Date
Dec. 5, 2024, 2:07 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 36.586967] ================================================================== [ 36.587901] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 36.588701] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.589496] [ 36.589821] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.590889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.591591] Hardware name: linux,dummy-virt (DT) [ 36.592302] Call trace: [ 36.592694] show_stack+0x20/0x38 (C) [ 36.593259] dump_stack_lvl+0x8c/0xd0 [ 36.593928] print_report+0x118/0x5e0 [ 36.594609] kasan_report+0xc8/0x118 [ 36.595252] kasan_check_range+0x100/0x1a8 [ 36.595995] __kasan_check_write+0x20/0x30 [ 36.596563] kasan_atomics_helper+0x17ec/0x4858 [ 36.597276] kasan_atomics+0x198/0x2e8 [ 36.597857] kunit_try_run_case+0x14c/0x3d0 [ 36.598589] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.599327] kthread+0x24c/0x2d0 [ 36.599913] ret_from_fork+0x10/0x20 [ 36.600454] [ 36.600735] Allocated by task 254: [ 36.601326] kasan_save_stack+0x3c/0x68 [ 36.601960] kasan_save_track+0x20/0x40 [ 36.602534] kasan_save_alloc_info+0x40/0x58 [ 36.603096] __kasan_kmalloc+0xd4/0xd8 [ 36.603637] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.604157] kasan_atomics+0xb8/0x2e8 [ 36.604788] kunit_try_run_case+0x14c/0x3d0 [ 36.605416] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.606109] kthread+0x24c/0x2d0 [ 36.606604] ret_from_fork+0x10/0x20 [ 36.607265] [ 36.607560] The buggy address belongs to the object at fff00000c664f800 [ 36.607560] which belongs to the cache kmalloc-64 of size 64 [ 36.609051] The buggy address is located 0 bytes to the right of [ 36.609051] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.610477] [ 36.610798] The buggy address belongs to the physical page: [ 36.611460] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.612477] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.613256] page_type: f5(slab) [ 36.613773] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.614745] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.615713] page dumped because: kasan: bad access detected [ 36.616331] [ 36.616701] Memory state around the buggy address: [ 36.617361] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.618261] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.619220] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.620066] ^ [ 36.620716] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.621621] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.622533] ================================================================== [ 35.504552] ================================================================== [ 35.505258] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 35.506270] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.507126] [ 35.507440] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.508678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.509261] Hardware name: linux,dummy-virt (DT) [ 35.509965] Call trace: [ 35.510311] show_stack+0x20/0x38 (C) [ 35.510982] dump_stack_lvl+0x8c/0xd0 [ 35.511549] print_report+0x118/0x5e0 [ 35.512191] kasan_report+0xc8/0x118 [ 35.512758] __asan_report_load8_noabort+0x20/0x30 [ 35.513452] kasan_atomics_helper+0x3f58/0x4858 [ 35.514217] kasan_atomics+0x198/0x2e8 [ 35.514790] kunit_try_run_case+0x14c/0x3d0 [ 35.515516] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.516289] kthread+0x24c/0x2d0 [ 35.516829] ret_from_fork+0x10/0x20 [ 35.517478] [ 35.517900] Allocated by task 254: [ 35.518439] kasan_save_stack+0x3c/0x68 [ 35.519044] kasan_save_track+0x20/0x40 [ 35.519617] kasan_save_alloc_info+0x40/0x58 [ 35.520264] __kasan_kmalloc+0xd4/0xd8 [ 35.520723] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.521429] kasan_atomics+0xb8/0x2e8 [ 35.521986] kunit_try_run_case+0x14c/0x3d0 [ 35.522715] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.523414] kthread+0x24c/0x2d0 [ 35.524024] ret_from_fork+0x10/0x20 [ 35.524536] [ 35.524835] The buggy address belongs to the object at fff00000c664f800 [ 35.524835] which belongs to the cache kmalloc-64 of size 64 [ 35.526264] The buggy address is located 0 bytes to the right of [ 35.526264] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.527570] [ 35.527955] The buggy address belongs to the physical page: [ 35.528622] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.529647] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.530784] page_type: f5(slab) [ 35.531325] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.531774] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.532907] page dumped because: kasan: bad access detected [ 35.533680] [ 35.534026] Memory state around the buggy address: [ 35.534740] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.535818] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.536725] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.537679] ^ [ 35.538367] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.539275] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.540191] ================================================================== [ 34.136082] ================================================================== [ 34.136926] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 34.138089] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.139864] [ 34.140777] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.142010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.142589] Hardware name: linux,dummy-virt (DT) [ 34.143365] Call trace: [ 34.144159] show_stack+0x20/0x38 (C) [ 34.144615] dump_stack_lvl+0x8c/0xd0 [ 34.145199] print_report+0x118/0x5e0 [ 34.145919] kasan_report+0xc8/0x118 [ 34.146986] kasan_check_range+0x100/0x1a8 [ 34.148002] __kasan_check_read+0x20/0x30 [ 34.148568] kasan_atomics_helper+0x1ec/0x4858 [ 34.149301] kasan_atomics+0x198/0x2e8 [ 34.149810] kunit_try_run_case+0x14c/0x3d0 [ 34.150428] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.151161] kthread+0x24c/0x2d0 [ 34.151789] ret_from_fork+0x10/0x20 [ 34.152443] [ 34.152865] Allocated by task 254: [ 34.153569] kasan_save_stack+0x3c/0x68 [ 34.154349] kasan_save_track+0x20/0x40 [ 34.155941] kasan_save_alloc_info+0x40/0x58 [ 34.156479] __kasan_kmalloc+0xd4/0xd8 [ 34.157080] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.157726] kasan_atomics+0xb8/0x2e8 [ 34.158368] kunit_try_run_case+0x14c/0x3d0 [ 34.158945] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.159797] kthread+0x24c/0x2d0 [ 34.160759] ret_from_fork+0x10/0x20 [ 34.161681] [ 34.162297] The buggy address belongs to the object at fff00000c664f800 [ 34.162297] which belongs to the cache kmalloc-64 of size 64 [ 34.164162] The buggy address is located 0 bytes to the right of [ 34.164162] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.165571] [ 34.165866] The buggy address belongs to the physical page: [ 34.166785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.168016] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.168816] page_type: f5(slab) [ 34.169320] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.170780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.172289] page dumped because: kasan: bad access detected [ 34.173231] [ 34.173411] Memory state around the buggy address: [ 34.173717] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.174789] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.176155] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.177377] ^ [ 34.178387] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.178944] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.180370] ================================================================== [ 34.648792] ================================================================== [ 34.649598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 34.650412] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.651449] [ 34.652042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.653348] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.653779] Hardware name: linux,dummy-virt (DT) [ 34.654507] Call trace: [ 34.654865] show_stack+0x20/0x38 (C) [ 34.655513] dump_stack_lvl+0x8c/0xd0 [ 34.656266] print_report+0x118/0x5e0 [ 34.656773] kasan_report+0xc8/0x118 [ 34.657446] kasan_check_range+0x100/0x1a8 [ 34.658044] __kasan_check_write+0x20/0x30 [ 34.658715] kasan_atomics_helper+0x61c/0x4858 [ 34.659428] kasan_atomics+0x198/0x2e8 [ 34.660122] kunit_try_run_case+0x14c/0x3d0 [ 34.660759] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.661516] kthread+0x24c/0x2d0 [ 34.662065] ret_from_fork+0x10/0x20 [ 34.662711] [ 34.663108] Allocated by task 254: [ 34.663591] kasan_save_stack+0x3c/0x68 [ 34.664206] kasan_save_track+0x20/0x40 [ 34.664761] kasan_save_alloc_info+0x40/0x58 [ 34.665483] __kasan_kmalloc+0xd4/0xd8 [ 34.665999] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.666743] kasan_atomics+0xb8/0x2e8 [ 34.667339] kunit_try_run_case+0x14c/0x3d0 [ 34.668067] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.668889] kthread+0x24c/0x2d0 [ 34.669315] ret_from_fork+0x10/0x20 [ 34.669921] [ 34.670319] The buggy address belongs to the object at fff00000c664f800 [ 34.670319] which belongs to the cache kmalloc-64 of size 64 [ 34.671679] The buggy address is located 0 bytes to the right of [ 34.671679] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.673093] [ 34.673466] The buggy address belongs to the physical page: [ 34.674219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.675158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.675965] page_type: f5(slab) [ 34.676422] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.677414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.678394] page dumped because: kasan: bad access detected [ 34.679112] [ 34.679458] Memory state around the buggy address: [ 34.680173] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.680982] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.681964] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.682865] ^ [ 34.683520] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.684428] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.685309] ================================================================== [ 34.728077] ================================================================== [ 34.728920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 34.729831] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.731005] [ 34.731477] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.733039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.733704] Hardware name: linux,dummy-virt (DT) [ 34.734418] Call trace: [ 34.734952] show_stack+0x20/0x38 (C) [ 34.735557] dump_stack_lvl+0x8c/0xd0 [ 34.736289] print_report+0x118/0x5e0 [ 34.736984] kasan_report+0xc8/0x118 [ 34.737611] kasan_check_range+0x100/0x1a8 [ 34.738301] __kasan_check_write+0x20/0x30 [ 34.739005] kasan_atomics_helper+0x6ec/0x4858 [ 34.739801] kasan_atomics+0x198/0x2e8 [ 34.740536] kunit_try_run_case+0x14c/0x3d0 [ 34.741234] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.742108] kthread+0x24c/0x2d0 [ 34.742630] ret_from_fork+0x10/0x20 [ 34.743293] [ 34.743626] Allocated by task 254: [ 34.744258] kasan_save_stack+0x3c/0x68 [ 34.744964] kasan_save_track+0x20/0x40 [ 34.745713] kasan_save_alloc_info+0x40/0x58 [ 34.746405] __kasan_kmalloc+0xd4/0xd8 [ 34.747074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.747765] kasan_atomics+0xb8/0x2e8 [ 34.748388] kunit_try_run_case+0x14c/0x3d0 [ 34.749147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.749950] kthread+0x24c/0x2d0 [ 34.750568] ret_from_fork+0x10/0x20 [ 34.751321] [ 34.751772] The buggy address belongs to the object at fff00000c664f800 [ 34.751772] which belongs to the cache kmalloc-64 of size 64 [ 34.753239] The buggy address is located 0 bytes to the right of [ 34.753239] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.754794] [ 34.755296] The buggy address belongs to the physical page: [ 34.756113] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.757109] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.757976] page_type: f5(slab) [ 34.758521] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.759529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.760476] page dumped because: kasan: bad access detected [ 34.761236] [ 34.761567] Memory state around the buggy address: [ 34.762343] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.763323] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.764330] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.765246] ^ [ 34.765973] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.766984] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.767866] ================================================================== [ 36.273066] ================================================================== [ 36.273892] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 36.275764] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.276734] [ 36.277236] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.278485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.279132] Hardware name: linux,dummy-virt (DT) [ 36.279865] Call trace: [ 36.280443] show_stack+0x20/0x38 (C) [ 36.281122] dump_stack_lvl+0x8c/0xd0 [ 36.281766] print_report+0x118/0x5e0 [ 36.282423] kasan_report+0xc8/0x118 [ 36.283064] kasan_check_range+0x100/0x1a8 [ 36.283708] __kasan_check_write+0x20/0x30 [ 36.284401] kasan_atomics_helper+0x15b4/0x4858 [ 36.285123] kasan_atomics+0x198/0x2e8 [ 36.285754] kunit_try_run_case+0x14c/0x3d0 [ 36.286450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.287256] kthread+0x24c/0x2d0 [ 36.287857] ret_from_fork+0x10/0x20 [ 36.288577] [ 36.288922] Allocated by task 254: [ 36.289509] kasan_save_stack+0x3c/0x68 [ 36.290163] kasan_save_track+0x20/0x40 [ 36.290863] kasan_save_alloc_info+0x40/0x58 [ 36.291596] __kasan_kmalloc+0xd4/0xd8 [ 36.292330] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.293042] kasan_atomics+0xb8/0x2e8 [ 36.293594] kunit_try_run_case+0x14c/0x3d0 [ 36.294261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.295100] kthread+0x24c/0x2d0 [ 36.295653] ret_from_fork+0x10/0x20 [ 36.296306] [ 36.296722] The buggy address belongs to the object at fff00000c664f800 [ 36.296722] which belongs to the cache kmalloc-64 of size 64 [ 36.298157] The buggy address is located 0 bytes to the right of [ 36.298157] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.299757] [ 36.300211] The buggy address belongs to the physical page: [ 36.301055] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.302068] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.302945] page_type: f5(slab) [ 36.303522] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.304477] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.305443] page dumped because: kasan: bad access detected [ 36.306227] [ 36.306693] Memory state around the buggy address: [ 36.307366] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.308385] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.309401] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.310347] ^ [ 36.311099] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.312128] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.313038] ================================================================== [ 34.323497] ================================================================== [ 34.324287] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 34.326032] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.327027] [ 34.327721] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.329042] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.329593] Hardware name: linux,dummy-virt (DT) [ 34.330326] Call trace: [ 34.330772] show_stack+0x20/0x38 (C) [ 34.331908] dump_stack_lvl+0x8c/0xd0 [ 34.332578] print_report+0x118/0x5e0 [ 34.333319] kasan_report+0xc8/0x118 [ 34.333964] kasan_check_range+0x100/0x1a8 [ 34.334599] __kasan_check_write+0x20/0x30 [ 34.335270] kasan_atomics_helper+0x32c/0x4858 [ 34.336233] kasan_atomics+0x198/0x2e8 [ 34.336892] kunit_try_run_case+0x14c/0x3d0 [ 34.337694] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.338504] kthread+0x24c/0x2d0 [ 34.339141] ret_from_fork+0x10/0x20 [ 34.339930] [ 34.340616] Allocated by task 254: [ 34.341312] kasan_save_stack+0x3c/0x68 [ 34.341795] kasan_save_track+0x20/0x40 [ 34.342450] kasan_save_alloc_info+0x40/0x58 [ 34.343749] __kasan_kmalloc+0xd4/0xd8 [ 34.344340] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.344947] kasan_atomics+0xb8/0x2e8 [ 34.345441] kunit_try_run_case+0x14c/0x3d0 [ 34.346080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.346870] kthread+0x24c/0x2d0 [ 34.347447] ret_from_fork+0x10/0x20 [ 34.347998] [ 34.348274] The buggy address belongs to the object at fff00000c664f800 [ 34.348274] which belongs to the cache kmalloc-64 of size 64 [ 34.351078] The buggy address is located 0 bytes to the right of [ 34.351078] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.352442] [ 34.353250] The buggy address belongs to the physical page: [ 34.354186] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.355400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.356675] page_type: f5(slab) [ 34.357787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.358902] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.359944] page dumped because: kasan: bad access detected [ 34.360689] [ 34.361370] Memory state around the buggy address: [ 34.361871] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.362821] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.364150] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.364895] ^ [ 34.365622] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.366458] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.367357] ================================================================== [ 34.854270] ================================================================== [ 34.854977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 34.856257] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.857644] [ 34.858018] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.859424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.860190] Hardware name: linux,dummy-virt (DT) [ 34.860751] Call trace: [ 34.861207] show_stack+0x20/0x38 (C) [ 34.861509] dump_stack_lvl+0x8c/0xd0 [ 34.861806] print_report+0x118/0x5e0 [ 34.862688] kasan_report+0xc8/0x118 [ 34.863509] kasan_check_range+0x100/0x1a8 [ 34.864131] __kasan_check_write+0x20/0x30 [ 34.864746] kasan_atomics_helper+0x894/0x4858 [ 34.865434] kasan_atomics+0x198/0x2e8 [ 34.866006] kunit_try_run_case+0x14c/0x3d0 [ 34.866702] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.867515] kthread+0x24c/0x2d0 [ 34.868011] ret_from_fork+0x10/0x20 [ 34.868518] [ 34.868861] Allocated by task 254: [ 34.869400] kasan_save_stack+0x3c/0x68 [ 34.870082] kasan_save_track+0x20/0x40 [ 34.870847] kasan_save_alloc_info+0x40/0x58 [ 34.871647] __kasan_kmalloc+0xd4/0xd8 [ 34.872366] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.873052] kasan_atomics+0xb8/0x2e8 [ 34.873708] kunit_try_run_case+0x14c/0x3d0 [ 34.874488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.875290] kthread+0x24c/0x2d0 [ 34.875995] ret_from_fork+0x10/0x20 [ 34.876662] [ 34.877106] The buggy address belongs to the object at fff00000c664f800 [ 34.877106] which belongs to the cache kmalloc-64 of size 64 [ 34.878229] The buggy address is located 0 bytes to the right of [ 34.878229] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.878936] [ 34.879314] The buggy address belongs to the physical page: [ 34.880102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.880980] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.882104] page_type: f5(slab) [ 34.882558] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.883572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.884654] page dumped because: kasan: bad access detected [ 34.885456] [ 34.885934] Memory state around the buggy address: [ 34.886641] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.887656] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.888562] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.889508] ^ [ 34.890245] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.891193] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.892199] ================================================================== [ 36.507772] ================================================================== [ 36.508517] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 36.510446] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.512569] [ 36.513176] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.514391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.514948] Hardware name: linux,dummy-virt (DT) [ 36.515553] Call trace: [ 36.515959] show_stack+0x20/0x38 (C) [ 36.516528] dump_stack_lvl+0x8c/0xd0 [ 36.517241] print_report+0x118/0x5e0 [ 36.517803] kasan_report+0xc8/0x118 [ 36.518454] kasan_check_range+0x100/0x1a8 [ 36.519091] __kasan_check_write+0x20/0x30 [ 36.519705] kasan_atomics_helper+0x175c/0x4858 [ 36.520386] kasan_atomics+0x198/0x2e8 [ 36.521040] kunit_try_run_case+0x14c/0x3d0 [ 36.521760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.522487] kthread+0x24c/0x2d0 [ 36.523028] ret_from_fork+0x10/0x20 [ 36.523523] [ 36.523977] Allocated by task 254: [ 36.524530] kasan_save_stack+0x3c/0x68 [ 36.525033] kasan_save_track+0x20/0x40 [ 36.525737] kasan_save_alloc_info+0x40/0x58 [ 36.526350] __kasan_kmalloc+0xd4/0xd8 [ 36.527024] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.527641] kasan_atomics+0xb8/0x2e8 [ 36.528124] kunit_try_run_case+0x14c/0x3d0 [ 36.528808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.529582] kthread+0x24c/0x2d0 [ 36.530081] ret_from_fork+0x10/0x20 [ 36.530712] [ 36.531077] The buggy address belongs to the object at fff00000c664f800 [ 36.531077] which belongs to the cache kmalloc-64 of size 64 [ 36.532396] The buggy address is located 0 bytes to the right of [ 36.532396] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.533840] [ 36.534236] The buggy address belongs to the physical page: [ 36.535134] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.536268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.537262] page_type: f5(slab) [ 36.537958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.538846] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.539852] page dumped because: kasan: bad access detected [ 36.540552] [ 36.541105] Memory state around the buggy address: [ 36.541772] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.542663] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.543546] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.544430] ^ [ 36.545118] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.546091] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.547024] ================================================================== [ 34.893763] ================================================================== [ 34.894424] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 34.896802] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.897989] [ 34.898442] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.899560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.900138] Hardware name: linux,dummy-virt (DT) [ 34.900996] Call trace: [ 34.901603] show_stack+0x20/0x38 (C) [ 34.902410] dump_stack_lvl+0x8c/0xd0 [ 34.903206] print_report+0x118/0x5e0 [ 34.903818] kasan_report+0xc8/0x118 [ 34.904284] __asan_report_load4_noabort+0x20/0x30 [ 34.905215] kasan_atomics_helper+0x42d8/0x4858 [ 34.905775] kasan_atomics+0x198/0x2e8 [ 34.906349] kunit_try_run_case+0x14c/0x3d0 [ 34.906986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.907674] kthread+0x24c/0x2d0 [ 34.908264] ret_from_fork+0x10/0x20 [ 34.908779] [ 34.909138] Allocated by task 254: [ 34.909816] kasan_save_stack+0x3c/0x68 [ 34.910446] kasan_save_track+0x20/0x40 [ 34.911036] kasan_save_alloc_info+0x40/0x58 [ 34.911748] __kasan_kmalloc+0xd4/0xd8 [ 34.912420] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.912961] kasan_atomics+0xb8/0x2e8 [ 34.913574] kunit_try_run_case+0x14c/0x3d0 [ 34.914273] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.915082] kthread+0x24c/0x2d0 [ 34.915578] ret_from_fork+0x10/0x20 [ 34.916224] [ 34.916591] The buggy address belongs to the object at fff00000c664f800 [ 34.916591] which belongs to the cache kmalloc-64 of size 64 [ 34.918006] The buggy address is located 0 bytes to the right of [ 34.918006] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.919445] [ 34.919726] The buggy address belongs to the physical page: [ 34.920489] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.921364] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.922315] page_type: f5(slab) [ 34.922747] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.923705] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.924617] page dumped because: kasan: bad access detected [ 34.925318] [ 34.925627] Memory state around the buggy address: [ 34.926290] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.927182] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.928125] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.928965] ^ [ 34.929594] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.930502] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.931325] ================================================================== [ 35.199084] ================================================================== [ 35.200293] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 35.201448] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.202490] [ 35.202953] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.204337] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.204912] Hardware name: linux,dummy-virt (DT) [ 35.205509] Call trace: [ 35.206002] show_stack+0x20/0x38 (C) [ 35.206651] dump_stack_lvl+0x8c/0xd0 [ 35.207289] print_report+0x118/0x5e0 [ 35.207810] kasan_report+0xc8/0x118 [ 35.208453] __asan_report_load4_noabort+0x20/0x30 [ 35.209134] kasan_atomics_helper+0x3dbc/0x4858 [ 35.209761] kasan_atomics+0x198/0x2e8 [ 35.210438] kunit_try_run_case+0x14c/0x3d0 [ 35.211006] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.211841] kthread+0x24c/0x2d0 [ 35.212503] ret_from_fork+0x10/0x20 [ 35.213041] [ 35.213417] Allocated by task 254: [ 35.213915] kasan_save_stack+0x3c/0x68 [ 35.214436] kasan_save_track+0x20/0x40 [ 35.215203] kasan_save_alloc_info+0x40/0x58 [ 35.215831] __kasan_kmalloc+0xd4/0xd8 [ 35.216333] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.217111] kasan_atomics+0xb8/0x2e8 [ 35.217649] kunit_try_run_case+0x14c/0x3d0 [ 35.218300] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.219081] kthread+0x24c/0x2d0 [ 35.219702] ret_from_fork+0x10/0x20 [ 35.220333] [ 35.220642] The buggy address belongs to the object at fff00000c664f800 [ 35.220642] which belongs to the cache kmalloc-64 of size 64 [ 35.222088] The buggy address is located 0 bytes to the right of [ 35.222088] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.223482] [ 35.223765] The buggy address belongs to the physical page: [ 35.224523] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.225601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.226360] page_type: f5(slab) [ 35.226861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.228163] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.228900] page dumped because: kasan: bad access detected [ 35.229552] [ 35.229924] Memory state around the buggy address: [ 35.230630] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.231453] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.232354] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.233305] ^ [ 35.233920] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.234849] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.235705] ================================================================== [ 34.411566] ================================================================== [ 34.412244] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 34.414379] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.415458] [ 34.415791] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.417032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.417649] Hardware name: linux,dummy-virt (DT) [ 34.418239] Call trace: [ 34.418630] show_stack+0x20/0x38 (C) [ 34.419325] dump_stack_lvl+0x8c/0xd0 [ 34.419895] print_report+0x118/0x5e0 [ 34.420454] kasan_report+0xc8/0x118 [ 34.421541] kasan_check_range+0x100/0x1a8 [ 34.422063] __kasan_check_write+0x20/0x30 [ 34.422704] kasan_atomics_helper+0x3ac/0x4858 [ 34.423720] kasan_atomics+0x198/0x2e8 [ 34.424315] kunit_try_run_case+0x14c/0x3d0 [ 