_alloc_info+0x3b/0x50 [ 29.210976] __kasan_kmalloc+0xb7/0xc0 [ 29.211434] __kmalloc_cache_noprof+0x184/0x410 [ 29.211897] kasan_atomics+0x96/0x310 [ 29.212321] kunit_try_run_case+0x1b3/0x490 [ 29.212644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.213335] kthread+0x257/0x310 [ 29.213823] ret_from_fork+0x41/0x80 [ 29.214215] ret_from_fork_asm+0x1a/0x30 [ 29.214722] [ 29.214949] The buggy address belongs to the object at ffff888101afb700 [ 29.214949] which belongs to the cache kmalloc-64 of size 64 [ 29.215982] The buggy address is located 0 bytes to the right of [ 29.215982] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.216745] [ 29.217077] The buggy address belongs to the physical page: [ 29.217550] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.218200] flags: 0x200000000000000(node=0|zone=2) [ 29.218814] page_type: f5(slab) [ 29.219275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.219884] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.220519] page dumped because: kasan: bad access detected [ 29.221103] [ 29.221330] Memory state around the buggy address: [ 29.221708] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.222397] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.223157] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.223739] ^ [ 29.224226] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.225559] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.226536] ================================================================== [ 27.846308] ================================================================== [ 27.848172] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 27.849045] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.850415] [ 27.850803] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.851683] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.852104] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.852937] Call Trace: [ 27.853228] <TASK> [ 27.854505] dump_stack_lvl+0x73/0xb0 [ 27.854789] print_report+0xd1/0x640 [ 27.855558] ? __virt_addr_valid+0x1db/0x2d0 [ 27.856162] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.857055] kasan_report+0x102/0x140 [ 27.857577] ? kasan_atomics_helper+0x861/0x5450 [ 27.859037] ? kasan_atomics_helper+0x861/0x5450 [ 27.859612] kasan_check_range+0x10c/0x1c0 [ 27.860000] __kasan_check_write+0x18/0x20 [ 27.860459] kasan_atomics_helper+0x861/0x5450 [ 27.860976] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.861539] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.862206] ? __schedule+0xc3e/0x2790 [ 27.862998] ? finish_task_switch.isra.0+0x153/0x700 [ 27.863654] ? kasan_atomics+0x153/0x310 [ 27.864096] kasan_atomics+0x1dd/0x310 [ 27.864449] ? __pfx_kasan_atomics+0x10/0x10 [ 27.865150] ? __pfx_read_tsc+0x10/0x10 [ 27.866274] ? ktime_get_ts64+0x86/0x230 [ 27.866856] kunit_try_run_case+0x1b3/0x490 [ 27.867564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.868194] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.868751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.869475] ? __kthread_parkme+0x82/0x160 [ 27.870010] ? preempt_count_sub+0x50/0x80 [ 27.870409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.870986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.872148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.872832] kthread+0x257/0x310 [ 27.873239] ? __pfx_kthread+0x10/0x10 [ 27.873704] ret_from_fork+0x41/0x80 [ 27.874200] ? __pfx_kthread+0x10/0x10 [ 27.874696] ret_from_fork_asm+0x1a/0x30 [ 27.875176] </TASK> [ 27.875962] [ 27.876173] Allocated by task 273: [ 27.876574] kasan_save_stack+0x3d/0x60 [ 27.877072] kasan_save_track+0x18/0x40 [ 27.877523] kasan_save_alloc_info+0x3b/0x50 [ 27.878096] __kasan_kmalloc+0xb7/0xc0 [ 27.878652] __kmalloc_cache_noprof+0x184/0x410 [ 27.879057] kasan_atomics+0x96/0x310 [ 27.879667] kunit_try_run_case+0x1b3/0x490 [ 27.880127] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.880718] kthread+0x257/0x310 [ 27.881201] ret_from_fork+0x41/0x80 [ 27.882595] ret_from_fork_asm+0x1a/0x30 [ 27.883188] [ 27.883690] The buggy address belongs to the object at ffff888101afb700 [ 27.883690] which belongs to the cache kmalloc-64 of size 64 [ 27.885100] The buggy address is located 0 bytes to the right of [ 27.885100] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.886308] [ 27.886799] The buggy address belongs to the physical page: [ 27.887430] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.888563] flags: 0x200000000000000(node=0|zone=2) [ 27.889749] page_type: f5(slab) [ 27.890770] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.891600] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.892435] page dumped because: kasan: bad access detected [ 27.893095] [ 27.893374] Memory state around the buggy address: [ 27.894634] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.895348] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.896196] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.896902] ^ [ 27.897483] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.898243] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.899089] ================================================================== [ 29.614854] ================================================================== [ 29.616135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 29.617141] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.617782] [ 29.618083] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.619460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.619805] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.621125] Call Trace: [ 29.621545] <TASK> [ 29.621799] dump_stack_lvl+0x73/0xb0 [ 29.622149] print_report+0xd1/0x640 [ 29.622695] ? __virt_addr_valid+0x1db/0x2d0 [ 29.623468] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.623953] kasan_report+0x102/0x140 [ 29.624744] ? kasan_atomics_helper+0x1b23/0x5450 [ 29.625366] ? kasan_atomics_helper+0x1b23/0x5450 [ 29.625920] kasan_check_range+0x10c/0x1c0 [ 29.626744] __kasan_check_write+0x18/0x20 [ 29.627481] kasan_atomics_helper+0x1b23/0x5450 [ 29.628428] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.628896] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.629971] ? __schedule+0xc3e/0x2790 [ 29.630397] ? finish_task_switch.isra.0+0x153/0x700 [ 29.630919] ? kasan_atomics+0x153/0x310 [ 29.631701] kasan_atomics+0x1dd/0x310 [ 29.632580] ? __pfx_kasan_atomics+0x10/0x10 [ 29.633412] ? __pfx_read_tsc+0x10/0x10 [ 29.633943] ? ktime_get_ts64+0x86/0x230 [ 29.634770] kunit_try_run_case+0x1b3/0x490 [ 29.635644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.636218] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.636810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.637442] ? __kthread_parkme+0x82/0x160 [ 29.637856] ? preempt_count_sub+0x50/0x80 [ 29.638739] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.639319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.640388] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.640947] kthread+0x257/0x310 [ 29.641661] ? __pfx_kthread+0x10/0x10 [ 29.642088] ret_from_fork+0x41/0x80 [ 29.642645] ? __pfx_kthread+0x10/0x10 [ 29.642996] ret_from_fork_asm+0x1a/0x30 [ 29.643890] </TASK> [ 29.644407] [ 29.644691] Allocated by task 273: [ 29.644984] kasan_save_stack+0x3d/0x60 [ 29.645538] kasan_save_track+0x18/0x40 [ 29.645937] kasan_save_alloc_info+0x3b/0x50 [ 29.647057] __kasan_kmalloc+0xb7/0xc0 [ 29.647588] __kmalloc_cache_noprof+0x184/0x410 [ 29.648276] kasan_atomics+0x96/0x310 [ 29.648916] kunit_try_run_case+0x1b3/0x490 [ 29.649696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.650481] kthread+0x257/0x310 [ 29.651134] ret_from_fork+0x41/0x80 [ 29.651655] ret_from_fork_asm+0x1a/0x30 [ 29.652120] [ 29.652333] The buggy address belongs to the object at ffff888101afb700 [ 29.652333] which belongs to the cache kmalloc-64 of size 64 [ 29.653961] The buggy address is located 0 bytes to the right of [ 29.653961] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.655238] [ 29.655508] The buggy address belongs to the physical page: [ 29.656376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.656883] flags: 0x200000000000000(node=0|zone=2) [ 29.657813] page_type: f5(slab) [ 29.658475] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.659285] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.659978] page dumped because: kasan: bad access detected [ 29.660469] [ 29.661476] Memory state around the buggy address: [ 29.661813] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.662824] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.663645] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.664654] ^ [ 29.665992] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.666516] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.667573] ================================================================== [ 28.801661] ================================================================== [ 28.802362] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 28.803357] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.803982] [ 28.804288] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.805459] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.805847] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.806714] Call Trace: [ 28.807145] <TASK> [ 28.807460] dump_stack_lvl+0x73/0xb0 [ 28.807948] print_report+0xd1/0x640 [ 28.808824] ? __virt_addr_valid+0x1db/0x2d0 [ 28.809379] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.810517] kasan_report+0x102/0x140 [ 28.811030] ? kasan_atomics_helper+0x49ea/0x5450 [ 28.811413] ? kasan_atomics_helper+0x49ea/0x5450 [ 28.811988] __asan_report_load4_noabort+0x18/0x20 [ 28.812673] kasan_atomics_helper+0x49ea/0x5450 [ 28.813343] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.813888] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.814692] ? __schedule+0xc3e/0x2790 [ 28.815020] ? finish_task_switch.isra.0+0x153/0x700 [ 28.815663] ? kasan_atomics+0x153/0x310 [ 28.816099] kasan_atomics+0x1dd/0x310 [ 28.816705] ? __pfx_kasan_atomics+0x10/0x10 [ 28.817149] ? __pfx_read_tsc+0x10/0x10 [ 28.817844] ? ktime_get_ts64+0x86/0x230 [ 28.818370] kunit_try_run_case+0x1b3/0x490 [ 28.818905] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.819309] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.819749] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.820363] ? __kthread_parkme+0x82/0x160 [ 28.820797] ? preempt_count_sub+0x50/0x80 [ 28.821101] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.821814] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.822389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.822885] kthread+0x257/0x310 [ 28.823421] ? __pfx_kthread+0x10/0x10 [ 28.824008] ret_from_fork+0x41/0x80 [ 28.824644] ? __pfx_kthread+0x10/0x10 [ 28.824996] ret_from_fork_asm+0x1a/0x30 [ 28.825641] </TASK> [ 28.826063] [ 28.826260] Allocated by task 273: [ 28.826743] kasan_save_stack+0x3d/0x60 [ 28.827183] kasan_save_track+0x18/0x40 [ 28.827618] kasan_save_alloc_info+0x3b/0x50 [ 28.828204] __kasan_kmalloc+0xb7/0xc0 [ 28.828732] __kmalloc_cache_noprof+0x184/0x410 [ 28.829239] kasan_atomics+0x96/0x310 [ 28.829710] kunit_try_run_case+0x1b3/0x490 [ 28.830334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.830712] kthread+0x257/0x310 [ 28.831340] ret_from_fork+0x41/0x80 [ 28.831942] ret_from_fork_asm+0x1a/0x30 [ 28.832402] [ 28.832666] The buggy address belongs to the object at ffff888101afb700 [ 28.832666] which belongs to the cache kmalloc-64 of size 64 [ 28.833755] The buggy address is located 0 bytes to the right of [ 28.833755] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.835013] [ 28.835236] The buggy address belongs to the physical page: [ 28.835844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.836657] flags: 0x200000000000000(node=0|zone=2) [ 28.837219] page_type: f5(slab) [ 28.837662] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.838347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.838940] page dumped because: kasan: bad access detected [ 28.839684] [ 28.840175] Memory state around the buggy address: [ 28.840757] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.841747] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.842571] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.843142] ^ [ 28.843740] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.844574] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.845406] ================================================================== [ 28.898752] ================================================================== [ 28.899346] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 28.900791] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.902200] [ 28.902999] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.905480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.906273] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.907262] Call Trace: [ 28.907527] <TASK> [ 28.907877] dump_stack_lvl+0x73/0xb0 [ 28.908318] print_report+0xd1/0x640 [ 28.909019] ? __virt_addr_valid+0x1db/0x2d0 [ 28.909528] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.910955] kasan_report+0x102/0x140 [ 28.911713] ? kasan_atomics_helper+0x49d0/0x5450 [ 28.912212] ? kasan_atomics_helper+0x49d0/0x5450 [ 28.912735] __asan_report_load4_noabort+0x18/0x20 [ 28.913545] kasan_atomics_helper+0x49d0/0x5450 [ 28.914150] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.914673] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.915735] ? __schedule+0xc3e/0x2790 [ 28.916885] ? finish_task_switch.isra.0+0x153/0x700 [ 28.917559] ? kasan_atomics+0x153/0x310 [ 28.917774] kasan_atomics+0x1dd/0x310 [ 28.918210] ? __pfx_kasan_atomics+0x10/0x10 [ 28.919161] ? __pfx_read_tsc+0x10/0x10 [ 28.919661] ? ktime_get_ts64+0x86/0x230 [ 28.920119] kunit_try_run_case+0x1b3/0x490 [ 28.920917] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.921528] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.922260] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.922910] ? __kthread_parkme+0x82/0x160 [ 28.923504] ? preempt_count_sub+0x50/0x80 [ 28.924178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.924607] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.925588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.926349] kthread+0x257/0x310 [ 28.926830] ? __pfx_kthread+0x10/0x10 [ 28.927224] ret_from_fork+0x41/0x80 [ 28.927889] ? __pfx_kthread+0x10/0x10 [ 28.928298] ret_from_fork_asm+0x1a/0x30 [ 28.929105] </TASK> [ 28.929332] [ 28.929629] Allocated by task 273: [ 28.930092] kasan_save_stack+0x3d/0x60 [ 28.930628] kasan_save_track+0x18/0x40 [ 28.931061] kasan_save_alloc_info+0x3b/0x50 [ 28.931797] __kasan_kmalloc+0xb7/0xc0 [ 28.932247] __kmalloc_cache_noprof+0x184/0x410 [ 28.932858] kasan_atomics+0x96/0x310 [ 28.933471] kunit_try_run_case+0x1b3/0x490 [ 28.933844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.934657] kthread+0x257/0x310 [ 28.934997] ret_from_fork+0x41/0x80 [ 28.935663] ret_from_fork_asm+0x1a/0x30 [ 28.936062] [ 28.936284] The buggy address belongs to the object at ffff888101afb700 [ 28.936284] which belongs to the cache kmalloc-64 of size 64 [ 28.937896] The buggy address is located 0 bytes to the right of [ 28.937896] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.939820] [ 28.940036] The buggy address belongs to the physical page: [ 28.940596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.941635] flags: 0x200000000000000(node=0|zone=2) [ 28.942170] page_type: f5(slab) [ 28.942786] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.943410] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.944482] page dumped because: kasan: bad access detected [ 28.945110] [ 28.945413] Memory state around the buggy address: [ 28.945960] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.946899] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.947635] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.948433] ^ [ 28.948883] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.949693] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.950651] ================================================================== [ 28.665883] ================================================================== [ 28.667099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 28.667406] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.667721] [ 28.667840] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.669416] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.670229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.671396] Call Trace: [ 28.671807] <TASK> [ 28.672097] dump_stack_lvl+0x73/0xb0 [ 28.672604] print_report+0xd1/0x640 [ 28.673063] ? __virt_addr_valid+0x1db/0x2d0 [ 28.673667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.674192] kasan_report+0x102/0x140 [ 28.674695] ? kasan_atomics_helper+0x1149/0x5450 [ 28.675258] ? kasan_atomics_helper+0x1149/0x5450 [ 28.675708] kasan_check_range+0x10c/0x1c0 [ 28.676248] __kasan_check_write+0x18/0x20 [ 28.676703] kasan_atomics_helper+0x1149/0x5450 [ 28.677273] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.677901] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.678319] ? __schedule+0xc3e/0x2790 [ 28.678896] ? finish_task_switch.isra.0+0x153/0x700 [ 28.679325] ? kasan_atomics+0x153/0x310 [ 28.679807] kasan_atomics+0x1dd/0x310 [ 28.680334] ? __pfx_kasan_atomics+0x10/0x10 [ 28.680768] ? __pfx_read_tsc+0x10/0x10 [ 28.681332] ? ktime_get_ts64+0x86/0x230 [ 28.681732] kunit_try_run_case+0x1b3/0x490 [ 28.682308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.682945] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.683315] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.683917] ? __kthread_parkme+0x82/0x160 [ 28.684463] ? preempt_count_sub+0x50/0x80 [ 28.684996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.685624] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.686197] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.686837] kthread+0x257/0x310 [ 28.687301] ? __pfx_kthread+0x10/0x10 [ 28.687644] ret_from_fork+0x41/0x80 [ 28.688127] ? __pfx_kthread+0x10/0x10 [ 28.688623] ret_from_fork_asm+0x1a/0x30 [ 28.689175] </TASK> [ 28.689454] [ 28.689711] Allocated by task 273: [ 28.690172] kasan_save_stack+0x3d/0x60 [ 28.690568] kasan_save_track+0x18/0x40 [ 28.691098] kasan_save_alloc_info+0x3b/0x50 [ 28.691577] __kasan_kmalloc+0xb7/0xc0 [ 28.692028] __kmalloc_cache_noprof+0x184/0x410 [ 28.692612] kasan_atomics+0x96/0x310 [ 28.693100] kunit_try_run_case+0x1b3/0x490 [ 28.693647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.694321] kthread+0x257/0x310 [ 28.694705] ret_from_fork+0x41/0x80 [ 28.695251] ret_from_fork_asm+0x1a/0x30 [ 28.695995] [ 28.696342] The buggy address belongs to the object at ffff888101afb700 [ 28.696342] which belongs to the cache kmalloc-64 of size 64 [ 28.697587] The buggy address is located 0 bytes to the right of [ 28.697587] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.698984] [ 28.699236] The buggy address belongs to the physical page: [ 28.699973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.700916] flags: 0x200000000000000(node=0|zone=2) [ 28.701656] page_type: f5(slab) [ 28.702559] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.703296] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.703881] page dumped because: kasan: bad access detected [ 28.704243] [ 28.704598] Memory state around the buggy address: [ 28.705193] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.705907] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.706620] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.707281] ^ [ 28.707728] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.708453] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.709086] ================================================================== [ 27.145239] ================================================================== [ 27.146654] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 27.148185] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.149741] [ 27.150051] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.151547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.152139] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.154115] Call Trace: [ 27.154926] <TASK> [ 27.155475] dump_stack_lvl+0x73/0xb0 [ 27.156240] print_report+0xd1/0x640 [ 27.156682] ? __virt_addr_valid+0x1db/0x2d0 [ 27.157135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.157665] kasan_report+0x102/0x140 [ 27.158082] ? kasan_atomics_helper+0x4ba4/0x5450 [ 27.159595] ? kasan_atomics_helper+0x4ba4/0x5450 [ 27.160436] __asan_report_store4_noabort+0x1b/0x30 [ 27.161358] kasan_atomics_helper+0x4ba4/0x5450 [ 27.162225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.163124] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.164201] ? __schedule+0xc3e/0x2790 [ 27.165062] ? finish_task_switch.isra.0+0x153/0x700 [ 27.166245] ? kasan_atomics+0x153/0x310 [ 27.166699] kasan_atomics+0x1dd/0x310 [ 27.167275] ? __pfx_kasan_atomics+0x10/0x10 [ 27.168018] ? __pfx_read_tsc+0x10/0x10 [ 27.168815] ? ktime_get_ts64+0x86/0x230 [ 27.169135] kunit_try_run_case+0x1b3/0x490 [ 27.169449] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.170885] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.171792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.172779] ? __kthread_parkme+0x82/0x160 [ 27.173166] ? preempt_count_sub+0x50/0x80 [ 27.173796] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.175378] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.176630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.177679] kthread+0x257/0x310 [ 27.178424] ? __pfx_kthread+0x10/0x10 [ 27.179201] ret_from_fork+0x41/0x80 [ 27.179633] ? __pfx_kthread+0x10/0x10 [ 27.180035] ret_from_fork_asm+0x1a/0x30 [ 27.180484] </TASK> [ 27.180752] [ 27.180968] Allocated by task 273: [ 27.182622] kasan_save_stack+0x3d/0x60 [ 27.183663] kasan_save_track+0x18/0x40 [ 27.184325] kasan_save_alloc_info+0x3b/0x50 [ 27.185618] __kasan_kmalloc+0xb7/0xc0 [ 27.186536] __kmalloc_cache_noprof+0x184/0x410 [ 27.187697] kasan_atomics+0x96/0x310 [ 27.188730] kunit_try_run_case+0x1b3/0x490 [ 27.189844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.191365] kthread+0x257/0x310 [ 27.192098] ret_from_fork+0x41/0x80 [ 27.192879] ret_from_fork_asm+0x1a/0x30 [ 27.193484] [ 27.193622] The buggy address belongs to the object at ffff888101afb700 [ 27.193622] which belongs to the cache kmalloc-64 of size 64 [ 27.194590] The buggy address is located 0 bytes to the right of [ 27.194590] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.197171] [ 27.197714] The buggy address belongs to the physical page: [ 27.198954] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.200652] flags: 0x200000000000000(node=0|zone=2) [ 27.201702] page_type: f5(slab) [ 27.202372] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.203070] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.204781] page dumped because: kasan: bad access detected [ 27.205819] [ 27.205966] Memory state around the buggy address: [ 27.206561] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.207265] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.208214] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.208912] ^ [ 27.209252] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.209934] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.210608] ================================================================== [ 27.788644] ================================================================== [ 27.789234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 27.790456] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.791224] [ 27.791587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.793014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.793328] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.794371] Call Trace: [ 27.794753] <TASK> [ 27.795122] dump_stack_lvl+0x73/0xb0 [ 27.796607] print_report+0xd1/0x640 [ 27.797059] ? __virt_addr_valid+0x1db/0x2d0 [ 27.797614] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.798524] kasan_report+0x102/0x140 [ 27.799031] ? kasan_atomics_helper+0x7c8/0x5450 [ 27.799653] ? kasan_atomics_helper+0x7c8/0x5450 [ 27.800683] kasan_check_range+0x10c/0x1c0 [ 27.801736] __kasan_check_write+0x18/0x20 [ 27.802139] kasan_atomics_helper+0x7c8/0x5450 [ 27.802885] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.804090] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.804756] ? __schedule+0xc3e/0x2790 [ 27.805250] ? finish_task_switch.isra.0+0x153/0x700 [ 27.806484] ? kasan_atomics+0x153/0x310 [ 27.807272] kasan_atomics+0x1dd/0x310 [ 27.807890] ? __pfx_kasan_atomics+0x10/0x10 [ 27.808413] ? __pfx_read_tsc+0x10/0x10 [ 27.809209] ? ktime_get_ts64+0x86/0x230 [ 27.809753] kunit_try_run_case+0x1b3/0x490 [ 27.810465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.811078] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.812052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.812618] ? __kthread_parkme+0x82/0x160 [ 27.813257] ? preempt_count_sub+0x50/0x80 [ 27.814038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.814872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.815502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.816264] kthread+0x257/0x310 [ 27.816748] ? __pfx_kthread+0x10/0x10 [ 27.817394] ret_from_fork+0x41/0x80 [ 27.818363] ? __pfx_kthread+0x10/0x10 [ 27.819028] ret_from_fork_asm+0x1a/0x30 [ 27.819664] </TASK> [ 27.820045] [ 27.820531] Allocated by task 273: [ 27.820887] kasan_save_stack+0x3d/0x60 [ 27.821659] kasan_save_track+0x18/0x40 [ 27.822124] kasan_save_alloc_info+0x3b/0x50 [ 27.822942] __kasan_kmalloc+0xb7/0xc0 [ 27.823468] __kmalloc_cache_noprof+0x184/0x410 [ 27.824662] kasan_atomics+0x96/0x310 [ 27.825145] kunit_try_run_case+0x1b3/0x490 [ 27.825830] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.826667] kthread+0x257/0x310 [ 27.827326] ret_from_fork+0x41/0x80 [ 27.827721] ret_from_fork_asm+0x1a/0x30 [ 27.828567] [ 27.828843] The buggy address belongs to the object at ffff888101afb700 [ 27.828843] which belongs to the cache kmalloc-64 of size 64 [ 27.830538] The buggy address is located 0 bytes to the right of [ 27.830538] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.831900] [ 27.832135] The buggy address belongs to the physical page: [ 27.832818] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.833559] flags: 0x200000000000000(node=0|zone=2) [ 27.834611] page_type: f5(slab) [ 27.835390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.836865] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.837576] page dumped because: kasan: bad access detected [ 27.838099] [ 27.838305] Memory state around the buggy address: [ 27.838691] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.840162] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.841551] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.841968] ^ [ 27.842459] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.843125] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.844138] ================================================================== [ 27.677180] ================================================================== [ 27.678877] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 27.680403] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.681012] [ 27.681683] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.683066] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.683313] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.684175] Call Trace: [ 27.684818] <TASK> [ 27.685208] dump_stack_lvl+0x73/0xb0 [ 27.685747] print_report+0xd1/0x640 [ 27.686148] ? __virt_addr_valid+0x1db/0x2d0 [ 