34.425003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.425805] kthread+0x24c/0x2d0 [ 34.426425] ret_from_fork+0x10/0x20 [ 34.427099] [ 34.427960] Allocated by task 254: [ 34.428611] kasan_save_stack+0x3c/0x68 [ 34.429268] kasan_save_track+0x20/0x40 [ 34.429958] kasan_save_alloc_info+0x40/0x58 [ 34.430847] __kasan_kmalloc+0xd4/0xd8 [ 34.431855] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.432568] kasan_atomics+0xb8/0x2e8 [ 34.433104] kunit_try_run_case+0x14c/0x3d0 [ 34.433751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.434356] kthread+0x24c/0x2d0 [ 34.434981] ret_from_fork+0x10/0x20 [ 34.435438] [ 34.435987] The buggy address belongs to the object at fff00000c664f800 [ 34.435987] which belongs to the cache kmalloc-64 of size 64 [ 34.437413] The buggy address is located 0 bytes to the right of [ 34.437413] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.438843] [ 34.439156] The buggy address belongs to the physical page: [ 34.440181] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.441057] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.441923] page_type: f5(slab) [ 34.442569] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.443777] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.444767] page dumped because: kasan: bad access detected [ 34.445751] [ 34.446135] Memory state around the buggy address: [ 34.446909] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.447698] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.448992] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.449917] ^ [ 34.450664] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.451744] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.452603] ================================================================== [ 35.313851] ================================================================== [ 35.314645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 35.315561] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.316519] [ 35.316921] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.318029] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.318697] Hardware name: linux,dummy-virt (DT) [ 35.319328] Call trace: [ 35.319754] show_stack+0x20/0x38 (C) [ 35.320388] dump_stack_lvl+0x8c/0xd0 [ 35.321118] print_report+0x118/0x5e0 [ 35.321721] kasan_report+0xc8/0x118 [ 35.322366] kasan_check_range+0x100/0x1a8 [ 35.323003] __kasan_check_write+0x20/0x30 [ 35.323697] kasan_atomics_helper+0xca0/0x4858 [ 35.324313] kasan_atomics+0x198/0x2e8 [ 35.324959] kunit_try_run_case+0x14c/0x3d0 [ 35.325758] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.326592] kthread+0x24c/0x2d0 [ 35.327094] ret_from_fork+0x10/0x20 [ 35.327650] [ 35.328063] Allocated by task 254: [ 35.328529] kasan_save_stack+0x3c/0x68 [ 35.329216] kasan_save_track+0x20/0x40 [ 35.329825] kasan_save_alloc_info+0x40/0x58 [ 35.330463] __kasan_kmalloc+0xd4/0xd8 [ 35.331002] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.331701] kasan_atomics+0xb8/0x2e8 [ 35.332164] kunit_try_run_case+0x14c/0x3d0 [ 35.332830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.333600] kthread+0x24c/0x2d0 [ 35.334143] ret_from_fork+0x10/0x20 [ 35.334719] [ 35.335022] The buggy address belongs to the object at fff00000c664f800 [ 35.335022] which belongs to the cache kmalloc-64 of size 64 [ 35.336431] The buggy address is located 0 bytes to the right of [ 35.336431] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.337794] [ 35.338096] The buggy address belongs to the physical page: [ 35.338812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.339835] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.340750] page_type: f5(slab) [ 35.341332] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.342284] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.343170] page dumped because: kasan: bad access detected [ 35.343834] [ 35.344240] Memory state around the buggy address: [ 35.344913] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.345756] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.346729] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.347564] ^ [ 35.348213] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.349147] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.350026] ================================================================== [ 35.620138] ================================================================== [ 35.621157] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 35.621556] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.622036] [ 35.622411] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.623767] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.624340] Hardware name: linux,dummy-virt (DT) [ 35.625126] Call trace: [ 35.625523] show_stack+0x20/0x38 (C) [ 35.626149] dump_stack_lvl+0x8c/0xd0 [ 35.626802] print_report+0x118/0x5e0 [ 35.627452] kasan_report+0xc8/0x118 [ 35.628131] kasan_check_range+0x100/0x1a8 [ 35.628712] __kasan_check_write+0x20/0x30 [ 35.629438] kasan_atomics_helper+0xeb8/0x4858 [ 35.630052] kasan_atomics+0x198/0x2e8 [ 35.630743] kunit_try_run_case+0x14c/0x3d0 [ 35.631281] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.632150] kthread+0x24c/0x2d0 [ 35.632727] ret_from_fork+0x10/0x20 [ 35.633368] [ 35.633698] Allocated by task 254: [ 35.634134] kasan_save_stack+0x3c/0x68 [ 35.634828] kasan_save_track+0x20/0x40 [ 35.635499] kasan_save_alloc_info+0x40/0x58 [ 35.636205] __kasan_kmalloc+0xd4/0xd8 [ 35.636776] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.637333] kasan_atomics+0xb8/0x2e8 [ 35.638013] kunit_try_run_case+0x14c/0x3d0 [ 35.638622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.639381] kthread+0x24c/0x2d0 [ 35.639860] ret_from_fork+0x10/0x20 [ 35.640417] [ 35.640757] The buggy address belongs to the object at fff00000c664f800 [ 35.640757] which belongs to the cache kmalloc-64 of size 64 [ 35.642185] The buggy address is located 0 bytes to the right of [ 35.642185] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.643609] [ 35.643929] The buggy address belongs to the physical page: [ 35.644862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.645782] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.646585] page_type: f5(slab) [ 35.647115] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.648046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.649049] page dumped because: kasan: bad access detected [ 35.649668] [ 35.650043] Memory state around the buggy address: [ 35.650572] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.651563] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.652393] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.653347] ^ [ 35.654010] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.654850] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.655705] ================================================================== [ 35.851988] ================================================================== [ 35.852813] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 35.853620] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.854401] [ 35.854810] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.856039] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.856676] Hardware name: linux,dummy-virt (DT) [ 35.857363] Call trace: [ 35.857840] show_stack+0x20/0x38 (C) [ 35.858435] dump_stack_lvl+0x8c/0xd0 [ 35.859100] print_report+0x118/0x5e0 [ 35.859772] kasan_report+0xc8/0x118 [ 35.860427] kasan_check_range+0x100/0x1a8 [ 35.861039] __kasan_check_write+0x20/0x30 [ 35.861738] kasan_atomics_helper+0x1128/0x4858 [ 35.862417] kasan_atomics+0x198/0x2e8 [ 35.863038] kunit_try_run_case+0x14c/0x3d0 [ 35.863631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.864340] kthread+0x24c/0x2d0 [ 35.864921] ret_from_fork+0x10/0x20 [ 35.865493] [ 35.865769] Allocated by task 254: [ 35.866348] kasan_save_stack+0x3c/0x68 [ 35.866944] kasan_save_track+0x20/0x40 [ 35.867569] kasan_save_alloc_info+0x40/0x58 [ 35.868118] __kasan_kmalloc+0xd4/0xd8 [ 35.868756] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.869309] kasan_atomics+0xb8/0x2e8 [ 35.870083] kunit_try_run_case+0x14c/0x3d0 [ 35.870594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.871444] kthread+0x24c/0x2d0 [ 35.871974] ret_from_fork+0x10/0x20 [ 35.872513] [ 35.872839] The buggy address belongs to the object at fff00000c664f800 [ 35.872839] which belongs to the cache kmalloc-64 of size 64 [ 35.874311] The buggy address is located 0 bytes to the right of [ 35.874311] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.875763] [ 35.876129] The buggy address belongs to the physical page: [ 35.876919] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.877761] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.878674] page_type: f5(slab) [ 35.879197] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.880131] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.881082] page dumped because: kasan: bad access detected [ 35.881731] [ 35.882111] Memory state around the buggy address: [ 35.882777] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.883628] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.884452] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.885374] ^ [ 35.885967] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.886860] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.887692] ================================================================== [ 35.657214] ================================================================== [ 35.658033] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 35.659141] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.660308] [ 35.660672] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.661868] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.662525] Hardware name: linux,dummy-virt (DT) [ 35.663141] Call trace: [ 35.663675] show_stack+0x20/0x38 (C) [ 35.664340] dump_stack_lvl+0x8c/0xd0 [ 35.664947] print_report+0x118/0x5e0 [ 35.665524] kasan_report+0xc8/0x118 [ 35.666088] kasan_check_range+0x100/0x1a8 [ 35.666687] __kasan_check_write+0x20/0x30 [ 35.667458] kasan_atomics_helper+0xf20/0x4858 [ 35.668092] kasan_atomics+0x198/0x2e8 [ 35.668734] kunit_try_run_case+0x14c/0x3d0 [ 35.669390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.670196] kthread+0x24c/0x2d0 [ 35.670822] ret_from_fork+0x10/0x20 [ 35.671377] [ 35.671713] Allocated by task 254: [ 35.672205] kasan_save_stack+0x3c/0x68 [ 35.672846] kasan_save_track+0x20/0x40 [ 35.673423] kasan_save_alloc_info+0x40/0x58 [ 35.673972] __kasan_kmalloc+0xd4/0xd8 [ 35.674645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.675298] kasan_atomics+0xb8/0x2e8 [ 35.675951] kunit_try_run_case+0x14c/0x3d0 [ 35.676581] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.677437] kthread+0x24c/0x2d0 [ 35.677951] ret_from_fork+0x10/0x20 [ 35.678421] [ 35.678824] The buggy address belongs to the object at fff00000c664f800 [ 35.678824] which belongs to the cache kmalloc-64 of size 64 [ 35.680262] The buggy address is located 0 bytes to the right of [ 35.680262] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.681680] [ 35.682088] The buggy address belongs to the physical page: [ 35.682906] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.683805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.684607] page_type: f5(slab) [ 35.685182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.686142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.687138] page dumped because: kasan: bad access detected [ 35.687799] [ 35.688138] Memory state around the buggy address: [ 35.688744] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.689588] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.690457] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.691416] ^ [ 35.692050] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.692936] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.693758] ================================================================== [ 35.083957] ================================================================== [ 35.084681] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 35.085662] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.086505] [ 35.086899] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.088188] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.088679] Hardware name: linux,dummy-virt (DT) [ 35.089436] Call trace: [ 35.089867] show_stack+0x20/0x38 (C) [ 35.090528] dump_stack_lvl+0x8c/0xd0 [ 35.091219] print_report+0x118/0x5e0 [ 35.091762] kasan_report+0xc8/0x118 [ 35.092521] kasan_check_range+0x100/0x1a8 [ 35.093104] __kasan_check_write+0x20/0x30 [ 35.093839] kasan_atomics_helper+0xad4/0x4858 [ 35.094598] kasan_atomics+0x198/0x2e8 [ 35.095156] kunit_try_run_case+0x14c/0x3d0 [ 35.095778] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.096461] kthread+0x24c/0x2d0 [ 35.097110] ret_from_fork+0x10/0x20 [ 35.097695] [ 35.098053] Allocated by task 254: [ 35.098615] kasan_save_stack+0x3c/0x68 [ 35.099229] kasan_save_track+0x20/0x40 [ 35.099689] kasan_save_alloc_info+0x40/0x58 [ 35.100383] __kasan_kmalloc+0xd4/0xd8 [ 35.100982] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.101496] kasan_atomics+0xb8/0x2e8 [ 35.102149] kunit_try_run_case+0x14c/0x3d0 [ 35.102772] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.103543] kthread+0x24c/0x2d0 [ 35.104145] ret_from_fork+0x10/0x20 [ 35.104650] [ 35.104985] The buggy address belongs to the object at fff00000c664f800 [ 35.104985] which belongs to the cache kmalloc-64 of size 64 [ 35.106394] The buggy address is located 0 bytes to the right of [ 35.106394] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.107827] [ 35.108196] The buggy address belongs to the physical page: [ 35.109097] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.109959] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.110905] page_type: f5(slab) [ 35.111406] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.112362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.113377] page dumped because: kasan: bad access detected [ 35.114058] [ 35.114424] Memory state around the buggy address: [ 35.115258] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.116043] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.116963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.117797] ^ [ 35.118408] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.119344] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.120189] ================================================================== [ 34.368641] ================================================================== [ 34.369533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 34.370541] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.372217] [ 34.372708] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.373842] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.374531] Hardware name: linux,dummy-virt (DT) [ 34.375035] Call trace: [ 34.375626] show_stack+0x20/0x38 (C) [ 34.376256] dump_stack_lvl+0x8c/0xd0 [ 34.376866] print_report+0x118/0x5e0 [ 34.377441] kasan_report+0xc8/0x118 [ 34.378236] __asan_report_store4_noabort+0x20/0x30 [ 34.378938] kasan_atomics_helper+0x3f94/0x4858 [ 34.380306] kasan_atomics+0x198/0x2e8 [ 34.380866] kunit_try_run_case+0x14c/0x3d0 [ 34.381523] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.382340] kthread+0x24c/0x2d0 [ 34.382994] ret_from_fork+0x10/0x20 [ 34.383824] [ 34.384260] Allocated by task 254: [ 34.384616] kasan_save_stack+0x3c/0x68 [ 34.385327] kasan_save_track+0x20/0x40 [ 34.385897] kasan_save_alloc_info+0x40/0x58 [ 34.386649] __kasan_kmalloc+0xd4/0xd8 [ 34.387270] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.388385] kasan_atomics+0xb8/0x2e8 [ 34.389482] kunit_try_run_case+0x14c/0x3d0 [ 34.390080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.391045] kthread+0x24c/0x2d0 [ 34.391595] ret_from_fork+0x10/0x20 [ 34.392179] [ 34.392533] The buggy address belongs to the object at fff00000c664f800 [ 34.392533] which belongs to the cache kmalloc-64 of size 64 [ 34.394037] The buggy address is located 0 bytes to the right of [ 34.394037] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.395916] [ 34.396630] The buggy address belongs to the physical page: [ 34.397238] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.398386] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.399422] page_type: f5(slab) [ 34.399958] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.401461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.402513] page dumped because: kasan: bad access detected [ 34.403657] [ 34.404074] Memory state around the buggy address: [ 34.405161] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.405581] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.406386] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.407800] ^ [ 34.408466] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.409248] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.410138] ================================================================== [ 36.195622] ================================================================== [ 36.196200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 36.197759] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.198839] [ 36.199429] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.200679] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.201327] Hardware name: linux,dummy-virt (DT) [ 36.202042] Call trace: [ 36.202520] show_stack+0x20/0x38 (C) [ 36.203262] dump_stack_lvl+0x8c/0xd0 [ 36.203896] print_report+0x118/0x5e0 [ 36.204469] kasan_report+0xc8/0x118 [ 36.205103] kasan_check_range+0x100/0x1a8 [ 36.205703] __kasan_check_write+0x20/0x30 [ 36.206426] kasan_atomics_helper+0x14e4/0x4858 [ 36.207042] kasan_atomics+0x198/0x2e8 [ 36.207711] kunit_try_run_case+0x14c/0x3d0 [ 36.208368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.209026] kthread+0x24c/0x2d0 [ 36.209700] ret_from_fork+0x10/0x20 [ 36.210297] [ 36.210611] Allocated by task 254: [ 36.211233] kasan_save_stack+0x3c/0x68 [ 36.211738] kasan_save_track+0x20/0x40 [ 36.212398] kasan_save_alloc_info+0x40/0x58 [ 36.212950] __kasan_kmalloc+0xd4/0xd8 [ 36.213644] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.214243] kasan_atomics+0xb8/0x2e8 [ 36.214946] kunit_try_run_case+0x14c/0x3d0 [ 36.215538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.216170] kthread+0x24c/0x2d0 [ 36.216717] ret_from_fork+0x10/0x20 [ 36.217278] [ 36.217602] The buggy address belongs to the object at fff00000c664f800 [ 36.217602] which belongs to the cache kmalloc-64 of size 64 [ 36.219056] The buggy address is located 0 bytes to the right of [ 36.219056] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.220401] [ 36.220723] The buggy address belongs to the physical page: [ 36.221556] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.222439] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.223242] page_type: f5(slab) [ 36.223779] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.224675] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.225633] page dumped because: kasan: bad access detected [ 36.226321] [ 36.226623] Memory state around the buggy address: [ 36.227283] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.228143] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.229034] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.229897] ^ [ 36.230497] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.231480] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.232196] ================================================================== [ 36.470332] ================================================================== [ 36.471422] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 36.472128] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.472896] [ 36.473388] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.474475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.475164] Hardware name: linux,dummy-virt (DT) [ 36.475796] Call trace: [ 36.476242] show_stack+0x20/0x38 (C) [ 36.476748] dump_stack_lvl+0x8c/0xd0 [ 36.477414] print_report+0x118/0x5e0 [ 36.477924] kasan_report+0xc8/0x118 [ 36.478586] __asan_report_load8_noabort+0x20/0x30 [ 36.479298] kasan_atomics_helper+0x3e10/0x4858 [ 36.479964] kasan_atomics+0x198/0x2e8 [ 36.480631] kunit_try_run_case+0x14c/0x3d0 [ 36.481165] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.481989] kthread+0x24c/0x2d0 [ 36.482527] ret_from_fork+0x10/0x20 [ 36.483085] [ 36.483398] Allocated by task 254: [ 36.484013] kasan_save_stack+0x3c/0x68 [ 36.484611] kasan_save_track+0x20/0x40 [ 36.485140] kasan_save_alloc_info+0x40/0x58 [ 36.485849] __kasan_kmalloc+0xd4/0xd8 [ 36.486570] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.487132] kasan_atomics+0xb8/0x2e8 [ 36.487786] kunit_try_run_case+0x14c/0x3d0 [ 36.488454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.489221] kthread+0x24c/0x2d0 [ 36.489728] ret_from_fork+0x10/0x20 [ 36.490288] [ 36.490726] The buggy address belongs to the object at fff00000c664f800 [ 36.490726] which belongs to the cache kmalloc-64 of size 64 [ 36.492095] The buggy address is located 0 bytes to the right of [ 36.492095] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.493543] [ 36.493946] The buggy address belongs to the physical page: [ 36.494535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.495645] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.496512] page_type: f5(slab) [ 36.496956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.497966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.498942] page dumped because: kasan: bad access detected [ 36.499552] [ 36.499921] Memory state around the buggy address: [ 36.500569] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.501431] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.502258] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.503214] ^ [ 36.503932] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.504847] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.505703] ================================================================== [ 35.046785] ================================================================== [ 35.047482] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 35.048634] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.049557] [ 35.050042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.051093] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.051440] Hardware name: linux,dummy-virt (DT) [ 35.051744] Call trace: [ 35.052141] show_stack+0x20/0x38 (C) [ 35.052953] dump_stack_lvl+0x8c/0xd0 [ 35.053766] print_report+0x118/0x5e0 [ 35.054383] kasan_report+0xc8/0x118 [ 35.055005] kasan_check_range+0x100/0x1a8 [ 35.055702] __kasan_check_write+0x20/0x30 [ 35.056381] kasan_atomics_helper+0xa6c/0x4858 [ 35.057148] kasan_atomics+0x198/0x2e8 [ 35.057820] kunit_try_run_case+0x14c/0x3d0 [ 35.058453] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.059220] kthread+0x24c/0x2d0 [ 35.059845] ret_from_fork+0x10/0x20 [ 35.060403] [ 35.060747] Allocated by task 254: [ 35.061223] kasan_save_stack+0x3c/0x68 [ 35.061839] kasan_save_track+0x20/0x40 [ 35.062420] kasan_save_alloc_info+0x40/0x58 [ 35.063062] __kasan_kmalloc+0xd4/0xd8 [ 35.063576] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.064279] kasan_atomics+0xb8/0x2e8 [ 35.064752] kunit_try_run_case+0x14c/0x3d0 [ 35.065490] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.066131] kthread+0x24c/0x2d0 [ 35.066693] ret_from_fork+0x10/0x20 [ 35.067200] [ 35.067594] The buggy address belongs to the object at fff00000c664f800 [ 35.067594] which belongs to the cache kmalloc-64 of size 64 [ 35.069063] The buggy address is located 0 bytes to the right of [ 35.069063] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.070494] [ 35.070814] The buggy address belongs to the physical page: [ 35.071456] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.072476] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.073319] page_type: f5(slab) [ 35.073845] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.074832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.075763] page dumped because: kasan: bad access detected [ 35.076472] [ 35.076837] Memory state around the buggy address: [ 35.077445] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.078192] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.079268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.080091] ^ [ 35.080700] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.081591] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.082498] ================================================================== [ 35.122200] ================================================================== [ 35.122922] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 35.123969] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.125148] [ 35.125524] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.126983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.127600] Hardware name: linux,dummy-virt (DT) [ 35.128163] Call trace: [ 35.128379] show_stack+0x20/0x38 (C) [ 35.128672] dump_stack_lvl+0x8c/0xd0 [ 35.129053] print_report+0x118/0x5e0 [ 35.129995] kasan_report+0xc8/0x118 [ 35.130627] __asan_report_load4_noabort+0x20/0x30 [ 35.131400] kasan_atomics_helper+0x3dcc/0x4858 [ 35.132195] kasan_atomics+0x198/0x2e8 [ 35.132722] kunit_try_run_case+0x14c/0x3d0 [ 35.133514] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.134342] kthread+0x24c/0x2d0 [ 35.134976] ret_from_fork+0x10/0x20 [ 35.135605] [ 35.136010] Allocated by task 254: [ 35.136600] kasan_save_stack+0x3c/0x68 [ 35.137293] kasan_save_track+0x20/0x40 [ 35.138019] kasan_save_alloc_info+0x40/0x58 [ 35.138710] __kasan_kmalloc+0xd4/0xd8 [ 35.139373] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.140079] kasan_atomics+0xb8/0x2e8 [ 35.140682] kunit_try_run_case+0x14c/0x3d0 [ 35.141326] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.142135] kthread+0x24c/0x2d0 [ 35.142680] ret_from_fork+0x10/0x20 [ 35.143297] [ 35.143702] The buggy address belongs to the object at fff00000c664f800 [ 35.143702] which belongs to the cache kmalloc-64 of size 64 [ 35.145215] The buggy address is located 0 bytes to the right of [ 35.145215] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.146824] [ 35.147256] The buggy address belongs to the physical page: [ 35.147980] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.149054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.149938] page_type: f5(slab) [ 35.150524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.151492] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.152433] page dumped because: kasan: bad access detected [ 35.153214] [ 35.153545] Memory state around the buggy address: [ 35.154341] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.155244] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.156203] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.156969] ^ [ 35.157555] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.158706] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.159574] ================================================================== [ 35.733422] ================================================================== [ 35.734196] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 35.735134] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.736522] [ 35.736909] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.738110] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.738639] Hardware name: linux,dummy-virt (DT) [ 35.739244] Call trace: [ 35.739708] show_stack+0x20/0x38 (C) [ 35.740280] dump_stack_lvl+0x8c/0xd0 [ 35.740762] print_report+0x118/0x5e0 [ 35.741444] kasan_report+0xc8/0x118 [ 35.742034] kasan_check_range+0x100/0x1a8 [ 35.742637] __kasan_check_write+0x20/0x30 [ 35.743222] kasan_atomics_helper+0xff0/0x4858 [ 35.743926] kasan_atomics+0x198/0x2e8 [ 35.744595] kunit_try_run_case+0x14c/0x3d0 [ 35.745160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.746047] kthread+0x24c/0x2d0 [ 35.746649] ret_from_fork+0x10/0x20 [ 35.747244] [ 35.747555] Allocated by task 254: [ 35.748144] kasan_save_stack+0x3c/0x68 [ 35.748658] kasan_save_track+0x20/0x40 [ 35.749289] kasan_save_alloc_info+0x40/0x58 [ 35.749903] __kasan_kmalloc+0xd4/0xd8 [ 35.750489] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.751112] kasan_atomics+0xb8/0x2e8 [ 35.751635] kunit_try_run_case+0x14c/0x3d0 [ 35.752240] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.752976] kthread+0x24c/0x2d0 [ 35.753488] ret_from_fork+0x10/0x20 [ 35.754037] [ 35.754351] The buggy address belongs to the object at fff00000c664f800 [ 35.754351] which belongs to the cache kmalloc-64 of size 64 [ 35.755750] The buggy address is located 0 bytes to the right of [ 35.755750] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.757235] [ 