27.686612] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.687147] kasan_report+0x102/0x140 [ 27.687736] ? kasan_atomics_helper+0x698/0x5450 [ 27.688106] ? kasan_atomics_helper+0x698/0x5450 [ 27.689579] kasan_check_range+0x10c/0x1c0 [ 27.690505] __kasan_check_write+0x18/0x20 [ 27.691538] kasan_atomics_helper+0x698/0x5450 [ 27.691938] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.692722] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.693867] ? __schedule+0xc3e/0x2790 [ 27.694243] ? finish_task_switch.isra.0+0x153/0x700 [ 27.695241] ? kasan_atomics+0x153/0x310 [ 27.696248] kasan_atomics+0x1dd/0x310 [ 27.696760] ? __pfx_kasan_atomics+0x10/0x10 [ 27.697322] ? __pfx_read_tsc+0x10/0x10 [ 27.697790] ? ktime_get_ts64+0x86/0x230 [ 27.698232] kunit_try_run_case+0x1b3/0x490 [ 27.698699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.700731] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.701369] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.702036] ? __kthread_parkme+0x82/0x160 [ 27.702712] ? preempt_count_sub+0x50/0x80 [ 27.703532] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.703979] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.704866] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.705737] kthread+0x257/0x310 [ 27.706200] ? __pfx_kthread+0x10/0x10 [ 27.707044] ret_from_fork+0x41/0x80 [ 27.707628] ? __pfx_kthread+0x10/0x10 [ 27.708520] ret_from_fork_asm+0x1a/0x30 [ 27.709034] </TASK> [ 27.709503] [ 27.710277] Allocated by task 273: [ 27.710729] kasan_save_stack+0x3d/0x60 [ 27.711290] kasan_save_track+0x18/0x40 [ 27.712429] kasan_save_alloc_info+0x3b/0x50 [ 27.713008] __kasan_kmalloc+0xb7/0xc0 [ 27.713442] __kmalloc_cache_noprof+0x184/0x410 [ 27.713969] kasan_atomics+0x96/0x310 [ 27.714696] kunit_try_run_case+0x1b3/0x490 [ 27.715003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.716322] kthread+0x257/0x310 [ 27.717207] ret_from_fork+0x41/0x80 [ 27.717522] ret_from_fork_asm+0x1a/0x30 [ 27.718578] [ 27.718824] The buggy address belongs to the object at ffff888101afb700 [ 27.718824] which belongs to the cache kmalloc-64 of size 64 [ 27.720881] The buggy address is located 0 bytes to the right of [ 27.720881] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.722116] [ 27.722608] The buggy address belongs to the physical page: [ 27.723442] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.724072] flags: 0x200000000000000(node=0|zone=2) [ 27.724789] page_type: f5(slab) [ 27.725728] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.727068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.727746] page dumped because: kasan: bad access detected [ 27.728213] [ 27.728635] Memory state around the buggy address: [ 27.729003] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.729796] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.730712] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.731728] ^ [ 27.732363] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.732878] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.734090] ================================================================== [ 29.227726] ================================================================== [ 29.228252] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 29.228708] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.230031] [ 29.230865] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.232128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.232564] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.233556] Call Trace: [ 29.234037] <TASK> [ 29.234533] dump_stack_lvl+0x73/0xb0 [ 29.234939] print_report+0xd1/0x640 [ 29.235720] ? __virt_addr_valid+0x1db/0x2d0 [ 29.236385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.237070] kasan_report+0x102/0x140 [ 29.237328] ? kasan_atomics_helper+0x1650/0x5450 [ 29.237651] ? kasan_atomics_helper+0x1650/0x5450 [ 29.238114] kasan_check_range+0x10c/0x1c0 [ 29.238541] __kasan_check_write+0x18/0x20 [ 29.238925] kasan_atomics_helper+0x1650/0x5450 [ 29.240148] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.240684] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.241618] ? __schedule+0xc3e/0x2790 [ 29.241953] ? finish_task_switch.isra.0+0x153/0x700 [ 29.242844] ? kasan_atomics+0x153/0x310 [ 29.243862] kasan_atomics+0x1dd/0x310 [ 29.244526] ? __pfx_kasan_atomics+0x10/0x10 [ 29.244897] ? __pfx_read_tsc+0x10/0x10 [ 29.245860] ? ktime_get_ts64+0x86/0x230 [ 29.246561] kunit_try_run_case+0x1b3/0x490 [ 29.247199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.247606] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.248545] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.249297] ? __kthread_parkme+0x82/0x160 [ 29.249695] ? preempt_count_sub+0x50/0x80 [ 29.250372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.250829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.251617] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.252419] kthread+0x257/0x310 [ 29.253165] ? __pfx_kthread+0x10/0x10 [ 29.253743] ret_from_fork+0x41/0x80 [ 29.253944] ? __pfx_kthread+0x10/0x10 [ 29.254751] ret_from_fork_asm+0x1a/0x30 [ 29.255683] </TASK> [ 29.256205] [ 29.256409] Allocated by task 273: [ 29.256761] kasan_save_stack+0x3d/0x60 [ 29.257940] kasan_save_track+0x18/0x40 [ 29.258322] kasan_save_alloc_info+0x3b/0x50 [ 29.258697] __kasan_kmalloc+0xb7/0xc0 [ 29.259107] __kmalloc_cache_noprof+0x184/0x410 [ 29.259631] kasan_atomics+0x96/0x310 [ 29.260346] kunit_try_run_case+0x1b3/0x490 [ 29.261109] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.261822] kthread+0x257/0x310 [ 29.262352] ret_from_fork+0x41/0x80 [ 29.263033] ret_from_fork_asm+0x1a/0x30 [ 29.263537] [ 29.264022] The buggy address belongs to the object at ffff888101afb700 [ 29.264022] which belongs to the cache kmalloc-64 of size 64 [ 29.265464] The buggy address is located 0 bytes to the right of [ 29.265464] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.266772] [ 29.267163] The buggy address belongs to the physical page: [ 29.267978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.268916] flags: 0x200000000000000(node=0|zone=2) [ 29.269523] page_type: f5(slab) [ 29.270004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.270586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.271526] page dumped because: kasan: bad access detected [ 29.271966] [ 29.272336] Memory state around the buggy address: [ 29.272792] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.273575] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.274627] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.275206] ^ [ 29.275896] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.276642] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.277248] ================================================================== [ 28.418032] ================================================================== [ 28.418843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 28.420010] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.420645] [ 28.420855] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.422628] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.423028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.423845] Call Trace: [ 28.424707] <TASK> [ 28.424963] dump_stack_lvl+0x73/0xb0 [ 28.425357] print_report+0xd1/0x640 [ 28.426066] ? __virt_addr_valid+0x1db/0x2d0 [ 28.426657] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.427385] kasan_report+0x102/0x140 [ 28.427791] ? kasan_atomics_helper+0xf11/0x5450 [ 28.428540] ? kasan_atomics_helper+0xf11/0x5450 [ 28.429043] kasan_check_range+0x10c/0x1c0 [ 28.429486] __kasan_check_write+0x18/0x20 [ 28.429867] kasan_atomics_helper+0xf11/0x5450 [ 28.430785] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.431186] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.431893] ? __schedule+0xc3e/0x2790 [ 28.432492] ? finish_task_switch.isra.0+0x153/0x700 [ 28.433178] ? kasan_atomics+0x153/0x310 [ 28.433781] kasan_atomics+0x1dd/0x310 [ 28.434342] ? __pfx_kasan_atomics+0x10/0x10 [ 28.434779] ? __pfx_read_tsc+0x10/0x10 [ 28.435480] ? ktime_get_ts64+0x86/0x230 [ 28.436107] kunit_try_run_case+0x1b3/0x490 [ 28.436907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.437304] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.437842] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.438597] ? __kthread_parkme+0x82/0x160 [ 28.439179] ? preempt_count_sub+0x50/0x80 [ 28.439588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.440401] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.440926] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.441709] kthread+0x257/0x310 [ 28.442309] ? __pfx_kthread+0x10/0x10 [ 28.442665] ret_from_fork+0x41/0x80 [ 28.443507] ? __pfx_kthread+0x10/0x10 [ 28.443879] ret_from_fork_asm+0x1a/0x30 [ 28.444588] </TASK> [ 28.444834] [ 28.445368] Allocated by task 273: [ 28.445793] kasan_save_stack+0x3d/0x60 [ 28.446489] kasan_save_track+0x18/0x40 [ 28.446921] kasan_save_alloc_info+0x3b/0x50 [ 28.447335] __kasan_kmalloc+0xb7/0xc0 [ 28.447705] __kmalloc_cache_noprof+0x184/0x410 [ 28.448800] kasan_atomics+0x96/0x310 [ 28.449180] kunit_try_run_case+0x1b3/0x490 [ 28.449676] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.450588] kthread+0x257/0x310 [ 28.451128] ret_from_fork+0x41/0x80 [ 28.451696] ret_from_fork_asm+0x1a/0x30 [ 28.452364] [ 28.452585] The buggy address belongs to the object at ffff888101afb700 [ 28.452585] which belongs to the cache kmalloc-64 of size 64 [ 28.454130] The buggy address is located 0 bytes to the right of [ 28.454130] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.455153] [ 28.455809] The buggy address belongs to the physical page: [ 28.456400] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.457233] flags: 0x200000000000000(node=0|zone=2) [ 28.457790] page_type: f5(slab) [ 28.458339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.459520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.459816] page dumped because: kasan: bad access detected [ 28.460793] [ 28.461011] Memory state around the buggy address: [ 28.461516] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.462165] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.464029] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.464700] ^ [ 28.465530] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.466874] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.467511] ================================================================== [ 29.278361] ================================================================== [ 29.279336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 29.279948] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.280774] [ 29.281100] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.281542] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.282282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.283117] Call Trace: [ 29.283633] <TASK> [ 29.284117] dump_stack_lvl+0x73/0xb0 [ 29.284679] print_report+0xd1/0x640 [ 29.285312] ? __virt_addr_valid+0x1db/0x2d0 [ 29.285994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.286715] kasan_report+0x102/0x140 [ 29.287366] ? kasan_atomics_helper+0x16e8/0x5450 [ 29.287819] ? kasan_atomics_helper+0x16e8/0x5450 [ 29.288438] kasan_check_range+0x10c/0x1c0 [ 29.288991] __kasan_check_write+0x18/0x20 [ 29.289551] kasan_atomics_helper+0x16e8/0x5450 [ 29.290010] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.290714] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.291175] ? __schedule+0xc3e/0x2790 [ 29.291740] ? finish_task_switch.isra.0+0x153/0x700 [ 29.292334] ? kasan_atomics+0x153/0x310 [ 29.292907] kasan_atomics+0x1dd/0x310 [ 29.293523] ? __pfx_kasan_atomics+0x10/0x10 [ 29.294158] ? __pfx_read_tsc+0x10/0x10 [ 29.294454] ? ktime_get_ts64+0x86/0x230 [ 29.295041] kunit_try_run_case+0x1b3/0x490 [ 29.295520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.296169] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.296647] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.297189] ? __kthread_parkme+0x82/0x160 [ 29.297761] ? preempt_count_sub+0x50/0x80 [ 29.298189] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.298813] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.299381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.300120] kthread+0x257/0x310 [ 29.300455] ? __pfx_kthread+0x10/0x10 [ 29.300937] ret_from_fork+0x41/0x80 [ 29.301342] ? __pfx_kthread+0x10/0x10 [ 29.301901] ret_from_fork_asm+0x1a/0x30 [ 29.302452] </TASK> [ 29.302840] [ 29.303077] Allocated by task 273: [ 29.303470] kasan_save_stack+0x3d/0x60 [ 29.303991] kasan_save_track+0x18/0x40 [ 29.304524] kasan_save_alloc_info+0x3b/0x50 [ 29.304855] __kasan_kmalloc+0xb7/0xc0 [ 29.305403] __kmalloc_cache_noprof+0x184/0x410 [ 29.305898] kasan_atomics+0x96/0x310 [ 29.306516] kunit_try_run_case+0x1b3/0x490 [ 29.306908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.307562] kthread+0x257/0x310 [ 29.308099] ret_from_fork+0x41/0x80 [ 29.308432] ret_from_fork_asm+0x1a/0x30 [ 29.309070] [ 29.309294] The buggy address belongs to the object at ffff888101afb700 [ 29.309294] which belongs to the cache kmalloc-64 of size 64 [ 29.310548] The buggy address is located 0 bytes to the right of [ 29.310548] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.311664] [ 29.311981] The buggy address belongs to the physical page: [ 29.312449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.313386] flags: 0x200000000000000(node=0|zone=2) [ 29.313996] page_type: f5(slab) [ 29.314445] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.315244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.315755] page dumped because: kasan: bad access detected [ 29.316291] [ 29.316655] Memory state around the buggy address: [ 29.317169] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.317850] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.318598] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.319267] ^ [ 29.319737] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.320430] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.321134] ================================================================== [ 29.561907] ================================================================== [ 29.562699] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 29.563266] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.563917] [ 29.564144] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.565197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.566272] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.567794] Call Trace: [ 29.567945] <TASK> [ 29.568326] dump_stack_lvl+0x73/0xb0 [ 29.568847] print_report+0xd1/0x640 [ 29.569328] ? __virt_addr_valid+0x1db/0x2d0 [ 29.569840] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.570302] kasan_report+0x102/0x140 [ 29.571331] ? kasan_atomics_helper+0x1a80/0x5450 [ 29.571790] ? kasan_atomics_helper+0x1a80/0x5450 [ 29.572768] kasan_check_range+0x10c/0x1c0 [ 29.573196] __kasan_check_write+0x18/0x20 [ 29.573619] kasan_atomics_helper+0x1a80/0x5450 [ 29.574580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.574983] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.576103] ? __schedule+0xc3e/0x2790 [ 29.576533] ? finish_task_switch.isra.0+0x153/0x700 [ 29.577212] ? kasan_atomics+0x153/0x310 [ 29.578072] kasan_atomics+0x1dd/0x310 [ 29.578461] ? __pfx_kasan_atomics+0x10/0x10 [ 29.578878] ? __pfx_read_tsc+0x10/0x10 [ 29.579258] ? ktime_get_ts64+0x86/0x230 [ 29.580428] kunit_try_run_case+0x1b3/0x490 [ 29.581247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.581799] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.582104] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.582739] ? __kthread_parkme+0x82/0x160 [ 29.583253] ? preempt_count_sub+0x50/0x80 [ 29.583638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.584228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.584710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.585477] kthread+0x257/0x310 [ 29.585793] ? __pfx_kthread+0x10/0x10 [ 29.586391] ret_from_fork+0x41/0x80 [ 29.586973] ? __pfx_kthread+0x10/0x10 [ 29.587864] ret_from_fork_asm+0x1a/0x30 [ 29.588263] </TASK> [ 29.588746] [ 29.589129] Allocated by task 273: [ 29.589658] kasan_save_stack+0x3d/0x60 [ 29.590049] kasan_save_track+0x18/0x40 [ 29.590572] kasan_save_alloc_info+0x3b/0x50 [ 29.591139] __kasan_kmalloc+0xb7/0xc0 [ 29.591819] __kmalloc_cache_noprof+0x184/0x410 [ 29.592482] kasan_atomics+0x96/0x310 [ 29.593235] kunit_try_run_case+0x1b3/0x490 [ 29.593875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.594815] kthread+0x257/0x310 [ 29.595511] ret_from_fork+0x41/0x80 [ 29.596420] ret_from_fork_asm+0x1a/0x30 [ 29.596801] [ 29.597037] The buggy address belongs to the object at ffff888101afb700 [ 29.597037] which belongs to the cache kmalloc-64 of size 64 [ 29.598739] The buggy address is located 0 bytes to the right of [ 29.598739] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.600359] [ 29.600632] The buggy address belongs to the physical page: [ 29.601602] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.602982] flags: 0x200000000000000(node=0|zone=2) [ 29.603458] page_type: f5(slab) [ 29.604124] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.604789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.605483] page dumped because: kasan: bad access detected [ 29.606535] [ 29.606876] Memory state around the buggy address: [ 29.607691] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.608770] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.610173] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.611219] ^ [ 29.611759] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.612728] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.613500] ================================================================== [ 29.852926] ================================================================== [ 29.854076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 29.855170] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.856819] [ 29.857346] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.859413] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.860303] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.861622] Call Trace: [ 29.862105] <TASK> [ 29.862502] dump_stack_lvl+0x73/0xb0 [ 29.863170] print_report+0xd1/0x640 [ 29.863682] ? __virt_addr_valid+0x1db/0x2d0 [ 29.864097] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.864668] kasan_report+0x102/0x140 [ 29.864980] ? kasan_atomics_helper+0x1e13/0x5450 [ 29.865479] ? kasan_atomics_helper+0x1e13/0x5450 [ 29.865901] kasan_check_range+0x10c/0x1c0 [ 29.866513] __kasan_check_write+0x18/0x20 [ 29.866955] kasan_atomics_helper+0x1e13/0x5450 [ 29.867384] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.867893] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.868394] ? __schedule+0xc3e/0x2790 [ 29.868853] ? finish_task_switch.isra.0+0x153/0x700 [ 29.869321] ? kasan_atomics+0x153/0x310 [ 29.869823] kasan_atomics+0x1dd/0x310 [ 29.870136] ? __pfx_kasan_atomics+0x10/0x10 [ 29.870703] ? __pfx_read_tsc+0x10/0x10 [ 29.871219] ? ktime_get_ts64+0x86/0x230 [ 29.871916] kunit_try_run_case+0x1b3/0x490 [ 29.872313] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.872717] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.873210] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.873598] ? __kthread_parkme+0x82/0x160 [ 29.873906] ? preempt_count_sub+0x50/0x80 [ 29.874834] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.875368] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.875786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.876396] kthread+0x257/0x310 [ 29.876936] ? __pfx_kthread+0x10/0x10 [ 29.877394] ret_from_fork+0x41/0x80 [ 29.877727] ? __pfx_kthread+0x10/0x10 [ 29.878014] ret_from_fork_asm+0x1a/0x30 [ 29.878326] </TASK> [ 29.878670] [ 29.878932] Allocated by task 273: [ 29.879344] kasan_save_stack+0x3d/0x60 [ 29.879878] kasan_save_track+0x18/0x40 [ 29.880353] kasan_save_alloc_info+0x3b/0x50 [ 29.881050] __kasan_kmalloc+0xb7/0xc0 [ 29.881418] __kmalloc_cache_noprof+0x184/0x410 [ 29.881795] kasan_atomics+0x96/0x310 [ 29.882187] kunit_try_run_case+0x1b3/0x490 [ 29.882883] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.883313] kthread+0x257/0x310 [ 29.883596] ret_from_fork+0x41/0x80 [ 29.884054] ret_from_fork_asm+0x1a/0x30 [ 29.884662] [ 29.884857] The buggy address belongs to the object at ffff888101afb700 [ 29.884857] which belongs to the cache kmalloc-64 of size 64 [ 29.886153] The buggy address is located 0 bytes to the right of [ 29.886153] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.886895] [ 29.887095] The buggy address belongs to the physical page: [ 29.887755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.888486] flags: 0x200000000000000(node=0|zone=2) [ 29.888962] page_type: f5(slab) [ 29.889368] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.889847] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.890668] page dumped because: kasan: bad access detected [ 29.891310] [ 29.891586] Memory state around the buggy address: [ 29.892006] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.892713] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.893211] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.893885] ^ [ 29.894337] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.894771] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.895233] ================================================================== [ 29.896521] ================================================================== [ 29.897497] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 29.898394] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.899257] [ 29.899524] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.900292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.900589] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.901638] Call Trace: [ 29.902028] <TASK> [ 29.902322] dump_stack_lvl+0x73/0xb0 [ 29.902829] print_report+0xd1/0x640 [ 29.903301] ? __virt_addr_valid+0x1db/0x2d0 [ 29.903667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.904246] kasan_report+0x102/0x140 [ 29.904678] ? kasan_atomics_helper+0x1eab/0x5450 [ 29.905188] ? kasan_atomics_helper+0x1eab/0x5450 [ 29.905536] kasan_check_range+0x10c/0x1c0 [ 29.905869] __kasan_check_write+0x18/0x20 [ 29.906223] kasan_atomics_helper+0x1eab/0x5450 [ 29.906569] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.907248] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.907880] ? __schedule+0xc3e/0x2790 [ 29.908445] ? finish_task_switch.isra.0+0x153/0x700 [ 29.909055] ? kasan_atomics+0x153/0x310 [ 29.909599] kasan_atomics+0x1dd/0x310 [ 29.910132] ? __pfx_kasan_atomics+0x10/0x10 [ 29.910663] ? __pfx_read_tsc+0x10/0x10 [ 29.911154] ? ktime_get_ts64+0x86/0x230 [ 29.911516] kunit_try_run_case+0x1b3/0x490 [ 29.911860] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.912241] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.912595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.913257] ? __kthread_parkme+0x82/0x160 [ 29.913809] ? preempt_count_sub+0x50/0x80 [ 29.914353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.914937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.915564] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.916159] kthread+0x257/0x310 [ 29.916468] ? __pfx_kthread+0x10/0x10 [ 29.916847] ret_from_fork+0x41/0x80 [ 29.917180] ? __pfx_kthread+0x10/0x10 [ 29.917465] ret_from_fork_asm+0x1a/0x30 [ 29.917820] </TASK> [ 29.918064] [ 29.918226] Allocated by task 273: [ 29.918474] kasan_save_stack+0x3d/0x60 [ 29.919031] kasan_save_track+0x18/0x40 [ 29.919533] kasan_save_alloc_info+0x3b/0x50 [ 29.920157] __kasan_kmalloc+0xb7/0xc0 [ 29.920666] __kmalloc_cache_noprof+0x184/0x410 [ 29.921264] kasan_atomics+0x96/0x310 [ 29.921740] kunit_try_run_case+0x1b3/0x490 [ 29.922303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.922932] kthread+0x257/0x310 [ 29.923364] ret_from_fork+0x41/0x80 [ 29.924225] ret_from_fork_asm+0x1a/0x30 [ 29.925375] [ 29.926025] The buggy address belongs to the object at ffff888101afb700 [ 29.926025] which belongs to the cache kmalloc-64 of size 64 [ 29.927577] The buggy address is located 0 bytes to the right of [ 29.927577] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.929229] [ 29.929413] The buggy address belongs to the physical page: [ 29.930329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.931990] flags: 0x200000000000000(node=0|zone=2) [ 29.932616] page_type: f5(slab) [ 29.932974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.933726] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.934828] page dumped because: kasan: bad access detected [ 29.935910] [ 29.936128] Memory state around the buggy address: [ 29.936594] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.937369] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.938362] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.939121] ^ [ 29.939602] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.940627] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.940942] ================================================================== [ 28.368617] ================================================================== [ 28.369394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 28.370101] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.370692] [ 28.370962] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.371743] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.372295] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.373093] Call Trace: [ 28.373490] <TASK> [ 28.373747] dump_stack_lvl+0x73/0xb0 [ 28.374269] print_report+0xd1/0x640 [ 28.374709] ? __virt_addr_valid+0x1db/0x2d0 [ 28.375189] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.375751] kasan_report+0x102/0x140 [ 28.376266] ? kasan_atomics_helper+0xe79/0x5450 [ 28.376747] ? kasan_atomics_helper+0xe79/0x5450 [ 28.377229] kasan_check_range+0x10c/0x1c0 [ 28.377684] __kasan_check_write+0x18/0x20 [ 28.378081] kasan_atomics_helper+0xe79/0x5450 [ 28.378596] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.379091] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.379672] ? __schedule+0xc3e/0x2790 [ 28.380167] ? finish_task_switch.isra.0+0x153/0x700 [ 28.380550] ? kasan_atomics+0x153/0x310 [ 28.381124] kasan_atomics+0x1dd/0x310 [ 28.381583] ? __pfx_kasan_atomics+0x10/0x10 [ 28.383324] ? __pfx_read_tsc+0x10/0x10 [ 28.383731] ? ktime_get_ts64+0x86/0x230 [ 28.384257] kunit_try_run_case+0x1b3/0x490 [ 28.384710] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.385661] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.386081] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.386717] ? __kthread_parkme+0x82/0x160 [ 28.387208] ? preempt_count_sub+0x50/0x80 [ 28.388106] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.388655] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.389844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.390428] kthread+0x257/0x310 [ 28.390720] ? __pfx_kthread+0x10/0x10 [ 28.391148] ret_from_fork+0x41/0x80 [ 28.391649] ? __pfx_kthread+0x10/0x10 [ 28.392064] ret_from_fork_asm+0x1a/0x30 [ 28.392572] </TASK> [ 28.392838] [ 28.393116] Allocated by task 273: [ 28.393385] kasan_save_stack+0x3d/0x60 [ 28.393970] kasan_save_track+0x18/0x40 [ 28.394642] kasan_save_alloc_info+0x3b/0x50 [ 28.395191] __kasan_kmalloc+0xb7/0xc0 [ 28.395747] __kmalloc_cache_noprof+0x184/0x410 [ 28.396069] kasan_atomics+0x96/0x310 [ 28.396891] kunit_try_run_case+0x1b3/0x490 [ 28.397368] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.397745] kthread+0x257/0x310 [ 28.398482] ret_from_fork+0x41/0x80 [ 28.399277] ret_from_fork_asm+0x1a/0x30 [ 28.399612] [ 28.399795] The buggy