35.757564] The buggy address belongs to the physical page: [ 35.758281] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.759252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.760186] page_type: f5(slab) [ 35.760739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.761657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.762604] page dumped because: kasan: bad access detected [ 35.763282] [ 35.763617] Memory state around the buggy address: [ 35.764268] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.765074] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.766000] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.766861] ^ [ 35.767510] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.768415] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.769308] ================================================================== [ 36.119828] ================================================================== [ 36.120465] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 36.121609] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.122458] [ 36.122767] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.124027] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.124586] Hardware name: linux,dummy-virt (DT) [ 36.125269] Call trace: [ 36.125794] show_stack+0x20/0x38 (C) [ 36.126389] dump_stack_lvl+0x8c/0xd0 [ 36.127126] print_report+0x118/0x5e0 [ 36.127673] kasan_report+0xc8/0x118 [ 36.128274] kasan_check_range+0x100/0x1a8 [ 36.128826] __kasan_check_write+0x20/0x30 [ 36.129578] kasan_atomics_helper+0x1414/0x4858 [ 36.130329] kasan_atomics+0x198/0x2e8 [ 36.130914] kunit_try_run_case+0x14c/0x3d0 [ 36.131564] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.132221] kthread+0x24c/0x2d0 [ 36.132862] ret_from_fork+0x10/0x20 [ 36.133391] [ 36.133761] Allocated by task 254: [ 36.134321] kasan_save_stack+0x3c/0x68 [ 36.134893] kasan_save_track+0x20/0x40 [ 36.135426] kasan_save_alloc_info+0x40/0x58 [ 36.136112] __kasan_kmalloc+0xd4/0xd8 [ 36.136665] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.137576] kasan_atomics+0xb8/0x2e8 [ 36.138339] kunit_try_run_case+0x14c/0x3d0 [ 36.139253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.139948] kthread+0x24c/0x2d0 [ 36.140404] ret_from_fork+0x10/0x20 [ 36.141002] [ 36.141361] The buggy address belongs to the object at fff00000c664f800 [ 36.141361] which belongs to the cache kmalloc-64 of size 64 [ 36.142746] The buggy address is located 0 bytes to the right of [ 36.142746] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.144159] [ 36.144458] The buggy address belongs to the physical page: [ 36.145175] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.146249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.146960] page_type: f5(slab) [ 36.147524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.148443] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.149358] page dumped because: kasan: bad access detected [ 36.150045] [ 36.150339] Memory state around the buggy address: [ 36.151023] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.151832] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.152664] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.153535] ^ [ 36.154202] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.155084] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.155936] ================================================================== [ 36.157729] ================================================================== [ 36.158473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 36.160311] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.161166] [ 36.161556] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.162778] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.163321] Hardware name: linux,dummy-virt (DT) [ 36.163917] Call trace: [ 36.164320] show_stack+0x20/0x38 (C) [ 36.164929] dump_stack_lvl+0x8c/0xd0 [ 36.165495] print_report+0x118/0x5e0 [ 36.166110] kasan_report+0xc8/0x118 [ 36.166768] kasan_check_range+0x100/0x1a8 [ 36.167339] __kasan_check_write+0x20/0x30 [ 36.168111] kasan_atomics_helper+0x147c/0x4858 [ 36.168668] kasan_atomics+0x198/0x2e8 [ 36.169070] kunit_try_run_case+0x14c/0x3d0 [ 36.169747] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.170503] kthread+0x24c/0x2d0 [ 36.171038] ret_from_fork+0x10/0x20 [ 36.171510] [ 36.171892] Allocated by task 254: [ 36.172524] kasan_save_stack+0x3c/0x68 [ 36.173108] kasan_save_track+0x20/0x40 [ 36.173621] kasan_save_alloc_info+0x40/0x58 [ 36.174355] __kasan_kmalloc+0xd4/0xd8 [ 36.174947] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.175531] kasan_atomics+0xb8/0x2e8 [ 36.176126] kunit_try_run_case+0x14c/0x3d0 [ 36.176730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.177492] kthread+0x24c/0x2d0 [ 36.178068] ret_from_fork+0x10/0x20 [ 36.178595] [ 36.178978] The buggy address belongs to the object at fff00000c664f800 [ 36.178978] which belongs to the cache kmalloc-64 of size 64 [ 36.180347] The buggy address is located 0 bytes to the right of [ 36.180347] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.181852] [ 36.182201] The buggy address belongs to the physical page: [ 36.183105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.183927] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.184793] page_type: f5(slab) [ 36.185311] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.186216] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.187172] page dumped because: kasan: bad access detected [ 36.187854] [ 36.188208] Memory state around the buggy address: [ 36.188944] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.189786] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.190620] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.191529] ^ [ 36.192299] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.193168] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.194039] ================================================================== [ 36.082083] ================================================================== [ 36.082947] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 36.084074] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.084892] [ 36.085283] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.086498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.087065] Hardware name: linux,dummy-virt (DT) [ 36.087791] Call trace: [ 36.088317] show_stack+0x20/0x38 (C) [ 36.088824] dump_stack_lvl+0x8c/0xd0 [ 36.089553] print_report+0x118/0x5e0 [ 36.090150] kasan_report+0xc8/0x118 [ 36.090891] __asan_report_load8_noabort+0x20/0x30 [ 36.091562] kasan_atomics_helper+0x3f04/0x4858 [ 36.092297] kasan_atomics+0x198/0x2e8 [ 36.092900] kunit_try_run_case+0x14c/0x3d0 [ 36.093592] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.094362] kthread+0x24c/0x2d0 [ 36.095032] ret_from_fork+0x10/0x20 [ 36.095671] [ 36.096100] Allocated by task 254: [ 36.096533] kasan_save_stack+0x3c/0x68 [ 36.097259] kasan_save_track+0x20/0x40 [ 36.097801] kasan_save_alloc_info+0x40/0x58 [ 36.098385] __kasan_kmalloc+0xd4/0xd8 [ 36.099041] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.099833] kasan_atomics+0xb8/0x2e8 [ 36.100362] kunit_try_run_case+0x14c/0x3d0 [ 36.101065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.101814] kthread+0x24c/0x2d0 [ 36.102331] ret_from_fork+0x10/0x20 [ 36.102844] [ 36.103219] The buggy address belongs to the object at fff00000c664f800 [ 36.103219] which belongs to the cache kmalloc-64 of size 64 [ 36.104684] The buggy address is located 0 bytes to the right of [ 36.104684] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.106067] [ 36.106393] The buggy address belongs to the physical page: [ 36.107078] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.108021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.108965] page_type: f5(slab) [ 36.109506] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.110529] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.111457] page dumped because: kasan: bad access detected [ 36.112228] [ 36.112535] Memory state around the buggy address: [ 36.113190] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.114094] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.115018] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.115819] ^ [ 36.116489] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.117358] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.118203] ================================================================== [ 34.686837] ================================================================== [ 34.687661] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 34.688511] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.689418] [ 34.689917] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.691470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.692137] Hardware name: linux,dummy-virt (DT) [ 34.692796] Call trace: [ 34.693270] show_stack+0x20/0x38 (C) [ 34.693983] dump_stack_lvl+0x8c/0xd0 [ 34.694665] print_report+0x118/0x5e0 [ 34.695340] kasan_report+0xc8/0x118 [ 34.695972] kasan_check_range+0x100/0x1a8 [ 34.696665] __kasan_check_write+0x20/0x30 [ 34.697357] kasan_atomics_helper+0x684/0x4858 [ 34.698064] kasan_atomics+0x198/0x2e8 [ 34.698735] kunit_try_run_case+0x14c/0x3d0 [ 34.699488] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.700297] kthread+0x24c/0x2d0 [ 34.700977] ret_from_fork+0x10/0x20 [ 34.701607] [ 34.701901] Allocated by task 254: [ 34.702459] kasan_save_stack+0x3c/0x68 [ 34.703157] kasan_save_track+0x20/0x40 [ 34.703791] kasan_save_alloc_info+0x40/0x58 [ 34.704455] __kasan_kmalloc+0xd4/0xd8 [ 34.705155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.705864] kasan_atomics+0xb8/0x2e8 [ 34.706487] kunit_try_run_case+0x14c/0x3d0 [ 34.707145] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.707951] kthread+0x24c/0x2d0 [ 34.708509] ret_from_fork+0x10/0x20 [ 34.709126] [ 34.709570] The buggy address belongs to the object at fff00000c664f800 [ 34.709570] which belongs to the cache kmalloc-64 of size 64 [ 34.710985] The buggy address is located 0 bytes to the right of [ 34.710985] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.712506] [ 34.712953] The buggy address belongs to the physical page: [ 34.713756] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.714813] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.715743] page_type: f5(slab) [ 34.716287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.717337] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.718277] page dumped because: kasan: bad access detected [ 34.719112] [ 34.719464] Memory state around the buggy address: [ 34.720215] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.721257] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.722165] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.723041] ^ [ 34.723793] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.724825] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.725712] ================================================================== [ 34.932776] ================================================================== [ 34.933406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 34.934523] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.935655] [ 34.936122] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.937314] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.937855] Hardware name: linux,dummy-virt (DT) [ 34.938442] Call trace: [ 34.938946] show_stack+0x20/0x38 (C) [ 34.939510] dump_stack_lvl+0x8c/0xd0 [ 34.940081] print_report+0x118/0x5e0 [ 34.940743] kasan_report+0xc8/0x118 [ 34.941254] kasan_check_range+0x100/0x1a8 [ 34.941918] __kasan_check_write+0x20/0x30 [ 34.942580] kasan_atomics_helper+0x934/0x4858 [ 34.943261] kasan_atomics+0x198/0x2e8 [ 34.943785] kunit_try_run_case+0x14c/0x3d0 [ 34.944533] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.945330] kthread+0x24c/0x2d0 [ 34.945925] ret_from_fork+0x10/0x20 [ 34.946514] [ 34.946847] Allocated by task 254: [ 34.947369] kasan_save_stack+0x3c/0x68 [ 34.947942] kasan_save_track+0x20/0x40 [ 34.948669] kasan_save_alloc_info+0x40/0x58 [ 34.949249] __kasan_kmalloc+0xd4/0xd8 [ 34.949897] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.950525] kasan_atomics+0xb8/0x2e8 [ 34.951107] kunit_try_run_case+0x14c/0x3d0 [ 34.951707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.952386] kthread+0x24c/0x2d0 [ 34.952980] ret_from_fork+0x10/0x20 [ 34.953542] [ 34.953863] The buggy address belongs to the object at fff00000c664f800 [ 34.953863] which belongs to the cache kmalloc-64 of size 64 [ 34.955168] The buggy address is located 0 bytes to the right of [ 34.955168] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.956581] [ 34.956899] The buggy address belongs to the physical page: [ 34.957594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.958662] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.959565] page_type: f5(slab) [ 34.960059] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.960950] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.961753] page dumped because: kasan: bad access detected [ 34.962588] [ 34.962957] Memory state around the buggy address: [ 34.963607] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.964508] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.965437] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.966233] ^ [ 34.966931] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.967832] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.968741] ================================================================== [ 35.277352] ================================================================== [ 35.278142] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 35.279025] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.279952] [ 35.280327] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.281689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.282310] Hardware name: linux,dummy-virt (DT) [ 35.283018] Call trace: [ 35.283411] show_stack+0x20/0x38 (C) [ 35.283992] dump_stack_lvl+0x8c/0xd0 [ 35.284546] print_report+0x118/0x5e0 [ 35.285220] kasan_report+0xc8/0x118 [ 35.285835] __asan_report_load4_noabort+0x20/0x30 [ 35.286582] kasan_atomics_helper+0x3de4/0x4858 [ 35.287313] kasan_atomics+0x198/0x2e8 [ 35.287899] kunit_try_run_case+0x14c/0x3d0 [ 35.288520] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.289241] kthread+0x24c/0x2d0 [ 35.289793] ret_from_fork+0x10/0x20 [ 35.290448] [ 35.290821] Allocated by task 254: [ 35.291323] kasan_save_stack+0x3c/0x68 [ 35.291996] kasan_save_track+0x20/0x40 [ 35.292569] kasan_save_alloc_info+0x40/0x58 [ 35.293192] __kasan_kmalloc+0xd4/0xd8 [ 35.293664] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.294393] kasan_atomics+0xb8/0x2e8 [ 35.295014] kunit_try_run_case+0x14c/0x3d0 [ 35.295620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.296403] kthread+0x24c/0x2d0 [ 35.296900] ret_from_fork+0x10/0x20 [ 35.297423] [ 35.297769] The buggy address belongs to the object at fff00000c664f800 [ 35.297769] which belongs to the cache kmalloc-64 of size 64 [ 35.299216] The buggy address is located 0 bytes to the right of [ 35.299216] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.300626] [ 35.300943] The buggy address belongs to the physical page: [ 35.301504] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.302632] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.303558] page_type: f5(slab) [ 35.304042] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.304956] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.305852] page dumped because: kasan: bad access detected [ 35.306553] [ 35.306900] Memory state around the buggy address: [ 35.307497] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.308396] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.309268] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.310128] ^ [ 35.310765] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.311682] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.312600] ================================================================== [ 35.928980] ================================================================== [ 35.929801] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 35.930492] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.932429] [ 35.932802] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.934077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.934700] Hardware name: linux,dummy-virt (DT) [ 35.935386] Call trace: [ 35.935905] show_stack+0x20/0x38 (C) [ 35.936486] dump_stack_lvl+0x8c/0xd0 [ 35.937079] print_report+0x118/0x5e0 [ 35.937591] kasan_report+0xc8/0x118 [ 35.938252] kasan_check_range+0x100/0x1a8 [ 35.938857] __kasan_check_write+0x20/0x30 [ 35.939416] kasan_atomics_helper+0x11f8/0x4858 [ 35.940201] kasan_atomics+0x198/0x2e8 [ 35.940774] kunit_try_run_case+0x14c/0x3d0 [ 35.941462] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.942261] kthread+0x24c/0x2d0 [ 35.942905] ret_from_fork+0x10/0x20 [ 35.943491] [ 35.943850] Allocated by task 254: [ 35.944319] kasan_save_stack+0x3c/0x68 [ 35.944962] kasan_save_track+0x20/0x40 [ 35.945517] kasan_save_alloc_info+0x40/0x58 [ 35.946131] __kasan_kmalloc+0xd4/0xd8 [ 35.946617] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.947341] kasan_atomics+0xb8/0x2e8 [ 35.947847] kunit_try_run_case+0x14c/0x3d0 [ 35.948504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.949197] kthread+0x24c/0x2d0 [ 35.949790] ret_from_fork+0x10/0x20 [ 35.950434] [ 35.950715] The buggy address belongs to the object at fff00000c664f800 [ 35.950715] which belongs to the cache kmalloc-64 of size 64 [ 35.952203] The buggy address is located 0 bytes to the right of [ 35.952203] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.953603] [ 35.953953] The buggy address belongs to the physical page: [ 35.954643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.955651] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.956575] page_type: f5(slab) [ 35.957054] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.958049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.958986] page dumped because: kasan: bad access detected [ 35.959716] [ 35.960101] Memory state around the buggy address: [ 35.960758] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.961585] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.962464] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.963430] ^ [ 35.964146] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965060] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.965892] ================================================================== [ 34.046355] ================================================================== [ 34.048029] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 34.049160] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.050084] [ 34.050574] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.052284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.053129] Hardware name: linux,dummy-virt (DT) [ 34.053928] Call trace: [ 34.054546] show_stack+0x20/0x38 (C) [ 34.055382] dump_stack_lvl+0x8c/0xd0 [ 34.056230] print_report+0x118/0x5e0 [ 34.056530] kasan_report+0xc8/0x118 [ 34.056813] __asan_report_load4_noabort+0x20/0x30 [ 34.057181] kasan_atomics_helper+0x40a8/0x4858 [ 34.057503] kasan_atomics+0x198/0x2e8 [ 34.057793] kunit_try_run_case+0x14c/0x3d0 [ 34.059468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.060294] kthread+0x24c/0x2d0 [ 34.060919] ret_from_fork+0x10/0x20 [ 34.061372] [ 34.061757] Allocated by task 254: [ 34.062480] kasan_save_stack+0x3c/0x68 [ 34.063046] kasan_save_track+0x20/0x40 [ 34.064104] kasan_save_alloc_info+0x40/0x58 [ 34.064710] __kasan_kmalloc+0xd4/0xd8 [ 34.065258] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.065808] kasan_atomics+0xb8/0x2e8 [ 34.066494] kunit_try_run_case+0x14c/0x3d0 [ 34.067040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.068174] kthread+0x24c/0x2d0 [ 34.068664] ret_from_fork+0x10/0x20 [ 34.069229] [ 34.069548] The buggy address belongs to the object at fff00000c664f800 [ 34.069548] which belongs to the cache kmalloc-64 of size 64 [ 34.070936] The buggy address is located 0 bytes to the right of [ 34.070936] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.072576] [ 34.072946] The buggy address belongs to the physical page: [ 34.073627] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.074817] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.075942] page_type: f5(slab) [ 34.076389] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.077382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.078327] page dumped because: kasan: bad access detected [ 34.079017] [ 34.079708] Memory state around the buggy address: [ 34.080183] fff00000c664f700: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 34.081399] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.082318] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.083146] ^ [ 34.083896] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.084841] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.086074] ================================================================== [ 34.089158] ================================================================== [ 34.090114] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 34.090953] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.092319] [ 34.092603] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.094493] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.095778] Hardware name: linux,dummy-virt (DT) [ 34.096817] Call trace: [ 34.097159] show_stack+0x20/0x38 (C) [ 34.098059] dump_stack_lvl+0x8c/0xd0 [ 34.098752] print_report+0x118/0x5e0 [ 34.099706] kasan_report+0xc8/0x118 [ 34.100275] __asan_report_store4_noabort+0x20/0x30 [ 34.100894] kasan_atomics_helper+0x3f7c/0x4858 [ 34.101623] kasan_atomics+0x198/0x2e8 [ 34.102271] kunit_try_run_case+0x14c/0x3d0 [ 34.102992] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.103748] kthread+0x24c/0x2d0 [ 34.104294] ret_from_fork+0x10/0x20 [ 34.104903] [ 34.105195] Allocated by task 254: [ 34.106127] kasan_save_stack+0x3c/0x68 [ 34.106733] kasan_save_track+0x20/0x40 [ 34.107378] kasan_save_alloc_info+0x40/0x58 [ 34.108055] __kasan_kmalloc+0xd4/0xd8 [ 34.108722] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.109288] kasan_atomics+0xb8/0x2e8 [ 34.110054] kunit_try_run_case+0x14c/0x3d0 [ 34.110710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.111693] kthread+0x24c/0x2d0 [ 34.112185] ret_from_fork+0x10/0x20 [ 34.112772] [ 34.113063] The buggy address belongs to the object at fff00000c664f800 [ 34.113063] which belongs to the cache kmalloc-64 of size 64 [ 34.115594] The buggy address is located 0 bytes to the right of [ 34.115594] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.117154] [ 34.117560] The buggy address belongs to the physical page: [ 34.118462] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.119823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.121144] page_type: f5(slab) [ 34.121678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.122655] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.124053] page dumped because: kasan: bad access detected [ 34.124985] [ 34.125325] Memory state around the buggy address: [ 34.126390] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.127350] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.129287] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.131002] ^ [ 34.132128] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.133224] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.134358] ================================================================== [ 35.580670] ================================================================== [ 35.582072] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 35.583737] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.584974] [ 35.585645] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.587053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.587705] Hardware name: linux,dummy-virt (DT) [ 35.588412] Call trace: [ 35.588841] show_stack+0x20/0x38 (C) [ 35.589408] dump_stack_lvl+0x8c/0xd0 [ 35.589954] print_report+0x118/0x5e0 [ 35.590493] kasan_report+0xc8/0x118 [ 35.591101] __asan_report_store8_noabort+0x20/0x30 [ 35.591855] kasan_atomics_helper+0x3e5c/0x4858 [ 35.592828] kasan_atomics+0x198/0x2e8 [ 35.593562] kunit_try_run_case+0x14c/0x3d0 [ 35.594196] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.594696] kthread+0x24c/0x2d0 [ 35.595597] ret_from_fork+0x10/0x20 [ 35.596132] [ 35.596554] Allocated by task 254: [ 35.597281] kasan_save_stack+0x3c/0x68 [ 35.597914] kasan_save_track+0x20/0x40 [ 35.598439] kasan_save_alloc_info+0x40/0x58 [ 35.599084] __kasan_kmalloc+0xd4/0xd8 [ 35.599639] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.600279] kasan_atomics+0xb8/0x2e8 [ 35.600856] kunit_try_run_case+0x14c/0x3d0 [ 35.601464] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.602193] kthread+0x24c/0x2d0 [ 35.602695] ret_from_fork+0x10/0x20 [ 35.603301] [ 35.603642] The buggy address belongs to the object at fff00000c664f800 [ 35.603642] which belongs to the cache kmalloc-64 of size 64 [ 35.605098] The buggy address is located 0 bytes to the right of [ 35.605098] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.606494] [ 35.606846] The buggy address belongs to the physical page: [ 35.607432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.608495] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.609293] page_type: f5(slab) [ 35.609854] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.610756] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.611757] page dumped because: kasan: bad access detected [ 35.612427] [ 35.612754] Memory state around the buggy address: [ 35.613380] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.614228] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.615102] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.616111] ^ [ 35.616721] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.617610] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.618605] ================================================================== [ 36.350307] ================================================================== [ 36.351161] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 36.352008] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.353588] [ 36.354108] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.355373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.355997] Hardware name: linux,dummy-virt (DT) [ 36.356653] Call trace: [ 36.357026] show_stack+0x20/0x38 (C) [ 36.357742] dump_stack_lvl+0x8c/0xd0 [ 36.358395] print_report+0x118/0x5e0 [ 36.359041] kasan_report+0xc8/0x118 [ 36.359669] kasan_check_range+0x100/0x1a8 [ 36.360362] __kasan_check_write+0x20/0x30 [ 36.361053] kasan_atomics_helper+0x1644/0x4858 [ 36.361776] kasan_atomics+0x198/0x2e8 [ 36.362442] kunit_try_run_case+0x14c/0x3d0 [ 36.363143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.363951] kthread+0x24c/0x2d0 [ 36.364545] ret_from_fork+0x10/0x20 [ 36.365204] [ 36.365544] Allocated by task 254: [ 36.366168] kasan_save_stack+0x3c/0x68 [ 36.366854] kasan_save_track+0x20/0x40 [ 36.367570] kasan_save_alloc_info+0x40/0x58 [ 36.368350] __kasan_kmalloc+0xd4/0xd8 [ 36.369033] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.369709] kasan_atomics+0xb8/0x2e8 [ 36.370307] kunit_try_run_case+0x14c/0x3d0 [ 36.371019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.371783] kthread+0x24c/0x2d0 [ 36.372459] ret_from_fork+0x10/0x20 [ 36.373100] [ 36.373442] The buggy address belongs to the object at fff00000c664f800 [ 36.373442] which belongs to the cache kmalloc-64 of size 64 [ 36.375044] The buggy address is located 0 bytes to the right of [ 36.375044] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.376515] [ 36.376957] The buggy address belongs to the physical page: [ 36.377659] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.378785] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.379655] page_type: f5(slab) [ 36.380192] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.381294] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.382435] page dumped because: kasan: bad access detected [ 36.383269] [ 36.383567] Memory state around the buggy address: [ 36.384170] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.385107] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.386395] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.387449] ^ [ 36.388131] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.389077] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.389973] ================================================================== [ 