address belongs to the object at ffff888101afb700 [ 28.399795] which belongs to the cache kmalloc-64 of size 64 [ 28.401779] The buggy address is located 0 bytes to the right of [ 28.401779] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.403567] [ 28.404032] The buggy address belongs to the physical page: [ 28.404576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.405292] flags: 0x200000000000000(node=0|zone=2) [ 28.406100] page_type: f5(slab) [ 28.406609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.407562] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.408730] page dumped because: kasan: bad access detected [ 28.409426] [ 28.410053] Memory state around the buggy address: [ 28.410661] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.411936] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.412700] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.413799] ^ [ 28.414621] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.415508] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.416329] ================================================================== [ 27.502512] ================================================================== [ 27.503135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 27.504182] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.505214] [ 27.505671] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.506255] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.506789] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.508062] Call Trace: [ 27.508645] <TASK> [ 27.509207] dump_stack_lvl+0x73/0xb0 [ 27.510039] print_report+0xd1/0x640 [ 27.511173] ? __virt_addr_valid+0x1db/0x2d0 [ 27.511827] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.512676] kasan_report+0x102/0x140 [ 27.513100] ? kasan_atomics_helper+0x4b3c/0x5450 [ 27.513684] ? kasan_atomics_helper+0x4b3c/0x5450 [ 27.514442] __asan_report_store4_noabort+0x1b/0x30 [ 27.514851] kasan_atomics_helper+0x4b3c/0x5450 [ 27.516013] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.516573] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.517208] ? __schedule+0xc3e/0x2790 [ 27.517739] ? finish_task_switch.isra.0+0x153/0x700 [ 27.518513] ? kasan_atomics+0x153/0x310 [ 27.519022] kasan_atomics+0x1dd/0x310 [ 27.519630] ? __pfx_kasan_atomics+0x10/0x10 [ 27.520226] ? __pfx_read_tsc+0x10/0x10 [ 27.521266] ? ktime_get_ts64+0x86/0x230 [ 27.521695] kunit_try_run_case+0x1b3/0x490 [ 27.522426] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.523525] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.524556] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.525344] ? __kthread_parkme+0x82/0x160 [ 27.526090] ? preempt_count_sub+0x50/0x80 [ 27.526613] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.527056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.528643] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.530197] kthread+0x257/0x310 [ 27.531085] ? __pfx_kthread+0x10/0x10 [ 27.532043] ret_from_fork+0x41/0x80 [ 27.533474] ? __pfx_kthread+0x10/0x10 [ 27.534060] ret_from_fork_asm+0x1a/0x30 [ 27.535179] </TASK> [ 27.535388] [ 27.535875] Allocated by task 273: [ 27.536179] kasan_save_stack+0x3d/0x60 [ 27.536497] kasan_save_track+0x18/0x40 [ 27.536782] kasan_save_alloc_info+0x3b/0x50 [ 27.538547] __kasan_kmalloc+0xb7/0xc0 [ 27.539205] __kmalloc_cache_noprof+0x184/0x410 [ 27.540387] kasan_atomics+0x96/0x310 [ 27.540734] kunit_try_run_case+0x1b3/0x490 [ 27.541575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.542008] kthread+0x257/0x310 [ 27.542177] ret_from_fork+0x41/0x80 [ 27.542451] ret_from_fork_asm+0x1a/0x30 [ 27.543303] [ 27.543578] The buggy address belongs to the object at ffff888101afb700 [ 27.543578] which belongs to the cache kmalloc-64 of size 64 [ 27.545674] The buggy address is located 0 bytes to the right of [ 27.545674] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.547046] [ 27.547150] The buggy address belongs to the physical page: [ 27.547468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.548778] flags: 0x200000000000000(node=0|zone=2) [ 27.549919] page_type: f5(slab) [ 27.550548] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.551804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.552531] page dumped because: kasan: bad access detected [ 27.552752] [ 27.553369] Memory state around the buggy address: [ 27.554246] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.555468] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.556270] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.557186] ^ [ 27.557889] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.559602] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.560719] ================================================================== [ 28.131734] ================================================================== [ 28.132484] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 28.133185] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.133743] [ 28.134070] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.136216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.136640] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.137720] Call Trace: [ 28.138425] <TASK> [ 28.138680] dump_stack_lvl+0x73/0xb0 [ 28.139677] print_report+0xd1/0x640 [ 28.140302] ? __virt_addr_valid+0x1db/0x2d0 [ 28.140653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.141372] kasan_report+0x102/0x140 [ 28.141708] ? kasan_atomics_helper+0xb6b/0x5450 [ 28.142336] ? kasan_atomics_helper+0xb6b/0x5450 [ 28.143336] kasan_check_range+0x10c/0x1c0 [ 28.144425] __kasan_check_write+0x18/0x20 [ 28.145002] kasan_atomics_helper+0xb6b/0x5450 [ 28.145668] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.146532] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.146855] ? __schedule+0xc3e/0x2790 [ 28.147451] ? finish_task_switch.isra.0+0x153/0x700 [ 28.148427] ? kasan_atomics+0x153/0x310 [ 28.149139] kasan_atomics+0x1dd/0x310 [ 28.149344] ? __pfx_kasan_atomics+0x10/0x10 [ 28.149842] ? __pfx_read_tsc+0x10/0x10 [ 28.150370] ? ktime_get_ts64+0x86/0x230 [ 28.151097] kunit_try_run_case+0x1b3/0x490 [ 28.151483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.152198] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.153032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.153979] ? __kthread_parkme+0x82/0x160 [ 28.154307] ? preempt_count_sub+0x50/0x80 [ 28.155022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.155372] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.156121] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.156775] kthread+0x257/0x310 [ 28.157122] ? __pfx_kthread+0x10/0x10 [ 28.157697] ret_from_fork+0x41/0x80 [ 28.158050] ? __pfx_kthread+0x10/0x10 [ 28.158436] ret_from_fork_asm+0x1a/0x30 [ 28.159111] </TASK> [ 28.159348] [ 28.159650] Allocated by task 273: [ 28.160044] kasan_save_stack+0x3d/0x60 [ 28.160491] kasan_save_track+0x18/0x40 [ 28.161078] kasan_save_alloc_info+0x3b/0x50 [ 28.161592] __kasan_kmalloc+0xb7/0xc0 [ 28.162121] __kmalloc_cache_noprof+0x184/0x410 [ 28.162597] kasan_atomics+0x96/0x310 [ 28.162989] kunit_try_run_case+0x1b3/0x490 [ 28.163569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.164179] kthread+0x257/0x310 [ 28.164673] ret_from_fork+0x41/0x80 [ 28.165095] ret_from_fork_asm+0x1a/0x30 [ 28.165618] [ 28.165845] The buggy address belongs to the object at ffff888101afb700 [ 28.165845] which belongs to the cache kmalloc-64 of size 64 [ 28.166714] The buggy address is located 0 bytes to the right of [ 28.166714] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.167800] [ 28.168021] The buggy address belongs to the physical page: [ 28.168559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.169560] flags: 0x200000000000000(node=0|zone=2) [ 28.170047] page_type: f5(slab) [ 28.170307] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.171292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.172102] page dumped because: kasan: bad access detected [ 28.172572] [ 28.172925] Memory state around the buggy address: [ 28.173310] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.174065] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.174702] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.175358] ^ [ 28.175915] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.176784] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.177560] ================================================================== [ 30.037893] ================================================================== [ 30.038975] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 30.039891] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.040699] [ 30.041030] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.041787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.042381] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.043144] Call Trace: [ 30.043505] <TASK> [ 30.043810] dump_stack_lvl+0x73/0xb0 [ 30.044111] print_report+0xd1/0x640 [ 30.044645] ? __virt_addr_valid+0x1db/0x2d0 [ 30.045321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.045832] kasan_report+0x102/0x140 [ 30.046360] ? kasan_atomics_helper+0x2007/0x5450 [ 30.046983] ? kasan_atomics_helper+0x2007/0x5450 [ 30.047586] kasan_check_range+0x10c/0x1c0 [ 30.048064] __kasan_check_write+0x18/0x20 [ 30.048520] kasan_atomics_helper+0x2007/0x5450 [ 30.049095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.049748] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.050301] ? __schedule+0xc3e/0x2790 [ 30.050732] ? finish_task_switch.isra.0+0x153/0x700 [ 30.051119] ? kasan_atomics+0x153/0x310 [ 30.051429] kasan_atomics+0x1dd/0x310 [ 30.052031] ? __pfx_kasan_atomics+0x10/0x10 [ 30.052780] ? __pfx_read_tsc+0x10/0x10 [ 30.053363] ? ktime_get_ts64+0x86/0x230 [ 30.053948] kunit_try_run_case+0x1b3/0x490 [ 30.054473] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.054959] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.055499] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.057117] ? __kthread_parkme+0x82/0x160 [ 30.057492] ? preempt_count_sub+0x50/0x80 [ 30.058022] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.058574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.059544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.060203] kthread+0x257/0x310 [ 30.060860] ? __pfx_kthread+0x10/0x10 [ 30.061584] ret_from_fork+0x41/0x80 [ 30.062069] ? __pfx_kthread+0x10/0x10 [ 30.062816] ret_from_fork_asm+0x1a/0x30 [ 30.063646] </TASK> [ 30.064264] [ 30.064717] Allocated by task 273: [ 30.065102] kasan_save_stack+0x3d/0x60 [ 30.065309] kasan_save_track+0x18/0x40 [ 30.065491] kasan_save_alloc_info+0x3b/0x50 [ 30.065936] __kasan_kmalloc+0xb7/0xc0 [ 30.066599] __kmalloc_cache_noprof+0x184/0x410 [ 30.067362] kasan_atomics+0x96/0x310 [ 30.067934] kunit_try_run_case+0x1b3/0x490 [ 30.068535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.070090] kthread+0x257/0x310 [ 30.070438] ret_from_fork+0x41/0x80 [ 30.071197] ret_from_fork_asm+0x1a/0x30 [ 30.071615] [ 30.071784] The buggy address belongs to the object at ffff888101afb700 [ 30.071784] which belongs to the cache kmalloc-64 of size 64 [ 30.073781] The buggy address is located 0 bytes to the right of [ 30.073781] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.076205] [ 30.076437] The buggy address belongs to the physical page: [ 30.076984] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.077748] flags: 0x200000000000000(node=0|zone=2) [ 30.079232] page_type: f5(slab) [ 30.079641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.080181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.081074] page dumped because: kasan: bad access detected [ 30.081649] [ 30.081928] Memory state around the buggy address: [ 30.082386] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.083191] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.083793] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.084509] ^ [ 30.085047] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.085741] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.086500] ================================================================== [ 27.272857] ================================================================== [ 27.273577] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 27.274465] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.275215] [ 27.275507] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.276428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.277638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.278812] Call Trace: [ 27.279088] <TASK> [ 27.279493] dump_stack_lvl+0x73/0xb0 [ 27.279986] print_report+0xd1/0x640 [ 27.280485] ? __virt_addr_valid+0x1db/0x2d0 [ 27.281553] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.282153] kasan_report+0x102/0x140 [ 27.282778] ? kasan_atomics_helper+0x4b70/0x5450 [ 27.283106] ? kasan_atomics_helper+0x4b70/0x5450 [ 27.284005] __asan_report_store4_noabort+0x1b/0x30 [ 27.284565] kasan_atomics_helper+0x4b70/0x5450 [ 27.285177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.285563] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.286488] ? __schedule+0xc3e/0x2790 [ 27.286985] ? finish_task_switch.isra.0+0x153/0x700 [ 27.287563] ? kasan_atomics+0x153/0x310 [ 27.288270] kasan_atomics+0x1dd/0x310 [ 27.288675] ? __pfx_kasan_atomics+0x10/0x10 [ 27.288994] ? __pfx_read_tsc+0x10/0x10 [ 27.290365] ? ktime_get_ts64+0x86/0x230 [ 27.290903] kunit_try_run_case+0x1b3/0x490 [ 27.291629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.291964] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.292510] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.293162] ? __kthread_parkme+0x82/0x160 [ 27.293698] ? preempt_count_sub+0x50/0x80 [ 27.293991] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.294716] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.295403] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.297089] kthread+0x257/0x310 [ 27.297810] ? __pfx_kthread+0x10/0x10 [ 27.298379] ret_from_fork+0x41/0x80 [ 27.298791] ? __pfx_kthread+0x10/0x10 [ 27.299876] ret_from_fork_asm+0x1a/0x30 [ 27.300476] </TASK> [ 27.300693] [ 27.300922] Allocated by task 273: [ 27.301258] kasan_save_stack+0x3d/0x60 [ 27.301921] kasan_save_track+0x18/0x40 [ 27.302553] kasan_save_alloc_info+0x3b/0x50 [ 27.302939] __kasan_kmalloc+0xb7/0xc0 [ 27.303219] __kmalloc_cache_noprof+0x184/0x410 [ 27.303900] kasan_atomics+0x96/0x310 [ 27.304440] kunit_try_run_case+0x1b3/0x490 [ 27.305505] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.305894] kthread+0x257/0x310 [ 27.306147] ret_from_fork+0x41/0x80 [ 27.306737] ret_from_fork_asm+0x1a/0x30 [ 27.307247] [ 27.307505] The buggy address belongs to the object at ffff888101afb700 [ 27.307505] which belongs to the cache kmalloc-64 of size 64 [ 27.308391] The buggy address is located 0 bytes to the right of [ 27.308391] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.309958] [ 27.310166] The buggy address belongs to the physical page: [ 27.311275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.312111] flags: 0x200000000000000(node=0|zone=2) [ 27.312648] page_type: f5(slab) [ 27.312996] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.313483] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.314557] page dumped because: kasan: bad access detected [ 27.314902] [ 27.315154] Memory state around the buggy address: [ 27.315702] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.316348] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.316837] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.318425] ^ [ 27.318953] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.319876] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.320591] ================================================================== [ 30.179906] ================================================================== [ 30.180598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 30.181779] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.182503] [ 30.182887] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.183834] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.184406] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.185176] Call Trace: [ 30.185601] <TASK> [ 30.185861] dump_stack_lvl+0x73/0xb0 [ 30.186321] print_report+0xd1/0x640 [ 30.186867] ? __virt_addr_valid+0x1db/0x2d0 [ 30.187410] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.188055] kasan_report+0x102/0x140 [ 30.188517] ? kasan_atomics_helper+0x4fb4/0x5450 [ 30.188997] ? kasan_atomics_helper+0x4fb4/0x5450 [ 30.189623] __asan_report_load8_noabort+0x18/0x20 [ 30.190274] kasan_atomics_helper+0x4fb4/0x5450 [ 30.190688] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.191384] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.191880] ? __schedule+0xc3e/0x2790 [ 30.192450] ? finish_task_switch.isra.0+0x153/0x700 [ 30.192897] ? kasan_atomics+0x153/0x310 [ 30.193400] kasan_atomics+0x1dd/0x310 [ 30.193965] ? __pfx_kasan_atomics+0x10/0x10 [ 30.194380] ? __pfx_read_tsc+0x10/0x10 [ 30.194959] ? ktime_get_ts64+0x86/0x230 [ 30.195392] kunit_try_run_case+0x1b3/0x490 [ 30.195989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.196501] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.197063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.197631] ? __kthread_parkme+0x82/0x160 [ 30.198230] ? preempt_count_sub+0x50/0x80 [ 30.198757] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.199281] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.199938] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.200490] kthread+0x257/0x310 [ 30.200953] ? __pfx_kthread+0x10/0x10 [ 30.201371] ret_from_fork+0x41/0x80 [ 30.201857] ? __pfx_kthread+0x10/0x10 [ 30.202327] ret_from_fork_asm+0x1a/0x30 [ 30.202895] </TASK> [ 30.203310] [ 30.203525] Allocated by task 273: [ 30.203966] kasan_save_stack+0x3d/0x60 [ 30.204500] kasan_save_track+0x18/0x40 [ 30.204871] kasan_save_alloc_info+0x3b/0x50 [ 30.205330] __kasan_kmalloc+0xb7/0xc0 [ 30.205901] __kmalloc_cache_noprof+0x184/0x410 [ 30.206342] kasan_atomics+0x96/0x310 [ 30.206902] kunit_try_run_case+0x1b3/0x490 [ 30.207472] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.208108] kthread+0x257/0x310 [ 30.208560] ret_from_fork+0x41/0x80 [ 30.209099] ret_from_fork_asm+0x1a/0x30 [ 30.209635] [ 30.209905] The buggy address belongs to the object at ffff888101afb700 [ 30.209905] which belongs to the cache kmalloc-64 of size 64 [ 30.210962] The buggy address is located 0 bytes to the right of [ 30.210962] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.212223] [ 30.212517] The buggy address belongs to the physical page: [ 30.213078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.213819] flags: 0x200000000000000(node=0|zone=2) [ 30.214458] page_type: f5(slab) [ 30.214845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.215635] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.216303] page dumped because: kasan: bad access detected [ 30.216878] [ 30.217085] Memory state around the buggy address: [ 30.217522] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.218255] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.218933] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.219513] ^ [ 30.220177] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.220779] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.221511] ================================================================== [ 29.512603] ================================================================== [ 29.513403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 29.514484] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.516182] [ 29.516419] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.517800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.518404] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.519346] Call Trace: [ 29.519874] <TASK> [ 29.520582] dump_stack_lvl+0x73/0xb0 [ 29.520937] print_report+0xd1/0x640 [ 29.521404] ? __virt_addr_valid+0x1db/0x2d0 [ 29.521870] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.523199] kasan_report+0x102/0x140 [ 29.523761] ? kasan_atomics_helper+0x19e4/0x5450 [ 29.524534] ? kasan_atomics_helper+0x19e4/0x5450 [ 29.524965] kasan_check_range+0x10c/0x1c0 [ 29.525378] __kasan_check_write+0x18/0x20 [ 29.525781] kasan_atomics_helper+0x19e4/0x5450 [ 29.526908] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.527361] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.528073] ? __schedule+0xc3e/0x2790 [ 29.528476] ? finish_task_switch.isra.0+0x153/0x700 [ 29.529008] ? kasan_atomics+0x153/0x310 [ 29.529436] kasan_atomics+0x1dd/0x310 [ 29.530585] ? __pfx_kasan_atomics+0x10/0x10 [ 29.531265] ? __pfx_read_tsc+0x10/0x10 [ 29.531805] ? ktime_get_ts64+0x86/0x230 [ 29.532506] kunit_try_run_case+0x1b3/0x490 [ 29.533179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.533883] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.534435] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.535591] ? __kthread_parkme+0x82/0x160 [ 29.535997] ? preempt_count_sub+0x50/0x80 [ 29.536567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.537010] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.538260] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.538891] kthread+0x257/0x310 [ 29.539630] ? __pfx_kthread+0x10/0x10 [ 29.539825] ret_from_fork+0x41/0x80 [ 29.540170] ? __pfx_kthread+0x10/0x10 [ 29.540548] ret_from_fork_asm+0x1a/0x30 [ 29.541016] </TASK> [ 29.541352] [ 29.541594] Allocated by task 273: [ 29.542047] kasan_save_stack+0x3d/0x60 [ 29.542472] kasan_save_track+0x18/0x40 [ 29.543162] kasan_save_alloc_info+0x3b/0x50 [ 29.543751] __kasan_kmalloc+0xb7/0xc0 [ 29.544252] __kmalloc_cache_noprof+0x184/0x410 [ 29.544788] kasan_atomics+0x96/0x310 [ 29.545235] kunit_try_run_case+0x1b3/0x490 [ 29.545780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.546369] kthread+0x257/0x310 [ 29.546787] ret_from_fork+0x41/0x80 [ 29.547236] ret_from_fork_asm+0x1a/0x30 [ 29.547725] [ 29.548078] The buggy address belongs to the object at ffff888101afb700 [ 29.548078] which belongs to the cache kmalloc-64 of size 64 [ 29.549135] The buggy address is located 0 bytes to the right of [ 29.549135] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.550345] [ 29.550597] The buggy address belongs to the physical page: [ 29.551270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.552160] flags: 0x200000000000000(node=0|zone=2) [ 29.552652] page_type: f5(slab) [ 29.553152] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.553816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.554604] page dumped because: kasan: bad access detected [ 29.555135] [ 29.555415] Memory state around the buggy address: [ 29.555985] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.556617] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.557383] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.558147] ^ [ 29.558614] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.559407] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.559925] ================================================================== [ 28.469826] ================================================================== [ 28.471468] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 28.472281] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.472960] [ 28.473252] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.474121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.474635] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.475555] Call Trace: [ 28.475781] <TASK> [ 28.476226] dump_stack_lvl+0x73/0xb0 [ 28.476900] print_report+0xd1/0x640 [ 28.477478] ? __virt_addr_valid+0x1db/0x2d0 [ 28.477996] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.478785] kasan_report+0x102/0x140 [ 28.479321] ? kasan_atomics_helper+0xfaa/0x5450 [ 28.479997] ? kasan_atomics_helper+0xfaa/0x5450 [ 28.480556] kasan_check_range+0x10c/0x1c0 [ 28.481111] __kasan_check_write+0x18/0x20 [ 28.481581] kasan_atomics_helper+0xfaa/0x5450 [ 28.482228] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.482728] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.483383] ? __schedule+0xc3e/0x2790 [ 28.483919] ? finish_task_switch.isra.0+0x153/0x700 [ 28.484476] ? kasan_atomics+0x153/0x310 [ 28.485177] kasan_atomics+0x1dd/0x310 [ 28.485731] ? __pfx_kasan_atomics+0x10/0x10 [ 28.486372] ? __pfx_read_tsc+0x10/0x10 [ 28.486986] ? ktime_get_ts64+0x86/0x230 [ 28.487539] kunit_try_run_case+0x1b3/0x490 [ 28.488112] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.488596] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.489299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.490024] ? __kthread_parkme+0x82/0x160 [ 28.490593] ? preempt_count_sub+0x50/0x80 [ 28.491158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.491698] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.492438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.493015] kthread+0x257/0x310 [ 28.493337] ? __pfx_kthread+0x10/0x10 [ 28.494006] ret_from_fork+0x41/0x80 [ 28.494571] ? __pfx_kthread+0x10/0x10 [ 28.495072] ret_from_fork_asm+0x1a/0x30 [ 28.495493] </TASK> [ 28.495985] [ 28.496177] Allocated by task 273: [ 28.496733] kasan_save_stack+0x3d/0x60 [ 28.497293] kasan_save_track+0x18/0x40 [ 28.497655] kasan_save_alloc_info+0x3b/0x50 [ 28.498186] __kasan_kmalloc+0xb7/0xc0 [ 28.498623] __kmalloc_cache_noprof+0x184/0x410 [ 28.499060] kasan_atomics+0x96/0x310 [ 28.499816] kunit_try_run_case+0x1b3/0x490 [ 28.500398] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.501351] kthread+0x257/0x310 [ 28.501745] ret_from_fork+0x41/0x80 [ 28.502263] ret_from_fork_asm+0x1a/0x30 [ 28.503509] [ 28.503712] The buggy address belongs to the object at ffff888101afb700 [ 28.503712] which belongs to the cache kmalloc-64 of size 64 [ 28.505211] The buggy address is located 0 bytes to the right of [ 28.505211] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.506614] [ 28.506861] The buggy address belongs to the physical page: [ 28.507448] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.508575] flags: 0x200000000000000(node=0|zone=2) [ 28.509252] page_type: f5(slab) [ 28.509678] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.511249] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.511893] page dumped because: kasan: bad access detected [ 28.512679] [ 28.513285] Memory state around the buggy address: [ 28.513943] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.515318] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.516339] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.517148] ^ [ 28.517475] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.518485] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.519218] ================================================================== [ 30.134790] ================================================================== [ 30.136372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 30.137398] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.138933] [ 30.139438] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.140693] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.140883] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.141795] Call Trace: [ 30.142118] <TASK> [ 30.142392] dump_stack_lvl+0x73/0xb0 [ 30.142826] print_report+0xd1/0x640 [ 30.143302] ? __virt_addr_valid+0x1db/0x2d0 [ 30.143902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.144504] kasan_report+0x102/0x140 [ 30.145169] ? kasan_atomics_helper+0x20c9/0x5450 [ 30.145647] ? kasan_atomics_helper+0x20c9/0x5450 [ 30.146305] kasan_check_range+0x10c/0x1c0 [ 30.146845] __kasan_check_write+0x18/0x20 [ 30.147326] kasan_atomics_helper+0x20c9/0x5450 [ 30.147854] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.148489] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.149151] ? __schedule+0xc3e/0x2790 [ 30.149672] ? finish_task_switch.isra.0+0x153/0x700 [ 30.150182] ? kasan_atomics+0x153/0x310 [ 30.150620] kasan_atomics+0x1dd/0x310 [ 30.151245] ? __pfx_kasan_atomics+0x10/0x10 [ 30.151629] ? __pfx_read_tsc+0x10/0x10 [ 30.152235] ? ktime_get_ts64+0x86/0x230 [ 30.152651] kunit_try_run_case+0x1b3/0x490 [ 30.153334] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.153778] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.154477] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.154913] ? __kthread_parkme+0x82/0x160 [ 30.155390] ? preempt_count_sub+0x50/0x80 [ 30.155866] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.156502] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.156979] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.157715] kthread+0x257/0x310 [ 30.158188] ? __pfx_kthread+0x10/0x10 [ 30.158707] ret_from_fork+0x41/0x80 [ 30.159085] ? __pfx_kthread+0x10/0x10 [ 30.159508] ret_from_fork_asm+0x1a/0x30 [ 30.159971] </TASK> [ 30.160390] [ 30.160671] Allocated by task 273: [ 30.161085] kasan_save_stack+0x3d/0x60 [ 30.161660] kasan_save_track+0x18/0x40 [ 30.162203] kasan_save_alloc_info+0x3b/0x50 [ 30.162679] __kasan_kmalloc+0xb7/0xc0 [ 30.163208] __kmalloc_cache_noprof+0x184/0x410 [ 30.163702] kasan_atomics+0x96/0x310 [ 30.164277] kunit_try_run_case+0x1b3/0x490 [ 30.164717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.165100] kthread+0x257/0x310 [ 30.165515] ret_from_fork+0x41/0x80 [ 30.166152] ret_from_fork_asm+0x1a/0x30 [ 30.166555] [ 30.166846] The buggy address belongs to the object at ffff888101afb700 [ 30.166846] which belongs to the cache kmalloc-64 of size 64 [ 30.167892] The buggy address is located 0 bytes to the right of [ 30.167892] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.169246] [ 30.169439] The buggy address belongs to the physical page: [ 30.170236] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.170927] flags: 0x200000000000000(node=0|zone=2) [ 30.171647] page_type: f5(slab) [ 30.172038] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.172650] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.173293] page dumped because: kasan: bad access detected [ 30.173929] [ 30.174237] Memory state around the buggy address: [ 30.174758] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.175497] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.176207] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.176782] ^ [ 30.177486] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.178206] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.178927] ================================================================== [ 30.265932] ================================================================== [ 30.266462] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 30.267223] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.267798] [ 30.268107] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.268936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.269269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.270248] Call Trace: [ 30.270472] <TASK> [ 30.270698] dump_stack_lvl+0x73/0xb0 [ 30.271063] print_report+0xd1/0x640 [ 30.271530] ? __virt_addr_valid+0x1db/0x2d0 [ 30.272132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.272799] kasan_report+0x102/0x140 [ 30.273178] ? kasan_atomics_helper+0x4fa7/0x5450 [ 30.273654] ? kasan_atomics_helper+0x4fa7/0x5450 [ 30.274258] __asan_report_load8_noabort+0x18/0x20 [ 30.274857] kasan_atomics_helper+0x4fa7/0x5450 [ 30.275353] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.275823] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.276306] ? __schedule+0xc3e/0x2790 [ 30.276651] ? finish_task_switch.isra.0+0x153/0x700 [ 30.277248] ? kasan_atomics+0x153/0x310 [ 30.277569] kasan_atomics+0x1dd/0x310 [ 30.278120] ? __pfx_kasan_atomics+0x10/0x10 [ 30.278680] ? __pfx_read_tsc+0x10/0x10 [ 30.279134] ? ktime_get_ts64+0x86/0x230 [ 30.279509] kunit_try_run_case+0x1b3/0x490 [ 30.280051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.280636] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.281076] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.281438] ? __kthread_parkme+0x82/0x160 [ 30.282054] ? preempt_count_sub+0x50/0x80 [ 30.282577] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.282982] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.283636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.284253] kthread+0x257/0x310 [ 30.284615] ? __pfx_kthread+0x10/0x10 [ 30.285136] ret_from_fork+0x41/0x80 [ 30.285571] ? __pfx_kthread+0x10/0x10 [ 30.285901] ret_from_fork_asm+0x1a/0x30 [ 30.286471] </TASK> [ 30.286799] [ 30.286953] Allocated by task 273: [ 30.287256] kasan_save_stack+0x3d/0x60 [ 30.287567] kasan_save_track+0x18/0x40 [ 30.288127] kasan_save_alloc_info+0x3b/0x50 [ 30.288704] __kasan_kmalloc+0xb7/0xc0 [ 30.289225] __kmalloc_cache_noprof+0x184/0x410 [ 30.289670] kasan_atomics+0x96/0x310 [ 30.290190] kunit_try_run_case+0x1b3/0x490 [ 30.290674] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.291184] kthread+0x257/0x310 [ 30.291550] ret_from_fork+0x41/0x80 [ 30.291960] ret_from_fork_asm+0x1a/0x30 [ 30.292295] [ 30.292462] The buggy address belongs to the object at ffff888101afb700 [ 30.292462] which belongs to the cache kmalloc-64 of size 64 [ 30.293742] The buggy address is located 0 bytes to the right of [ 30.293742] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.294703] [ 30.294950] The buggy address belongs to the physical page: [ 30.295542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.296294] flags: 0x200000000000000(node=0|zone=2) [ 30.296786] page_type: f5(slab) [ 30.297138] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.297885] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.298512] page dumped because: kasan: bad access detected [ 30.298911] [ 30.299212] Memory state around the buggy address: [ 30.299678] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.300303] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.300831] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.301576] ^ [ 30.302005] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.302469] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.303287] ================================================================== [ 28.952242] ================================================================== [ 28.953444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 28.954487] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.955815] [ 28.956888] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.957759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.958380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.959311] Call Trace: [ 28.959869] <TASK> [ 28.960291] dump_stack_lvl+0x73/0xb0 [ 28.960754] print_report+0xd1/0x640 [ 28.961239] ? __virt_addr_valid+0x1db/0x2d0 [ 28.961988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.962779] kasan_report+0x102/0x140 [ 28.963307] ? kasan_atomics_helper+0x13b6/0x5450 [ 28.963802] ? kasan_atomics_helper+0x13b6/0x5450 [ 28.964397] kasan_check_range+0x10c/0x1c0 [ 28.964987] __kasan_check_read+0x15/0x20 [ 28.965374] kasan_atomics_helper+0x13b6/0x5450 [ 28.965933] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.966589] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.967102] ? __schedule+0xc3e/0x2790 [ 28.967528] ? finish_task_switch.isra.0+0x153/0x700 [ 28.968089] ? kasan_atomics+0x153/0x310 [ 28.968640] kasan_atomics+0x1dd/0x310 [ 28.969284] ? __pfx_kasan_atomics+0x10/0x10 [ 28.969824] ? __pfx_read_tsc+0x10/0x10 [ 28.970337] ? ktime_get_ts64+0x86/0x230 [ 28.970934] kunit_try_run_case+0x1b3/0x490 [ 28.971493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.971880] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.972506] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.973051] ? __kthread_parkme+0x82/0x160 [ 28.973410] ? preempt_count_sub+0x50/0x80 [ 28.973945] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.974424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.975132] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.975640] kthread+0x257/0x310 [ 28.976083] ? __pfx_kthread+0x10/0x10 [ 28.976447] ret_from_fork+0x41/0x80 [ 28.977067] ? __pfx_kthread+0x10/0x10 [ 28.977475] ret_from_fork_asm+0x1a/0x30 [ 28.978160] </TASK> [ 28.978373] [ 28.978655] Allocated by task 273: [ 28.979197] kasan_save_stack+0x3d/0x60 [ 28.979577] kasan_save_track+0x18/0x40 [ 28.980215] kasan_save_alloc_info+0x3b/0x50 [ 28.980583] __kasan_kmalloc+0xb7/0xc0 [ 28.981158] __kmalloc_cache_noprof+0x184/0x410 [ 28.981674] kasan_atomics+0x96/0x310 [ 28.982167] kunit_try_run_case+0x1b3/0x490 [ 28.982626] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.983223] kthread+0x257/0x310 [ 28.983727] ret_from_fork+0x41/0x80 [ 28.984259] ret_from_fork_asm+0x1a/0x30 [ 28.984815] [ 28.985141] The buggy address belongs to the object at ffff888101afb700 [ 28.985141] which belongs to the cache kmalloc-64 of size 64 [ 28.986186] The buggy address is located 0 bytes to the right of [ 28.986186] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.987411] [ 28.987718] The buggy address belongs to the physical page: [ 28.988280] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.989162] flags: 0x200000000000000(node=0|zone=2) [ 28.989784] page_type: f5(slab) [ 28.990193] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.991058] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.991699] page dumped because: kasan: bad access detected [ 28.992300] [ 28.992548] Memory state around the buggy address: [ 28.993007] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.993569] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.994193] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.994883] ^ [ 28.995395] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.995874] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.996681] ================================================================== [ 28.846808] ================================================================== [ 28.847713] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 28.848714] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.849298] [ 28.849619] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.850780] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.851399] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.852322] Call Trace: [ 28.852711] <TASK> [ 28.853168] dump_stack_lvl+0x73/0xb0 [ 28.853732] print_report+0xd1/0x640 [ 28.854244] ? __virt_addr_valid+0x1db/0x2d0 [ 28.854857] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.855561] kasan_report+0x102/0x140 [ 28.856202] ? kasan_atomics_helper+0x12e7/0x5450 [ 28.856668] ? kasan_atomics_helper+0x12e7/0x5450 [ 28.857341] kasan_check_range+0x10c/0x1c0 [ 28.857957] __kasan_check_write+0x18/0x20 [ 28.858490] kasan_atomics_helper+0x12e7/0x5450 [ 28.859046] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.859632] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.860221] ? __schedule+0xc3e/0x2790 [ 28.860694] ? finish_task_switch.isra.0+0x153/0x700 [ 28.861315] ? kasan_atomics+0x153/0x310 [ 28.862001] kasan_atomics+0x1dd/0x310 [ 28.862483] ? __pfx_kasan_atomics+0x10/0x10 [ 28.863163] ? __pfx_read_tsc+0x10/0x10 [ 28.863645] ? ktime_get_ts64+0x86/0x230 [ 28.864122] kunit_try_run_case+0x1b3/0x490 [ 28.864640] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.865129] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.865718] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.866209] ? __kthread_parkme+0x82/0x160 [ 28.866703] ? preempt_count_sub+0x50/0x80 [ 28.867332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.868042] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.868716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.869310] kthread+0x257/0x310 [ 28.869938] ? __pfx_kthread+0x10/0x10 [ 28.870409] ret_from_fork+0x41/0x80 [ 28.871357] ? __pfx_kthread+0x10/0x10 [ 28.871655] ret_from_fork_asm+0x1a/0x30 [ 28.872217] </TASK> [ 28.872574] [ 28.872844] Allocated by task 273: [ 28.873166] kasan_save_stack+0x3d/0x60 [ 28.874312] kasan_save_track+0x18/0x40 [ 28.874889] kasan_save_alloc_info+0x3b/0x50 [ 28.875573] __kasan_kmalloc+0xb7/0xc0 [ 28.876222] __kmalloc_cache_noprof+0x184/0x410 [ 28.877152] kasan_atomics+0x96/0x310 [ 28.877772] kunit_try_run_case+0x1b3/0x490 [ 28.878543] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.879054] kthread+0x257/0x310 [ 28.879393] ret_from_fork+0x41/0x80 [ 28.879820] ret_from_fork_asm+0x1a/0x30 [ 28.880400] [ 28.880687] The buggy address belongs to the object at ffff888101afb700 [ 28.880687] which belongs to the cache kmalloc-64 of size 64 [ 28.882519] The buggy address is located 0 bytes to the right of [ 28.882519] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.884004] [ 28.884427] The buggy address belongs to the physical page: [ 28.885638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.886491] flags: 0x200000000000000(node=0|zone=2) [ 28.887596] page_type: f5(slab) [ 28.887925] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.888939] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.889651] page dumped because: kasan: bad access detected [ 28.890670] [ 28.890844] Memory state around the buggy address: [ 28.891157] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.892667] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.893126] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.894533] ^ [ 28.895307] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.896251] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.897440] ================================================================== [ 29.414006] ================================================================== [ 29.415412] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 29.416810] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.418054] [ 29.418249] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.419294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.419692] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.420636] Call Trace: [ 29.421052] <TASK> [ 29.421527] dump_stack_lvl+0x73/0xb0 [ 29.421905] print_report+0xd1/0x640 [ 29.422345] ? __virt_addr_valid+0x1db/0x2d0 [ 29.422993] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.423542] kasan_report+0x102/0x140 [ 29.424561] ? kasan_atomics_helper+0x18b2/0x5450 [ 29.425286] ? kasan_atomics_helper+0x18b2/0x5450 [ 29.426110] kasan_check_range+0x10c/0x1c0 [ 29.426842] __kasan_check_write+0x18/0x20 [ 29.427775] kasan_atomics_helper+0x18b2/0x5450 [ 29.428791] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.429720] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.430560] ? __schedule+0xc3e/0x2790 [ 29.431171] ? finish_task_switch.isra.0+0x153/0x700 [ 29.431858] ? kasan_atomics+0x153/0x310 [ 29.432672] kasan_atomics+0x1dd/0x310 [ 29.433048] ? __pfx_kasan_atomics+0x10/0x10 [ 29.433264] ? __pfx_read_tsc+0x10/0x10 [ 29.433455] ? ktime_get_ts64+0x86/0x230 [ 29.434340] kunit_try_run_case+0x1b3/0x490 [ 29.435234] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.435935] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.436561] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.437028] ? __kthread_parkme+0x82/0x160 [ 29.437748] ? preempt_count_sub+0x50/0x80 [ 29.438337] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.438845] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.439688] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.440192] kthread+0x257/0x310 [ 29.440879] ? __pfx_kthread+0x10/0x10 [ 29.441592] ret_from_fork+0x41/0x80 [ 29.442074] ? __pfx_kthread+0x10/0x10 [ 29.443061] ret_from_fork_asm+0x1a/0x30 [ 29.443408] </TASK> [ 29.443783] [ 29.444307] Allocated by task 273: [ 29.444721] kasan_save_stack+0x3d/0x60 [ 29.445532] kasan_save_track+0x18/0x40 [ 29.446216] kasan_save_alloc_info+0x3b/0x50 [ 29.446746] __kasan_kmalloc+0xb7/0xc0 [ 29.447143] __kmalloc_cache_noprof+0x184/0x410 [ 29.447770] kasan_atomics+0x96/0x310 [ 29.448137] kunit_try_run_case+0x1b3/0x490 [ 29.449381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.449884] kthread+0x257/0x310 [ 29.450386] ret_from_fork+0x41/0x80 [ 29.450709] ret_from_fork_asm+0x1a/0x30 [ 29.451290] [ 29.451547] The buggy address belongs to the object at ffff888101afb700 [ 29.451547] which belongs to the cache kmalloc-64 of size 64 [ 29.452579] The buggy address is located 0 bytes to the right of [ 29.452579] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.453713] [ 29.453989] The buggy address belongs to the physical page: [ 29.454556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.455265] flags: 0x200000000000000(node=0|zone=2) [ 29.455707] page_type: f5(slab) [ 29.456027] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.456858] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.457607] page dumped because: kasan: bad access detected [ 29.458192] [ 29.458417] Memory state around the buggy address: [ 29.459033] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.459766] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.460546] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.461090] ^ [ 29.461524] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.462215] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.462880] ================================================================== [ 29.762213] ================================================================== [ 29.763122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 29.763865] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.764630] [ 29.764912] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.765874] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.766350] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.767156] Call Trace: [ 29.767526] <TASK> [ 29.767838] dump_stack_lvl+0x73/0xb0 [ 29.768518] print_report+0xd1/0x640 [ 29.768984] ? __virt_addr_valid+0x1db/0x2d0 [ 29.769519] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.769977] kasan_report+0x102/0x140 [ 29.770524] ? kasan_atomics_helper+0x1ce2/0x5450 [ 29.771202] ? kasan_atomics_helper+0x1ce2/0x5450 [ 29.771798] kasan_check_range+0x10c/0x1c0 [ 29.772109] __kasan_check_write+0x18/0x20 [ 29.772459] kasan_atomics_helper+0x1ce2/0x5450 [ 29.773605] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.774387] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.775065] ? __schedule+0xc3e/0x2790 [ 29.775589] ? finish_task_switch.isra.0+0x153/0x700 [ 29.776390] ? kasan_atomics+0x153/0x310 [ 29.777265] kasan_atomics+0x1dd/0x310 [ 29.777633] ? __pfx_kasan_atomics+0x10/0x10 [ 29.778435] ? __pfx_read_tsc+0x10/0x10 [ 29.778859] ? ktime_get_ts64+0x86/0x230 [ 29.779302] kunit_try_run_case+0x1b3/0x490 [ 29.780196] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.780862] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.781482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.782000] ? __kthread_parkme+0x82/0x160 [ 29.782693] ? preempt_count_sub+0x50/0x80 [ 29.783385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.783908] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.784499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.785240] kthread+0x257/0x310 [ 29.785662] ? __pfx_kthread+0x10/0x10 [ 29.786211] ret_from_fork+0x41/0x80 [ 29.786511] ? __pfx_kthread+0x10/0x10 [ 29.787100] ret_from_fork_asm+0x1a/0x30 [ 29.787623] </TASK> [ 29.787841] [ 29.788249] Allocated by task 273: [ 29.788605] kasan_save_stack+0x3d/0x60 [ 29.789248] kasan_save_track+0x18/0x40 [ 29.790260] kasan_save_alloc_info+0x3b/0x50 [ 29.790749] __kasan_kmalloc+0xb7/0xc0 [ 29.791607] __kmalloc_cache_noprof+0x184/0x410 [ 29.792332] kasan_atomics+0x96/0x310 [ 29.792747] kunit_try_run_case+0x1b3/0x490 [ 29.793087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.793697] kthread+0x257/0x310 [ 29.794284] ret_from_fork+0x41/0x80 [ 29.794684] ret_from_fork_asm+0x1a/0x30 [ 29.795969] [ 29.796182] The buggy address belongs to the object at ffff888101afb700 [ 29.796182] which belongs to the cache kmalloc-64 of size 64 [ 29.797397] The buggy address is located 0 bytes to the right of [ 29.797397] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.798658] [ 29.798808] The buggy address belongs to the physical page: [ 29.799357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.800045] flags: 0x200000000000000(node=0|zone=2) [ 29.800429] page_type: f5(slab) [ 29.800901] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.801492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.802437] page dumped because: kasan: bad access detected [ 29.803055] [ 29.803278] Memory state around the buggy address: [ 29.803667] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.804382] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.805248] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.805730] ^ [ 29.806386] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.807204] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.807840] ================================================================== [ 29.942880] ================================================================== [ 29.943341] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 29.944821] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.946378] [ 29.946606] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.947727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.948051] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.948781] Call Trace: [ 29.949205] <TASK> [ 29.949578] dump_stack_lvl+0x73/0xb0 [ 29.950161] print_report+0xd1/0x640 [ 29.950500] ? __virt_addr_valid+0x1db/0x2d0 [ 29.951012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.951520] kasan_report+0x102/0x140 [ 29.952001] ? kasan_atomics_helper+0x1f44/0x5450 [ 29.952464] ? kasan_atomics_helper+0x1f44/0x5450 [ 29.952949] kasan_check_range+0x10c/0x1c0 [ 29.953490] __kasan_check_write+0x18/0x20 [ 29.953836] kasan_atomics_helper+0x1f44/0x5450 [ 29.954505] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.954991] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.955619] ? __schedule+0xc3e/0x2790 [ 29.955942] ? finish_task_switch.isra.0+0x153/0x700 [ 29.956577] ? kasan_atomics+0x153/0x310 [ 29.957138] kasan_atomics+0x1dd/0x310 [ 29.957591] ? __pfx_kasan_atomics+0x10/0x10 [ 29.957933] ? __pfx_read_tsc+0x10/0x10 [ 29.958523] ? ktime_get_ts64+0x86/0x230 [ 29.959065] kunit_try_run_case+0x1b3/0x490 [ 29.959410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.959995] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.960605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.961104] ? __kthread_parkme+0x82/0x160 [ 29.961489] ? preempt_count_sub+0x50/0x80 [ 29.962127] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.962611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.963000] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.963766] kthread+0x257/0x310 [ 29.964159] ? __pfx_kthread+0x10/0x10 [ 29.964727] ret_from_fork+0x41/0x80 [ 29.965215] ? __pfx_kthread+0x10/0x10 [ 29.965598] ret_from_fork_asm+0x1a/0x30 [ 29.965924] </TASK> [ 29.966393] [ 29.966707] Allocated by task 273: [ 29.967263] kasan_save_stack+0x3d/0x60 [ 29.967801] kasan_save_track+0x18/0x40 [ 29.968224] kasan_save_alloc_info+0x3b/0x50 [ 29.968766] __kasan_kmalloc+0xb7/0xc0 [ 29.969168] __kmalloc_cache_noprof+0x184/0x410 [ 29.969668] kasan_atomics+0x96/0x310 [ 29.969948] kunit_try_run_case+0x1b3/0x490 [ 29.970517] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.971212] kthread+0x257/0x310 [ 29.971577] ret_from_fork+0x41/0x80 [ 29.971913] ret_from_fork_asm+0x1a/0x30 [ 29.972526] [ 29.972709] The buggy address belongs to the object at ffff888101afb700 [ 29.972709] which belongs to the cache kmalloc-64 of size 64 [ 29.974144] The buggy address is located 0 bytes to the right of [ 29.974144] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.975219] [ 29.975424] The buggy address belongs to the physical page: [ 29.976055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.976529] flags: 0x200000000000000(node=0|zone=2) [ 29.977610] page_type: f5(slab) [ 29.978604] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.979239] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.979948] page dumped because: kasan: bad access detected [ 29.980449] [ 29.981099] Memory state around the buggy address: [ 29.981431] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.982843] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.983696] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.984528] ^ [ 29.984976] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985911] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.986653] ================================================================== [ 27.620883] ================================================================== [ 27.621502] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 27.622677] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.623686] [ 27.623808] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.624188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.624473] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.626279] Call Trace: [ 27.626630] <TASK> [ 27.627000] dump_stack_lvl+0x73/0xb0 [ 27.627431] print_report+0xd1/0x640 [ 27.627808] ? __virt_addr_valid+0x1db/0x2d0 [ 27.628169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.629616] kasan_report+0x102/0x140 [ 27.629860] ? kasan_atomics_helper+0x5ff/0x5450 [ 27.630205] ? kasan_atomics_helper+0x5ff/0x5450 [ 27.631131] kasan_check_range+0x10c/0x1c0 [ 27.631710] __kasan_check_write+0x18/0x20 [ 27.632225] kasan_atomics_helper+0x5ff/0x5450 [ 27.632705] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.633379] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.634063] ? __schedule+0xc3e/0x2790 [ 27.634476] ? finish_task_switch.isra.0+0x153/0x700 [ 27.636012] ? kasan_atomics+0x153/0x310 [ 27.636747] kasan_atomics+0x1dd/0x310 [ 27.637379] ? __pfx_kasan_atomics+0x10/0x10 [ 27.637840] ? __pfx_read_tsc+0x10/0x10 [ 27.638264] ? ktime_get_ts64+0x86/0x230 [ 27.639145] kunit_try_run_case+0x1b3/0x490 [ 27.639697] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.641550] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.642220] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.642922] ? __kthread_parkme+0x82/0x160 [ 27.643754] ? preempt_count_sub+0x50/0x80 [ 27.644129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.644829] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.645342] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.646116] kthread+0x257/0x310 [ 27.646500] ? __pfx_kthread+0x10/0x10 [ 27.647414] ret_from_fork+0x41/0x80 [ 27.648731] ? __pfx_kthread+0x10/0x10 [ 27.649156] ret_from_fork_asm+0x1a/0x30 [ 27.649707] </TASK> [ 27.650261] [ 27.650585] Allocated by task 273: [ 27.651051] kasan_save_stack+0x3d/0x60 [ 27.651808] kasan_save_track+0x18/0x40 [ 27.652125] kasan_save_alloc_info+0x3b/0x50 [ 27.652945] __kasan_kmalloc+0xb7/0xc0 [ 27.653388] __kmalloc_cache_noprof+0x184/0x410 [ 27.653798] kasan_atomics+0x96/0x310 [ 27.654149] kunit_try_run_case+0x1b3/0x490 [ 27.654973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.655919] kthread+0x257/0x310 [ 27.656166] ret_from_fork+0x41/0x80 [ 27.657327] ret_from_fork_asm+0x1a/0x30 [ 27.657744] [ 27.658123] The buggy address belongs to the object at ffff888101afb700 [ 27.658123] which belongs to the cache kmalloc-64 of size 64 [ 27.658787] The buggy address is located 0 bytes to the right of [ 27.658787] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.661032] [ 27.661269] The buggy address belongs to the physical page: [ 27.662595] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.663898] flags: 0x200000000000000(node=0|zone=2) [ 27.665158] page_type: f5(slab) [ 27.665863] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.666669] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.667859] page dumped because: kasan: bad access detected [ 27.668191] [ 27.668702] Memory state around the buggy address: [ 27.669772] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.671631] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.672857] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.673791] ^ [ 27.674212] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.675366] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.676073] ================================================================== [ 27.382670] ================================================================== [ 27.384358] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 27.385487] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.385937] [ 27.386333] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.388016] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.388463] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.389293] Call Trace: [ 27.389537] <TASK> [ 27.390942] dump_stack_lvl+0x73/0xb0 [ 27.391892] print_report+0xd1/0x640 [ 27.392525] ? __virt_addr_valid+0x1db/0x2d0 [ 27.392766] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.393790] kasan_report+0x102/0x140 [ 27.394195] ? kasan_atomics_helper+0x4b56/0x5450 [ 27.395120] ? kasan_atomics_helper+0x4b56/0x5450 [ 27.395946] __asan_report_load4_noabort+0x18/0x20 [ 27.396958] kasan_atomics_helper+0x4b56/0x5450 [ 27.397816] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.398274] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.399922] ? __schedule+0xc3e/0x2790 [ 27.400295] ? finish_task_switch.isra.0+0x153/0x700 [ 27.401329] ? kasan_atomics+0x153/0x310 [ 27.401822] kasan_atomics+0x1dd/0x310 [ 27.402228] ? __pfx_kasan_atomics+0x10/0x10 [ 27.402573] ? __pfx_read_tsc+0x10/0x10 [ 27.403501] ? ktime_get_ts64+0x86/0x230 [ 27.403887] kunit_try_run_case+0x1b3/0x490 [ 27.404895] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.405879] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.406700] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.407745] ? __kthread_parkme+0x82/0x160 [ 27.408575] ? preempt_count_sub+0x50/0x80 [ 27.409353] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.410052] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.411191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.411996] kthread+0x257/0x310 [ 27.412251] ? __pfx_kthread+0x10/0x10 [ 27.412694] ret_from_fork+0x41/0x80 [ 27.413120] ? __pfx_kthread+0x10/0x10 [ 27.413687] ret_from_fork_asm+0x1a/0x30 [ 27.414705] </TASK> [ 27.415190] [ 27.415363] Allocated by task 273: [ 27.416865] kasan_save_stack+0x3d/0x60 [ 27.417374] kasan_save_track+0x18/0x40 [ 27.417794] kasan_save_alloc_info+0x3b/0x50 [ 27.418238] __kasan_kmalloc+0xb7/0xc0 [ 27.419210] __kmalloc_cache_noprof+0x184/0x410 [ 27.419938] kasan_atomics+0x96/0x310 [ 27.421036] kunit_try_run_case+0x1b3/0x490 [ 27.421466] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.421724] kthread+0x257/0x310 [ 27.421996] ret_from_fork+0x41/0x80 [ 27.423085] ret_from_fork_asm+0x1a/0x30 [ 27.423912] [ 27.424061] The buggy address belongs to the object at ffff888101afb700 [ 27.424061] which belongs to the cache kmalloc-64 of size 64 [ 27.425160] The buggy address is located 0 bytes to the right of [ 27.425160] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.426544] [ 27.426869] The buggy address belongs to the physical page: [ 27.427600] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.429306] flags: 0x200000000000000(node=0|zone=2) [ 27.430209] page_type: f5(slab) [ 27.431265] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.431996] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.432759] page dumped because: kasan: bad access detected [ 27.433438] [ 27.433618] Memory state around the buggy address: [ 27.434098] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.435246] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.436830] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.437545] ^ [ 27.438089] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.439641] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.440575] ================================================================== [ 30.343384] ================================================================== [ 30.344074] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 30.344768] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.345381] [ 30.345654] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.346685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.347085] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.347936] Call Trace: [ 30.348343] <TASK> [ 30.348676] dump_stack_lvl+0x73/0xb0 [ 30.349198] print_report+0xd1/0x640 [ 30.349514] ? __virt_addr_valid+0x1db/0x2d0 [ 30.350324] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.350833] kasan_report+0x102/0x140 [ 30.351295] ? kasan_atomics_helper+0x5117/0x5450 [ 30.351791] ? kasan_atomics_helper+0x5117/0x5450 [ 30.352255] __asan_report_load8_noabort+0x18/0x20 [ 30.352831] kasan_atomics_helper+0x5117/0x5450 [ 30.353346] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.353777] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.354228] ? __schedule+0xc3e/0x2790 [ 30.354716] ? finish_task_switch.isra.0+0x153/0x700 [ 30.355329] ? kasan_atomics+0x153/0x310 [ 30.355829] kasan_atomics+0x1dd/0x310 [ 30.356340] ? __pfx_kasan_atomics+0x10/0x10 [ 30.356679] ? __pfx_read_tsc+0x10/0x10 [ 30.357209] ? ktime_get_ts64+0x86/0x230 [ 30.357906] kunit_try_run_case+0x1b3/0x490 [ 30.359282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.360537] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.360897] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.361289] ? __kthread_parkme+0x82/0x160 [ 30.361627] ? preempt_count_sub+0x50/0x80 [ 30.361930] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.362783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.363713] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.364472] kthread+0x257/0x310 [ 30.365080] ? __pfx_kthread+0x10/0x10 [ 30.365668] ret_from_fork+0x41/0x80 [ 30.366193] ? __pfx_kthread+0x10/0x10 [ 30.366753] ret_from_fork_asm+0x1a/0x30 [ 30.367187] </TASK> [ 30.367632] [ 30.367923] Allocated by task 273: [ 30.368550] kasan_save_stack+0x3d/0x60 [ 30.369092] kasan_save_track+0x18/0x40 [ 30.369653] kasan_save_alloc_info+0x3b/0x50 [ 30.370512] __kasan_kmalloc+0xb7/0xc0 [ 30.370938] __kmalloc_cache_noprof+0x184/0x410 [ 30.371452] kasan_atomics+0x96/0x310 [ 30.371813] kunit_try_run_case+0x1b3/0x490 [ 30.372352] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.372827] kthread+0x257/0x310 [ 30.373347] ret_from_fork+0x41/0x80 [ 30.373729] ret_from_fork_asm+0x1a/0x30 [ 30.374254] [ 30.374495] The buggy address belongs to the object at ffff888101afb700 [ 30.374495] which belongs to the cache kmalloc-64 of size 64 [ 30.375738] The buggy address is located 0 bytes to the right of [ 30.375738] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.376885] [ 30.377156] The buggy address belongs to the physical page: [ 30.377806] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.378652] flags: 0x200000000000000(node=0|zone=2) [ 30.379112] page_type: f5(slab) [ 30.379575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.380182] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.381003] page dumped because: kasan: bad access detected [ 30.381533] [ 30.381798] Memory state around the buggy address: [ 30.382356] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.383114] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.383781] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.384532] ^ [ 30.385147] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.385785] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.386441] ================================================================== [ 27.085973] ================================================================== [ 27.087431] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 27.088655] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.089189] [ 27.089676] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.090889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.091570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.092714] Call Trace: [ 27.093140] <TASK> [ 27.093442] dump_stack_lvl+0x73/0xb0 [ 27.093838] print_report+0xd1/0x640 [ 27.094239] ? __virt_addr_valid+0x1db/0x2d0 [ 27.094768] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.095386] kasan_report+0x102/0x140 [ 27.095777] ? kasan_atomics_helper+0x4bbe/0x5450 [ 27.096879] ? kasan_atomics_helper+0x4bbe/0x5450 [ 27.097269] __asan_report_load4_noabort+0x18/0x20 [ 27.098155] kasan_atomics_helper+0x4bbe/0x5450 [ 27.099012] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.099540] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.100334] ? __schedule+0xc3e/0x2790 [ 27.101315] ? finish_task_switch.isra.0+0x153/0x700 [ 27.101789] ? kasan_atomics+0x153/0x310 [ 27.102104] kasan_atomics+0x1dd/0x310 [ 27.102489] ? __pfx_kasan_atomics+0x10/0x10 [ 27.102914] ? __pfx_read_tsc+0x10/0x10 [ 27.103407] ? ktime_get_ts64+0x86/0x230 [ 27.103970] kunit_try_run_case+0x1b3/0x490 [ 27.105263] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.105763] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.106593] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.107511] ? __kthread_parkme+0x82/0x160 [ 27.108171] ? preempt_count_sub+0x50/0x80 [ 27.108716] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.109687] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.110606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.111331] kthread+0x257/0x310 [ 27.112146] ? __pfx_kthread+0x10/0x10 [ 27.113143] ret_from_fork+0x41/0x80 [ 27.113683] ? __pfx_kthread+0x10/0x10 [ 27.114136] ret_from_fork_asm+0x1a/0x30 [ 27.115080] </TASK> [ 27.115424] [ 27.116141] Allocated by task 273: [ 27.116803] kasan_save_stack+0x3d/0x60 [ 27.117202] kasan_save_track+0x18/0x40 [ 27.118130] kasan_save_alloc_info+0x3b/0x50 [ 27.118587] __kasan_kmalloc+0xb7/0xc0 [ 27.119126] __kmalloc_cache_noprof+0x184/0x410 [ 27.119763] kasan_atomics+0x96/0x310 [ 27.120980] kunit_try_run_case+0x1b3/0x490 [ 27.121785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.122764] kthread+0x257/0x310 [ 27.123265] ret_from_fork+0x41/0x80 [ 27.123807] ret_from_fork_asm+0x1a/0x30 [ 27.124660] [ 27.124896] The buggy address belongs to the object at ffff888101afb700 [ 27.124896] which belongs to the cache kmalloc-64 of size 64 [ 27.127469] The buggy address is located 0 bytes to the right of [ 27.127469] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.129457] [ 27.129661] The buggy address belongs to the physical page: [ 27.130615] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.131242] flags: 0x200000000000000(node=0|zone=2) [ 27.132080] page_type: f5(slab) [ 27.132987] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.134027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.135070] page dumped because: kasan: bad access detected [ 27.136026] [ 27.136257] Memory state around the buggy address: [ 27.136926] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.138457] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.139535] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.140542] ^ [ 27.141512] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.142108] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.142897] ================================================================== [ 28.230600] ================================================================== [ 28.231544] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 28.232288] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.233089] [ 28.233326] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.234315] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.234806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.235778] Call Trace: [ 28.236048] <TASK> [ 28.236469] dump_stack_lvl+0x73/0xb0 [ 28.236959] print_report+0xd1/0x640 [ 28.237468] ? __virt_addr_valid+0x1db/0x2d0 [ 28.238228] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.238797] kasan_report+0x102/0x140 [ 28.239298] ? kasan_atomics_helper+0x4a86/0x5450 [ 28.240032] ? kasan_atomics_helper+0x4a86/0x5450 [ 28.240420] __asan_report_load4_noabort+0x18/0x20 [ 28.240901] kasan_atomics_helper+0x4a86/0x5450 [ 28.241352] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.242126] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.242650] ? __schedule+0xc3e/0x2790 [ 28.243151] ? finish_task_switch.isra.0+0x153/0x700 [ 28.243632] ? kasan_atomics+0x153/0x310 [ 28.244283] kasan_atomics+0x1dd/0x310 [ 28.244642] ? __pfx_kasan_atomics+0x10/0x10 [ 28.245280] ? __pfx_read_tsc+0x10/0x10 [ 28.245846] ? ktime_get_ts64+0x86/0x230 [ 28.246225] kunit_try_run_case+0x1b3/0x490 [ 28.246743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.247435] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.248091] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.248518] ? __kthread_parkme+0x82/0x160 [ 28.249194] ? preempt_count_sub+0x50/0x80 [ 28.249778] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.250345] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.251369] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.251955] kthread+0x257/0x310 [ 28.252337] ? __pfx_kthread+0x10/0x10 [ 28.252894] ret_from_fork+0x41/0x80 [ 28.253346] ? __pfx_kthread+0x10/0x10 [ 28.253882] ret_from_fork_asm+0x1a/0x30 [ 28.254294] </TASK> [ 28.254642] [ 28.254934] Allocated by task 273: [ 28.255273] kasan_save_stack+0x3d/0x60 [ 28.255804] kasan_save_track+0x18/0x40 [ 28.256431] kasan_save_alloc_info+0x3b/0x50 [ 28.257019] __kasan_kmalloc+0xb7/0xc0 [ 28.257351] __kmalloc_cache_noprof+0x184/0x410 [ 28.257886] kasan_atomics+0x96/0x310 [ 28.258517] kunit_try_run_case+0x1b3/0x490 [ 28.258859] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.259464] kthread+0x257/0x310 [ 28.259737] ret_from_fork+0x41/0x80 [ 28.260167] ret_from_fork_asm+0x1a/0x30 [ 28.260481] [ 28.260852] The buggy address belongs to the object at ffff888101afb700 [ 28.260852] which belongs to the cache kmalloc-64 of size 64 [ 28.262234] The buggy address is located 0 bytes to the right of [ 28.262234] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.263292] [ 28.263578] The buggy address belongs to the physical page: [ 28.263975] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.264914] flags: 0x200000000000000(node=0|zone=2) [ 28.265328] page_type: f5(slab) [ 28.265628] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.266709] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.267616] page dumped because: kasan: bad access detected [ 28.268845] [ 28.269118] Memory state around the buggy address: [ 28.269659] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.270259] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.271495] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.272472] ^ [ 28.273432] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.274333] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.275165] ================================================================== [ 29.145983] ================================================================== [ 29.146509] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 29.147253] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.147804] [ 29.148120] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.148988] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.149323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.150105] Call Trace: [ 29.150393] <TASK> [ 29.150675] dump_stack_lvl+0x73/0xb0 [ 29.151214] print_report+0xd1/0x640 [ 29.151576] ? __virt_addr_valid+0x1db/0x2d0 [ 29.152094] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.152635] kasan_report+0x102/0x140 [ 29.153022] ? kasan_atomics_helper+0x151e/0x5450 [ 29.153604] ? kasan_atomics_helper+0x151e/0x5450 [ 29.154026] kasan_check_range+0x10c/0x1c0 [ 29.154567] __kasan_check_write+0x18/0x20 [ 29.155131] kasan_atomics_helper+0x151e/0x5450 [ 29.155490] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.156104] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.156461] ? __schedule+0xc3e/0x2790 [ 29.156957] ? finish_task_switch.isra.0+0x153/0x700 [ 29.157489] ? kasan_atomics+0x153/0x310 [ 29.157883] kasan_atomics+0x1dd/0x310 [ 29.158402] ? __pfx_kasan_atomics+0x10/0x10 [ 29.158806] ? __pfx_read_tsc+0x10/0x10 [ 29.159195] ? ktime_get_ts64+0x86/0x230 [ 29.159692] kunit_try_run_case+0x1b3/0x490 [ 29.160250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.160654] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.161131] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.161571] ? __kthread_parkme+0x82/0x160 [ 29.162062] ? preempt_count_sub+0x50/0x80 [ 29.162396] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.162955] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.163648] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.164317] kthread+0x257/0x310 [ 29.164656] ? __pfx_kthread+0x10/0x10 [ 29.164988] ret_from_fork+0x41/0x80 [ 29.165266] ? __pfx_kthread+0x10/0x10 [ 29.165589] ret_from_fork_asm+0x1a/0x30 [ 29.166180] </TASK> [ 29.166541] [ 29.166808] Allocated by task 273: [ 29.167317] kasan_save_stack+0x3d/0x60 [ 29.167739] kasan_save_track+0x18/0x40 [ 29.168211] kasan_save_alloc_info+0x3b/0x50 [ 29.168738] __kasan_kmalloc+0xb7/0xc0 [ 29.169156] __kmalloc_cache_noprof+0x184/0x410 [ 29.169667] kasan_atomics+0x96/0x310 [ 29.170048] kunit_try_run_case+0x1b3/0x490 [ 29.170555] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.171089] kthread+0x257/0x310 [ 29.171437] ret_from_fork+0x41/0x80 [ 29.171963] ret_from_fork_asm+0x1a/0x30 [ 29.172389] [ 29.172611] The buggy address belongs to the object at ffff888101afb700 [ 29.172611] which belongs to the cache kmalloc-64 of size 64 [ 29.173649] The buggy address is located 0 bytes to the right of [ 29.173649] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.174363] [ 29.174565] The buggy address belongs to the physical page: [ 29.175243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.176182] flags: 0x200000000000000(node=0|zone=2) [ 29.176713] page_type: f5(slab) [ 29.177097] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.177748] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.178384] page dumped because: kasan: bad access detected [ 29.178851] [ 29.179135] Memory state around the buggy address: [ 29.179666] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.180201] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.180879] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.181340] ^ [ 29.181890] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.182771] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.183367] ================================================================== [ 27.321718] ================================================================== [ 27.322432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 27.323070] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.324482] [ 27.324690] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.326428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.327065] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.328726] Call Trace: [ 27.328956] <TASK> [ 27.329136] dump_stack_lvl+0x73/0xb0 [ 27.329472] print_report+0xd1/0x640 [ 27.329844] ? __virt_addr_valid+0x1db/0x2d0 [ 27.330792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.332321] kasan_report+0x102/0x140 [ 27.332897] ? kasan_atomics_helper+0x3e0/0x5450 [ 27.333372] ? kasan_atomics_helper+0x3e0/0x5450 [ 27.333832] kasan_check_range+0x10c/0x1c0 [ 27.334530] __kasan_check_read+0x15/0x20 [ 27.335278] kasan_atomics_helper+0x3e0/0x5450 [ 27.336464] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.336837] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.337802] ? __schedule+0xc3e/0x2790 [ 27.338481] ? finish_task_switch.isra.0+0x153/0x700 [ 27.338797] ? kasan_atomics+0x153/0x310 [ 27.339686] kasan_atomics+0x1dd/0x310 [ 27.340655] ? __pfx_kasan_atomics+0x10/0x10 [ 27.340971] ? __pfx_read_tsc+0x10/0x10 [ 27.341680] ? ktime_get_ts64+0x86/0x230 [ 27.342283] kunit_try_run_case+0x1b3/0x490 [ 27.343646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.344083] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.344942] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.345933] ? __kthread_parkme+0x82/0x160 [ 27.346426] ? preempt_count_sub+0x50/0x80 [ 27.346663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.347297] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.348591] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.350106] kthread+0x257/0x310 [ 27.351013] ? __pfx_kthread+0x10/0x10 [ 27.351648] ret_from_fork+0x41/0x80 [ 27.352066] ? __pfx_kthread+0x10/0x10 [ 27.352492] ret_from_fork_asm+0x1a/0x30 [ 27.353118] </TASK> [ 27.354148] [ 27.354507] Allocated by task 273: [ 27.354775] kasan_save_stack+0x3d/0x60 [ 27.355333] kasan_save_track+0x18/0x40 [ 27.355694] kasan_save_alloc_info+0x3b/0x50 [ 27.356330] __kasan_kmalloc+0xb7/0xc0 [ 27.356680] __kmalloc_cache_noprof+0x184/0x410 [ 27.357180] kasan_atomics+0x96/0x310 [ 27.357557] kunit_try_run_case+0x1b3/0x490 [ 27.358269] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.359051] kthread+0x257/0x310 [ 27.359569] ret_from_fork+0x41/0x80 [ 27.359887] ret_from_fork_asm+0x1a/0x30 [ 27.361015] [ 27.361220] The buggy address belongs to the object at ffff888101afb700 [ 27.361220] which belongs to the cache kmalloc-64 of size 64 [ 27.363152] The buggy address is located 0 bytes to the right of [ 27.363152] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.364895] [ 27.365094] The buggy address belongs to the physical page: [ 27.365449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.367373] flags: 0x200000000000000(node=0|zone=2) [ 27.368029] page_type: f5(slab) [ 27.369346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.370121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.370844] page dumped because: kasan: bad access detected [ 27.372091] [ 27.372439] Memory state around the buggy address: [ 27.373369] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.375071] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.376034] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.376700] ^ [ 27.378239] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.379390] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.380499] ================================================================== [ 29.718012] ================================================================== [ 29.718814] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 29.719750] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.720513] [ 29.720977] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.722076] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.723241] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.724076] Call Trace: [ 29.724297] <TASK> [ 29.724832] dump_stack_lvl+0x73/0xb0 [ 29.725305] print_report+0xd1/0x640 [ 29.725807] ? __virt_addr_valid+0x1db/0x2d0 [ 29.726607] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.726999] kasan_report+0x102/0x140 [ 29.727548] ? kasan_atomics_helper+0x4f32/0x5450 [ 29.728211] ? kasan_atomics_helper+0x4f32/0x5450 [ 29.728718] __asan_report_load8_noabort+0x18/0x20 [ 29.729348] kasan_atomics_helper+0x4f32/0x5450 [ 29.729799] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.730392] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.730970] ? __schedule+0xc3e/0x2790 [ 29.731288] ? finish_task_switch.isra.0+0x153/0x700 [ 29.731966] ? kasan_atomics+0x153/0x310 [ 29.732438] kasan_atomics+0x1dd/0x310 [ 29.732970] ? __pfx_kasan_atomics+0x10/0x10 [ 29.733518] ? __pfx_read_tsc+0x10/0x10 [ 29.733832] ? ktime_get_ts64+0x86/0x230 [ 29.734234] kunit_try_run_case+0x1b3/0x490 [ 29.734833] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.735715] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.736043] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.736713] ? __kthread_parkme+0x82/0x160 [ 29.737261] ? preempt_count_sub+0x50/0x80 [ 29.737664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.738181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.738766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.739363] kthread+0x257/0x310 [ 29.739813] ? __pfx_kthread+0x10/0x10 [ 29.740335] ret_from_fork+0x41/0x80 [ 29.740770] ? __pfx_kthread+0x10/0x10 [ 29.741248] ret_from_fork_asm+0x1a/0x30 [ 29.741779] </TASK> [ 29.742060] [ 29.742369] Allocated by task 273: [ 29.742831] kasan_save_stack+0x3d/0x60 [ 29.743583] kasan_save_track+0x18/0x40 [ 29.743945] kasan_save_alloc_info+0x3b/0x50 [ 29.744546] __kasan_kmalloc+0xb7/0xc0 [ 29.744904] __kmalloc_cache_noprof+0x184/0x410 [ 29.745224] kasan_atomics+0x96/0x310 [ 29.745968] kunit_try_run_case+0x1b3/0x490 [ 29.746425] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.746999] kthread+0x257/0x310 [ 29.747445] ret_from_fork+0x41/0x80 [ 29.747831] ret_from_fork_asm+0x1a/0x30 [ 29.748305] [ 29.748625] The buggy address belongs to the object at ffff888101afb700 [ 29.748625] which belongs to the cache kmalloc-64 of size 64 [ 29.749653] The buggy address is located 0 bytes to the right of [ 29.749653] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.750838] [ 29.751227] The buggy address belongs to the physical page: [ 29.751633] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.752646] flags: 0x200000000000000(node=0|zone=2) [ 29.752977] page_type: f5(slab) [ 29.753319] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.754078] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.755138] page dumped because: kasan: bad access detected [ 29.755629] [ 29.755936] Memory state around the buggy address: [ 29.756641] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.757188] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.757900] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.759251] ^ [ 29.759642] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.760434] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.760915] ================================================================== [ 29.988119] ================================================================== [ 29.989550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 29.990196] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.991757] [ 29.992294] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.993623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.994008] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.995334] Call Trace: [ 29.995579] <TASK> [ 29.996348] dump_stack_lvl+0x73/0xb0 [ 29.996776] print_report+0xd1/0x640 [ 29.997377] ? __virt_addr_valid+0x1db/0x2d0 [ 29.998051] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.998535] kasan_report+0x102/0x140 [ 29.998903] ? kasan_atomics_helper+0x4f73/0x5450 [ 29.999822] ? kasan_atomics_helper+0x4f73/0x5450 [ 30.000326] __asan_report_load8_noabort+0x18/0x20 [ 30.000956] kasan_atomics_helper+0x4f73/0x5450 [ 30.001704] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.002398] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.003004] ? __schedule+0xc3e/0x2790 [ 30.003497] ? finish_task_switch.isra.0+0x153/0x700 [ 30.004001] ? kasan_atomics+0x153/0x310 [ 30.004798] kasan_atomics+0x1dd/0x310 [ 30.005436] ? __pfx_kasan_atomics+0x10/0x10 [ 30.006084] ? __pfx_read_tsc+0x10/0x10 [ 30.006532] ? ktime_get_ts64+0x86/0x230 [ 30.006934] kunit_try_run_case+0x1b3/0x490 [ 30.007690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.008032] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.008810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.009725] ? __kthread_parkme+0x82/0x160 [ 30.010111] ? preempt_count_sub+0x50/0x80 [ 30.010708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.011353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.012118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.012820] kthread+0x257/0x310 [ 30.013313] ? __pfx_kthread+0x10/0x10 [ 30.013959] ret_from_fork+0x41/0x80 [ 30.014440] ? __pfx_kthread+0x10/0x10 [ 30.015157] ret_from_fork_asm+0x1a/0x30 [ 30.015830] </TASK> [ 30.015964] [ 30.016147] Allocated by task 273: [ 30.017014] kasan_save_stack+0x3d/0x60 [ 30.017296] kasan_save_track+0x18/0x40 [ 30.017797] kasan_save_alloc_info+0x3b/0x50 [ 30.018706] __kasan_kmalloc+0xb7/0xc0 [ 30.018992] __kmalloc_cache_noprof+0x184/0x410 [ 30.019574] kasan_atomics+0x96/0x310 [ 30.020287] kunit_try_run_case+0x1b3/0x490 [ 30.020797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.021705] kthread+0x257/0x310 [ 30.022245] ret_from_fork+0x41/0x80 [ 30.022747] ret_from_fork_asm+0x1a/0x30 [ 30.023400] [ 30.023849] The buggy address belongs to the object at ffff888101afb700 [ 30.023849] which belongs to the cache kmalloc-64 of size 64 [ 30.025189] The buggy address is located 0 bytes to the right of [ 30.025189] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.026720] [ 30.026887] The buggy address belongs to the physical page: [ 30.027549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.028328] flags: 0x200000000000000(node=0|zone=2) [ 30.028816] page_type: f5(slab) [ 30.029290] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.030198] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.030894] page dumped because: kasan: bad access detected [ 30.031552] [ 30.031753] Memory state around the buggy address: [ 30.032383] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.033108] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.033894] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.034611] ^ [ 30.035187] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.035907] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.036452] ================================================================== [ 27.442669] ================================================================== [ 27.443961] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 27.444305] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.445954] [ 27.446441] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.447223] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.448030] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.449639] Call Trace: [ 27.450409] <TASK> [ 27.450640] dump_stack_lvl+0x73/0xb0 [ 27.451006] print_report+0xd1/0x640 [ 27.451354] ? __virt_addr_valid+0x1db/0x2d0 [ 27.452057] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.453338] kasan_report+0x102/0x140 [ 27.454438] ? kasan_atomics_helper+0x4a1/0x5450 [ 27.455031] ? kasan_atomics_helper+0x4a1/0x5450 [ 27.455921] kasan_check_range+0x10c/0x1c0 [ 27.456867] __kasan_check_write+0x18/0x20 [ 27.457434] kasan_atomics_helper+0x4a1/0x5450 [ 27.458005] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.458460] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.459206] ? __schedule+0xc3e/0x2790 [ 27.460161] ? finish_task_switch.isra.0+0x153/0x700 [ 27.460777] ? kasan_atomics+0x153/0x310 [ 27.461348] kasan_atomics+0x1dd/0x310 [ 27.462083] ? __pfx_kasan_atomics+0x10/0x10 [ 27.462466] ? __pfx_read_tsc+0x10/0x10 [ 27.463266] ? ktime_get_ts64+0x86/0x230 [ 27.464520] kunit_try_run_case+0x1b3/0x490 [ 27.465167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.465884] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.466442] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.466916] ? __kthread_parkme+0x82/0x160 [ 27.467302] ? preempt_count_sub+0x50/0x80 [ 27.468062] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.468815] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.469525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.470201] kthread+0x257/0x310 [ 27.471201] ? __pfx_kthread+0x10/0x10 [ 27.472023] ret_from_fork+0x41/0x80 [ 27.472708] ? __pfx_kthread+0x10/0x10 [ 27.473208] ret_from_fork_asm+0x1a/0x30 [ 27.473856] </TASK> [ 27.474164] [ 27.474943] Allocated by task 273: [ 27.475681] kasan_save_stack+0x3d/0x60 [ 27.476253] kasan_save_track+0x18/0x40 [ 27.477051] kasan_save_alloc_info+0x3b/0x50 [ 27.477723] __kasan_kmalloc+0xb7/0xc0 [ 27.478097] __kmalloc_cache_noprof+0x184/0x410 [ 27.478919] kasan_atomics+0x96/0x310 [ 27.479223] kunit_try_run_case+0x1b3/0x490 [ 27.479996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.481119] kthread+0x257/0x310 [ 27.481711] ret_from_fork+0x41/0x80 [ 27.482678] ret_from_fork_asm+0x1a/0x30 [ 27.483698] [ 27.484132] The buggy address belongs to the object at ffff888101afb700 [ 27.484132] which belongs to the cache kmalloc-64 of size 64 [ 27.485886] The buggy address is located 0 bytes to the right of [ 27.485886] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.487861] [ 27.488097] The buggy address belongs to the physical page: [ 27.489185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.490527] flags: 0x200000000000000(node=0|zone=2) [ 27.491042] page_type: f5(slab) [ 27.491469] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.492945] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.493429] page dumped because: kasan: bad access detected [ 27.494627] [ 27.495265] Memory state around the buggy address: [ 27.496002] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.496681] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.497715] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.498396] ^ [ 27.499179] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.500002] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.500608] ================================================================== [ 28.752215] ================================================================== [ 28.753454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 28.754222] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.754866] [ 28.755152] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.756486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.756773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.757568] Call Trace: [ 28.757891] <TASK> [ 28.758577] dump_stack_lvl+0x73/0xb0 [ 28.758967] print_report+0xd1/0x640 [ 28.759331] ? __virt_addr_valid+0x1db/0x2d0 [ 28.759745] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.760661] kasan_report+0x102/0x140 [ 28.761009] ? kasan_atomics_helper+0x1218/0x5450 [ 28.761385] ? kasan_atomics_helper+0x1218/0x5450 [ 28.762043] kasan_check_range+0x10c/0x1c0 [ 28.762478] __kasan_check_write+0x18/0x20 [ 28.762966] kasan_atomics_helper+0x1218/0x5450 [ 28.763803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.764360] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.765054] ? __schedule+0xc3e/0x2790 [ 28.765576] ? finish_task_switch.isra.0+0x153/0x700 [ 28.766604] ? kasan_atomics+0x153/0x310 [ 28.767258] kasan_atomics+0x1dd/0x310 [ 28.767851] ? __pfx_kasan_atomics+0x10/0x10 [ 28.768292] ? __pfx_read_tsc+0x10/0x10 [ 28.768653] ? ktime_get_ts64+0x86/0x230 [ 28.769647] kunit_try_run_case+0x1b3/0x490 [ 28.770181] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.770845] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.771740] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.772520] ? __kthread_parkme+0x82/0x160 [ 28.772952] ? preempt_count_sub+0x50/0x80 [ 28.773786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.774928] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.775826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.776716] kthread+0x257/0x310 [ 28.777265] ? __pfx_kthread+0x10/0x10 [ 28.777731] ret_from_fork+0x41/0x80 [ 28.778667] ? __pfx_kthread+0x10/0x10 [ 28.779224] ret_from_fork_asm+0x1a/0x30 [ 28.779782] </TASK> [ 28.780001] [ 28.780391] Allocated by task 273: [ 28.780810] kasan_save_stack+0x3d/0x60 [ 28.781603] kasan_save_track+0x18/0x40 [ 28.782364] kasan_save_alloc_info+0x3b/0x50 [ 28.783136] __kasan_kmalloc+0xb7/0xc0 [ 28.783550] __kmalloc_cache_noprof+0x184/0x410 [ 28.784580] kasan_atomics+0x96/0x310 [ 28.785519] kunit_try_run_case+0x1b3/0x490 [ 28.786333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.786701] kthread+0x257/0x310 [ 28.787112] ret_from_fork+0x41/0x80 [ 28.787735] ret_from_fork_asm+0x1a/0x30 [ 28.788183] [ 28.788472] The buggy address belongs to the object at ffff888101afb700 [ 28.788472] which belongs to the cache kmalloc-64 of size 64 [ 28.789465] The buggy address is located 0 bytes to the right of [ 28.789465] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.790751] [ 28.791042] The buggy address belongs to the physical page: [ 28.791393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.792328] flags: 0x200000000000000(node=0|zone=2) [ 28.792686] page_type: f5(slab) [ 28.792988] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.793889] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.794480] page dumped because: kasan: bad access detected [ 28.795311] [ 28.795593] Memory state around the buggy address: [ 28.795988] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.796761] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.797496] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.797932] ^ [ 28.798716] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.799322] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.800072] ================================================================== [ 28.082572] ================================================================== [ 28.083488] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 28.085434] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.086445] [ 28.086650] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.088177] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.088625] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.089605] Call Trace: [ 28.090005] <TASK> [ 28.090414] dump_stack_lvl+0x73/0xb0 [ 28.090981] print_report+0xd1/0x640 [ 28.091642] ? __virt_addr_valid+0x1db/0x2d0 [ 28.092343] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.092823] kasan_report+0x102/0x140 [ 28.093667] ? kasan_atomics_helper+0xac8/0x5450 [ 28.094341] ? kasan_atomics_helper+0xac8/0x5450 [ 28.095072] kasan_check_range+0x10c/0x1c0 [ 28.095901] __kasan_check_write+0x18/0x20 [ 28.096258] kasan_atomics_helper+0xac8/0x5450 [ 28.097007] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.098185] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.098621] ? __schedule+0xc3e/0x2790 [ 28.099440] ? finish_task_switch.isra.0+0x153/0x700 [ 28.100061] ? kasan_atomics+0x153/0x310 [ 28.100516] kasan_atomics+0x1dd/0x310 [ 28.101631] ? __pfx_kasan_atomics+0x10/0x10 [ 28.102036] ? __pfx_read_tsc+0x10/0x10 [ 28.102460] ? ktime_get_ts64+0x86/0x230 [ 28.103169] kunit_try_run_case+0x1b3/0x490 [ 28.103914] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.104347] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.105030] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.105639] ? __kthread_parkme+0x82/0x160 [ 28.106285] ? preempt_count_sub+0x50/0x80 [ 28.106746] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.107304] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.108013] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.108578] kthread+0x257/0x310 [ 28.108999] ? __pfx_kthread+0x10/0x10 [ 28.109438] ret_from_fork+0x41/0x80 [ 28.109896] ? __pfx_kthread+0x10/0x10 [ 28.110406] ret_from_fork_asm+0x1a/0x30 [ 28.110736] </TASK> [ 28.111241] [ 28.111423] Allocated by task 273: [ 28.111631] kasan_save_stack+0x3d/0x60 [ 28.111888] kasan_save_track+0x18/0x40 [ 28.112598] kasan_save_alloc_info+0x3b/0x50 [ 28.113464] __kasan_kmalloc+0xb7/0xc0 [ 28.114134] __kmalloc_cache_noprof+0x184/0x410 [ 28.115065] kasan_atomics+0x96/0x310 [ 28.115713] kunit_try_run_case+0x1b3/0x490 [ 28.116139] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.116726] kthread+0x257/0x310 [ 28.117202] ret_from_fork+0x41/0x80 [ 28.117623] ret_from_fork_asm+0x1a/0x30 [ 28.118085] [ 28.118403] The buggy address belongs to the object at ffff888101afb700 [ 28.118403] which belongs to the cache kmalloc-64 of size 64 [ 28.119438] The buggy address is located 0 bytes to the right of [ 28.119438] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.120542] [ 28.120800] The buggy address belongs to the physical page: [ 28.121393] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.122010] flags: 0x200000000000000(node=0|zone=2) [ 28.122588] page_type: f5(slab) [ 28.122887] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.123852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.124576] page dumped because: kasan: bad access detected [ 28.125218] [ 28.125551] Memory state around the buggy address: [ 28.126020] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.126944] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.127572] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.128227] ^ [ 28.128951] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.129405] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.130090] ================================================================== [ 28.325783] ================================================================== [ 28.326879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 28.327627] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.328511] [ 28.328746] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.329757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.330271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.331131] Call Trace: [ 28.331419] <TASK> [ 28.331745] dump_stack_lvl+0x73/0xb0 [ 28.332242] print_report+0xd1/0x640 [ 28.332617] ? __virt_addr_valid+0x1db/0x2d0 [ 28.332959] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.333627] kasan_report+0x102/0x140 [ 28.334148] ? kasan_atomics_helper+0xde1/0x5450 [ 28.334701] ? kasan_atomics_helper+0xde1/0x5450 [ 28.335200] kasan_check_range+0x10c/0x1c0 [ 28.335700] __kasan_check_write+0x18/0x20 [ 28.336163] kasan_atomics_helper+0xde1/0x5450 [ 28.336585] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.337152] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.337537] ? __schedule+0xc3e/0x2790 [ 28.338087] ? finish_task_switch.isra.0+0x153/0x700 [ 28.338674] ? kasan_atomics+0x153/0x310 [ 28.339277] kasan_atomics+0x1dd/0x310 [ 28.339624] ? __pfx_kasan_atomics+0x10/0x10 [ 28.340178] ? __pfx_read_tsc+0x10/0x10 [ 28.340589] ? ktime_get_ts64+0x86/0x230 [ 28.341015] kunit_try_run_case+0x1b3/0x490 [ 28.341460] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.341983] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.342537] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.342966] ? __kthread_parkme+0x82/0x160 [ 28.343445] ? preempt_count_sub+0x50/0x80 [ 28.343755] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.344253] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.345055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.345728] kthread+0x257/0x310 [ 28.346182] ? __pfx_kthread+0x10/0x10 [ 28.346542] ret_from_fork+0x41/0x80 [ 28.347015] ? __pfx_kthread+0x10/0x10 [ 28.347337] ret_from_fork_asm+0x1a/0x30 [ 28.347883] </TASK> [ 28.348181] [ 28.348384] Allocated by task 273: [ 28.348780] kasan_save_stack+0x3d/0x60 [ 28.349201] kasan_save_track+0x18/0x40 [ 28.349516] kasan_save_alloc_info+0x3b/0x50 [ 28.349873] __kasan_kmalloc+0xb7/0xc0 [ 28.350275] __kmalloc_cache_noprof+0x184/0x410 [ 28.350895] kasan_atomics+0x96/0x310 [ 28.351390] kunit_try_run_case+0x1b3/0x490 [ 28.351932] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.353524] kthread+0x257/0x310 [ 28.354027] ret_from_fork+0x41/0x80 [ 28.354343] ret_from_fork_asm+0x1a/0x30 [ 28.354775] [ 28.355685] The buggy address belongs to the object at ffff888101afb700 [ 28.355685] which belongs to the cache kmalloc-64 of size 64 [ 28.357167] The buggy address is located 0 bytes to the right of [ 28.357167] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.358385] [ 28.358678] The buggy address belongs to the physical page: [ 28.359256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.359979] flags: 0x200000000000000(node=0|zone=2) [ 28.360347] page_type: f5(slab) [ 28.360768] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.361345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.362116] page dumped because: kasan: bad access detected [ 28.362488] [ 28.362724] Memory state around the buggy address: [ 28.363278] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.363764] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.364579] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.365250] ^ [ 28.365711] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.366305] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.367001] ================================================================== [ 29.464204] ================================================================== [ 29.465711] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 29.467590] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.468595] [ 29.468843] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.469751] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.469939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.470719] Call Trace: [ 29.471106] <TASK> [ 29.471476] dump_stack_lvl+0x73/0xb0 [ 29.472218] print_report+0xd1/0x640 [ 29.472730] ? __virt_addr_valid+0x1db/0x2d0 [ 29.473781] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.474436] kasan_report+0x102/0x140 [ 29.474659] ? kasan_atomics_helper+0x194b/0x5450 [ 29.474877] ? kasan_atomics_helper+0x194b/0x5450 [ 29.475204] kasan_check_range+0x10c/0x1c0 [ 29.475927] __kasan_check_write+0x18/0x20 [ 29.476907] kasan_atomics_helper+0x194b/0x5450 [ 29.477578] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.478166] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.478664] ? __schedule+0xc3e/0x2790 [ 29.479289] ? finish_task_switch.isra.0+0x153/0x700 [ 29.479752] ? kasan_atomics+0x153/0x310 [ 29.480544] kasan_atomics+0x1dd/0x310 [ 29.481171] ? __pfx_kasan_atomics+0x10/0x10 [ 29.481697] ? __pfx_read_tsc+0x10/0x10 [ 29.482015] ? ktime_get_ts64+0x86/0x230 [ 29.482534] kunit_try_run_case+0x1b3/0x490 [ 29.482956] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.483368] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.483920] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.484442] ? __kthread_parkme+0x82/0x160 [ 29.484807] ? preempt_count_sub+0x50/0x80 [ 29.485386] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.485930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.486814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.487571] kthread+0x257/0x310 [ 29.487992] ? __pfx_kthread+0x10/0x10 [ 29.488497] ret_from_fork+0x41/0x80 [ 29.489159] ? __pfx_kthread+0x10/0x10 [ 29.489458] ret_from_fork_asm+0x1a/0x30 [ 29.490249] </TASK> [ 29.490736] [ 29.490951] Allocated by task 273: [ 29.491832] kasan_save_stack+0x3d/0x60 [ 29.492218] kasan_save_track+0x18/0x40 [ 29.492805] kasan_save_alloc_info+0x3b/0x50 [ 29.493171] __kasan_kmalloc+0xb7/0xc0 [ 29.493625] __kmalloc_cache_noprof+0x184/0x410 [ 29.494241] kasan_atomics+0x96/0x310 [ 29.494685] kunit_try_run_case+0x1b3/0x490 [ 29.495015] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.495710] kthread+0x257/0x310 [ 29.496453] ret_from_fork+0x41/0x80 [ 29.496885] ret_from_fork_asm+0x1a/0x30 [ 29.497579] [ 29.497739] The buggy address belongs to the object at ffff888101afb700 [ 29.497739] which belongs to the cache kmalloc-64 of size 64 [ 29.498808] The buggy address is located 0 bytes to the right of [ 29.498808] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.500371] [ 29.500643] The buggy address belongs to the physical page: [ 29.501077] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.501970] flags: 0x200000000000000(node=0|zone=2) [ 29.502675] page_type: f5(slab) [ 29.502951] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.503823] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.504348] page dumped because: kasan: bad access detected [ 29.505282] [ 29.505589] Memory state around the buggy address: [ 29.506012] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.506782] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.507368] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.508148] ^ [ 29.508622] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.509289] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.510312] ================================================================== [ 28.619540] ================================================================== [ 28.620192] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 28.621248] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.622298] [ 28.622561] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.623727] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.624745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.625918] Call Trace: [ 28.626311] <TASK> [ 28.626506] dump_stack_lvl+0x73/0xb0 [ 28.626729] print_report+0xd1/0x640 [ 28.626962] ? __virt_addr_valid+0x1db/0x2d0 [ 28.627739] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.628597] kasan_report+0x102/0x140 [ 28.628960] ? kasan_atomics_helper+0x4a1e/0x5450 [ 28.629464] ? kasan_atomics_helper+0x4a1e/0x5450 [ 28.629815] __asan_report_load4_noabort+0x18/0x20 [ 28.630484] kasan_atomics_helper+0x4a1e/0x5450 [ 28.630910] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.631631] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.632400] ? __schedule+0xc3e/0x2790 [ 28.632837] ? finish_task_switch.isra.0+0x153/0x700 [ 28.633894] ? kasan_atomics+0x153/0x310 [ 28.634293] kasan_atomics+0x1dd/0x310 [ 28.634675] ? __pfx_kasan_atomics+0x10/0x10 [ 28.635109] ? __pfx_read_tsc+0x10/0x10 [ 28.635645] ? ktime_get_ts64+0x86/0x230 [ 28.636170] kunit_try_run_case+0x1b3/0x490 [ 28.636602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.637382] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.637810] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.638650] ? __kthread_parkme+0x82/0x160 [ 28.639309] ? preempt_count_sub+0x50/0x80 [ 28.639955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.640563] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.641264] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.641992] kthread+0x257/0x310 [ 28.642232] ? __pfx_kthread+0x10/0x10 [ 28.642955] ret_from_fork+0x41/0x80 [ 28.643477] ? __pfx_kthread+0x10/0x10 [ 28.643982] ret_from_fork_asm+0x1a/0x30 [ 28.644597] </TASK> [ 28.645062] [ 28.645296] Allocated by task 273: [ 28.645765] kasan_save_stack+0x3d/0x60 [ 28.646307] kasan_save_track+0x18/0x40 [ 28.646936] kasan_save_alloc_info+0x3b/0x50 [ 28.647634] __kasan_kmalloc+0xb7/0xc0 [ 28.648140] __kmalloc_cache_noprof+0x184/0x410 [ 28.648738] kasan_atomics+0x96/0x310 [ 28.649283] kunit_try_run_case+0x1b3/0x490 [ 28.649851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.650534] kthread+0x257/0x310 [ 28.651098] ret_from_fork+0x41/0x80 [ 28.651527] ret_from_fork_asm+0x1a/0x30 [ 28.652106] [ 28.652358] The buggy address belongs to the object at ffff888101afb700 [ 28.652358] which belongs to the cache kmalloc-64 of size 64 [ 28.653379] The buggy address is located 0 bytes to the right of [ 28.653379] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.654612] [ 28.654897] The buggy address belongs to the physical page: [ 28.655528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.656273] flags: 0x200000000000000(node=0|zone=2) [ 28.656666] page_type: f5(slab) [ 28.657005] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.657681] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.658622] page dumped because: kasan: bad access detected [ 28.659104] [ 28.659360] Memory state around the buggy address: [ 28.660126] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.660663] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.661484] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.662226] ^ [ 28.662820] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.663567] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.664327] ================================================================== [ 27.900836] ================================================================== [ 27.901428] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 27.902404] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.903134] [ 27.903596] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.904464] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.905136] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.906023] Call Trace: [ 27.906240] <TASK> [ 27.907395] dump_stack_lvl+0x73/0xb0 [ 27.907855] print_report+0xd1/0x640 [ 27.908294] ? __virt_addr_valid+0x1db/0x2d0 [ 27.909201] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.909696] kasan_report+0x102/0x140 [ 27.910560] ? kasan_atomics_helper+0x8fa/0x5450 [ 27.911154] ? kasan_atomics_helper+0x8fa/0x5450 [ 27.911727] kasan_check_range+0x10c/0x1c0 [ 27.912249] __kasan_check_write+0x18/0x20 [ 27.913024] kasan_atomics_helper+0x8fa/0x5450 [ 27.913404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.914930] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.915557] ? __schedule+0xc3e/0x2790 [ 27.916240] ? finish_task_switch.isra.0+0x153/0x700 [ 27.916832] ? kasan_atomics+0x153/0x310 [ 27.917685] kasan_atomics+0x1dd/0x310 [ 27.918276] ? __pfx_kasan_atomics+0x10/0x10 [ 27.918908] ? __pfx_read_tsc+0x10/0x10 [ 27.919474] ? ktime_get_ts64+0x86/0x230 [ 27.919819] kunit_try_run_case+0x1b3/0x490 [ 27.920770] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.921567] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.922190] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.922789] ? __kthread_parkme+0x82/0x160 [ 27.923977] ? preempt_count_sub+0x50/0x80 [ 27.924272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.924912] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.925755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.926749] kthread+0x257/0x310 [ 27.927278] ? __pfx_kthread+0x10/0x10 [ 27.928035] ret_from_fork+0x41/0x80 [ 27.928430] ? __pfx_kthread+0x10/0x10 [ 27.928861] ret_from_fork_asm+0x1a/0x30 [ 27.930139] </TASK> [ 27.930967] [ 27.931112] Allocated by task 273: [ 27.931303] kasan_save_stack+0x3d/0x60 [ 27.931853] kasan_save_track+0x18/0x40 [ 27.933511] kasan_save_alloc_info+0x3b/0x50 [ 27.934088] __kasan_kmalloc+0xb7/0xc0 [ 27.935230] __kmalloc_cache_noprof+0x184/0x410 [ 27.936581] kasan_atomics+0x96/0x310 [ 27.937163] kunit_try_run_case+0x1b3/0x490 [ 27.937499] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.938964] kthread+0x257/0x310 [ 27.939286] ret_from_fork+0x41/0x80 [ 27.940704] ret_from_fork_asm+0x1a/0x30 [ 27.941195] [ 27.941587] The buggy address belongs to the object at ffff888101afb700 [ 27.941587] which belongs to the cache kmalloc-64 of size 64 [ 27.943044] The buggy address is located 0 bytes to the right of [ 27.943044] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.944466] [ 27.945230] The buggy address belongs to the physical page: [ 27.946485] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.947591] flags: 0x200000000000000(node=0|zone=2) [ 27.948265] page_type: f5(slab) [ 27.948588] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.949568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.950268] page dumped because: kasan: bad access detected [ 27.952120] [ 27.952489] Memory state around the buggy address: [ 27.953084] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.954063] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.954811] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.955728] ^ [ 