35.541467] ================================================================== [ 35.542645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 35.543731] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.544620] [ 35.544961] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.546008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.546659] Hardware name: linux,dummy-virt (DT) [ 35.547379] Call trace: [ 35.547815] show_stack+0x20/0x38 (C) [ 35.548301] dump_stack_lvl+0x8c/0xd0 [ 35.549120] print_report+0x118/0x5e0 [ 35.549722] kasan_report+0xc8/0x118 [ 35.550305] kasan_check_range+0x100/0x1a8 [ 35.551021] __kasan_check_write+0x20/0x30 [ 35.551695] kasan_atomics_helper+0xe44/0x4858 [ 35.552425] kasan_atomics+0x198/0x2e8 [ 35.552923] kunit_try_run_case+0x14c/0x3d0 [ 35.553669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.554448] kthread+0x24c/0x2d0 [ 35.555025] ret_from_fork+0x10/0x20 [ 35.555632] [ 35.555962] Allocated by task 254: [ 35.556456] kasan_save_stack+0x3c/0x68 [ 35.557042] kasan_save_track+0x20/0x40 [ 35.557612] kasan_save_alloc_info+0x40/0x58 [ 35.558347] __kasan_kmalloc+0xd4/0xd8 [ 35.558807] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.559584] kasan_atomics+0xb8/0x2e8 [ 35.560282] kunit_try_run_case+0x14c/0x3d0 [ 35.560775] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.561533] kthread+0x24c/0x2d0 [ 35.562078] ret_from_fork+0x10/0x20 [ 35.562610] [ 35.562973] The buggy address belongs to the object at fff00000c664f800 [ 35.562973] which belongs to the cache kmalloc-64 of size 64 [ 35.564416] The buggy address is located 0 bytes to the right of [ 35.564416] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.565839] [ 35.566157] The buggy address belongs to the physical page: [ 35.566947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.567862] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.568685] page_type: f5(slab) [ 35.569238] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.570262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.571369] page dumped because: kasan: bad access detected [ 35.572129] [ 35.572452] Memory state around the buggy address: [ 35.573096] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.574180] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.575243] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.576314] ^ [ 35.577140] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.578225] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.579273] ================================================================== [ 34.228623] ================================================================== [ 34.229660] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 34.230903] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.232559] [ 34.233363] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.234784] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.235663] Hardware name: linux,dummy-virt (DT) [ 34.236344] Call trace: [ 34.236730] show_stack+0x20/0x38 (C) [ 34.237177] dump_stack_lvl+0x8c/0xd0 [ 34.238326] print_report+0x118/0x5e0 [ 34.239150] kasan_report+0xc8/0x118 [ 34.240448] kasan_check_range+0x100/0x1a8 [ 34.241385] __kasan_check_read+0x20/0x30 [ 34.242036] kasan_atomics_helper+0x2b0/0x4858 [ 34.242752] kasan_atomics+0x198/0x2e8 [ 34.243684] kunit_try_run_case+0x14c/0x3d0 [ 34.244504] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.245213] kthread+0x24c/0x2d0 [ 34.245949] ret_from_fork+0x10/0x20 [ 34.246670] [ 34.247164] Allocated by task 254: [ 34.248020] kasan_save_stack+0x3c/0x68 [ 34.248493] kasan_save_track+0x20/0x40 [ 34.249408] kasan_save_alloc_info+0x40/0x58 [ 34.250132] __kasan_kmalloc+0xd4/0xd8 [ 34.250957] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.251963] kasan_atomics+0xb8/0x2e8 [ 34.252493] kunit_try_run_case+0x14c/0x3d0 [ 34.253202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.254026] kthread+0x24c/0x2d0 [ 34.254649] ret_from_fork+0x10/0x20 [ 34.255594] [ 34.256265] The buggy address belongs to the object at fff00000c664f800 [ 34.256265] which belongs to the cache kmalloc-64 of size 64 [ 34.257729] The buggy address is located 0 bytes to the right of [ 34.257729] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.259224] [ 34.259507] The buggy address belongs to the physical page: [ 34.261018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.261922] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.262688] page_type: f5(slab) [ 34.263604] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.264891] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.266141] page dumped because: kasan: bad access detected [ 34.266954] [ 34.267705] Memory state around the buggy address: [ 34.268508] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.269429] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.270349] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.271600] ^ [ 34.272547] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.273667] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.274474] ================================================================== [ 34.811130] ================================================================== [ 34.812831] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 34.813921] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.815289] [ 34.815832] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.817264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.817819] Hardware name: linux,dummy-virt (DT) [ 34.818713] Call trace: [ 34.819172] show_stack+0x20/0x38 (C) [ 34.820005] dump_stack_lvl+0x8c/0xd0 [ 34.820791] print_report+0x118/0x5e0 [ 34.821595] kasan_report+0xc8/0x118 [ 34.822232] kasan_check_range+0x100/0x1a8 [ 34.823066] __kasan_check_write+0x20/0x30 [ 34.823387] kasan_atomics_helper+0x7cc/0x4858 [ 34.823838] kasan_atomics+0x198/0x2e8 [ 34.825011] kunit_try_run_case+0x14c/0x3d0 [ 34.825650] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.826671] kthread+0x24c/0x2d0 [ 34.827385] ret_from_fork+0x10/0x20 [ 34.827987] [ 34.828365] Allocated by task 254: [ 34.828897] kasan_save_stack+0x3c/0x68 [ 34.829696] kasan_save_track+0x20/0x40 [ 34.830275] kasan_save_alloc_info+0x40/0x58 [ 34.830959] __kasan_kmalloc+0xd4/0xd8 [ 34.831673] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.832348] kasan_atomics+0xb8/0x2e8 [ 34.832994] kunit_try_run_case+0x14c/0x3d0 [ 34.833657] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.834459] kthread+0x24c/0x2d0 [ 34.835033] ret_from_fork+0x10/0x20 [ 34.835626] [ 34.835998] The buggy address belongs to the object at fff00000c664f800 [ 34.835998] which belongs to the cache kmalloc-64 of size 64 [ 34.837545] The buggy address is located 0 bytes to the right of [ 34.837545] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.839122] [ 34.839571] The buggy address belongs to the physical page: [ 34.840450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.841515] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.842483] page_type: f5(slab) [ 34.843079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.844083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.845136] page dumped because: kasan: bad access detected [ 34.845869] [ 34.846369] Memory state around the buggy address: [ 34.847055] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.848071] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.849005] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.849939] ^ [ 34.850651] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.851631] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.852554] ================================================================== [ 35.427670] ================================================================== [ 35.428506] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 35.429280] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.430155] [ 35.430604] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.431892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.432506] Hardware name: linux,dummy-virt (DT) [ 35.433178] Call trace: [ 35.433591] show_stack+0x20/0x38 (C) [ 35.434226] dump_stack_lvl+0x8c/0xd0 [ 35.434909] print_report+0x118/0x5e0 [ 35.435464] kasan_report+0xc8/0x118 [ 35.435988] __asan_report_load4_noabort+0x20/0x30 [ 35.436816] kasan_atomics_helper+0x3e04/0x4858 [ 35.437485] kasan_atomics+0x198/0x2e8 [ 35.438129] kunit_try_run_case+0x14c/0x3d0 [ 35.438755] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.439605] kthread+0x24c/0x2d0 [ 35.440455] ret_from_fork+0x10/0x20 [ 35.441203] [ 35.441660] Allocated by task 254: [ 35.442503] kasan_save_stack+0x3c/0x68 [ 35.443074] kasan_save_track+0x20/0x40 [ 35.443631] kasan_save_alloc_info+0x40/0x58 [ 35.444257] __kasan_kmalloc+0xd4/0xd8 [ 35.444710] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.445490] kasan_atomics+0xb8/0x2e8 [ 35.446051] kunit_try_run_case+0x14c/0x3d0 [ 35.446665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.447407] kthread+0x24c/0x2d0 [ 35.448012] ret_from_fork+0x10/0x20 [ 35.448645] [ 35.449040] The buggy address belongs to the object at fff00000c664f800 [ 35.449040] which belongs to the cache kmalloc-64 of size 64 [ 35.450394] The buggy address is located 0 bytes to the right of [ 35.450394] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.451773] [ 35.452105] The buggy address belongs to the physical page: [ 35.452832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.453751] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.454560] page_type: f5(slab) [ 35.455113] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.456079] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.456968] page dumped because: kasan: bad access detected [ 35.457665] [ 35.458049] Memory state around the buggy address: [ 35.458576] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.459635] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.460559] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.461419] ^ [ 35.462017] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.462827] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.463797] ================================================================== [ 35.695173] ================================================================== [ 35.696121] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 35.697171] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.698615] [ 35.699728] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.700856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.701562] Hardware name: linux,dummy-virt (DT) [ 35.702192] Call trace: [ 35.702612] show_stack+0x20/0x38 (C) [ 35.703164] dump_stack_lvl+0x8c/0xd0 [ 35.703830] print_report+0x118/0x5e0 [ 35.704617] kasan_report+0xc8/0x118 [ 35.705269] kasan_check_range+0x100/0x1a8 [ 35.705863] __kasan_check_write+0x20/0x30 [ 35.706492] kasan_atomics_helper+0xf88/0x4858 [ 35.707218] kasan_atomics+0x198/0x2e8 [ 35.707524] kunit_try_run_case+0x14c/0x3d0 [ 35.707837] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.708533] kthread+0x24c/0x2d0 [ 35.709049] ret_from_fork+0x10/0x20 [ 35.709749] [ 35.710052] Allocated by task 254: [ 35.710656] kasan_save_stack+0x3c/0x68 [ 35.711248] kasan_save_track+0x20/0x40 [ 35.711900] kasan_save_alloc_info+0x40/0x58 [ 35.712579] __kasan_kmalloc+0xd4/0xd8 [ 35.713285] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.713907] kasan_atomics+0xb8/0x2e8 [ 35.714397] kunit_try_run_case+0x14c/0x3d0 [ 35.715164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.715955] kthread+0x24c/0x2d0 [ 35.716386] ret_from_fork+0x10/0x20 [ 35.717031] [ 35.717352] The buggy address belongs to the object at fff00000c664f800 [ 35.717352] which belongs to the cache kmalloc-64 of size 64 [ 35.718684] The buggy address is located 0 bytes to the right of [ 35.718684] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.720001] [ 35.720450] The buggy address belongs to the physical page: [ 35.721132] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.722236] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.723096] page_type: f5(slab) [ 35.723568] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.724557] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.725476] page dumped because: kasan: bad access detected [ 35.726109] [ 35.726458] Memory state around the buggy address: [ 35.727071] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.727986] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.728760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.729655] ^ [ 35.730242] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.731144] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.732055] ================================================================== [ 34.454540] ================================================================== [ 34.455368] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 34.457083] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.457866] [ 34.458272] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.460357] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.460949] Hardware name: linux,dummy-virt (DT) [ 34.461562] Call trace: [ 34.462014] show_stack+0x20/0x38 (C) [ 34.462605] dump_stack_lvl+0x8c/0xd0 [ 34.463182] print_report+0x118/0x5e0 [ 34.463844] kasan_report+0xc8/0x118 [ 34.464485] kasan_check_range+0x100/0x1a8 [ 34.465199] __kasan_check_write+0x20/0x30 [ 34.465815] kasan_atomics_helper+0x414/0x4858 [ 34.466477] kasan_atomics+0x198/0x2e8 [ 34.467013] kunit_try_run_case+0x14c/0x3d0 [ 34.467751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.468527] kthread+0x24c/0x2d0 [ 34.469152] ret_from_fork+0x10/0x20 [ 34.469799] [ 34.470300] Allocated by task 254: [ 34.471078] kasan_save_stack+0x3c/0x68 [ 34.471672] kasan_save_track+0x20/0x40 [ 34.472237] kasan_save_alloc_info+0x40/0x58 [ 34.472784] __kasan_kmalloc+0xd4/0xd8 [ 34.473392] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.473964] kasan_atomics+0xb8/0x2e8 [ 34.474678] kunit_try_run_case+0x14c/0x3d0 [ 34.475345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.476195] kthread+0x24c/0x2d0 [ 34.476848] ret_from_fork+0x10/0x20 [ 34.477596] [ 34.478117] The buggy address belongs to the object at fff00000c664f800 [ 34.478117] which belongs to the cache kmalloc-64 of size 64 [ 34.479523] The buggy address is located 0 bytes to the right of [ 34.479523] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.481059] [ 34.481635] The buggy address belongs to the physical page: [ 34.482505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.483526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.484433] page_type: f5(slab) [ 34.485004] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.485923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.486905] page dumped because: kasan: bad access detected [ 34.487563] [ 34.487923] Memory state around the buggy address: [ 34.488489] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.489397] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.490342] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.491273] ^ [ 34.491902] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.492762] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.493640] ================================================================== [ 34.495355] ================================================================== [ 34.496917] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 34.497793] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.498750] [ 34.499094] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.500539] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.501127] Hardware name: linux,dummy-virt (DT) [ 34.501795] Call trace: [ 34.502203] show_stack+0x20/0x38 (C) [ 34.502952] dump_stack_lvl+0x8c/0xd0 [ 34.503384] print_report+0x118/0x5e0 [ 34.504011] kasan_report+0xc8/0x118 [ 34.504653] kasan_check_range+0x100/0x1a8 [ 34.505372] __kasan_check_write+0x20/0x30 [ 34.506079] kasan_atomics_helper+0x47c/0x4858 [ 34.506758] kasan_atomics+0x198/0x2e8 [ 34.507411] kunit_try_run_case+0x14c/0x3d0 [ 34.508134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.508900] kthread+0x24c/0x2d0 [ 34.509514] ret_from_fork+0x10/0x20 [ 34.510122] [ 34.510460] Allocated by task 254: [ 34.510909] kasan_save_stack+0x3c/0x68 [ 34.511551] kasan_save_track+0x20/0x40 [ 34.512339] kasan_save_alloc_info+0x40/0x58 [ 34.512923] __kasan_kmalloc+0xd4/0xd8 [ 34.513558] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.514187] kasan_atomics+0xb8/0x2e8 [ 34.514807] kunit_try_run_case+0x14c/0x3d0 [ 34.515414] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.516210] kthread+0x24c/0x2d0 [ 34.516800] ret_from_fork+0x10/0x20 [ 34.517356] [ 34.517658] The buggy address belongs to the object at fff00000c664f800 [ 34.517658] which belongs to the cache kmalloc-64 of size 64 [ 34.519174] The buggy address is located 0 bytes to the right of [ 34.519174] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.520547] [ 34.520870] The buggy address belongs to the physical page: [ 34.521696] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.522669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.523442] page_type: f5(slab) [ 34.523982] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.524978] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.525848] page dumped because: kasan: bad access detected [ 34.526540] [ 34.526865] Memory state around the buggy address: [ 34.527513] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.528330] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.529289] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.530168] ^ [ 34.530797] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.531696] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.532568] ================================================================== [ 34.770511] ================================================================== [ 34.771393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 34.772371] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.773313] [ 34.773684] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.775017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.775670] Hardware name: linux,dummy-virt (DT) [ 34.776324] Call trace: [ 34.776923] show_stack+0x20/0x38 (C) [ 34.777764] dump_stack_lvl+0x8c/0xd0 [ 34.778420] print_report+0x118/0x5e0 [ 34.779144] kasan_report+0xc8/0x118 [ 34.779766] kasan_check_range+0x100/0x1a8 [ 34.780462] __kasan_check_write+0x20/0x30 [ 34.781141] kasan_atomics_helper+0x760/0x4858 [ 34.781926] kasan_atomics+0x198/0x2e8 [ 34.782552] kunit_try_run_case+0x14c/0x3d0 [ 34.783261] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.784077] kthread+0x24c/0x2d0 [ 34.784672] ret_from_fork+0x10/0x20 [ 34.785308] [ 34.785739] Allocated by task 254: [ 34.786252] kasan_save_stack+0x3c/0x68 [ 34.786820] kasan_save_track+0x20/0x40 [ 34.787323] kasan_save_alloc_info+0x40/0x58 [ 34.788152] __kasan_kmalloc+0xd4/0xd8 [ 34.788749] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.789430] kasan_atomics+0xb8/0x2e8 [ 34.790044] kunit_try_run_case+0x14c/0x3d0 [ 34.790707] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.791494] kthread+0x24c/0x2d0 [ 34.792104] ret_from_fork+0x10/0x20 [ 34.792717] [ 34.793112] The buggy address belongs to the object at fff00000c664f800 [ 34.793112] which belongs to the cache kmalloc-64 of size 64 [ 34.794557] The buggy address is located 0 bytes to the right of [ 34.794557] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.796199] [ 34.796596] The buggy address belongs to the physical page: [ 34.797364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.798413] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.799297] page_type: f5(slab) [ 34.799870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.800892] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.801806] page dumped because: kasan: bad access detected [ 34.802571] [ 34.803074] Memory state around the buggy address: [ 34.803794] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.804796] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.805713] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.806620] ^ [ 34.807362] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.808302] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.809154] ================================================================== [ 35.237325] ================================================================== [ 35.238106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 35.239484] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.241400] [ 35.241840] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.243470] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.244002] Hardware name: linux,dummy-virt (DT) [ 35.244567] Call trace: [ 35.245038] show_stack+0x20/0x38 (C) [ 35.245851] dump_stack_lvl+0x8c/0xd0 [ 35.246688] print_report+0x118/0x5e0 [ 35.247214] kasan_report+0xc8/0x118 [ 35.247868] kasan_check_range+0x100/0x1a8 [ 35.248486] __kasan_check_write+0x20/0x30 [ 35.249165] kasan_atomics_helper+0xc08/0x4858 [ 35.249936] kasan_atomics+0x198/0x2e8 [ 35.250452] kunit_try_run_case+0x14c/0x3d0 [ 35.251123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.251888] kthread+0x24c/0x2d0 [ 35.252459] ret_from_fork+0x10/0x20 [ 35.253149] [ 35.253463] Allocated by task 254: [ 35.254020] kasan_save_stack+0x3c/0x68 [ 35.254571] kasan_save_track+0x20/0x40 [ 35.255505] kasan_save_alloc_info+0x40/0x58 [ 35.256113] __kasan_kmalloc+0xd4/0xd8 [ 35.256664] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.257324] kasan_atomics+0xb8/0x2e8 [ 35.257941] kunit_try_run_case+0x14c/0x3d0 [ 35.258594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.259295] kthread+0x24c/0x2d0 [ 35.259903] ret_from_fork+0x10/0x20 [ 35.260485] [ 35.260834] The buggy address belongs to the object at fff00000c664f800 [ 35.260834] which belongs to the cache kmalloc-64 of size 64 [ 35.262300] The buggy address is located 0 bytes to the right of [ 35.262300] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.263699] [ 35.264058] The buggy address belongs to the physical page: [ 35.264662] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.265624] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.266515] page_type: f5(slab) [ 35.267074] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.267967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.268959] page dumped because: kasan: bad access detected [ 35.269652] [ 35.269992] Memory state around the buggy address: [ 35.270625] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.271442] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.272269] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.273128] ^ [ 35.273916] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.274801] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.275651] ================================================================== [ 36.233535] ================================================================== [ 36.234432] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 36.235459] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.236595] [ 36.237004] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.238496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.239074] Hardware name: linux,dummy-virt (DT) [ 36.239937] Call trace: [ 36.240360] show_stack+0x20/0x38 (C) [ 36.241056] dump_stack_lvl+0x8c/0xd0 [ 36.241776] print_report+0x118/0x5e0 [ 36.242505] kasan_report+0xc8/0x118 [ 36.243139] kasan_check_range+0x100/0x1a8 [ 36.243819] __kasan_check_write+0x20/0x30 [ 36.244533] kasan_atomics_helper+0x154c/0x4858 [ 36.245247] kasan_atomics+0x198/0x2e8 [ 36.245897] kunit_try_run_case+0x14c/0x3d0 [ 36.246588] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.247408] kthread+0x24c/0x2d0 [ 36.248017] ret_from_fork+0x10/0x20 [ 36.248649] [ 36.249013] Allocated by task 254: [ 36.249650] kasan_save_stack+0x3c/0x68 [ 36.250287] kasan_save_track+0x20/0x40 [ 36.251014] kasan_save_alloc_info+0x40/0x58 [ 36.251697] __kasan_kmalloc+0xd4/0xd8 [ 36.252318] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.252994] kasan_atomics+0xb8/0x2e8 [ 36.253583] kunit_try_run_case+0x14c/0x3d0 [ 36.254263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.255095] kthread+0x24c/0x2d0 [ 36.255801] ret_from_fork+0x10/0x20 [ 36.256496] [ 36.257014] The buggy address belongs to the object at fff00000c664f800 [ 36.257014] which belongs to the cache kmalloc-64 of size 64 [ 36.258362] The buggy address is located 0 bytes to the right of [ 36.258362] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.259947] [ 36.260450] The buggy address belongs to the physical page: [ 36.261157] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.262347] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.262763] page_type: f5(slab) [ 36.263050] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.263494] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.264024] page dumped because: kasan: bad access detected [ 36.265120] [ 36.265618] Memory state around the buggy address: [ 36.266282] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.267223] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.268127] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.269030] ^ [ 36.269705] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.270617] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.271526] ================================================================== [ 36.043925] ================================================================== [ 36.044687] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 36.045490] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.046586] [ 36.047031] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.048288] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.048868] Hardware name: linux,dummy-virt (DT) [ 36.049556] Call trace: [ 36.049970] show_stack+0x20/0x38 (C) [ 36.050571] dump_stack_lvl+0x8c/0xd0 [ 36.051097] print_report+0x118/0x5e0 [ 36.051765] kasan_report+0xc8/0x118 [ 36.052298] kasan_check_range+0x100/0x1a8 [ 36.052986] __kasan_check_write+0x20/0x30 [ 36.053686] kasan_atomics_helper+0x1384/0x4858 [ 36.054304] kasan_atomics+0x198/0x2e8 [ 36.055002] kunit_try_run_case+0x14c/0x3d0 [ 36.055631] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.056409] kthread+0x24c/0x2d0 [ 36.057013] ret_from_fork+0x10/0x20 [ 36.057621] [ 36.057917] Allocated by task 254: [ 36.058477] kasan_save_stack+0x3c/0x68 [ 36.059088] kasan_save_track+0x20/0x40 [ 36.059678] kasan_save_alloc_info+0x40/0x58 [ 36.060186] __kasan_kmalloc+0xd4/0xd8 [ 36.060825] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.061370] kasan_atomics+0xb8/0x2e8 [ 36.062003] kunit_try_run_case+0x14c/0x3d0 [ 36.062637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.063434] kthread+0x24c/0x2d0 [ 36.063947] ret_from_fork+0x10/0x20 [ 36.064570] [ 36.064866] The buggy address belongs to the object at fff00000c664f800 [ 36.064866] which belongs to the cache kmalloc-64 of size 64 [ 36.066417] The buggy address is located 0 bytes to the right of [ 36.066417] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.067852] [ 36.068186] The buggy address belongs to the physical page: [ 36.068897] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.069784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.070692] page_type: f5(slab) [ 36.071146] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.072148] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.073014] page dumped because: kasan: bad access detected [ 36.073679] [ 36.074023] Memory state around the buggy address: [ 36.074753] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.075620] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.076947] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.077911] ^ [ 36.078745] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.079687] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.080540] ================================================================== [ 34.572991] ================================================================== [ 34.573605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 34.574659] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.575627] [ 34.576148] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.577226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.577701] Hardware name: linux,dummy-virt (DT) [ 34.578481] Call trace: [ 34.578900] show_stack+0x20/0x38 (C) [ 34.579475] dump_stack_lvl+0x8c/0xd0 [ 34.580039] print_report+0x118/0x5e0 [ 34.580588] kasan_report+0xc8/0x118 [ 34.581096] kasan_check_range+0x100/0x1a8 [ 34.581804] __kasan_check_write+0x20/0x30 [ 34.582499] kasan_atomics_helper+0x54c/0x4858 [ 34.583252] kasan_atomics+0x198/0x2e8 [ 34.583821] kunit_try_run_case+0x14c/0x3d0 [ 34.584427] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.585200] kthread+0x24c/0x2d0 [ 34.585806] ret_from_fork+0x10/0x20 [ 34.586403] [ 34.586794] Allocated by task 254: [ 34.587362] kasan_save_stack+0x3c/0x68 [ 34.587952] kasan_save_track+0x20/0x40 [ 34.588494] kasan_save_alloc_info+0x40/0x58 [ 34.589173] __kasan_kmalloc+0xd4/0xd8 [ 34.589715] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.590361] kasan_atomics+0xb8/0x2e8 [ 34.590927] kunit_try_run_case+0x14c/0x3d0 [ 34.591556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.592274] kthread+0x24c/0x2d0 [ 34.592774] ret_from_fork+0x10/0x20 [ 34.593410] [ 34.593743] The buggy address belongs to the object at fff00000c664f800 [ 34.593743] which belongs to the cache kmalloc-64 of size 64 [ 34.595140] The buggy address is located 0 bytes to the right of [ 34.595140] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.596738] [ 34.597042] The buggy address belongs to the physical page: [ 34.597841] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.598821] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.599675] page_type: f5(slab) [ 34.600211] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.601113] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.602087] page dumped because: kasan: bad access detected [ 34.602753] [ 34.603138] Memory state around the buggy address: [ 34.603810] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.604642] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.605508] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.606356] ^ [ 34.607117] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.607968] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.608809] ================================================================== [ 35.889413] ================================================================== [ 35.890044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 35.891290] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.892472] [ 35.892976] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.894736] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.895610] Hardware name: linux,dummy-virt (DT) [ 35.896492] Call trace: [ 35.897125] show_stack+0x20/0x38 (C) [ 35.897936] dump_stack_lvl+0x8c/0xd0 [ 35.898518] print_report+0x118/0x5e0 [ 35.899310] kasan_report+0xc8/0x118 [ 35.900052] kasan_check_range+0x100/0x1a8 [ 35.900647] __kasan_check_write+0x20/0x30 [ 35.901434] kasan_atomics_helper+0x1190/0x4858 [ 35.902098] kasan_atomics+0x198/0x2e8 [ 35.902669] kunit_try_run_case+0x14c/0x3d0 [ 35.903483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.904301] kthread+0x24c/0x2d0 [ 35.904827] ret_from_fork+0x10/0x20 [ 35.905432] [ 35.905804] Allocated by task 254: [ 35.906422] kasan_save_stack+0x3c/0x68 [ 35.906961] kasan_save_track+0x20/0x40 [ 35.907540] kasan_save_alloc_info+0x40/0x58 [ 35.908230] __kasan_kmalloc+0xd4/0xd8 [ 35.908777] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.909410] kasan_atomics+0xb8/0x2e8 [ 35.909898] kunit_try_run_case+0x14c/0x3d0 [ 35.910585] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.911383] kthread+0x24c/0x2d0 [ 35.911985] ret_from_fork+0x10/0x20 [ 35.912524] [ 35.912864] The buggy address belongs to the object at fff00000c664f800 [ 35.912864] which belongs to the cache kmalloc-64 of size 64 [ 35.914244] The buggy address is located 0 bytes to the right of [ 35.914244] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.915570] [ 35.915994] The buggy address belongs to the physical page: [ 35.916660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.917776] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.918526] page_type: f5(slab) [ 35.919114] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.920063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.921015] page dumped because: kasan: bad access detected [ 35.921670] [ 35.921989] Memory state around the buggy address: [ 35.922619] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.923427] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.924361] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.925204] ^ [ 35.925801] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.926703] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.927526] ================================================================== [ 35.770693] ================================================================== [ 35.771679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 35.772848] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.774001] [ 35.774457] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.775688] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.776370] Hardware name: linux,dummy-virt (DT) [ 35.776964] Call trace: [ 35.777570] show_stack+0x20/0x38 (C) [ 35.778296] dump_stack_lvl+0x8c/0xd0 [ 35.778968] print_report+0x118/0x5e0 [ 35.779588] kasan_report+0xc8/0x118 [ 35.780219] kasan_check_range+0x100/0x1a8 [ 35.780902] __kasan_check_write+0x20/0x30 [ 35.781522] kasan_atomics_helper+0x1058/0x4858 [ 35.782230] kasan_atomics+0x198/0x2e8 [ 35.782895] kunit_try_run_case+0x14c/0x3d0 [ 35.783580] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.784387] kthread+0x24c/0x2d0 [ 35.785007] ret_from_fork+0x10/0x20 [ 35.785655] [ 35.786028] Allocated by task 254: [ 35.786631] kasan_save_stack+0x3c/0x68 [ 35.787360] kasan_save_track+0x20/0x40 [ 35.787981] kasan_save_alloc_info+0x40/0x58 [ 35.788643] __kasan_kmalloc+0xd4/0xd8 [ 35.789252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.789974] kasan_atomics+0xb8/0x2e8 [ 35.790593] kunit_try_run_case+0x14c/0x3d0 [ 35.791323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.792114] kthread+0x24c/0x2d0 [ 35.792666] ret_from_fork+0x10/0x20 [ 35.793292] [ 35.793634] The buggy address belongs to the object at fff00000c664f800 [ 35.793634] which belongs to the cache kmalloc-64 of size 64 [ 35.795141] The buggy address is located 0 bytes to the right of [ 35.795141] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.796506] [ 35.796923] The buggy address belongs to the physical page: [ 35.797596] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.798658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.799524] page_type: f5(slab) [ 35.800066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.801123] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.802106] page dumped because: kasan: bad access detected [ 35.802806] [ 35.803132] Memory state around the buggy address: [ 35.803834] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.804638] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.805484] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.806333] ^ [ 35.807026] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.808119] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.808982] ================================================================== [ 35.465277] ================================================================== [ 35.466282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 35.468175] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.469376] [ 35.469697] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.471303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.471899] Hardware name: linux,dummy-virt (DT) [ 35.472535] Call trace: [ 35.473040] show_stack+0x20/0x38 (C) [ 35.473723] dump_stack_lvl+0x8c/0xd0 [ 35.474452] print_report+0x118/0x5e0 [ 35.474969] kasan_report+0xc8/0x118 [ 35.475507] kasan_check_range+0x100/0x1a8 [ 35.476170] __kasan_check_read+0x20/0x30 [ 35.476752] kasan_atomics_helper+0xdd4/0x4858 [ 35.477396] kasan_atomics+0x198/0x2e8 [ 35.478113] kunit_try_run_case+0x14c/0x3d0 [ 35.478782] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.479485] kthread+0x24c/0x2d0 [ 35.480090] ret_from_fork+0x10/0x20 [ 35.480572] [ 35.480944] Allocated by task 254: [ 35.481446] kasan_save_stack+0x3c/0x68 [ 35.482122] kasan_save_track+0x20/0x40 [ 35.482700] kasan_save_alloc_info+0x40/0x58 [ 35.483744] __kasan_kmalloc+0xd4/0xd8 [ 35.484328] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.485025] kasan_atomics+0xb8/0x2e8 [ 35.485594] kunit_try_run_case+0x14c/0x3d0 [ 35.486276] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.486985] kthread+0x24c/0x2d0 [ 35.487545] ret_from_fork+0x10/0x20 [ 35.488089] [ 35.488380] The buggy address belongs to the object at fff00000c664f800 [ 35.488380] which belongs to the cache kmalloc-64 of size 64 [ 35.489783] The buggy address is located 0 bytes to the right of [ 35.489783] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.491190] [ 35.491472] The buggy address belongs to the physical page: [ 35.492247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.493154] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.493953] page_type: f5(slab) [ 35.494497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.495489] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.496390] page dumped because: kasan: bad access detected [ 35.497055] [ 35.497384] Memory state around the buggy address: [ 35.497949] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.498870] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.499760] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.500621] ^ [ 35.501319] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.502183] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.503008] ================================================================== [ 34.181635] ================================================================== [ 34.182575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 34.184543] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.185559] [ 34.185926] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.187212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.187983] Hardware name: linux,dummy-virt (DT) [ 34.188849] Call trace: [ 34.189452] show_stack+0x20/0x38 (C) [ 34.190246] dump_stack_lvl+0x8c/0xd0 [ 34.190980] print_report+0x118/0x5e0 [ 34.191772] kasan_report+0xc8/0x118 [ 34.192663] kasan_check_range+0x100/0x1a8 [ 34.193168] __kasan_check_write+0x20/0x30 [ 34.194029] kasan_atomics_helper+0x24c/0x4858 [ 34.194891] kasan_atomics+0x198/0x2e8 [ 34.195986] kunit_try_run_case+0x14c/0x3d0 [ 34.196779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.197578] kthread+0x24c/0x2d0 [ 34.198197] ret_from_fork+0x10/0x20 [ 34.198846] [ 34.199225] Allocated by task 254: [ 34.199932] kasan_save_stack+0x3c/0x68 [ 34.200595] kasan_save_track+0x20/0x40 [ 34.201260] kasan_save_alloc_info+0x40/0x58 [ 34.201911] __kasan_kmalloc+0xd4/0xd8 [ 34.202537] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.203324] kasan_atomics+0xb8/0x2e8 [ 34.204422] kunit_try_run_case+0x14c/0x3d0 [ 34.205162] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.205991] kthread+0x24c/0x2d0 [ 34.206632] ret_from_fork+0x10/0x20 [ 34.207254] [ 34.207758] The buggy address belongs to the object at fff00000c664f800 [ 34.207758] which belongs to the cache kmalloc-64 of size 64 [ 34.209862] The buggy address is located 0 bytes to the right of [ 34.209862] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.211510] [ 34.212154] The buggy address belongs to the physical page: [ 34.212913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.214031] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.214897] page_type: f5(slab) [ 34.215977] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.217127] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.218166] page dumped because: kasan: bad access detected [ 34.219158] [ 34.219907] Memory state around the buggy address: [ 34.220576] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.221648] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.222681] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.223917] ^ [ 34.224559] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.225370] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.226534] ================================================================== [ 34.610009] ================================================================== [ 34.610761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 34.612080] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.612978] [ 34.613357] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.614500] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.615267] Hardware name: linux,dummy-virt (DT) [ 34.615810] Call trace: [ 34.616307] show_stack+0x20/0x38 (C) [ 34.617052] dump_stack_lvl+0x8c/0xd0 [ 34.617682] print_report+0x118/0x5e0 [ 34.618278] kasan_report+0xc8/0x118 [ 34.618815] kasan_check_range+0x100/0x1a8 [ 34.619541] __kasan_check_write+0x20/0x30 [ 34.620165] kasan_atomics_helper+0x5b4/0x4858 [ 34.620669] kasan_atomics+0x198/0x2e8 [ 34.621342] kunit_try_run_case+0x14c/0x3d0 [ 34.622065] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.622930] kthread+0x24c/0x2d0 [ 34.623469] ret_from_fork+0x10/0x20 [ 34.624136] [ 34.624412] Allocated by task 254: [ 34.625197] kasan_save_stack+0x3c/0x68 [ 34.625912] kasan_save_track+0x20/0x40 [ 34.626510] kasan_save_alloc_info+0x40/0x58 [ 34.627108] __kasan_kmalloc+0xd4/0xd8 [ 34.627726] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.628394] kasan_atomics+0xb8/0x2e8 [ 34.628971] kunit_try_run_case+0x14c/0x3d0 [ 34.629620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.630325] kthread+0x24c/0x2d0 [ 34.630947] ret_from_fork+0x10/0x20 [ 34.631476] [ 34.631892] The buggy address belongs to the object at fff00000c664f800 [ 34.631892] which belongs to the cache kmalloc-64 of size 64 [ 34.633323] The buggy address is located 0 bytes to the right of [ 34.633323] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.634695] [ 34.635034] The buggy address belongs to the physical page: [ 34.635753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.636699] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.637488] page_type: f5(slab) [ 34.638093] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.638982] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.639902] page dumped because: kasan: bad access detected [ 34.640571] [ 34.640863] Memory state around the buggy address: [ 34.641501] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.642366] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.643244] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.644115] ^ [ 34.644630] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.645609] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.646475] ================================================================== [ 35.008161] ================================================================== [ 35.008839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 35.010366] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.011319] [ 35.011755] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.013054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.013738] Hardware name: linux,dummy-virt (DT) [ 35.014294] Call trace: [ 35.014852] show_stack+0x20/0x38 (C) [ 35.015422] dump_stack_lvl+0x8c/0xd0 [ 35.016016] print_report+0x118/0x5e0 [ 35.016660] kasan_report+0xc8/0x118 [ 35.017255] kasan_check_range+0x100/0x1a8 [ 35.017783] __kasan_check_write+0x20/0x30 [ 35.018504] kasan_atomics_helper+0xa04/0x4858 [ 35.019185] kasan_atomics+0x198/0x2e8 [ 35.019855] kunit_try_run_case+0x14c/0x3d0 [ 35.020508] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.021232] kthread+0x24c/0x2d0 [ 35.021787] ret_from_fork+0x10/0x20 [ 35.022496] [ 35.022823] Allocated by task 254: [ 35.023295] kasan_save_stack+0x3c/0x68 [ 35.023917] kasan_save_track+0x20/0x40 [ 35.024450] kasan_save_alloc_info+0x40/0x58 [ 35.025147] __kasan_kmalloc+0xd4/0xd8 [ 35.025651] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.026323] kasan_atomics+0xb8/0x2e8 [ 35.027054] kunit_try_run_case+0x14c/0x3d0 [ 35.027642] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.028319] kthread+0x24c/0x2d0 [ 35.028929] ret_from_fork+0x10/0x20 [ 35.029505] [ 35.029957] The buggy address belongs to the object at fff00000c664f800 [ 35.029957] which belongs to the cache kmalloc-64 of size 64 [ 35.031340] The buggy address is located 0 bytes to the right of [ 35.031340] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.032764] [ 35.033111] The buggy address belongs to the physical page: [ 35.033793] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.035020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.036036] page_type: f5(slab) [ 35.036513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.037398] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.038474] page dumped because: kasan: bad access detected [ 35.039188] [ 35.039520] Memory state around the buggy address: [ 35.040175] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.040989] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.041823] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.042752] ^ [ 35.043394] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.044253] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.045163] ================================================================== [ 35.161581] ================================================================== [ 35.162320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 35.163382] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.164219] [ 35.164599] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.165642] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.166424] Hardware name: linux,dummy-virt (DT) [ 35.167077] Call trace: [ 35.167470] show_stack+0x20/0x38 (C) [ 35.168053] dump_stack_lvl+0x8c/0xd0 [ 35.168687] print_report+0x118/0x5e0 [ 35.169231] kasan_report+0xc8/0x118 [ 35.169700] kasan_check_range+0x100/0x1a8 [ 35.170655] __kasan_check_write+0x20/0x30 [ 35.171314] kasan_atomics_helper+0xb70/0x4858 [ 35.171942] kasan_atomics+0x198/0x2e8 [ 35.172668] kunit_try_run_case+0x14c/0x3d0 [ 35.173323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.174099] kthread+0x24c/0x2d0 [ 35.174616] ret_from_fork+0x10/0x20 [ 35.175184] [ 35.175602] Allocated by task 254: [ 35.176114] kasan_save_stack+0x3c/0x68 [ 35.176665] kasan_save_track+0x20/0x40 [ 35.177229] kasan_save_alloc_info+0x40/0x58 [ 35.177901] __kasan_kmalloc+0xd4/0xd8 [ 35.178440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.179113] kasan_atomics+0xb8/0x2e8 [ 35.179598] kunit_try_run_case+0x14c/0x3d0 [ 35.180266] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.181089] kthread+0x24c/0x2d0 [ 35.181663] ret_from_fork+0x10/0x20 [ 35.182129] [ 35.182529] The buggy address belongs to the object at fff00000c664f800 [ 35.182529] which belongs to the cache kmalloc-64 of size 64 [ 35.183913] The buggy address is located 0 bytes to the right of [ 35.183913] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.185617] [ 35.185911] The buggy address belongs to the physical page: [ 35.186769] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.187594] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.188670] page_type: f5(slab) [ 35.189127] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.190027] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.191052] page dumped because: kasan: bad access detected [ 35.191712] [ 35.192075] Memory state around the buggy address: [ 35.192709] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.193579] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.194445] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.195267] ^ [ 35.195962] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.196837] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.197716] ================================================================== [ 34.276127] ================================================================== [ 34.276715] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 34.278698] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.280430] [ 34.280975] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.282251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.282870] Hardware name: linux,dummy-virt (DT) [ 34.283687] Call trace: [ 34.284790] show_stack+0x20/0x38 (C) [ 34.285671] dump_stack_lvl+0x8c/0xd0 [ 34.286339] print_report+0x118/0x5e0 [ 34.287003] kasan_report+0xc8/0x118 [ 34.287694] __asan_report_load4_noabort+0x20/0x30 [ 34.288650] kasan_atomics_helper+0x40fc/0x4858 [ 34.289372] kasan_atomics+0x198/0x2e8 [ 34.290028] kunit_try_run_case+0x14c/0x3d0 [ 34.290693] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.291520] kthread+0x24c/0x2d0 [ 34.292287] ret_from_fork+0x10/0x20 [ 34.292851] [ 34.293153] Allocated by task 254: [ 34.293680] kasan_save_stack+0x3c/0x68 [ 34.294724] kasan_save_track+0x20/0x40 [ 34.295758] kasan_save_alloc_info+0x40/0x58 [ 34.296651] __kasan_kmalloc+0xd4/0xd8 [ 34.297305] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.298013] kasan_atomics+0xb8/0x2e8 [ 34.298629] kunit_try_run_case+0x14c/0x3d0 [ 34.299323] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.300166] kthread+0x24c/0x2d0 [ 34.301348] ret_from_fork+0x10/0x20 [ 34.301902] [ 34.302232] The buggy address belongs to the object at fff00000c664f800 [ 34.302232] which belongs to the cache kmalloc-64 of size 64 [ 34.304485] The buggy address is located 0 bytes to the right of [ 34.304485] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.306108] [ 34.306573] The buggy address belongs to the physical page: [ 34.307473] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.309166] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.310065] page_type: f5(slab) [ 34.310639] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.311758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.313260] page dumped because: kasan: bad access detected [ 34.314090] [ 34.314448] Memory state around the buggy address: [ 34.315156] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.316732] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.317631] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.318621] ^ [ 34.319334] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.320770] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.321682] ================================================================== [ 35.390416] ================================================================== [ 35.391089] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 35.392090] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.392924] [ 35.393239] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.394685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.395225] Hardware name: linux,dummy-virt (DT) [ 35.396191] Call trace: [ 35.396641] show_stack+0x20/0x38 (C) [ 35.397214] dump_stack_lvl+0x8c/0xd0 [ 35.397827] print_report+0x118/0x5e0 [ 35.398465] kasan_report+0xc8/0x118 [ 35.399025] kasan_check_range+0x100/0x1a8 [ 35.399700] __kasan_check_write+0x20/0x30 [ 35.400363] kasan_atomics_helper+0xd3c/0x4858 [ 35.401056] kasan_atomics+0x198/0x2e8 [ 35.401619] kunit_try_run_case+0x14c/0x3d0 [ 35.402203] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.402987] kthread+0x24c/0x2d0 [ 35.403481] ret_from_fork+0x10/0x20 [ 35.404119] [ 35.404474] Allocated by task 254: [ 35.404967] kasan_save_stack+0x3c/0x68 [ 35.405563] kasan_save_track+0x20/0x40 [ 35.406203] kasan_save_alloc_info+0x40/0x58 [ 35.406822] __kasan_kmalloc+0xd4/0xd8 [ 35.407431] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.408126] kasan_atomics+0xb8/0x2e8 [ 35.408658] kunit_try_run_case+0x14c/0x3d0 [ 35.409360] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.409988] kthread+0x24c/0x2d0 [ 35.410589] ret_from_fork+0x10/0x20 [ 35.411154] [ 35.411460] The buggy address belongs to the object at fff00000c664f800 [ 35.411460] which belongs to the cache kmalloc-64 of size 64 [ 35.412894] The buggy address is located 0 bytes to the right of [ 35.412894] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.414237] [ 35.414607] The buggy address belongs to the physical page: [ 35.415323] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.416214] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.417110] page_type: f5(slab) [ 35.417690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.418594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.419586] page dumped because: kasan: bad access detected [ 35.420400] [ 35.420681] Memory state around the buggy address: [ 35.421372] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.422215] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.423048] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.423916] ^ [ 35.424534] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.425441] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.426336] ================================================================== [ 36.432764] ================================================================== [ 36.433695] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 36.434324] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.435059] [ 36.435359] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.436748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.437313] Hardware name: linux,dummy-virt (DT) [ 36.437939] Call trace: [ 36.438469] show_stack+0x20/0x38 (C) [ 36.439241] dump_stack_lvl+0x8c/0xd0 [ 36.440009] print_report+0x118/0x5e0 [ 36.440781] kasan_report+0xc8/0x118 [ 36.441356] kasan_check_range+0x100/0x1a8 [ 36.442024] __kasan_check_write+0x20/0x30 [ 36.442659] kasan_atomics_helper+0x16d0/0x4858 [ 36.443358] kasan_atomics+0x198/0x2e8 [ 36.443996] kunit_try_run_case+0x14c/0x3d0 [ 36.444601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.445321] kthread+0x24c/0x2d0 [ 36.445898] ret_from_fork+0x10/0x20 [ 36.446563] [ 36.446910] Allocated by task 254: [ 36.447594] kasan_save_stack+0x3c/0x68 [ 36.448193] kasan_save_track+0x20/0x40 [ 36.448706] kasan_save_alloc_info+0x40/0x58 [ 36.449463] __kasan_kmalloc+0xd4/0xd8 [ 36.450094] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.450710] kasan_atomics+0xb8/0x2e8 [ 36.451250] kunit_try_run_case+0x14c/0x3d0 [ 36.451771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.452657] kthread+0x24c/0x2d0 [ 36.453184] ret_from_fork+0x10/0x20 [ 36.453698] [ 36.454060] The buggy address belongs to the object at fff00000c664f800 [ 36.454060] which belongs to the cache kmalloc-64 of size 64 [ 36.455352] The buggy address is located 0 bytes to the right of [ 36.455352] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.456912] [ 36.457215] The buggy address belongs to the physical page: [ 36.458018] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.458994] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.459804] page_type: f5(slab) [ 36.460379] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.461312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.462228] page dumped because: kasan: bad access detected [ 36.462938] [ 36.463306] Memory state around the buggy address: [ 36.464082] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.464896] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.465724] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.466707] ^ [ 36.467364] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.468241] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.469189] ================================================================== [ 35.352187] ================================================================== [ 35.352960] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 35.353770] Read of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.354725] [ 35.355273] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.356692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.357335] Hardware name: linux,dummy-virt (DT) [ 35.358474] Call trace: [ 35.358983] show_stack+0x20/0x38 (C) [ 35.359695] dump_stack_lvl+0x8c/0xd0 [ 35.360294] print_report+0x118/0x5e0 [ 35.360867] kasan_report+0xc8/0x118 [ 35.361464] __asan_report_load4_noabort+0x20/0x30 [ 35.362029] kasan_atomics_helper+0x3dd8/0x4858 [ 35.362768] kasan_atomics+0x198/0x2e8 [ 35.363451] kunit_try_run_case+0x14c/0x3d0 [ 35.364185] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.364924] kthread+0x24c/0x2d0 [ 35.365538] ret_from_fork+0x10/0x20 [ 35.366138] [ 35.366430] Allocated by task 254: [ 35.367123] kasan_save_stack+0x3c/0x68 [ 35.367794] kasan_save_track+0x20/0x40 [ 35.368445] kasan_save_alloc_info+0x40/0x58 [ 35.369091] __kasan_kmalloc+0xd4/0xd8 [ 35.369646] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.370336] kasan_atomics+0xb8/0x2e8 [ 35.370861] kunit_try_run_case+0x14c/0x3d0 [ 35.371579] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.372273] kthread+0x24c/0x2d0 [ 35.372867] ret_from_fork+0x10/0x20 [ 35.373499] [ 35.373791] The buggy address belongs to the object at fff00000c664f800 [ 35.373791] which belongs to the cache kmalloc-64 of size 64 [ 35.375254] The buggy address is located 0 bytes to the right of [ 35.375254] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.376633] [ 