27.956558] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.957905] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.958729] ================================================================== [ 29.049756] ================================================================== [ 29.050153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 29.051296] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.053192] [ 29.053553] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.055264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.055651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.056960] Call Trace: [ 29.057306] <TASK> [ 29.057840] dump_stack_lvl+0x73/0xb0 [ 29.058294] print_report+0xd1/0x640 [ 29.058735] ? __virt_addr_valid+0x1db/0x2d0 [ 29.059789] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.060363] kasan_report+0x102/0x140 [ 29.061048] ? kasan_atomics_helper+0x1468/0x5450 [ 29.061729] ? kasan_atomics_helper+0x1468/0x5450 [ 29.062271] kasan_check_range+0x10c/0x1c0 [ 29.062507] __kasan_check_write+0x18/0x20 [ 29.062704] kasan_atomics_helper+0x1468/0x5450 [ 29.062922] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.063459] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.064066] ? __schedule+0xc3e/0x2790 [ 29.064513] ? finish_task_switch.isra.0+0x153/0x700 [ 29.065227] ? kasan_atomics+0x153/0x310 [ 29.065711] kasan_atomics+0x1dd/0x310 [ 29.066389] ? __pfx_kasan_atomics+0x10/0x10 [ 29.067099] ? __pfx_read_tsc+0x10/0x10 [ 29.067502] ? ktime_get_ts64+0x86/0x230 [ 29.068170] kunit_try_run_case+0x1b3/0x490 [ 29.068912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.069571] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.070283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.070886] ? __kthread_parkme+0x82/0x160 [ 29.071514] ? preempt_count_sub+0x50/0x80 [ 29.072274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.072715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.073285] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.074461] kthread+0x257/0x310 [ 29.075003] ? __pfx_kthread+0x10/0x10 [ 29.075553] ret_from_fork+0x41/0x80 [ 29.076159] ? __pfx_kthread+0x10/0x10 [ 29.076703] ret_from_fork_asm+0x1a/0x30 [ 29.077241] </TASK> [ 29.077483] [ 29.077737] Allocated by task 273: [ 29.078539] kasan_save_stack+0x3d/0x60 [ 29.078816] kasan_save_track+0x18/0x40 [ 29.079692] kasan_save_alloc_info+0x3b/0x50 [ 29.080461] __kasan_kmalloc+0xb7/0xc0 [ 29.080881] __kmalloc_cache_noprof+0x184/0x410 [ 29.081745] kasan_atomics+0x96/0x310 [ 29.082140] kunit_try_run_case+0x1b3/0x490 [ 29.082624] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.083349] kthread+0x257/0x310 [ 29.083609] ret_from_fork+0x41/0x80 [ 29.084095] ret_from_fork_asm+0x1a/0x30 [ 29.084509] [ 29.084750] The buggy address belongs to the object at ffff888101afb700 [ 29.084750] which belongs to the cache kmalloc-64 of size 64 [ 29.086416] The buggy address is located 0 bytes to the right of [ 29.086416] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.088321] [ 29.088543] The buggy address belongs to the physical page: [ 29.088862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.090012] flags: 0x200000000000000(node=0|zone=2) [ 29.090306] page_type: f5(slab) [ 29.090520] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.091153] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.092174] page dumped because: kasan: bad access detected [ 29.092823] [ 29.093063] Memory state around the buggy address: [ 29.094391] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.094945] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.096138] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.097241] ^ [ 29.097596] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.098865] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.099430] ================================================================== [ 28.022552] ================================================================== [ 28.023052] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 28.024134] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.025361] [ 28.025587] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.028260] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.028846] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.030083] Call Trace: [ 28.030569] <TASK> [ 28.031209] dump_stack_lvl+0x73/0xb0 [ 28.032163] print_report+0xd1/0x640 [ 28.033079] ? __virt_addr_valid+0x1db/0x2d0 [ 28.033901] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.034614] kasan_report+0x102/0x140 [ 28.034994] ? kasan_atomics_helper+0xa2c/0x5450 [ 28.035530] ? kasan_atomics_helper+0xa2c/0x5450 [ 28.036089] kasan_check_range+0x10c/0x1c0 [ 28.036884] __kasan_check_write+0x18/0x20 [ 28.037684] kasan_atomics_helper+0xa2c/0x5450 [ 28.038781] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.039533] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.040214] ? __schedule+0xc3e/0x2790 [ 28.041002] ? finish_task_switch.isra.0+0x153/0x700 [ 28.041678] ? kasan_atomics+0x153/0x310 [ 28.042281] kasan_atomics+0x1dd/0x310 [ 28.043206] ? __pfx_kasan_atomics+0x10/0x10 [ 28.044117] ? __pfx_read_tsc+0x10/0x10 [ 28.044585] ? ktime_get_ts64+0x86/0x230 [ 28.045060] kunit_try_run_case+0x1b3/0x490 [ 28.045761] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.046197] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.046792] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.047505] ? __kthread_parkme+0x82/0x160 [ 28.047886] ? preempt_count_sub+0x50/0x80 [ 28.049140] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.049863] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.050862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.051726] kthread+0x257/0x310 [ 28.052116] ? __pfx_kthread+0x10/0x10 [ 28.053077] ret_from_fork+0x41/0x80 [ 28.053649] ? __pfx_kthread+0x10/0x10 [ 28.054614] ret_from_fork_asm+0x1a/0x30 [ 28.055525] </TASK> [ 28.056020] [ 28.056233] Allocated by task 273: [ 28.057182] kasan_save_stack+0x3d/0x60 [ 28.057702] kasan_save_track+0x18/0x40 [ 28.058671] kasan_save_alloc_info+0x3b/0x50 [ 28.059609] __kasan_kmalloc+0xb7/0xc0 [ 28.060898] __kmalloc_cache_noprof+0x184/0x410 [ 28.061356] kasan_atomics+0x96/0x310 [ 28.061959] kunit_try_run_case+0x1b3/0x490 [ 28.062532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.063684] kthread+0x257/0x310 [ 28.064232] ret_from_fork+0x41/0x80 [ 28.064633] ret_from_fork_asm+0x1a/0x30 [ 28.065081] [ 28.065311] The buggy address belongs to the object at ffff888101afb700 [ 28.065311] which belongs to the cache kmalloc-64 of size 64 [ 28.067349] The buggy address is located 0 bytes to the right of [ 28.067349] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.069214] [ 28.069797] The buggy address belongs to the physical page: [ 28.070649] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.071101] flags: 0x200000000000000(node=0|zone=2) [ 28.071813] page_type: f5(slab) [ 28.072308] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.073511] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.074600] page dumped because: kasan: bad access detected [ 28.074986] [ 28.075245] Memory state around the buggy address: [ 28.076017] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.076698] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.077427] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.078116] ^ [ 28.078780] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.079655] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.080147] ================================================================== [ 30.087770] ================================================================== [ 30.088818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 30.089526] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.090359] [ 30.090549] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.091473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.092060] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.092740] Call Trace: [ 30.093169] <TASK> [ 30.093550] dump_stack_lvl+0x73/0xb0 [ 30.093988] print_report+0xd1/0x640 [ 30.094417] ? __virt_addr_valid+0x1db/0x2d0 [ 30.094939] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.095671] kasan_report+0x102/0x140 [ 30.096172] ? kasan_atomics_helper+0x4f9a/0x5450 [ 30.096673] ? kasan_atomics_helper+0x4f9a/0x5450 [ 30.097257] __asan_report_load8_noabort+0x18/0x20 [ 30.097910] kasan_atomics_helper+0x4f9a/0x5450 [ 30.098303] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.098761] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.099047] ? __schedule+0xc3e/0x2790 [ 30.099679] ? finish_task_switch.isra.0+0x153/0x700 [ 30.100427] ? kasan_atomics+0x153/0x310 [ 30.100854] kasan_atomics+0x1dd/0x310 [ 30.101154] ? __pfx_kasan_atomics+0x10/0x10 [ 30.101996] ? __pfx_read_tsc+0x10/0x10 [ 30.102507] ? ktime_get_ts64+0x86/0x230 [ 30.102897] kunit_try_run_case+0x1b3/0x490 [ 30.104486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.105472] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.105822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.106587] ? __kthread_parkme+0x82/0x160 [ 30.107634] ? preempt_count_sub+0x50/0x80 [ 30.107963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.108684] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.109630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.110656] kthread+0x257/0x310 [ 30.111019] ? __pfx_kthread+0x10/0x10 [ 30.111677] ret_from_fork+0x41/0x80 [ 30.112849] ? __pfx_kthread+0x10/0x10 [ 30.113287] ret_from_fork_asm+0x1a/0x30 [ 30.114018] </TASK> [ 30.114397] [ 30.114552] Allocated by task 273: [ 30.115083] kasan_save_stack+0x3d/0x60 [ 30.115553] kasan_save_track+0x18/0x40 [ 30.116087] kasan_save_alloc_info+0x3b/0x50 [ 30.116587] __kasan_kmalloc+0xb7/0xc0 [ 30.117023] __kmalloc_cache_noprof+0x184/0x410 [ 30.117736] kasan_atomics+0x96/0x310 [ 30.118216] kunit_try_run_case+0x1b3/0x490 [ 30.118659] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.119328] kthread+0x257/0x310 [ 30.119672] ret_from_fork+0x41/0x80 [ 30.120201] ret_from_fork_asm+0x1a/0x30 [ 30.120779] [ 30.121070] The buggy address belongs to the object at ffff888101afb700 [ 30.121070] which belongs to the cache kmalloc-64 of size 64 [ 30.121961] The buggy address is located 0 bytes to the right of [ 30.121961] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.123183] [ 30.123499] The buggy address belongs to the physical page: [ 30.123958] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.124742] flags: 0x200000000000000(node=0|zone=2) [ 30.125370] page_type: f5(slab) [ 30.125777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.126609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.127374] page dumped because: kasan: bad access detected [ 30.127938] [ 30.128258] Memory state around the buggy address: [ 30.128734] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.129398] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.130179] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.130743] ^ [ 30.131341] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.132335] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.133160] ================================================================== [ 28.998096] ================================================================== [ 28.998760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 28.999644] Read of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.000324] [ 29.000979] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.002098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.002422] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.002828] Call Trace: [ 29.003151] <TASK> [ 29.003663] dump_stack_lvl+0x73/0xb0 [ 29.004359] print_report+0xd1/0x640 [ 29.005082] ? __virt_addr_valid+0x1db/0x2d0 [ 29.005814] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.006626] kasan_report+0x102/0x140 [ 29.007720] ? kasan_atomics_helper+0x4eb0/0x5450 [ 29.008587] ? kasan_atomics_helper+0x4eb0/0x5450 [ 29.009073] __asan_report_load8_noabort+0x18/0x20 [ 29.009608] kasan_atomics_helper+0x4eb0/0x5450 [ 29.010491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.010915] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.011636] ? __schedule+0xc3e/0x2790 [ 29.012038] ? finish_task_switch.isra.0+0x153/0x700 [ 29.012557] ? kasan_atomics+0x153/0x310 [ 29.013254] kasan_atomics+0x1dd/0x310 [ 29.013862] ? __pfx_kasan_atomics+0x10/0x10 [ 29.014510] ? __pfx_read_tsc+0x10/0x10 [ 29.015673] ? ktime_get_ts64+0x86/0x230 [ 29.016226] kunit_try_run_case+0x1b3/0x490 [ 29.016723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.017685] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.018125] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.018807] ? __kthread_parkme+0x82/0x160 [ 29.019884] ? preempt_count_sub+0x50/0x80 [ 29.020321] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.020952] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.021677] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.022501] kthread+0x257/0x310 [ 29.022747] ? __pfx_kthread+0x10/0x10 [ 29.023565] ret_from_fork+0x41/0x80 [ 29.023924] ? __pfx_kthread+0x10/0x10 [ 29.024389] ret_from_fork_asm+0x1a/0x30 [ 29.024785] </TASK> [ 29.025115] [ 29.025533] Allocated by task 273: [ 29.025824] kasan_save_stack+0x3d/0x60 [ 29.026934] kasan_save_track+0x18/0x40 [ 29.027341] kasan_save_alloc_info+0x3b/0x50 [ 29.027805] __kasan_kmalloc+0xb7/0xc0 [ 29.029136] __kmalloc_cache_noprof+0x184/0x410 [ 29.029794] kasan_atomics+0x96/0x310 [ 29.030566] kunit_try_run_case+0x1b3/0x490 [ 29.030982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.031424] kthread+0x257/0x310 [ 29.031776] ret_from_fork+0x41/0x80 [ 29.032713] ret_from_fork_asm+0x1a/0x30 [ 29.033224] [ 29.033397] The buggy address belongs to the object at ffff888101afb700 [ 29.033397] which belongs to the cache kmalloc-64 of size 64 [ 29.035012] The buggy address is located 0 bytes to the right of [ 29.035012] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.036531] [ 29.036690] The buggy address belongs to the physical page: [ 29.037679] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.038551] flags: 0x200000000000000(node=0|zone=2) [ 29.038944] page_type: f5(slab) [ 29.039682] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.040583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.041287] page dumped because: kasan: bad access detected [ 29.042078] [ 29.042519] Memory state around the buggy address: [ 29.043265] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.043912] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.045083] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.046067] ^ [ 29.046692] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.047712] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.048501] ================================================================== [ 28.178989] ================================================================== [ 28.180958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 28.181877] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.182593] [ 28.182907] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.184042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.184527] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.185015] Call Trace: [ 28.185572] <TASK> [ 28.186160] dump_stack_lvl+0x73/0xb0 [ 28.186652] print_report+0xd1/0x640 [ 28.187720] ? __virt_addr_valid+0x1db/0x2d0 [ 28.188305] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.188844] kasan_report+0x102/0x140 [ 28.189735] ? kasan_atomics_helper+0xc71/0x5450 [ 28.190505] ? kasan_atomics_helper+0xc71/0x5450 [ 28.191620] kasan_check_range+0x10c/0x1c0 [ 28.192179] __kasan_check_write+0x18/0x20 [ 28.192593] kasan_atomics_helper+0xc71/0x5450 [ 28.193639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.194447] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.195377] ? __schedule+0xc3e/0x2790 [ 28.195882] ? finish_task_switch.isra.0+0x153/0x700 [ 28.196429] ? kasan_atomics+0x153/0x310 [ 28.196880] kasan_atomics+0x1dd/0x310 [ 28.197284] ? __pfx_kasan_atomics+0x10/0x10 [ 28.197724] ? __pfx_read_tsc+0x10/0x10 [ 28.198277] ? ktime_get_ts64+0x86/0x230 [ 28.198933] kunit_try_run_case+0x1b3/0x490 [ 28.199304] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.199851] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.200271] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.201031] ? __kthread_parkme+0x82/0x160 [ 28.201411] ? preempt_count_sub+0x50/0x80 [ 28.202013] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.202421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.203160] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.203650] kthread+0x257/0x310 [ 28.204226] ? __pfx_kthread+0x10/0x10 [ 28.204546] ret_from_fork+0x41/0x80 [ 28.205155] ? __pfx_kthread+0x10/0x10 [ 28.205624] ret_from_fork_asm+0x1a/0x30 [ 28.206219] </TASK> [ 28.206631] [ 28.206810] Allocated by task 273: [ 28.207105] kasan_save_stack+0x3d/0x60 [ 28.208272] kasan_save_track+0x18/0x40 [ 28.209015] kasan_save_alloc_info+0x3b/0x50 [ 28.209741] __kasan_kmalloc+0xb7/0xc0 [ 28.210467] __kmalloc_cache_noprof+0x184/0x410 [ 28.210783] kasan_atomics+0x96/0x310 [ 28.211444] kunit_try_run_case+0x1b3/0x490 [ 28.212634] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.213720] kthread+0x257/0x310 [ 28.214191] ret_from_fork+0x41/0x80 [ 28.214830] ret_from_fork_asm+0x1a/0x30 [ 28.215677] [ 28.216084] The buggy address belongs to the object at ffff888101afb700 [ 28.216084] which belongs to the cache kmalloc-64 of size 64 [ 28.217052] The buggy address is located 0 bytes to the right of [ 28.217052] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.218600] [ 28.218816] The buggy address belongs to the physical page: [ 28.220070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.220866] flags: 0x200000000000000(node=0|zone=2) [ 28.221289] page_type: f5(slab) [ 28.221924] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.222721] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.223599] page dumped because: kasan: bad access detected [ 28.224154] [ 28.224415] Memory state around the buggy address: [ 28.224954] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.225580] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.226235] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.227048] ^ [ 28.227459] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.228303] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.229061] ================================================================== [ 28.277550] ================================================================== [ 28.278368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 28.279163] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.279805] [ 28.280317] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.282028] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.282577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.283660] Call Trace: [ 28.284371] <TASK> [ 28.284680] dump_stack_lvl+0x73/0xb0 [ 28.285100] print_report+0xd1/0x640 [ 28.285493] ? __virt_addr_valid+0x1db/0x2d0 [ 28.285927] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.286659] kasan_report+0x102/0x140 [ 28.287565] ? kasan_atomics_helper+0xd48/0x5450 [ 28.288284] ? kasan_atomics_helper+0xd48/0x5450 [ 28.288742] kasan_check_range+0x10c/0x1c0 [ 28.289469] __kasan_check_write+0x18/0x20 [ 28.290141] kasan_atomics_helper+0xd48/0x5450 [ 28.290620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.291242] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.291536] ? __schedule+0xc3e/0x2790 [ 28.291863] ? finish_task_switch.isra.0+0x153/0x700 [ 28.292542] ? kasan_atomics+0x153/0x310 [ 28.293559] kasan_atomics+0x1dd/0x310 [ 28.294138] ? __pfx_kasan_atomics+0x10/0x10 [ 28.294537] ? __pfx_read_tsc+0x10/0x10 [ 28.295018] ? ktime_get_ts64+0x86/0x230 [ 28.295463] kunit_try_run_case+0x1b3/0x490 [ 28.296038] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.296618] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.297142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.297857] ? __kthread_parkme+0x82/0x160 [ 28.298341] ? preempt_count_sub+0x50/0x80 [ 28.298728] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.299324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.300072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.300617] kthread+0x257/0x310 [ 28.301208] ? __pfx_kthread+0x10/0x10 [ 28.301646] ret_from_fork+0x41/0x80 [ 28.302123] ? __pfx_kthread+0x10/0x10 [ 28.302438] ret_from_fork_asm+0x1a/0x30 [ 28.302967] </TASK> [ 28.303444] [ 28.303782] Allocated by task 273: [ 28.304052] kasan_save_stack+0x3d/0x60 [ 28.304686] kasan_save_track+0x18/0x40 [ 28.305163] kasan_save_alloc_info+0x3b/0x50 [ 28.305748] __kasan_kmalloc+0xb7/0xc0 [ 28.306042] __kmalloc_cache_noprof+0x184/0x410 [ 28.306362] kasan_atomics+0x96/0x310 [ 28.306872] kunit_try_run_case+0x1b3/0x490 [ 28.307785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.308242] kthread+0x257/0x310 [ 28.308678] ret_from_fork+0x41/0x80 [ 28.309070] ret_from_fork_asm+0x1a/0x30 [ 28.309783] [ 28.310164] The buggy address belongs to the object at ffff888101afb700 [ 28.310164] which belongs to the cache kmalloc-64 of size 64 [ 28.310858] The buggy address is located 0 bytes to the right of [ 28.310858] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.312145] [ 28.312337] The buggy address belongs to the physical page: [ 28.314329] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.314995] flags: 0x200000000000000(node=0|zone=2) [ 28.315498] page_type: f5(slab) [ 28.315765] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.316739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.318034] page dumped because: kasan: bad access detected [ 28.318496] [ 28.318667] Memory state around the buggy address: [ 28.319512] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.320861] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.321956] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.322449] ^ [ 28.322891] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.323504] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.324120] ================================================================== [ 27.961053] ================================================================== [ 27.962476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 27.963280] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.963999] [ 27.964234] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.966012] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.966614] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.967436] Call Trace: [ 27.968134] <TASK> [ 27.969060] dump_stack_lvl+0x73/0xb0 [ 27.970002] print_report+0xd1/0x640 [ 27.971059] ? __virt_addr_valid+0x1db/0x2d0 [ 27.972136] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.973119] kasan_report+0x102/0x140 [ 27.973934] ? kasan_atomics_helper+0x993/0x5450 [ 27.974744] ? kasan_atomics_helper+0x993/0x5450 [ 27.975746] kasan_check_range+0x10c/0x1c0 [ 27.976200] __kasan_check_write+0x18/0x20 [ 27.977016] kasan_atomics_helper+0x993/0x5450 [ 27.977891] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.978879] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.979721] ? __schedule+0xc3e/0x2790 [ 27.980831] ? finish_task_switch.isra.0+0x153/0x700 [ 27.981287] ? kasan_atomics+0x153/0x310 [ 27.982107] kasan_atomics+0x1dd/0x310 [ 27.982632] ? __pfx_kasan_atomics+0x10/0x10 [ 27.983804] ? __pfx_read_tsc+0x10/0x10 [ 27.984181] ? ktime_get_ts64+0x86/0x230 [ 27.985856] kunit_try_run_case+0x1b3/0x490 [ 27.986292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.987855] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.988317] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.989241] ? __kthread_parkme+0x82/0x160 [ 27.989570] ? preempt_count_sub+0x50/0x80 [ 27.990545] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.991418] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.992129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.992797] kthread+0x257/0x310 [ 27.994182] ? __pfx_kthread+0x10/0x10 [ 27.994927] ret_from_fork+0x41/0x80 [ 27.995477] ? __pfx_kthread+0x10/0x10 [ 27.995700] ret_from_fork_asm+0x1a/0x30 [ 27.995917] </TASK> [ 27.996041] [ 27.996138] Allocated by task 273: [ 27.996295] kasan_save_stack+0x3d/0x60 [ 27.997084] kasan_save_track+0x18/0x40 [ 27.997809] kasan_save_alloc_info+0x3b/0x50 [ 27.998767] __kasan_kmalloc+0xb7/0xc0 [ 27.999507] __kmalloc_cache_noprof+0x184/0x410 [ 28.000520] kasan_atomics+0x96/0x310 [ 28.001504] kunit_try_run_case+0x1b3/0x490 [ 28.001826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.002335] kthread+0x257/0x310 [ 28.002595] ret_from_fork+0x41/0x80 [ 28.003057] ret_from_fork_asm+0x1a/0x30 [ 28.003638] [ 28.004041] The buggy address belongs to the object at ffff888101afb700 [ 28.004041] which belongs to the cache kmalloc-64 of size 64 [ 28.006148] The buggy address is located 0 bytes to the right of [ 28.006148] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.008336] [ 28.008757] The buggy address belongs to the physical page: [ 28.009256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.010621] flags: 0x200000000000000(node=0|zone=2) [ 28.011205] page_type: f5(slab) [ 28.011897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.012788] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.014264] page dumped because: kasan: bad access detected [ 28.014831] [ 28.015499] Memory state around the buggy address: [ 28.015946] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.017130] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.018062] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.018449] ^ [ 28.019395] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.020225] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.021215] ================================================================== [ 30.222938] ================================================================== [ 30.223609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 30.224328] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.225089] [ 30.225403] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.226332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.226636] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.227758] Call Trace: [ 30.228212] <TASK> [ 30.228453] dump_stack_lvl+0x73/0xb0 [ 30.228966] print_report+0xd1/0x640 [ 30.229360] ? __virt_addr_valid+0x1db/0x2d0 [ 30.229957] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.230511] kasan_report+0x102/0x140 [ 30.230910] ? kasan_atomics_helper+0x218b/0x5450 [ 30.231634] ? kasan_atomics_helper+0x218b/0x5450 [ 30.232229] kasan_check_range+0x10c/0x1c0 [ 30.232787] __kasan_check_write+0x18/0x20 [ 30.233345] kasan_atomics_helper+0x218b/0x5450 [ 30.233821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.234439] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.235046] ? __schedule+0xc3e/0x2790 [ 30.235523] ? finish_task_switch.isra.0+0x153/0x700 [ 30.236059] ? kasan_atomics+0x153/0x310 [ 30.236622] kasan_atomics+0x1dd/0x310 [ 30.237238] ? __pfx_kasan_atomics+0x10/0x10 [ 30.237725] ? __pfx_read_tsc+0x10/0x10 [ 30.238154] ? ktime_get_ts64+0x86/0x230 [ 30.238751] kunit_try_run_case+0x1b3/0x490 [ 30.239266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.239805] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.240290] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.240902] ? __kthread_parkme+0x82/0x160 [ 30.241434] ? preempt_count_sub+0x50/0x80 [ 30.241836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.242393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.243066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.243673] kthread+0x257/0x310 [ 30.244229] ? __pfx_kthread+0x10/0x10 [ 30.244599] ret_from_fork+0x41/0x80 [ 30.245144] ? __pfx_kthread+0x10/0x10 [ 30.245661] ret_from_fork_asm+0x1a/0x30 [ 30.246215] </TASK> [ 30.246520] [ 30.246848] Allocated by task 273: [ 30.247195] kasan_save_stack+0x3d/0x60 [ 30.247759] kasan_save_track+0x18/0x40 [ 30.248216] kasan_save_alloc_info+0x3b/0x50 [ 30.248782] __kasan_kmalloc+0xb7/0xc0 [ 30.249276] __kmalloc_cache_noprof+0x184/0x410 [ 30.249713] kasan_atomics+0x96/0x310 [ 30.250326] kunit_try_run_case+0x1b3/0x490 [ 30.250718] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.251360] kthread+0x257/0x310 [ 30.251656] ret_from_fork+0x41/0x80 [ 30.252215] ret_from_fork_asm+0x1a/0x30 [ 30.252671] [ 30.252967] The buggy address belongs to the object at ffff888101afb700 [ 30.252967] which belongs to the cache kmalloc-64 of size 64 [ 30.254096] The buggy address is located 0 bytes to the right of [ 30.254096] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.255231] [ 30.255541] The buggy address belongs to the physical page: [ 30.256083] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.256840] flags: 0x200000000000000(node=0|zone=2) [ 30.257379] page_type: f5(slab) [ 30.257845] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.258547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.259331] page dumped because: kasan: bad access detected [ 30.259903] [ 30.260281] Memory state around the buggy address: [ 30.260616] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.261376] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.262184] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.262776] ^ [ 30.263369] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.264247] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.264966] ================================================================== [ 27.735873] ================================================================== [ 27.736861] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 27.738032] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.738896] [ 27.739187] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.740415] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.740894] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.742322] Call Trace: [ 27.742725] <TASK> [ 27.743001] dump_stack_lvl+0x73/0xb0 [ 27.743815] print_report+0xd1/0x640 [ 27.744410] ? __virt_addr_valid+0x1db/0x2d0 [ 27.745067] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.745610] kasan_report+0x102/0x140 [ 27.746267] ? kasan_atomics_helper+0x730/0x5450 [ 27.747050] ? kasan_atomics_helper+0x730/0x5450 [ 27.748143] kasan_check_range+0x10c/0x1c0 [ 27.748745] __kasan_check_write+0x18/0x20 [ 27.749278] kasan_atomics_helper+0x730/0x5450 [ 27.750075] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.750494] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.751393] ? __schedule+0xc3e/0x2790 [ 27.751715] ? finish_task_switch.isra.0+0x153/0x700 [ 27.752938] ? kasan_atomics+0x153/0x310 [ 27.753325] kasan_atomics+0x1dd/0x310 [ 27.753994] ? __pfx_kasan_atomics+0x10/0x10 [ 27.754507] ? __pfx_read_tsc+0x10/0x10 [ 27.755062] ? ktime_get_ts64+0x86/0x230 [ 27.755426] kunit_try_run_case+0x1b3/0x490 [ 27.756043] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.756775] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.757368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.758074] ? __kthread_parkme+0x82/0x160 [ 27.758725] ? preempt_count_sub+0x50/0x80 [ 27.759397] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.759905] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.760590] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.761188] kthread+0x257/0x310 [ 27.762232] ? __pfx_kthread+0x10/0x10 [ 27.762543] ret_from_fork+0x41/0x80 [ 27.763062] ? __pfx_kthread+0x10/0x10 [ 27.763841] ret_from_fork_asm+0x1a/0x30 [ 27.764439] </TASK> [ 27.764756] [ 27.764986] Allocated by task 273: [ 27.765364] kasan_save_stack+0x3d/0x60 [ 27.765807] kasan_save_track+0x18/0x40 [ 27.766407] kasan_save_alloc_info+0x3b/0x50 [ 27.767390] __kasan_kmalloc+0xb7/0xc0 [ 27.767834] __kmalloc_cache_noprof+0x184/0x410 [ 27.768699] kasan_atomics+0x96/0x310 [ 27.769191] kunit_try_run_case+0x1b3/0x490 [ 27.769656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.770588] kthread+0x257/0x310 [ 27.771093] ret_from_fork+0x41/0x80 [ 27.771722] ret_from_fork_asm+0x1a/0x30 [ 27.772164] [ 27.773001] The buggy address belongs to the object at ffff888101afb700 [ 27.773001] which belongs to the cache kmalloc-64 of size 64 [ 27.774175] The buggy address is located 0 bytes to the right of [ 27.774175] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.775571] [ 27.775823] The buggy address belongs to the physical page: [ 27.776416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.777619] flags: 0x200000000000000(node=0|zone=2) [ 27.778097] page_type: f5(slab) [ 27.778711] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.779464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.781026] page dumped because: kasan: bad access detected [ 27.781726] [ 27.781990] Memory state around the buggy address: [ 27.782513] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.783415] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.784107] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.784984] ^ [ 27.785376] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.786920] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.787307] ================================================================== [ 28.572656] ================================================================== [ 28.573732] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 28.574498] Write of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 28.575110] [ 28.575321] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 28.576926] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.577502] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.578264] Call Trace: [ 28.578566] <TASK> [ 28.578828] dump_stack_lvl+0x73/0xb0 [ 28.579671] print_report+0xd1/0x640 [ 28.580236] ? __virt_addr_valid+0x1db/0x2d0 [ 28.580929] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.581608] kasan_report+0x102/0x140 [ 28.582057] ? kasan_atomics_helper+0x107a/0x5450 [ 28.582720] ? kasan_atomics_helper+0x107a/0x5450 [ 28.583314] kasan_check_range+0x10c/0x1c0 [ 28.583568] __kasan_check_write+0x18/0x20 [ 28.583765] kasan_atomics_helper+0x107a/0x5450 [ 28.584075] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.584745] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.585598] ? __schedule+0xc3e/0x2790 [ 28.586191] ? finish_task_switch.isra.0+0x153/0x700 [ 28.587100] ? kasan_atomics+0x153/0x310 [ 28.587653] kasan_atomics+0x1dd/0x310 [ 28.588202] ? __pfx_kasan_atomics+0x10/0x10 [ 28.589100] ? __pfx_read_tsc+0x10/0x10 [ 28.589546] ? ktime_get_ts64+0x86/0x230 [ 28.590245] kunit_try_run_case+0x1b3/0x490 [ 28.590789] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.591366] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.591746] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.592236] ? __kthread_parkme+0x82/0x160 [ 28.592566] ? preempt_count_sub+0x50/0x80 [ 28.593099] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.593850] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.594901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.595494] kthread+0x257/0x310 [ 28.595686] ? __pfx_kthread+0x10/0x10 [ 28.595882] ret_from_fork+0x41/0x80 [ 28.596166] ? __pfx_kthread+0x10/0x10 [ 28.596638] ret_from_fork_asm+0x1a/0x30 [ 28.597070] </TASK> [ 28.597363] [ 28.597575] Allocated by task 273: [ 28.598255] kasan_save_stack+0x3d/0x60 [ 28.598786] kasan_save_track+0x18/0x40 [ 28.599154] kasan_save_alloc_info+0x3b/0x50 [ 28.599519] __kasan_kmalloc+0xb7/0xc0 [ 28.600326] __kmalloc_cache_noprof+0x184/0x410 [ 28.601141] kasan_atomics+0x96/0x310 [ 28.601558] kunit_try_run_case+0x1b3/0x490 [ 28.602557] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.602947] kthread+0x257/0x310 [ 28.603520] ret_from_fork+0x41/0x80 [ 28.604019] ret_from_fork_asm+0x1a/0x30 [ 28.604437] [ 28.605163] The buggy address belongs to the object at ffff888101afb700 [ 28.605163] which belongs to the cache kmalloc-64 of size 64 [ 28.606948] The buggy address is located 0 bytes to the right of [ 28.606948] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 28.608527] [ 28.608752] The buggy address belongs to the physical page: [ 28.609371] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 28.609768] flags: 0x200000000000000(node=0|zone=2) [ 28.610408] page_type: f5(slab) [ 28.611014] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.612187] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.612559] page dumped because: kasan: bad access detected [ 28.613316] [ 28.613522] Memory state around the buggy address: [ 28.613822] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.614661] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.615519] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.616149] ^ [ 28.616739] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.617638] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.618291] ================================================================== [ 29.669051] ================================================================== [ 29.670646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 29.671585] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.672585] [ 29.672819] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.674098] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.674701] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.675680] Call Trace: [ 29.676241] <TASK> [ 29.676512] dump_stack_lvl+0x73/0xb0 [ 29.676902] print_report+0xd1/0x640 [ 29.677561] ? __virt_addr_valid+0x1db/0x2d0 [ 29.678617] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.679444] kasan_report+0x102/0x140 [ 29.680386] ? kasan_atomics_helper+0x1c19/0x5450 [ 29.680877] ? kasan_atomics_helper+0x1c19/0x5450 [ 29.681697] kasan_check_range+0x10c/0x1c0 [ 29.682818] __kasan_check_write+0x18/0x20 [ 29.683443] kasan_atomics_helper+0x1c19/0x5450 [ 29.683907] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.684978] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.685613] ? __schedule+0xc3e/0x2790 [ 29.685981] ? finish_task_switch.isra.0+0x153/0x700 [ 29.686632] ? kasan_atomics+0x153/0x310 [ 29.687242] kasan_atomics+0x1dd/0x310 [ 29.687578] ? __pfx_kasan_atomics+0x10/0x10 [ 29.688108] ? __pfx_read_tsc+0x10/0x10 [ 29.688720] ? ktime_get_ts64+0x86/0x230 [ 29.689773] kunit_try_run_case+0x1b3/0x490 [ 29.690502] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.690901] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.691429] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.692179] ? __kthread_parkme+0x82/0x160 [ 29.692662] ? preempt_count_sub+0x50/0x80 [ 29.693469] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.694761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.695344] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.695984] kthread+0x257/0x310 [ 29.696278] ? __pfx_kthread+0x10/0x10 [ 29.696748] ret_from_fork+0x41/0x80 [ 29.697342] ? __pfx_kthread+0x10/0x10 [ 29.697720] ret_from_fork_asm+0x1a/0x30 [ 29.698311] </TASK> [ 29.698588] [ 29.698854] Allocated by task 273: [ 29.699270] kasan_save_stack+0x3d/0x60 [ 29.699797] kasan_save_track+0x18/0x40 [ 29.700422] kasan_save_alloc_info+0x3b/0x50 [ 29.700893] __kasan_kmalloc+0xb7/0xc0 [ 29.701213] __kmalloc_cache_noprof+0x184/0x410 [ 29.701872] kasan_atomics+0x96/0x310 [ 29.702321] kunit_try_run_case+0x1b3/0x490 [ 29.702797] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.703338] kthread+0x257/0x310 [ 29.703818] ret_from_fork+0x41/0x80 [ 29.704358] ret_from_fork_asm+0x1a/0x30 [ 29.704758] [ 29.704932] The buggy address belongs to the object at ffff888101afb700 [ 29.704932] which belongs to the cache kmalloc-64 of size 64 [ 29.706225] The buggy address is located 0 bytes to the right of [ 29.706225] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.707445] [ 29.707741] The buggy address belongs to the physical page: [ 29.708265] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.708938] flags: 0x200000000000000(node=0|zone=2) [ 29.709582] page_type: f5(slab) [ 29.710058] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.710690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.711342] page dumped because: kasan: bad access detected [ 29.711698] [ 29.711901] Memory state around the buggy address: [ 29.712896] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.713406] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.714257] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.714909] ^ [ 29.715459] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.716057] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.716569] ================================================================== [ 29.368635] ================================================================== [ 29.369585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 29.370369] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.371076] [ 29.371335] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.372344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.372671] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.373599] Call Trace: [ 29.374014] <TASK> [ 29.374392] dump_stack_lvl+0x73/0xb0 [ 29.374988] print_report+0xd1/0x640 [ 29.375291] ? __virt_addr_valid+0x1db/0x2d0 [ 29.375888] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.376543] kasan_report+0x102/0x140 [ 29.376962] ? kasan_atomics_helper+0x1819/0x5450 [ 29.377479] ? kasan_atomics_helper+0x1819/0x5450 [ 29.378014] kasan_check_range+0x10c/0x1c0 [ 29.378452] __kasan_check_write+0x18/0x20 [ 29.379110] kasan_atomics_helper+0x1819/0x5450 [ 29.379691] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.380219] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.380815] ? __schedule+0xc3e/0x2790 [ 29.381260] ? finish_task_switch.isra.0+0x153/0x700 [ 29.381783] ? kasan_atomics+0x153/0x310 [ 29.382308] kasan_atomics+0x1dd/0x310 [ 29.382668] ? __pfx_kasan_atomics+0x10/0x10 [ 29.383164] ? __pfx_read_tsc+0x10/0x10 [ 29.383880] ? ktime_get_ts64+0x86/0x230 [ 29.384753] kunit_try_run_case+0x1b3/0x490 [ 29.385388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.386075] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.386553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.387018] ? __kthread_parkme+0x82/0x160 [ 29.387588] ? preempt_count_sub+0x50/0x80 [ 29.388058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.388705] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.389548] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.390190] kthread+0x257/0x310 [ 29.390749] ? __pfx_kthread+0x10/0x10 [ 29.391372] ret_from_fork+0x41/0x80 [ 29.391769] ? __pfx_kthread+0x10/0x10 [ 29.392200] ret_from_fork_asm+0x1a/0x30 [ 29.392983] </TASK> [ 29.393164] [ 29.393309] Allocated by task 273: [ 29.393573] kasan_save_stack+0x3d/0x60 [ 29.393840] kasan_save_track+0x18/0x40 [ 29.394103] kasan_save_alloc_info+0x3b/0x50 [ 29.394400] __kasan_kmalloc+0xb7/0xc0 [ 29.394768] __kmalloc_cache_noprof+0x184/0x410 [ 29.395084] kasan_atomics+0x96/0x310 [ 29.395363] kunit_try_run_case+0x1b3/0x490 [ 29.396440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.397190] kthread+0x257/0x310 [ 29.397715] ret_from_fork+0x41/0x80 [ 29.398387] ret_from_fork_asm+0x1a/0x30 [ 29.398858] [ 29.399221] The buggy address belongs to the object at ffff888101afb700 [ 29.399221] which belongs to the cache kmalloc-64 of size 64 [ 29.399914] The buggy address is located 0 bytes to the right of [ 29.399914] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.401393] [ 29.401601] The buggy address belongs to the physical page: [ 29.402419] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.402892] flags: 0x200000000000000(node=0|zone=2) [ 29.403218] page_type: f5(slab) [ 29.403477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.404454] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.405903] page dumped because: kasan: bad access detected [ 29.406543] [ 29.406795] Memory state around the buggy address: [ 29.408145] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.409313] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.409762] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.410149] ^ [ 29.410531] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.411902] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.412615] ================================================================== [ 29.809149] ================================================================== [ 29.809737] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 29.810627] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 29.811337] [ 29.811661] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 29.812590] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.813192] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.814039] Call Trace: [ 29.814464] <TASK> [ 29.814789] dump_stack_lvl+0x73/0xb0 [ 29.815429] print_report+0xd1/0x640 [ 29.815819] ? __virt_addr_valid+0x1db/0x2d0 [ 29.816411] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.817088] kasan_report+0x102/0x140 [ 29.817527] ? kasan_atomics_helper+0x1d7b/0x5450 [ 29.818115] ? kasan_atomics_helper+0x1d7b/0x5450 [ 29.818779] kasan_check_range+0x10c/0x1c0 [ 29.819289] __kasan_check_write+0x18/0x20 [ 29.819693] kasan_atomics_helper+0x1d7b/0x5450 [ 29.820246] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.820881] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.821444] ? __schedule+0xc3e/0x2790 [ 29.821940] ? finish_task_switch.isra.0+0x153/0x700 [ 29.822630] ? kasan_atomics+0x153/0x310 [ 29.823237] kasan_atomics+0x1dd/0x310 [ 29.823634] ? __pfx_kasan_atomics+0x10/0x10 [ 29.824297] ? __pfx_read_tsc+0x10/0x10 [ 29.824751] ? ktime_get_ts64+0x86/0x230 [ 29.825307] kunit_try_run_case+0x1b3/0x490 [ 29.825790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.826346] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.826801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.827286] ? __kthread_parkme+0x82/0x160 [ 29.827800] ? preempt_count_sub+0x50/0x80 [ 29.828228] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.828586] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.829416] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.830028] kthread+0x257/0x310 [ 29.830530] ? __pfx_kthread+0x10/0x10 [ 29.831037] ret_from_fork+0x41/0x80 [ 29.831498] ? __pfx_kthread+0x10/0x10 [ 29.831933] ret_from_fork_asm+0x1a/0x30 [ 29.832598] </TASK> [ 29.832851] [ 29.833213] Allocated by task 273: [ 29.833609] kasan_save_stack+0x3d/0x60 [ 29.834190] kasan_save_track+0x18/0x40 [ 29.834659] kasan_save_alloc_info+0x3b/0x50 [ 29.835289] __kasan_kmalloc+0xb7/0xc0 [ 29.835632] __kmalloc_cache_noprof+0x184/0x410 [ 29.836311] kasan_atomics+0x96/0x310 [ 29.836796] kunit_try_run_case+0x1b3/0x490 [ 29.837303] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.837790] kthread+0x257/0x310 [ 29.838294] ret_from_fork+0x41/0x80 [ 29.838933] ret_from_fork_asm+0x1a/0x30 [ 29.839351] [ 29.839513] The buggy address belongs to the object at ffff888101afb700 [ 29.839513] which belongs to the cache kmalloc-64 of size 64 [ 29.840746] The buggy address is located 0 bytes to the right of [ 29.840746] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 29.841914] [ 29.842173] The buggy address belongs to the physical page: [ 29.842955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 29.843778] flags: 0x200000000000000(node=0|zone=2) [ 29.844388] page_type: f5(slab) [ 29.844808] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.845389] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.846379] page dumped because: kasan: bad access detected [ 29.846926] [ 29.847229] Memory state around the buggy address: [ 29.847755] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.848512] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.849177] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.850045] ^ [ 29.850518] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851271] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.851701] ================================================================== [ 27.212246] ================================================================== [ 27.213104] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 27.214671] Read of size 4 at addr ffff888101afb730 by task kunit_try_catch/273 [ 27.215259] [ 27.215749] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 27.216891] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.218343] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.219462] Call Trace: [ 27.219820] <TASK> [ 27.220209] dump_stack_lvl+0x73/0xb0 [ 27.220925] print_report+0xd1/0x640 [ 27.221361] ? __virt_addr_valid+0x1db/0x2d0 [ 27.222188] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.223012] kasan_report+0x102/0x140 [ 27.223458] ? kasan_atomics_helper+0x4b8a/0x5450 [ 27.224788] ? kasan_atomics_helper+0x4b8a/0x5450 [ 27.225973] __asan_report_load4_noabort+0x18/0x20 [ 27.227019] kasan_atomics_helper+0x4b8a/0x5450 [ 27.227627] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.228268] ? __kmalloc_cache_noprof+0x184/0x410 [ 27.229110] ? __schedule+0xc3e/0x2790 [ 27.230268] ? finish_task_switch.isra.0+0x153/0x700 [ 27.231088] ? kasan_atomics+0x153/0x310 [ 27.231836] kasan_atomics+0x1dd/0x310 [ 27.232224] ? __pfx_kasan_atomics+0x10/0x10 [ 27.233096] ? __pfx_read_tsc+0x10/0x10 [ 27.233607] ? ktime_get_ts64+0x86/0x230 [ 27.234114] kunit_try_run_case+0x1b3/0x490 [ 27.234925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.235607] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 27.236169] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.237145] ? __kthread_parkme+0x82/0x160 [ 27.237913] ? preempt_count_sub+0x50/0x80 [ 27.239262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.240189] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.241128] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.241929] kthread+0x257/0x310 [ 27.242170] ? __pfx_kthread+0x10/0x10 [ 27.243199] ret_from_fork+0x41/0x80 [ 27.244118] ? __pfx_kthread+0x10/0x10 [ 27.245358] ret_from_fork_asm+0x1a/0x30 [ 27.245714] </TASK> [ 27.246090] [ 27.246242] Allocated by task 273: [ 27.247100] kasan_save_stack+0x3d/0x60 [ 27.248022] kasan_save_track+0x18/0x40 [ 27.248969] kasan_save_alloc_info+0x3b/0x50 [ 27.249804] __kasan_kmalloc+0xb7/0xc0 [ 27.250506] __kmalloc_cache_noprof+0x184/0x410 [ 27.250824] kasan_atomics+0x96/0x310 [ 27.251146] kunit_try_run_case+0x1b3/0x490 [ 27.251514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.252145] kthread+0x257/0x310 [ 27.252893] ret_from_fork+0x41/0x80 [ 27.253191] ret_from_fork_asm+0x1a/0x30 [ 27.254011] [ 27.254518] The buggy address belongs to the object at ffff888101afb700 [ 27.254518] which belongs to the cache kmalloc-64 of size 64 [ 27.255800] The buggy address is located 0 bytes to the right of [ 27.255800] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 27.258704] [ 27.259647] The buggy address belongs to the physical page: [ 27.260230] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 27.261016] flags: 0x200000000000000(node=0|zone=2) [ 27.261906] page_type: f5(slab) [ 27.262648] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.262944] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.263226] page dumped because: kasan: bad access detected [ 27.264026] [ 27.264826] Memory state around the buggy address: [ 27.265716] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.266572] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.267630] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.268751] ^ [ 27.269125] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.269727] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.271069] ================================================================== [ 30.304485] ================================================================== [ 30.305352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 30.306059] Write of size 8 at addr ffff888101afb730 by task kunit_try_catch/273 [ 30.306758] [ 30.307072] CPU: 0 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241204 #1 [ 30.307824] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.308304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.309177] Call Trace: [ 30.309403] <TASK> [ 30.309755] dump_stack_lvl+0x73/0xb0 [ 30.310302] print_report+0xd1/0x640 [ 30.310806] ? __virt_addr_valid+0x1db/0x2d0 [ 30.311248] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.311851] kasan_report+0x102/0x140 [ 30.312303] ? kasan_atomics_helper+0x224d/0x5450 [ 30.312700] ? kasan_atomics_helper+0x224d/0x5450 [ 30.313142] kasan_check_range+0x10c/0x1c0 [ 30.313764] __kasan_check_write+0x18/0x20 [ 30.314226] kasan_atomics_helper+0x224d/0x5450 [ 30.314685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.315124] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.315739] ? __schedule+0xc3e/0x2790 [ 30.316149] ? finish_task_switch.isra.0+0x153/0x700 [ 30.316522] ? kasan_atomics+0x153/0x310 [ 30.316938] kasan_atomics+0x1dd/0x310 [ 30.317483] ? __pfx_kasan_atomics+0x10/0x10 [ 30.318076] ? __pfx_read_tsc+0x10/0x10 [ 30.318516] ? ktime_get_ts64+0x86/0x230 [ 30.318994] kunit_try_run_case+0x1b3/0x490 [ 30.319410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.319802] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.320325] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.320814] ? __kthread_parkme+0x82/0x160 [ 30.321275] ? preempt_count_sub+0x50/0x80 [ 30.321674] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.322210] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.322605] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.323314] kthread+0x257/0x310 [ 30.323787] ? __pfx_kthread+0x10/0x10 [ 30.324169] ret_from_fork+0x41/0x80 [ 30.324632] ? __pfx_kthread+0x10/0x10 [ 30.324944] ret_from_fork_asm+0x1a/0x30 [ 30.325445] </TASK> [ 30.325696] [ 30.325955] Allocated by task 273: [ 30.326345] kasan_save_stack+0x3d/0x60 [ 30.326742] kasan_save_track+0x18/0x40 [ 30.327204] kasan_save_alloc_info+0x3b/0x50 [ 30.327572] __kasan_kmalloc+0xb7/0xc0 [ 30.328077] __kmalloc_cache_noprof+0x184/0x410 [ 30.328468] kasan_atomics+0x96/0x310 [ 30.328890] kunit_try_run_case+0x1b3/0x490 [ 30.329361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.329741] kthread+0x257/0x310 [ 30.330004] ret_from_fork+0x41/0x80 [ 30.330339] ret_from_fork_asm+0x1a/0x30 [ 30.330643] [ 30.330906] The buggy address belongs to the object at ffff888101afb700 [ 30.330906] which belongs to the cache kmalloc-64 of size 64 [ 30.332358] The buggy address is located 0 bytes to the right of [ 30.332358] allocated 48-byte region [ffff888101afb700, ffff888101afb730) [ 30.333512] [ 30.333730] The buggy address belongs to the physical page: [ 30.334239] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x101afb [ 30.335134] flags: 0x200000000000000(node=0|zone=2) [ 30.335736] page_type: f5(slab) [ 30.336067] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.336708] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.337341] page dumped because: kasan: bad access detected [ 30.337818] [ 30.338128] Memory state around the buggy address: [ 30.338556] ffff888101afb600: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.339304] ffff888101afb680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.339871] >ffff888101afb700: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.340520] ^ [ 30.340855] ffff888101afb780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.341320] ffff888101afb800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.341907] ==================================================================