35.377107] The buggy address belongs to the physical page: [ 35.377851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.379104] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.379897] page_type: f5(slab) [ 35.380502] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.381357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.382367] page dumped because: kasan: bad access detected [ 35.383056] [ 35.383353] Memory state around the buggy address: [ 35.384046] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.384903] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.385768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.386648] ^ [ 35.387264] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.388184] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.389026] ================================================================== [ 35.967570] ================================================================== [ 35.968495] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 35.969323] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.970199] [ 35.970577] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.971889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.972390] Hardware name: linux,dummy-virt (DT) [ 35.973026] Call trace: [ 35.973519] show_stack+0x20/0x38 (C) [ 35.974188] dump_stack_lvl+0x8c/0xd0 [ 35.974771] print_report+0x118/0x5e0 [ 35.975429] kasan_report+0xc8/0x118 [ 35.976108] kasan_check_range+0x100/0x1a8 [ 35.976597] __kasan_check_write+0x20/0x30 [ 35.977260] kasan_atomics_helper+0x126c/0x4858 [ 35.977914] kasan_atomics+0x198/0x2e8 [ 35.978592] kunit_try_run_case+0x14c/0x3d0 [ 35.979303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.980026] kthread+0x24c/0x2d0 [ 35.980548] ret_from_fork+0x10/0x20 [ 35.981179] [ 35.981504] Allocated by task 254: [ 35.982079] kasan_save_stack+0x3c/0x68 [ 35.982604] kasan_save_track+0x20/0x40 [ 35.983289] kasan_save_alloc_info+0x40/0x58 [ 35.983910] __kasan_kmalloc+0xd4/0xd8 [ 35.984377] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.985129] kasan_atomics+0xb8/0x2e8 [ 35.985743] kunit_try_run_case+0x14c/0x3d0 [ 35.986404] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.987134] kthread+0x24c/0x2d0 [ 35.987607] ret_from_fork+0x10/0x20 [ 35.988219] [ 35.988521] The buggy address belongs to the object at fff00000c664f800 [ 35.988521] which belongs to the cache kmalloc-64 of size 64 [ 35.989851] The buggy address is located 0 bytes to the right of [ 35.989851] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.991308] [ 35.991592] The buggy address belongs to the physical page: [ 35.992381] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.993237] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.994215] page_type: f5(slab) [ 35.994690] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.995660] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.996565] page dumped because: kasan: bad access detected [ 35.997365] [ 35.997703] Memory state around the buggy address: [ 35.998422] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.999291] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.000197] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.001058] ^ [ 36.001695] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.002631] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.003552] ================================================================== [ 34.534916] ================================================================== [ 34.535793] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 34.536667] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.537690] [ 34.538043] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.539311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.539953] Hardware name: linux,dummy-virt (DT) [ 34.540579] Call trace: [ 34.541012] show_stack+0x20/0x38 (C) [ 34.541587] dump_stack_lvl+0x8c/0xd0 [ 34.542158] print_report+0x118/0x5e0 [ 34.542849] kasan_report+0xc8/0x118 [ 34.543389] kasan_check_range+0x100/0x1a8 [ 34.544094] __kasan_check_write+0x20/0x30 [ 34.544633] kasan_atomics_helper+0x4e4/0x4858 [ 34.545381] kasan_atomics+0x198/0x2e8 [ 34.546046] kunit_try_run_case+0x14c/0x3d0 [ 34.546698] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.547521] kthread+0x24c/0x2d0 [ 34.548152] ret_from_fork+0x10/0x20 [ 34.548716] [ 34.549184] Allocated by task 254: [ 34.549688] kasan_save_stack+0x3c/0x68 [ 34.550254] kasan_save_track+0x20/0x40 [ 34.550925] kasan_save_alloc_info+0x40/0x58 [ 34.551514] __kasan_kmalloc+0xd4/0xd8 [ 34.552026] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.552688] kasan_atomics+0xb8/0x2e8 [ 34.553179] kunit_try_run_case+0x14c/0x3d0 [ 34.553870] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.554608] kthread+0x24c/0x2d0 [ 34.555225] ret_from_fork+0x10/0x20 [ 34.555711] [ 34.556113] The buggy address belongs to the object at fff00000c664f800 [ 34.556113] which belongs to the cache kmalloc-64 of size 64 [ 34.557493] The buggy address is located 0 bytes to the right of [ 34.557493] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.558937] [ 34.559341] The buggy address belongs to the physical page: [ 34.559905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.560931] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.561789] page_type: f5(slab) [ 34.562270] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.563282] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.564134] page dumped because: kasan: bad access detected [ 34.564951] [ 34.565310] Memory state around the buggy address: [ 34.565968] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.566974] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.567814] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.568616] ^ [ 34.569388] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.570355] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.571221] ================================================================== [ 36.548452] ================================================================== [ 36.549547] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 36.550471] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.551385] [ 36.551804] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.553121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.553648] Hardware name: linux,dummy-virt (DT) [ 36.554238] Call trace: [ 36.554703] show_stack+0x20/0x38 (C) [ 36.555290] dump_stack_lvl+0x8c/0xd0 [ 36.555901] print_report+0x118/0x5e0 [ 36.556666] kasan_report+0xc8/0x118 [ 36.557381] __asan_report_load8_noabort+0x20/0x30 [ 36.558127] kasan_atomics_helper+0x3e20/0x4858 [ 36.558894] kasan_atomics+0x198/0x2e8 [ 36.559490] kunit_try_run_case+0x14c/0x3d0 [ 36.560003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.560787] kthread+0x24c/0x2d0 [ 36.561411] ret_from_fork+0x10/0x20 [ 36.562070] [ 36.562445] Allocated by task 254: [ 36.563116] kasan_save_stack+0x3c/0x68 [ 36.563632] kasan_save_track+0x20/0x40 [ 36.564274] kasan_save_alloc_info+0x40/0x58 [ 36.564933] __kasan_kmalloc+0xd4/0xd8 [ 36.565921] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.566505] kasan_atomics+0xb8/0x2e8 [ 36.567118] kunit_try_run_case+0x14c/0x3d0 [ 36.567826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.568596] kthread+0x24c/0x2d0 [ 36.569121] ret_from_fork+0x10/0x20 [ 36.569604] [ 36.570064] The buggy address belongs to the object at fff00000c664f800 [ 36.570064] which belongs to the cache kmalloc-64 of size 64 [ 36.571444] The buggy address is located 0 bytes to the right of [ 36.571444] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.573102] [ 36.573377] The buggy address belongs to the physical page: [ 36.574424] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.575578] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.576502] page_type: f5(slab) [ 36.576972] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.577967] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.578826] page dumped because: kasan: bad access detected [ 36.579469] [ 36.579778] Memory state around the buggy address: [ 36.580348] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.581255] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.582129] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.583039] ^ [ 36.583675] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.584532] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.585433] ================================================================== [ 35.812098] ================================================================== [ 35.812870] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 35.813698] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 35.815103] [ 35.815479] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 35.816714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.817296] Hardware name: linux,dummy-virt (DT) [ 35.817850] Call trace: [ 35.818326] show_stack+0x20/0x38 (C) [ 35.819004] dump_stack_lvl+0x8c/0xd0 [ 35.819516] print_report+0x118/0x5e0 [ 35.820198] kasan_report+0xc8/0x118 [ 35.820705] kasan_check_range+0x100/0x1a8 [ 35.821494] __kasan_check_write+0x20/0x30 [ 35.822211] kasan_atomics_helper+0x10c0/0x4858 [ 35.822896] kasan_atomics+0x198/0x2e8 [ 35.823465] kunit_try_run_case+0x14c/0x3d0 [ 35.824118] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.824940] kthread+0x24c/0x2d0 [ 35.825571] ret_from_fork+0x10/0x20 [ 35.826129] [ 35.826445] Allocated by task 254: [ 35.826970] kasan_save_stack+0x3c/0x68 [ 35.827699] kasan_save_track+0x20/0x40 [ 35.828253] kasan_save_alloc_info+0x40/0x58 [ 35.828964] __kasan_kmalloc+0xd4/0xd8 [ 35.829556] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.830271] kasan_atomics+0xb8/0x2e8 [ 35.830857] kunit_try_run_case+0x14c/0x3d0 [ 35.831480] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.832254] kthread+0x24c/0x2d0 [ 35.832848] ret_from_fork+0x10/0x20 [ 35.833366] [ 35.833717] The buggy address belongs to the object at fff00000c664f800 [ 35.833717] which belongs to the cache kmalloc-64 of size 64 [ 35.835131] The buggy address is located 0 bytes to the right of [ 35.835131] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 35.836547] [ 35.836890] The buggy address belongs to the physical page: [ 35.837528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 35.838546] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.839474] page_type: f5(slab) [ 35.840296] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.841214] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.842298] page dumped because: kasan: bad access detected [ 35.843117] [ 35.843630] Memory state around the buggy address: [ 35.844419] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.845523] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.846488] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.847455] ^ [ 35.848069] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.848995] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.849834] ================================================================== [ 36.392384] ================================================================== [ 36.393748] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 36.394707] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.396059] [ 36.396431] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.397999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.398860] Hardware name: linux,dummy-virt (DT) [ 36.399491] Call trace: [ 36.399911] show_stack+0x20/0x38 (C) [ 36.400453] dump_stack_lvl+0x8c/0xd0 [ 36.401357] print_report+0x118/0x5e0 [ 36.402152] kasan_report+0xc8/0x118 [ 36.402980] __asan_report_load8_noabort+0x20/0x30 [ 36.403718] kasan_atomics_helper+0x3df4/0x4858 [ 36.404340] kasan_atomics+0x198/0x2e8 [ 36.404943] kunit_try_run_case+0x14c/0x3d0 [ 36.405552] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.406469] kthread+0x24c/0x2d0 [ 36.406962] ret_from_fork+0x10/0x20 [ 36.407663] [ 36.408053] Allocated by task 254: [ 36.408565] kasan_save_stack+0x3c/0x68 [ 36.409292] kasan_save_track+0x20/0x40 [ 36.409857] kasan_save_alloc_info+0x40/0x58 [ 36.410667] __kasan_kmalloc+0xd4/0xd8 [ 36.411313] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.411973] kasan_atomics+0xb8/0x2e8 [ 36.412594] kunit_try_run_case+0x14c/0x3d0 [ 36.413302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.414121] kthread+0x24c/0x2d0 [ 36.414769] ret_from_fork+0x10/0x20 [ 36.415395] [ 36.415851] The buggy address belongs to the object at fff00000c664f800 [ 36.415851] which belongs to the cache kmalloc-64 of size 64 [ 36.417291] The buggy address is located 0 bytes to the right of [ 36.417291] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.418032] [ 36.418543] The buggy address belongs to the physical page: [ 36.419425] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.420540] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.421373] page_type: f5(slab) [ 36.422061] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.423128] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.424188] page dumped because: kasan: bad access detected [ 36.424956] [ 36.425291] Memory state around the buggy address: [ 36.426113] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.427049] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.427963] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.428812] ^ [ 36.429402] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.430343] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.431201] ================================================================== [ 34.970251] ================================================================== [ 34.971041] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 34.972225] Write of size 4 at addr fff00000c664f830 by task kunit_try_catch/254 [ 34.973155] [ 34.973540] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.974723] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.975389] Hardware name: linux,dummy-virt (DT) [ 34.976014] Call trace: [ 34.976362] show_stack+0x20/0x38 (C) [ 34.977055] dump_stack_lvl+0x8c/0xd0 [ 34.977625] print_report+0x118/0x5e0 [ 34.978234] kasan_report+0xc8/0x118 [ 34.978843] kasan_check_range+0x100/0x1a8 [ 34.979475] __kasan_check_write+0x20/0x30 [ 34.980217] kasan_atomics_helper+0x99c/0x4858 [ 34.980756] kasan_atomics+0x198/0x2e8 [ 34.981483] kunit_try_run_case+0x14c/0x3d0 [ 34.982170] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.982947] kthread+0x24c/0x2d0 [ 34.983592] ret_from_fork+0x10/0x20 [ 34.984166] [ 34.984461] Allocated by task 254: [ 34.984995] kasan_save_stack+0x3c/0x68 [ 34.985640] kasan_save_track+0x20/0x40 [ 34.986418] kasan_save_alloc_info+0x40/0x58 [ 34.986979] __kasan_kmalloc+0xd4/0xd8 [ 34.987633] __kmalloc_cache_noprof+0x15c/0x3c0 [ 34.988309] kasan_atomics+0xb8/0x2e8 [ 34.988842] kunit_try_run_case+0x14c/0x3d0 [ 34.989487] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 34.990188] kthread+0x24c/0x2d0 [ 34.990718] ret_from_fork+0x10/0x20 [ 34.991248] [ 34.991614] The buggy address belongs to the object at fff00000c664f800 [ 34.991614] which belongs to the cache kmalloc-64 of size 64 [ 34.993018] The buggy address is located 0 bytes to the right of [ 34.993018] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 34.994396] [ 34.994697] The buggy address belongs to the physical page: [ 34.995537] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 34.996467] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 34.997355] page_type: f5(slab) [ 34.997940] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 34.998895] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.999767] page dumped because: kasan: bad access detected [ 35.000548] [ 35.000871] Memory state around the buggy address: [ 35.001507] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.002361] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.003159] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.004019] ^ [ 35.004641] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.005609] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.006417] ================================================================== [ 36.004975] ================================================================== [ 36.005718] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 36.006716] Write of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.007633] [ 36.008042] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.009362] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.010028] Hardware name: linux,dummy-virt (DT) [ 36.010531] Call trace: [ 36.011060] show_stack+0x20/0x38 (C) [ 36.011644] dump_stack_lvl+0x8c/0xd0 [ 36.012418] print_report+0x118/0x5e0 [ 36.012934] kasan_report+0xc8/0x118 [ 36.013589] kasan_check_range+0x100/0x1a8 [ 36.014424] __kasan_check_write+0x20/0x30 [ 36.014992] kasan_atomics_helper+0x12d8/0x4858 [ 36.015727] kasan_atomics+0x198/0x2e8 [ 36.016216] kunit_try_run_case+0x14c/0x3d0 [ 36.016990] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.017734] kthread+0x24c/0x2d0 [ 36.018308] ret_from_fork+0x10/0x20 [ 36.018933] [ 36.019315] Allocated by task 254: [ 36.019737] kasan_save_stack+0x3c/0x68 [ 36.020423] kasan_save_track+0x20/0x40 [ 36.020989] kasan_save_alloc_info+0x40/0x58 [ 36.021634] __kasan_kmalloc+0xd4/0xd8 [ 36.022132] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.022897] kasan_atomics+0xb8/0x2e8 [ 36.023409] kunit_try_run_case+0x14c/0x3d0 [ 36.024016] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.024781] kthread+0x24c/0x2d0 [ 36.025303] ret_from_fork+0x10/0x20 [ 36.025784] [ 36.026213] The buggy address belongs to the object at fff00000c664f800 [ 36.026213] which belongs to the cache kmalloc-64 of size 64 [ 36.027593] The buggy address is located 0 bytes to the right of [ 36.027593] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.028978] [ 36.029285] The buggy address belongs to the physical page: [ 36.030396] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.031369] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.032228] page_type: f5(slab) [ 36.032726] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.033646] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.034621] page dumped because: kasan: bad access detected [ 36.035331] [ 36.035712] Memory state around the buggy address: [ 36.036234] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037189] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.037993] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.038961] ^ [ 36.039563] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.040432] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.041299] ================================================================== [ 36.314445] ================================================================== [ 36.315076] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 36.316473] Read of size 8 at addr fff00000c664f830 by task kunit_try_catch/254 [ 36.317200] [ 36.317495] CPU: 1 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 36.318485] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.319009] Hardware name: linux,dummy-virt (DT) [ 36.319661] Call trace: [ 36.320097] show_stack+0x20/0x38 (C) [ 36.320731] dump_stack_lvl+0x8c/0xd0 [ 36.321349] print_report+0x118/0x5e0 [ 36.321927] kasan_report+0xc8/0x118 [ 36.322460] __asan_report_load8_noabort+0x20/0x30 [ 36.323230] kasan_atomics_helper+0x3db0/0x4858 [ 36.323768] kasan_atomics+0x198/0x2e8 [ 36.324439] kunit_try_run_case+0x14c/0x3d0 [ 36.325143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.326020] kthread+0x24c/0x2d0 [ 36.326544] ret_from_fork+0x10/0x20 [ 36.327217] [ 36.327547] Allocated by task 254: [ 36.328002] kasan_save_stack+0x3c/0x68 [ 36.328598] kasan_save_track+0x20/0x40 [ 36.329115] kasan_save_alloc_info+0x40/0x58 [ 36.329831] __kasan_kmalloc+0xd4/0xd8 [ 36.330454] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.331080] kasan_atomics+0xb8/0x2e8 [ 36.331609] kunit_try_run_case+0x14c/0x3d0 [ 36.332247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.333002] kthread+0x24c/0x2d0 [ 36.333511] ret_from_fork+0x10/0x20 [ 36.334034] [ 36.334474] The buggy address belongs to the object at fff00000c664f800 [ 36.334474] which belongs to the cache kmalloc-64 of size 64 [ 36.335922] The buggy address is located 0 bytes to the right of [ 36.335922] allocated 48-byte region [fff00000c664f800, fff00000c664f830) [ 36.337208] [ 36.337599] The buggy address belongs to the physical page: [ 36.338179] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x10664f [ 36.339220] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.340119] page_type: f5(slab) [ 36.340650] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.341564] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.342520] page dumped because: kasan: bad access detected [ 36.343184] [ 36.343503] Memory state around the buggy address: [ 36.344136] fff00000c664f700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.344958] fff00000c664f780: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.345768] >fff00000c664f800: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.346677] ^ [ 36.347316] fff00000c664f880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.348222] fff00000c664f900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.349089] ==================================================================
[ 32.206918] ================================================================== [ 32.207537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 32.209014] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.210125] [ 32.210341] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.211226] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.211530] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.212278] Call Trace: [ 32.212673] <TASK> [ 32.213036] dump_stack_lvl+0x73/0xb0 [ 32.213364] print_report+0xd1/0x640 [ 32.213879] ? __virt_addr_valid+0x1db/0x2d0 [ 32.214395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.214921] kasan_report+0x102/0x140 [ 32.215315] ? kasan_atomics_helper+0x3e0/0x5450 [ 32.215825] ? kasan_atomics_helper+0x3e0/0x5450 [ 32.216310] kasan_check_range+0x10c/0x1c0 [ 32.216841] __kasan_check_read+0x15/0x20 [ 32.217219] kasan_atomics_helper+0x3e0/0x5450 [ 32.217676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.218105] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.218656] ? kasan_atomics+0x153/0x310 [ 32.219168] kasan_atomics+0x1dd/0x310 [ 32.219733] ? __pfx_kasan_atomics+0x10/0x10 [ 32.220141] ? __pfx_read_tsc+0x10/0x10 [ 32.220534] ? ktime_get_ts64+0x86/0x230 [ 32.221284] kunit_try_run_case+0x1b3/0x490 [ 32.221638] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.222228] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.222742] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.223293] ? __kthread_parkme+0x82/0x160 [ 32.223736] ? preempt_count_sub+0x50/0x80 [ 32.224193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.224629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.225399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.226020] kthread+0x257/0x310 [ 32.226370] ? __pfx_kthread+0x10/0x10 [ 32.226776] ret_from_fork+0x41/0x80 [ 32.227330] ? __pfx_kthread+0x10/0x10 [ 32.227673] ret_from_fork_asm+0x1a/0x30 [ 32.228181] </TASK> [ 32.228488] [ 32.228651] Allocated by task 272: [ 32.228925] kasan_save_stack+0x3d/0x60 [ 32.229445] kasan_save_track+0x18/0x40 [ 32.229979] kasan_save_alloc_info+0x3b/0x50 [ 32.230518] __kasan_kmalloc+0xb7/0xc0 [ 32.230863] __kmalloc_cache_noprof+0x184/0x410 [ 32.231335] kasan_atomics+0x96/0x310 [ 32.231915] kunit_try_run_case+0x1b3/0x490 [ 32.232226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.232962] kthread+0x257/0x310 [ 32.233419] ret_from_fork+0x41/0x80 [ 32.234383] ret_from_fork_asm+0x1a/0x30 [ 32.234752] [ 32.235047] The buggy address belongs to the object at ffff888102a0ec00 [ 32.235047] which belongs to the cache kmalloc-64 of size 64 [ 32.237306] The buggy address is located 0 bytes to the right of [ 32.237306] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.238975] [ 32.239197] The buggy address belongs to the physical page: [ 32.239755] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.240486] flags: 0x200000000000000(node=0|zone=2) [ 32.241890] page_type: f5(slab) [ 32.242635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.243422] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.243960] page dumped because: kasan: bad access detected [ 32.244535] [ 32.244735] Memory state around the buggy address: [ 32.245230] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.245811] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.246474] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.246942] ^ [ 32.247506] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.248221] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.248809] ================================================================== [ 32.726850] ================================================================== [ 32.727729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 32.728448] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.729127] [ 32.729317] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.730096] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.730649] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.731612] Call Trace: [ 32.731963] <TASK> [ 32.732336] dump_stack_lvl+0x73/0xb0 [ 32.732856] print_report+0xd1/0x640 [ 32.733312] ? __virt_addr_valid+0x1db/0x2d0 [ 32.733775] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.734452] kasan_report+0x102/0x140 [ 32.735119] ? kasan_atomics_helper+0xa2c/0x5450 [ 32.735604] ? kasan_atomics_helper+0xa2c/0x5450 [ 32.736547] kasan_check_range+0x10c/0x1c0 [ 32.737209] __kasan_check_write+0x18/0x20 [ 32.738041] kasan_atomics_helper+0xa2c/0x5450 [ 32.738559] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.739270] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.739664] ? kasan_atomics+0x153/0x310 [ 32.740292] kasan_atomics+0x1dd/0x310 [ 32.740762] ? __pfx_kasan_atomics+0x10/0x10 [ 32.741248] ? __pfx_read_tsc+0x10/0x10 [ 32.741786] ? ktime_get_ts64+0x86/0x230 [ 32.742250] kunit_try_run_case+0x1b3/0x490 [ 32.742919] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.743525] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.744052] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.744622] ? __kthread_parkme+0x82/0x160 [ 32.745151] ? preempt_count_sub+0x50/0x80 [ 32.745696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.746335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.746773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.747496] kthread+0x257/0x310 [ 32.748091] ? __pfx_kthread+0x10/0x10 [ 32.748539] ret_from_fork+0x41/0x80 [ 32.748869] ? __pfx_kthread+0x10/0x10 [ 32.749427] ret_from_fork_asm+0x1a/0x30 [ 32.750098] </TASK> [ 32.750351] [ 32.750555] Allocated by task 272: [ 32.751218] kasan_save_stack+0x3d/0x60 [ 32.751560] kasan_save_track+0x18/0x40 [ 32.752248] kasan_save_alloc_info+0x3b/0x50 [ 32.752801] __kasan_kmalloc+0xb7/0xc0 [ 32.753196] __kmalloc_cache_noprof+0x184/0x410 [ 32.753674] kasan_atomics+0x96/0x310 [ 32.754225] kunit_try_run_case+0x1b3/0x490 [ 32.754650] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.755481] kthread+0x257/0x310 [ 32.756295] ret_from_fork+0x41/0x80 [ 32.756975] ret_from_fork_asm+0x1a/0x30 [ 32.757607] [ 32.757773] The buggy address belongs to the object at ffff888102a0ec00 [ 32.757773] which belongs to the cache kmalloc-64 of size 64 [ 32.759815] The buggy address is located 0 bytes to the right of [ 32.759815] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.760725] [ 32.761359] The buggy address belongs to the physical page: [ 32.762177] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.762835] flags: 0x200000000000000(node=0|zone=2) [ 32.763594] page_type: f5(slab) [ 32.764231] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.765399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.766565] page dumped because: kasan: bad access detected [ 32.767078] [ 32.767286] Memory state around the buggy address: [ 32.768145] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.769357] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.770353] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.771319] ^ [ 32.771829] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.772434] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.773402] ================================================================== [ 33.894220] ================================================================== [ 33.894958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 33.895556] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.896261] [ 33.896496] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.897427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.897791] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.898597] Call Trace: [ 33.899000] <TASK> [ 33.899296] dump_stack_lvl+0x73/0xb0 [ 33.899740] print_report+0xd1/0x640 [ 33.900119] ? __virt_addr_valid+0x1db/0x2d0 [ 33.900592] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.901189] kasan_report+0x102/0x140 [ 33.901668] ? kasan_atomics_helper+0x16e8/0x5450 [ 33.902229] ? kasan_atomics_helper+0x16e8/0x5450 [ 33.902697] kasan_check_range+0x10c/0x1c0 [ 33.903195] __kasan_check_write+0x18/0x20 [ 33.903724] kasan_atomics_helper+0x16e8/0x5450 [ 33.904155] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.904752] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.905223] ? kasan_atomics+0x153/0x310 [ 33.905675] kasan_atomics+0x1dd/0x310 [ 33.906085] ? __pfx_kasan_atomics+0x10/0x10 [ 33.906603] ? __pfx_read_tsc+0x10/0x10 [ 33.907052] ? ktime_get_ts64+0x86/0x230 [ 33.907550] kunit_try_run_case+0x1b3/0x490 [ 33.908096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.908483] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.909032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.909700] ? __kthread_parkme+0x82/0x160 [ 33.910149] ? preempt_count_sub+0x50/0x80 [ 33.910514] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.911089] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.911500] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.912148] kthread+0x257/0x310 [ 33.912595] ? __pfx_kthread+0x10/0x10 [ 33.912977] ret_from_fork+0x41/0x80 [ 33.913483] ? __pfx_kthread+0x10/0x10 [ 33.914188] ret_from_fork_asm+0x1a/0x30 [ 33.914815] </TASK> [ 33.915179] [ 33.915372] Allocated by task 272: [ 33.915861] kasan_save_stack+0x3d/0x60 [ 33.916168] kasan_save_track+0x18/0x40 [ 33.916802] kasan_save_alloc_info+0x3b/0x50 [ 33.917314] __kasan_kmalloc+0xb7/0xc0 [ 33.917696] __kmalloc_cache_noprof+0x184/0x410 [ 33.918357] kasan_atomics+0x96/0x310 [ 33.918884] kunit_try_run_case+0x1b3/0x490 [ 33.919333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.919846] kthread+0x257/0x310 [ 33.920285] ret_from_fork+0x41/0x80 [ 33.920819] ret_from_fork_asm+0x1a/0x30 [ 33.921135] [ 33.921305] The buggy address belongs to the object at ffff888102a0ec00 [ 33.921305] which belongs to the cache kmalloc-64 of size 64 [ 33.922318] The buggy address is located 0 bytes to the right of [ 33.922318] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.923536] [ 33.923862] The buggy address belongs to the physical page: [ 33.924352] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.924970] flags: 0x200000000000000(node=0|zone=2) [ 33.925573] page_type: f5(slab) [ 33.926111] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.926671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.927186] page dumped because: kasan: bad access detected [ 33.927898] [ 33.928165] Memory state around the buggy address: [ 33.928757] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.929545] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.930188] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.930801] ^ [ 33.931118] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.932006] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.932655] ================================================================== [ 34.759613] ================================================================== [ 34.760285] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 34.761745] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.762581] [ 34.763134] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.764113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.764521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.765448] Call Trace: [ 34.765744] <TASK> [ 34.766239] dump_stack_lvl+0x73/0xb0 [ 34.766867] print_report+0xd1/0x640 [ 34.767520] ? __virt_addr_valid+0x1db/0x2d0 [ 34.768060] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.769113] kasan_report+0x102/0x140 [ 34.769565] ? kasan_atomics_helper+0x4fb4/0x5450 [ 34.770553] ? kasan_atomics_helper+0x4fb4/0x5450 [ 34.771197] __asan_report_load8_noabort+0x18/0x20 [ 34.771438] kasan_atomics_helper+0x4fb4/0x5450 [ 34.771662] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.772048] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.773202] ? kasan_atomics+0x153/0x310 [ 34.773636] kasan_atomics+0x1dd/0x310 [ 34.774278] ? __pfx_kasan_atomics+0x10/0x10 [ 34.774843] ? __pfx_read_tsc+0x10/0x10 [ 34.775319] ? ktime_get_ts64+0x86/0x230 [ 34.775887] kunit_try_run_case+0x1b3/0x490 [ 34.776272] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.776877] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.777257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.778047] ? __kthread_parkme+0x82/0x160 [ 34.778532] ? preempt_count_sub+0x50/0x80 [ 34.779183] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.779796] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.780402] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.781329] kthread+0x257/0x310 [ 34.781829] ? __pfx_kthread+0x10/0x10 [ 34.782540] ret_from_fork+0x41/0x80 [ 34.783150] ? __pfx_kthread+0x10/0x10 [ 34.783733] ret_from_fork_asm+0x1a/0x30 [ 34.784237] </TASK> [ 34.784704] [ 34.785032] Allocated by task 272: [ 34.785419] kasan_save_stack+0x3d/0x60 [ 34.786187] kasan_save_track+0x18/0x40 [ 34.786748] kasan_save_alloc_info+0x3b/0x50 [ 34.787210] __kasan_kmalloc+0xb7/0xc0 [ 34.787960] __kmalloc_cache_noprof+0x184/0x410 [ 34.788324] kasan_atomics+0x96/0x310 [ 34.789338] kunit_try_run_case+0x1b3/0x490 [ 34.790371] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.791202] kthread+0x257/0x310 [ 34.791477] ret_from_fork+0x41/0x80 [ 34.792060] ret_from_fork_asm+0x1a/0x30 [ 34.792485] [ 34.792733] The buggy address belongs to the object at ffff888102a0ec00 [ 34.792733] which belongs to the cache kmalloc-64 of size 64 [ 34.793647] The buggy address is located 0 bytes to the right of [ 34.793647] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.794551] [ 34.794921] The buggy address belongs to the physical page: [ 34.795567] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.796461] flags: 0x200000000000000(node=0|zone=2) [ 34.796857] page_type: f5(slab) [ 34.797567] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.798653] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.799414] page dumped because: kasan: bad access detected [ 34.799956] [ 34.800210] Memory state around the buggy address: [ 34.800708] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.801466] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.802187] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.802969] ^ [ 34.803377] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.804171] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.804934] ================================================================== [ 31.998490] ================================================================== [ 32.000767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 32.001501] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.003108] [ 32.003333] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.004757] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.005709] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.006662] Call Trace: [ 32.007027] <TASK> [ 32.007726] dump_stack_lvl+0x73/0xb0 [ 32.008279] print_report+0xd1/0x640 [ 32.009117] ? __virt_addr_valid+0x1db/0x2d0 [ 32.009811] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.010666] kasan_report+0x102/0x140 [ 32.011384] ? kasan_atomics_helper+0x4bbe/0x5450 [ 32.012428] ? kasan_atomics_helper+0x4bbe/0x5450 [ 32.013112] __asan_report_load4_noabort+0x18/0x20 [ 32.013779] kasan_atomics_helper+0x4bbe/0x5450 [ 32.014389] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.015202] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.015966] ? kasan_atomics+0x153/0x310 [ 32.016453] kasan_atomics+0x1dd/0x310 [ 32.016910] ? __pfx_kasan_atomics+0x10/0x10 [ 32.018378] ? __pfx_read_tsc+0x10/0x10 [ 32.018910] ? ktime_get_ts64+0x86/0x230 [ 32.019607] kunit_try_run_case+0x1b3/0x490 [ 32.020248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.020911] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.022095] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.022561] ? __kthread_parkme+0x82/0x160 [ 32.023543] ? preempt_count_sub+0x50/0x80 [ 32.024170] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.024872] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.025457] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.025909] kthread+0x257/0x310 [ 32.026335] ? __pfx_kthread+0x10/0x10 [ 32.027092] ret_from_fork+0x41/0x80 [ 32.027881] ? __pfx_kthread+0x10/0x10 [ 32.028817] ret_from_fork_asm+0x1a/0x30 [ 32.029241] </TASK> [ 32.029868] [ 32.030027] Allocated by task 272: [ 32.031162] kasan_save_stack+0x3d/0x60 [ 32.031861] kasan_save_track+0x18/0x40 [ 32.032321] kasan_save_alloc_info+0x3b/0x50 [ 32.033380] __kasan_kmalloc+0xb7/0xc0 [ 32.034024] __kmalloc_cache_noprof+0x184/0x410 [ 32.034722] kasan_atomics+0x96/0x310 [ 32.035493] kunit_try_run_case+0x1b3/0x490 [ 32.036355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.037198] kthread+0x257/0x310 [ 32.037642] ret_from_fork+0x41/0x80 [ 32.038443] ret_from_fork_asm+0x1a/0x30 [ 32.039358] [ 32.039526] The buggy address belongs to the object at ffff888102a0ec00 [ 32.039526] which belongs to the cache kmalloc-64 of size 64 [ 32.041516] The buggy address is located 0 bytes to the right of [ 32.041516] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.043204] [ 32.043384] The buggy address belongs to the physical page: [ 32.044041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.045108] flags: 0x200000000000000(node=0|zone=2) [ 32.046231] page_type: f5(slab) [ 32.046596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.047248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.049174] page dumped because: kasan: bad access detected [ 32.050413] [ 32.050626] Memory state around the buggy address: [ 32.051395] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.052281] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.053035] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.053787] ^ [ 32.054668] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.055564] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.056607] ================================================================== [ 33.627907] ================================================================== [ 33.628501] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 33.629230] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.629879] [ 33.630158] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.631130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.631889] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.632708] Call Trace: [ 33.633197] <TASK> [ 33.633473] dump_stack_lvl+0x73/0xb0 [ 33.634058] print_report+0xd1/0x640 [ 33.634506] ? __virt_addr_valid+0x1db/0x2d0 [ 33.635156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.635912] kasan_report+0x102/0x140 [ 33.636299] ? kasan_atomics_helper+0x4eb0/0x5450 [ 33.636942] ? kasan_atomics_helper+0x4eb0/0x5450 [ 33.637420] __asan_report_load8_noabort+0x18/0x20 [ 33.638088] kasan_atomics_helper+0x4eb0/0x5450 [ 33.638463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.639211] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.639735] ? kasan_atomics+0x153/0x310 [ 33.640427] kasan_atomics+0x1dd/0x310 [ 33.640838] ? __pfx_kasan_atomics+0x10/0x10 [ 33.641177] ? __pfx_read_tsc+0x10/0x10 [ 33.641995] ? ktime_get_ts64+0x86/0x230 [ 33.642653] kunit_try_run_case+0x1b3/0x490 [ 33.643120] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.643542] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.644402] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.645750] ? __kthread_parkme+0x82/0x160 [ 33.646149] ? preempt_count_sub+0x50/0x80 [ 33.646607] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.647337] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.648211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.649329] kthread+0x257/0x310 [ 33.649693] ? __pfx_kthread+0x10/0x10 [ 33.650424] ret_from_fork+0x41/0x80 [ 33.651153] ? __pfx_kthread+0x10/0x10 [ 33.651540] ret_from_fork_asm+0x1a/0x30 [ 33.652328] </TASK> [ 33.652542] [ 33.652818] Allocated by task 272: [ 33.653636] kasan_save_stack+0x3d/0x60 [ 33.654424] kasan_save_track+0x18/0x40 [ 33.655135] kasan_save_alloc_info+0x3b/0x50 [ 33.656133] __kasan_kmalloc+0xb7/0xc0 [ 33.656490] __kmalloc_cache_noprof+0x184/0x410 [ 33.657283] kasan_atomics+0x96/0x310 [ 33.657998] kunit_try_run_case+0x1b3/0x490 [ 33.658508] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.659312] kthread+0x257/0x310 [ 33.659654] ret_from_fork+0x41/0x80 [ 33.660019] ret_from_fork_asm+0x1a/0x30 [ 33.660459] [ 33.660697] The buggy address belongs to the object at ffff888102a0ec00 [ 33.660697] which belongs to the cache kmalloc-64 of size 64 [ 33.661463] The buggy address is located 0 bytes to the right of [ 33.661463] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.662819] [ 33.662996] The buggy address belongs to the physical page: [ 33.663728] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.664393] flags: 0x200000000000000(node=0|zone=2) [ 33.665098] page_type: f5(slab) [ 33.665549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.666362] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.667201] page dumped because: kasan: bad access detected [ 33.667924] [ 33.668069] Memory state around the buggy address: [ 33.668628] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.669382] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.670182] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.670742] ^ [ 33.671380] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.672080] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.672824] ================================================================== [ 34.256773] ================================================================== [ 34.257384] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 34.259011] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.259874] [ 34.260338] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.261311] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.261856] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.262894] Call Trace: [ 34.263358] <TASK> [ 34.263638] dump_stack_lvl+0x73/0xb0 [ 34.264547] print_report+0xd1/0x640 [ 34.265235] ? __virt_addr_valid+0x1db/0x2d0 [ 34.265710] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.266566] kasan_report+0x102/0x140 [ 34.267194] ? kasan_atomics_helper+0x1c19/0x5450 [ 34.268040] ? kasan_atomics_helper+0x1c19/0x5450 [ 34.268552] kasan_check_range+0x10c/0x1c0 [ 34.269446] __kasan_check_write+0x18/0x20 [ 34.269770] kasan_atomics_helper+0x1c19/0x5450 [ 34.270560] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.271374] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.272186] ? kasan_atomics+0x153/0x310 [ 34.272619] kasan_atomics+0x1dd/0x310 [ 34.273359] ? __pfx_kasan_atomics+0x10/0x10 [ 34.274355] ? __pfx_read_tsc+0x10/0x10 [ 34.274761] ? ktime_get_ts64+0x86/0x230 [ 34.275290] kunit_try_run_case+0x1b3/0x490 [ 34.275790] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.276283] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.277581] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.277959] ? __kthread_parkme+0x82/0x160 [ 34.278863] ? preempt_count_sub+0x50/0x80 [ 34.279259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.279671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.280341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.281023] kthread+0x257/0x310 [ 34.281594] ? __pfx_kthread+0x10/0x10 [ 34.282231] ret_from_fork+0x41/0x80 [ 34.282642] ? __pfx_kthread+0x10/0x10 [ 34.283378] ret_from_fork_asm+0x1a/0x30 [ 34.284502] </TASK> [ 34.284768] [ 34.285220] Allocated by task 272: [ 34.285585] kasan_save_stack+0x3d/0x60 [ 34.286619] kasan_save_track+0x18/0x40 [ 34.287130] kasan_save_alloc_info+0x3b/0x50 [ 34.287714] __kasan_kmalloc+0xb7/0xc0 [ 34.288464] __kmalloc_cache_noprof+0x184/0x410 [ 34.289223] kasan_atomics+0x96/0x310 [ 34.290281] kunit_try_run_case+0x1b3/0x490 [ 34.290666] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.291536] kthread+0x257/0x310 [ 34.292160] ret_from_fork+0x41/0x80 [ 34.293144] ret_from_fork_asm+0x1a/0x30 [ 34.293438] [ 34.293598] The buggy address belongs to the object at ffff888102a0ec00 [ 34.293598] which belongs to the cache kmalloc-64 of size 64 [ 34.294246] The buggy address is located 0 bytes to the right of [ 34.294246] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.295539] [ 34.296061] The buggy address belongs to the physical page: [ 34.296673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.298018] flags: 0x200000000000000(node=0|zone=2) [ 34.298633] page_type: f5(slab) [ 34.299042] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.300099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.300809] page dumped because: kasan: bad access detected [ 34.301318] [ 34.301635] Memory state around the buggy address: [ 34.302100] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.302855] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.303482] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.304244] ^ [ 34.304752] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.305426] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.306235] ================================================================== [ 32.595803] ================================================================== [ 32.596578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 32.597382] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.598307] [ 32.598580] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.600589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.601262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.602212] Call Trace: [ 32.602507] <TASK> [ 32.602772] dump_stack_lvl+0x73/0xb0 [ 32.603198] print_report+0xd1/0x640 [ 32.603604] ? __virt_addr_valid+0x1db/0x2d0 [ 32.603985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.604977] kasan_report+0x102/0x140 [ 32.605804] ? kasan_atomics_helper+0x861/0x5450 [ 32.606294] ? kasan_atomics_helper+0x861/0x5450 [ 32.606884] kasan_check_range+0x10c/0x1c0 [ 32.607281] __kasan_check_write+0x18/0x20 [ 32.607902] kasan_atomics_helper+0x861/0x5450 [ 32.608411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.608987] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.609610] ? kasan_atomics+0x153/0x310 [ 32.610281] kasan_atomics+0x1dd/0x310 [ 32.610649] ? __pfx_kasan_atomics+0x10/0x10 [ 32.611235] ? __pfx_read_tsc+0x10/0x10 [ 32.611812] ? ktime_get_ts64+0x86/0x230 [ 32.612228] kunit_try_run_case+0x1b3/0x490 [ 32.612859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.613260] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.613959] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.614415] ? __kthread_parkme+0x82/0x160 [ 32.615068] ? preempt_count_sub+0x50/0x80 [ 32.615652] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.616222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.616828] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.617275] kthread+0x257/0x310 [ 32.617845] ? __pfx_kthread+0x10/0x10 [ 32.618190] ret_from_fork+0x41/0x80 [ 32.618726] ? __pfx_kthread+0x10/0x10 [ 32.619253] ret_from_fork_asm+0x1a/0x30 [ 32.619840] </TASK> [ 32.620225] [ 32.620414] Allocated by task 272: [ 32.620866] kasan_save_stack+0x3d/0x60 [ 32.621308] kasan_save_track+0x18/0x40 [ 32.621930] kasan_save_alloc_info+0x3b/0x50 [ 32.622397] __kasan_kmalloc+0xb7/0xc0 [ 32.622840] __kmalloc_cache_noprof+0x184/0x410 [ 32.623231] kasan_atomics+0x96/0x310 [ 32.623852] kunit_try_run_case+0x1b3/0x490 [ 32.624432] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.624897] kthread+0x257/0x310 [ 32.625398] ret_from_fork+0x41/0x80 [ 32.625847] ret_from_fork_asm+0x1a/0x30 [ 32.626395] [ 32.626643] The buggy address belongs to the object at ffff888102a0ec00 [ 32.626643] which belongs to the cache kmalloc-64 of size 64 [ 32.627806] The buggy address is located 0 bytes to the right of [ 32.627806] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.629426] [ 32.630309] The buggy address belongs to the physical page: [ 32.630873] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.632555] flags: 0x200000000000000(node=0|zone=2) [ 32.633342] page_type: f5(slab) [ 32.633821] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.634495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.635053] page dumped because: kasan: bad access detected [ 32.635641] [ 32.635912] Memory state around the buggy address: [ 32.636257] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.637088] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.637648] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.638292] ^ [ 32.638651] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.639415] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.640020] ================================================================== [ 33.933653] ================================================================== [ 33.934251] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 33.935197] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.936173] [ 33.936364] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.937568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.938180] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.939100] Call Trace: [ 33.939592] <TASK> [ 33.940134] dump_stack_lvl+0x73/0xb0 [ 33.940769] print_report+0xd1/0x640 [ 33.941308] ? __virt_addr_valid+0x1db/0x2d0 [ 33.941718] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.942280] kasan_report+0x102/0x140 [ 33.942838] ? kasan_atomics_helper+0x1780/0x5450 [ 33.943296] ? kasan_atomics_helper+0x1780/0x5450 [ 33.943733] kasan_check_range+0x10c/0x1c0 [ 33.944325] __kasan_check_write+0x18/0x20 [ 33.944755] kasan_atomics_helper+0x1780/0x5450 [ 33.945348] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.945913] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.946359] ? kasan_atomics+0x153/0x310 [ 33.946715] kasan_atomics+0x1dd/0x310 [ 33.947266] ? __pfx_kasan_atomics+0x10/0x10 [ 33.947745] ? __pfx_read_tsc+0x10/0x10 [ 33.948115] ? ktime_get_ts64+0x86/0x230 [ 33.948610] kunit_try_run_case+0x1b3/0x490 [ 33.949081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.949516] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.950070] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.950647] ? __kthread_parkme+0x82/0x160 [ 33.951096] ? preempt_count_sub+0x50/0x80 [ 33.951478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.952023] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.952669] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.953224] kthread+0x257/0x310 [ 33.953541] ? __pfx_kthread+0x10/0x10 [ 33.954026] ret_from_fork+0x41/0x80 [ 33.954510] ? __pfx_kthread+0x10/0x10 [ 33.954924] ret_from_fork_asm+0x1a/0x30 [ 33.955421] </TASK> [ 33.955815] [ 33.956036] Allocated by task 272: [ 33.956313] kasan_save_stack+0x3d/0x60 [ 33.956870] kasan_save_track+0x18/0x40 [ 33.957330] kasan_save_alloc_info+0x3b/0x50 [ 33.957821] __kasan_kmalloc+0xb7/0xc0 [ 33.958196] __kmalloc_cache_noprof+0x184/0x410 [ 33.958726] kasan_atomics+0x96/0x310 [ 33.959252] kunit_try_run_case+0x1b3/0x490 [ 33.959630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.960178] kthread+0x257/0x310 [ 33.960578] ret_from_fork+0x41/0x80 [ 33.961077] ret_from_fork_asm+0x1a/0x30 [ 33.961577] [ 33.961816] The buggy address belongs to the object at ffff888102a0ec00 [ 33.961816] which belongs to the cache kmalloc-64 of size 64 [ 33.962706] The buggy address is located 0 bytes to the right of [ 33.962706] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.963620] [ 33.963922] The buggy address belongs to the physical page: [ 33.964483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.965212] flags: 0x200000000000000(node=0|zone=2) [ 33.965740] page_type: f5(slab) [ 33.966095] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.966803] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.967386] page dumped because: kasan: bad access detected [ 33.967974] [ 33.968227] Memory state around the buggy address: [ 33.968849] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.969422] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.970560] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.971201] ^ [ 33.971627] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.972421] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.972975] ================================================================== [ 34.670860] ================================================================== [ 34.671780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 34.672947] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.673833] [ 34.674047] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.674899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.675459] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.676522] Call Trace: [ 34.676903] <TASK> [ 34.677245] dump_stack_lvl+0x73/0xb0 [ 34.677748] print_report+0xd1/0x640 [ 34.678333] ? __virt_addr_valid+0x1db/0x2d0 [ 34.678924] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.679469] kasan_report+0x102/0x140 [ 34.680037] ? kasan_atomics_helper+0x4f9a/0x5450 [ 34.680587] ? kasan_atomics_helper+0x4f9a/0x5450 [ 34.681215] __asan_report_load8_noabort+0x18/0x20 [ 34.681842] kasan_atomics_helper+0x4f9a/0x5450 [ 34.682446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.683008] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.683504] ? kasan_atomics+0x153/0x310 [ 34.684073] kasan_atomics+0x1dd/0x310 [ 34.684592] ? __pfx_kasan_atomics+0x10/0x10 [ 34.685087] ? __pfx_read_tsc+0x10/0x10 [ 34.685409] ? ktime_get_ts64+0x86/0x230 [ 34.686020] kunit_try_run_case+0x1b3/0x490 [ 34.686552] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.687229] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.687853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.688419] ? __kthread_parkme+0x82/0x160 [ 34.688872] ? preempt_count_sub+0x50/0x80 [ 34.689444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.690142] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.690834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.691376] kthread+0x257/0x310 [ 34.691844] ? __pfx_kthread+0x10/0x10 [ 34.692305] ret_from_fork+0x41/0x80 [ 34.692901] ? __pfx_kthread+0x10/0x10 [ 34.693220] ret_from_fork_asm+0x1a/0x30 [ 34.693858] </TASK> [ 34.694146] [ 34.694431] Allocated by task 272: [ 34.694905] kasan_save_stack+0x3d/0x60 [ 34.695467] kasan_save_track+0x18/0x40 [ 34.696032] kasan_save_alloc_info+0x3b/0x50 [ 34.696616] __kasan_kmalloc+0xb7/0xc0 [ 34.697155] __kmalloc_cache_noprof+0x184/0x410 [ 34.697587] kasan_atomics+0x96/0x310 [ 34.698381] kunit_try_run_case+0x1b3/0x490 [ 34.698867] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.699482] kthread+0x257/0x310 [ 34.699889] ret_from_fork+0x41/0x80 [ 34.700222] ret_from_fork_asm+0x1a/0x30 [ 34.700721] [ 34.700975] The buggy address belongs to the object at ffff888102a0ec00 [ 34.700975] which belongs to the cache kmalloc-64 of size 64 [ 34.701961] The buggy address is located 0 bytes to the right of [ 34.701961] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.702986] [ 34.703200] The buggy address belongs to the physical page: [ 34.703801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.704406] flags: 0x200000000000000(node=0|zone=2) [ 34.704986] page_type: f5(slab) [ 34.705430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.706108] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.706701] page dumped because: kasan: bad access detected [ 34.707209] [ 34.707465] Memory state around the buggy address: [ 34.708046] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.708535] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.709202] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.709897] ^ [ 34.710375] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.711007] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.711563] ================================================================== [ 34.890543] ================================================================== [ 34.891421] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 34.892081] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.892798] [ 34.893076] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.893899] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.894342] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.895114] Call Trace: [ 34.895446] <TASK> [ 34.895706] dump_stack_lvl+0x73/0xb0 [ 34.896226] print_report+0xd1/0x640 [ 34.896622] ? __virt_addr_valid+0x1db/0x2d0 [ 34.897041] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.897672] kasan_report+0x102/0x140 [ 34.898079] ? kasan_atomics_helper+0x224d/0x5450 [ 34.898580] ? kasan_atomics_helper+0x224d/0x5450 [ 34.899180] kasan_check_range+0x10c/0x1c0 [ 34.899539] __kasan_check_write+0x18/0x20 [ 34.900103] kasan_atomics_helper+0x224d/0x5450 [ 34.900639] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.901180] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.901562] ? kasan_atomics+0x153/0x310 [ 34.902174] kasan_atomics+0x1dd/0x310 [ 34.902560] ? __pfx_kasan_atomics+0x10/0x10 [ 34.903083] ? __pfx_read_tsc+0x10/0x10 [ 34.903598] ? ktime_get_ts64+0x86/0x230 [ 34.904073] kunit_try_run_case+0x1b3/0x490 [ 34.904439] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.905049] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.905524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.906186] ? __kthread_parkme+0x82/0x160 [ 34.906618] ? preempt_count_sub+0x50/0x80 [ 34.907018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.907617] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.908214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.908823] kthread+0x257/0x310 [ 34.909116] ? __pfx_kthread+0x10/0x10 [ 34.909596] ret_from_fork+0x41/0x80 [ 34.910133] ? __pfx_kthread+0x10/0x10 [ 34.910629] ret_from_fork_asm+0x1a/0x30 [ 34.911089] </TASK> [ 34.911389] [ 34.911645] Allocated by task 272: [ 34.913907] kasan_save_stack+0x3d/0x60 [ 34.914566] kasan_save_track+0x18/0x40 [ 34.915081] kasan_save_alloc_info+0x3b/0x50 [ 34.915524] __kasan_kmalloc+0xb7/0xc0 [ 34.916398] __kmalloc_cache_noprof+0x184/0x410 [ 34.917172] kasan_atomics+0x96/0x310 [ 34.917456] kunit_try_run_case+0x1b3/0x490 [ 34.918191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.918732] kthread+0x257/0x310 [ 34.919464] ret_from_fork+0x41/0x80 [ 34.919665] ret_from_fork_asm+0x1a/0x30 [ 34.920083] [ 34.920350] The buggy address belongs to the object at ffff888102a0ec00 [ 34.920350] which belongs to the cache kmalloc-64 of size 64 [ 34.921111] The buggy address is located 0 bytes to the right of [ 34.921111] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.922469] [ 34.922967] The buggy address belongs to the physical page: [ 34.923357] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.924351] flags: 0x200000000000000(node=0|zone=2) [ 34.924869] page_type: f5(slab) [ 34.925408] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.926248] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.927198] page dumped because: kasan: bad access detected [ 34.927877] [ 34.928106] Memory state around the buggy address: [ 34.928566] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.929983] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.930858] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.931603] ^ [ 34.932229] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.933124] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.934070] ================================================================== [ 34.712783] ================================================================== [ 34.713228] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 34.714193] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.714881] [ 34.715161] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.716043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.716397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.717232] Call Trace: [ 34.717524] <TASK> [ 34.717858] dump_stack_lvl+0x73/0xb0 [ 34.718327] print_report+0xd1/0x640 [ 34.718751] ? __virt_addr_valid+0x1db/0x2d0 [ 34.719184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.719914] kasan_report+0x102/0x140 [ 34.720343] ? kasan_atomics_helper+0x20c9/0x5450 [ 34.720833] ? kasan_atomics_helper+0x20c9/0x5450 [ 34.721400] kasan_check_range+0x10c/0x1c0 [ 34.721923] __kasan_check_write+0x18/0x20 [ 34.722408] kasan_atomics_helper+0x20c9/0x5450 [ 34.723031] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.723452] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.723963] ? kasan_atomics+0x153/0x310 [ 34.724482] kasan_atomics+0x1dd/0x310 [ 34.725052] ? __pfx_kasan_atomics+0x10/0x10 [ 34.725482] ? __pfx_read_tsc+0x10/0x10 [ 34.726081] ? ktime_get_ts64+0x86/0x230 [ 34.726481] kunit_try_run_case+0x1b3/0x490 [ 34.726995] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.727383] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.728028] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.728537] ? __kthread_parkme+0x82/0x160 [ 34.729019] ? preempt_count_sub+0x50/0x80 [ 34.729476] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.730084] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.730597] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.731914] kthread+0x257/0x310 [ 34.732513] ? __pfx_kthread+0x10/0x10 [ 34.733427] ret_from_fork+0x41/0x80 [ 34.734028] ? __pfx_kthread+0x10/0x10 [ 34.734327] ret_from_fork_asm+0x1a/0x30 [ 34.734847] </TASK> [ 34.735131] [ 34.735370] Allocated by task 272: [ 34.736027] kasan_save_stack+0x3d/0x60 [ 34.736435] kasan_save_track+0x18/0x40 [ 34.736829] kasan_save_alloc_info+0x3b/0x50 [ 34.737844] __kasan_kmalloc+0xb7/0xc0 [ 34.738336] __kmalloc_cache_noprof+0x184/0x410 [ 34.738866] kasan_atomics+0x96/0x310 [ 34.739221] kunit_try_run_case+0x1b3/0x490 [ 34.739612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.740265] kthread+0x257/0x310 [ 34.740560] ret_from_fork+0x41/0x80 [ 34.741244] ret_from_fork_asm+0x1a/0x30 [ 34.741863] [ 34.742069] The buggy address belongs to the object at ffff888102a0ec00 [ 34.742069] which belongs to the cache kmalloc-64 of size 64 [ 34.743242] The buggy address is located 0 bytes to the right of [ 34.743242] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.744600] [ 34.744785] The buggy address belongs to the physical page: [ 34.745727] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.746341] flags: 0x200000000000000(node=0|zone=2) [ 34.747894] page_type: f5(slab) [ 34.748517] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.749394] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.750605] page dumped because: kasan: bad access detected [ 34.750955] [ 34.751121] Memory state around the buggy address: [ 34.751437] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.753003] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.753888] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.754706] ^ [ 34.756001] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.757105] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.758281] ================================================================== [ 34.206898] ================================================================== [ 34.208021] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 34.208698] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.210066] [ 34.210485] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.211290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.211763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.212437] Call Trace: [ 34.212778] <TASK> [ 34.213102] dump_stack_lvl+0x73/0xb0 [ 34.213422] print_report+0xd1/0x640 [ 34.213905] ? __virt_addr_valid+0x1db/0x2d0 [ 34.214311] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.214825] kasan_report+0x102/0x140 [ 34.215330] ? kasan_atomics_helper+0x1b23/0x5450 [ 34.215857] ? kasan_atomics_helper+0x1b23/0x5450 [ 34.216269] kasan_check_range+0x10c/0x1c0 [ 34.216839] __kasan_check_write+0x18/0x20 [ 34.217278] kasan_atomics_helper+0x1b23/0x5450 [ 34.217801] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.218236] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.218847] ? kasan_atomics+0x153/0x310 [ 34.219210] kasan_atomics+0x1dd/0x310 [ 34.219606] ? __pfx_kasan_atomics+0x10/0x10 [ 34.220208] ? __pfx_read_tsc+0x10/0x10 [ 34.221106] ? ktime_get_ts64+0x86/0x230 [ 34.221648] kunit_try_run_case+0x1b3/0x490 [ 34.222182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.222968] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.223207] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.223445] ? __kthread_parkme+0x82/0x160 [ 34.223650] ? preempt_count_sub+0x50/0x80 [ 34.224080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.224947] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.226300] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.227339] kthread+0x257/0x310 [ 34.227819] ? __pfx_kthread+0x10/0x10 [ 34.228510] ret_from_fork+0x41/0x80 [ 34.228830] ? __pfx_kthread+0x10/0x10 [ 34.229622] ret_from_fork_asm+0x1a/0x30 [ 34.230263] </TASK> [ 34.230483] [ 34.230762] Allocated by task 272: [ 34.231216] kasan_save_stack+0x3d/0x60 [ 34.232101] kasan_save_track+0x18/0x40 [ 34.232737] kasan_save_alloc_info+0x3b/0x50 [ 34.233567] __kasan_kmalloc+0xb7/0xc0 [ 34.234234] __kmalloc_cache_noprof+0x184/0x410 [ 34.234729] kasan_atomics+0x96/0x310 [ 34.235553] kunit_try_run_case+0x1b3/0x490 [ 34.236108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.236613] kthread+0x257/0x310 [ 34.237432] ret_from_fork+0x41/0x80 [ 34.237880] ret_from_fork_asm+0x1a/0x30 [ 34.238550] [ 34.238865] The buggy address belongs to the object at ffff888102a0ec00 [ 34.238865] which belongs to the cache kmalloc-64 of size 64 [ 34.240293] The buggy address is located 0 bytes to the right of [ 34.240293] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.242132] [ 34.242509] The buggy address belongs to the physical page: [ 34.243478] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.244857] flags: 0x200000000000000(node=0|zone=2) [ 34.245368] page_type: f5(slab) [ 34.245745] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.247066] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.248370] page dumped because: kasan: bad access detected [ 34.249353] [ 34.249601] Memory state around the buggy address: [ 34.249989] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.250675] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.251837] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.252668] ^ [ 34.253472] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.254324] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.255488] ================================================================== [ 32.289982] ================================================================== [ 32.290444] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 32.292500] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.293383] [ 32.293577] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.294759] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.295160] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.296857] Call Trace: [ 32.297147] <TASK> [ 32.297391] dump_stack_lvl+0x73/0xb0 [ 32.298414] print_report+0xd1/0x640 [ 32.298814] ? __virt_addr_valid+0x1db/0x2d0 [ 32.299430] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.300648] kasan_report+0x102/0x140 [ 32.301167] ? kasan_atomics_helper+0x4a1/0x5450 [ 32.301571] ? kasan_atomics_helper+0x4a1/0x5450 [ 32.302174] kasan_check_range+0x10c/0x1c0 [ 32.302578] __kasan_check_write+0x18/0x20 [ 32.302995] kasan_atomics_helper+0x4a1/0x5450 [ 32.303477] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.303935] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.304381] ? kasan_atomics+0x153/0x310 [ 32.304910] kasan_atomics+0x1dd/0x310 [ 32.305305] ? __pfx_kasan_atomics+0x10/0x10 [ 32.305655] ? __pfx_read_tsc+0x10/0x10 [ 32.306480] ? ktime_get_ts64+0x86/0x230 [ 32.306907] kunit_try_run_case+0x1b3/0x490 [ 32.307319] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.307812] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.308338] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.308726] ? __kthread_parkme+0x82/0x160 [ 32.309269] ? preempt_count_sub+0x50/0x80 [ 32.309925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.310324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.311045] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.311449] kthread+0x257/0x310 [ 32.311762] ? __pfx_kthread+0x10/0x10 [ 32.312257] ret_from_fork+0x41/0x80 [ 32.312760] ? __pfx_kthread+0x10/0x10 [ 32.313080] ret_from_fork_asm+0x1a/0x30 [ 32.313419] </TASK> [ 32.313749] [ 32.314014] Allocated by task 272: [ 32.314426] kasan_save_stack+0x3d/0x60 [ 32.315015] kasan_save_track+0x18/0x40 [ 32.315365] kasan_save_alloc_info+0x3b/0x50 [ 32.315799] __kasan_kmalloc+0xb7/0xc0 [ 32.316351] __kmalloc_cache_noprof+0x184/0x410 [ 32.316984] kasan_atomics+0x96/0x310 [ 32.317293] kunit_try_run_case+0x1b3/0x490 [ 32.317827] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.318424] kthread+0x257/0x310 [ 32.318716] ret_from_fork+0x41/0x80 [ 32.319200] ret_from_fork_asm+0x1a/0x30 [ 32.319930] [ 32.320190] The buggy address belongs to the object at ffff888102a0ec00 [ 32.320190] which belongs to the cache kmalloc-64 of size 64 [ 32.321405] The buggy address is located 0 bytes to the right of [ 32.321405] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.322162] [ 32.322333] The buggy address belongs to the physical page: [ 32.323069] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.323797] flags: 0x200000000000000(node=0|zone=2) [ 32.324133] page_type: f5(slab) [ 32.324405] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.325376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.326199] page dumped because: kasan: bad access detected [ 32.326743] [ 32.327013] Memory state around the buggy address: [ 32.327445] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.328841] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.329261] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.329590] ^ [ 32.330416] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.331418] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.332404] ================================================================== [ 32.820642] ================================================================== [ 32.821458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 32.822305] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.822992] [ 32.823286] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.824360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.824913] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.825630] Call Trace: [ 32.826042] <TASK> [ 32.826395] dump_stack_lvl+0x73/0xb0 [ 32.826953] print_report+0xd1/0x640 [ 32.827518] ? __virt_addr_valid+0x1db/0x2d0 [ 32.828017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.828724] kasan_report+0x102/0x140 [ 32.829276] ? kasan_atomics_helper+0xb6b/0x5450 [ 32.829915] ? kasan_atomics_helper+0xb6b/0x5450 [ 32.830574] kasan_check_range+0x10c/0x1c0 [ 32.831017] __kasan_check_write+0x18/0x20 [ 32.831561] kasan_atomics_helper+0xb6b/0x5450 [ 32.832069] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.832484] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.833119] ? kasan_atomics+0x153/0x310 [ 32.833746] kasan_atomics+0x1dd/0x310 [ 32.834168] ? __pfx_kasan_atomics+0x10/0x10 [ 32.834670] ? __pfx_read_tsc+0x10/0x10 [ 32.835201] ? ktime_get_ts64+0x86/0x230 [ 32.835716] kunit_try_run_case+0x1b3/0x490 [ 32.836199] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.836811] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.837474] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.838032] ? __kthread_parkme+0x82/0x160 [ 32.838563] ? preempt_count_sub+0x50/0x80 [ 32.839210] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.839717] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.840396] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.841107] kthread+0x257/0x310 [ 32.841578] ? __pfx_kthread+0x10/0x10 [ 32.842032] ret_from_fork+0x41/0x80 [ 32.842586] ? __pfx_kthread+0x10/0x10 [ 32.842976] ret_from_fork_asm+0x1a/0x30 [ 32.843613] </TASK> [ 32.844067] [ 32.844238] Allocated by task 272: [ 32.844720] kasan_save_stack+0x3d/0x60 [ 32.845207] kasan_save_track+0x18/0x40 [ 32.845735] kasan_save_alloc_info+0x3b/0x50 [ 32.846334] __kasan_kmalloc+0xb7/0xc0 [ 32.846890] __kmalloc_cache_noprof+0x184/0x410 [ 32.847458] kasan_atomics+0x96/0x310 [ 32.847997] kunit_try_run_case+0x1b3/0x490 [ 32.848463] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.849067] kthread+0x257/0x310 [ 32.849533] ret_from_fork+0x41/0x80 [ 32.850013] ret_from_fork_asm+0x1a/0x30 [ 32.850451] [ 32.850810] The buggy address belongs to the object at ffff888102a0ec00 [ 32.850810] which belongs to the cache kmalloc-64 of size 64 [ 32.851731] The buggy address is located 0 bytes to the right of [ 32.851731] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.852874] [ 32.853195] The buggy address belongs to the physical page: [ 32.853758] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.854480] flags: 0x200000000000000(node=0|zone=2) [ 32.855034] page_type: f5(slab) [ 32.855527] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.856281] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.857039] page dumped because: kasan: bad access detected [ 32.857634] [ 32.857886] Memory state around the buggy address: [ 32.858433] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.859263] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.860231] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.860965] ^ [ 32.861296] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.861993] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.862589] ================================================================== [ 33.410954] ================================================================== [ 33.411619] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 33.412254] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.412845] [ 33.413118] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.414079] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.414525] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.415170] Call Trace: [ 33.415458] <TASK> [ 33.415849] dump_stack_lvl+0x73/0xb0 [ 33.416337] print_report+0xd1/0x640 [ 33.416665] ? __virt_addr_valid+0x1db/0x2d0 [ 33.417115] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.417839] kasan_report+0x102/0x140 [ 33.418322] ? kasan_atomics_helper+0x1218/0x5450 [ 33.418738] ? kasan_atomics_helper+0x1218/0x5450 [ 33.419368] kasan_check_range+0x10c/0x1c0 [ 33.419842] __kasan_check_write+0x18/0x20 [ 33.420241] kasan_atomics_helper+0x1218/0x5450 [ 33.420617] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.421303] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.421896] ? kasan_atomics+0x153/0x310 [ 33.422356] kasan_atomics+0x1dd/0x310 [ 33.422867] ? __pfx_kasan_atomics+0x10/0x10 [ 33.423340] ? __pfx_read_tsc+0x10/0x10 [ 33.423754] ? ktime_get_ts64+0x86/0x230 [ 33.424207] kunit_try_run_case+0x1b3/0x490 [ 33.424555] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.425079] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.425602] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.426106] ? __kthread_parkme+0x82/0x160 [ 33.426469] ? preempt_count_sub+0x50/0x80 [ 33.427066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.427615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.428103] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.428744] kthread+0x257/0x310 [ 33.429234] ? __pfx_kthread+0x10/0x10 [ 33.429716] ret_from_fork+0x41/0x80 [ 33.430155] ? __pfx_kthread+0x10/0x10 [ 33.430465] ret_from_fork_asm+0x1a/0x30 [ 33.431081] </TASK> [ 33.431398] [ 33.431645] Allocated by task 272: [ 33.432095] kasan_save_stack+0x3d/0x60 [ 33.432401] kasan_save_track+0x18/0x40 [ 33.432838] kasan_save_alloc_info+0x3b/0x50 [ 33.433301] __kasan_kmalloc+0xb7/0xc0 [ 33.433666] __kmalloc_cache_noprof+0x184/0x410 [ 33.434129] kasan_atomics+0x96/0x310 [ 33.434605] kunit_try_run_case+0x1b3/0x490 [ 33.435217] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.435655] kthread+0x257/0x310 [ 33.436154] ret_from_fork+0x41/0x80 [ 33.436535] ret_from_fork_asm+0x1a/0x30 [ 33.436982] [ 33.437240] The buggy address belongs to the object at ffff888102a0ec00 [ 33.437240] which belongs to the cache kmalloc-64 of size 64 [ 33.438192] The buggy address is located 0 bytes to the right of [ 33.438192] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.439428] [ 33.439660] The buggy address belongs to the physical page: [ 33.440219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.440697] flags: 0x200000000000000(node=0|zone=2) [ 33.441413] page_type: f5(slab) [ 33.442003] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.442839] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.443664] page dumped because: kasan: bad access detected [ 33.444341] [ 33.444974] Memory state around the buggy address: [ 33.445438] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.446075] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.447218] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.447922] ^ [ 33.448751] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.449313] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.450189] ================================================================== [ 33.497494] ================================================================== [ 33.498018] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 33.498648] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.499396] [ 33.499602] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.500492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.500962] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.501705] Call Trace: [ 33.502003] <TASK> [ 33.502320] dump_stack_lvl+0x73/0xb0 [ 33.502667] print_report+0xd1/0x640 [ 33.503201] ? __virt_addr_valid+0x1db/0x2d0 [ 33.503616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.504311] kasan_report+0x102/0x140 [ 33.504730] ? kasan_atomics_helper+0x12e7/0x5450 [ 33.505349] ? kasan_atomics_helper+0x12e7/0x5450 [ 33.505755] kasan_check_range+0x10c/0x1c0 [ 33.506334] __kasan_check_write+0x18/0x20 [ 33.506748] kasan_atomics_helper+0x12e7/0x5450 [ 33.507358] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.507941] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.508471] ? kasan_atomics+0x153/0x310 [ 33.509066] kasan_atomics+0x1dd/0x310 [ 33.509446] ? __pfx_kasan_atomics+0x10/0x10 [ 33.509976] ? __pfx_read_tsc+0x10/0x10 [ 33.510427] ? ktime_get_ts64+0x86/0x230 [ 33.510979] kunit_try_run_case+0x1b3/0x490 [ 33.511427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.512044] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.512488] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.513133] ? __kthread_parkme+0x82/0x160 [ 33.513475] ? preempt_count_sub+0x50/0x80 [ 33.514051] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.514574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.515178] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.515664] kthread+0x257/0x310 [ 33.516106] ? __pfx_kthread+0x10/0x10 [ 33.516599] ret_from_fork+0x41/0x80 [ 33.516998] ? __pfx_kthread+0x10/0x10 [ 33.517426] ret_from_fork_asm+0x1a/0x30 [ 33.517996] </TASK> [ 33.518323] [ 33.518516] Allocated by task 272: [ 33.519426] kasan_save_stack+0x3d/0x60 [ 33.520293] kasan_save_track+0x18/0x40 [ 33.520655] kasan_save_alloc_info+0x3b/0x50 [ 33.521205] __kasan_kmalloc+0xb7/0xc0 [ 33.521614] __kmalloc_cache_noprof+0x184/0x410 [ 33.522346] kasan_atomics+0x96/0x310 [ 33.522869] kunit_try_run_case+0x1b3/0x490 [ 33.523386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.523874] kthread+0x257/0x310 [ 33.524205] ret_from_fork+0x41/0x80 [ 33.524572] ret_from_fork_asm+0x1a/0x30 [ 33.525578] [ 33.525773] The buggy address belongs to the object at ffff888102a0ec00 [ 33.525773] which belongs to the cache kmalloc-64 of size 64 [ 33.527589] The buggy address is located 0 bytes to the right of [ 33.527589] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.529453] [ 33.529852] The buggy address belongs to the physical page: [ 33.530374] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.531091] flags: 0x200000000000000(node=0|zone=2) [ 33.531537] page_type: f5(slab) [ 33.532068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.532886] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.533650] page dumped because: kasan: bad access detected [ 33.534203] [ 33.534468] Memory state around the buggy address: [ 33.535019] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.535670] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.536456] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.537154] ^ [ 33.537745] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.538437] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.539128] ================================================================== [ 34.626381] ================================================================== [ 34.627403] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 34.628345] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.629366] [ 34.629700] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.630632] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.631116] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.632085] Call Trace: [ 34.632453] <TASK> [ 34.632813] dump_stack_lvl+0x73/0xb0 [ 34.633170] print_report+0xd1/0x640 [ 34.633659] ? __virt_addr_valid+0x1db/0x2d0 [ 34.634346] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.634914] kasan_report+0x102/0x140 [ 34.635493] ? kasan_atomics_helper+0x2007/0x5450 [ 34.636144] ? kasan_atomics_helper+0x2007/0x5450 [ 34.636861] kasan_check_range+0x10c/0x1c0 [ 34.637301] __kasan_check_write+0x18/0x20 [ 34.637709] kasan_atomics_helper+0x2007/0x5450 [ 34.638228] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.638671] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.639325] ? kasan_atomics+0x153/0x310 [ 34.639950] kasan_atomics+0x1dd/0x310 [ 34.640428] ? __pfx_kasan_atomics+0x10/0x10 [ 34.641077] ? __pfx_read_tsc+0x10/0x10 [ 34.641514] ? ktime_get_ts64+0x86/0x230 [ 34.642131] kunit_try_run_case+0x1b3/0x490 [ 34.642558] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.643206] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.643841] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.644478] ? __kthread_parkme+0x82/0x160 [ 34.645101] ? preempt_count_sub+0x50/0x80 [ 34.645642] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.646237] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.646880] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.647457] kthread+0x257/0x310 [ 34.648011] ? __pfx_kthread+0x10/0x10 [ 34.648502] ret_from_fork+0x41/0x80 [ 34.648988] ? __pfx_kthread+0x10/0x10 [ 34.649308] ret_from_fork_asm+0x1a/0x30 [ 34.649908] </TASK> [ 34.650235] [ 34.650507] Allocated by task 272: [ 34.650985] kasan_save_stack+0x3d/0x60 [ 34.651376] kasan_save_track+0x18/0x40 [ 34.651947] kasan_save_alloc_info+0x3b/0x50 [ 34.652486] __kasan_kmalloc+0xb7/0xc0 [ 34.652951] __kmalloc_cache_noprof+0x184/0x410 [ 34.653390] kasan_atomics+0x96/0x310 [ 34.653963] kunit_try_run_case+0x1b3/0x490 [ 34.654474] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.655140] kthread+0x257/0x310 [ 34.655427] ret_from_fork+0x41/0x80 [ 34.656054] ret_from_fork_asm+0x1a/0x30 [ 34.656461] [ 34.656624] The buggy address belongs to the object at ffff888102a0ec00 [ 34.656624] which belongs to the cache kmalloc-64 of size 64 [ 34.657625] The buggy address is located 0 bytes to the right of [ 34.657625] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.658826] [ 34.659064] The buggy address belongs to the physical page: [ 34.659651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.660359] flags: 0x200000000000000(node=0|zone=2) [ 34.661085] page_type: f5(slab) [ 34.661392] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.662199] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.663041] page dumped because: kasan: bad access detected [ 34.663522] [ 34.663847] Memory state around the buggy address: [ 34.664304] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.665200] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.665900] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.666541] ^ [ 34.667136] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.667879] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.668559] ================================================================== [ 34.492269] ================================================================== [ 34.493180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 34.494054] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.494736] [ 34.495078] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.496136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.496611] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.497627] Call Trace: [ 34.497980] <TASK> [ 34.498309] dump_stack_lvl+0x73/0xb0 [ 34.498800] print_report+0xd1/0x640 [ 34.499369] ? __virt_addr_valid+0x1db/0x2d0 [ 34.499902] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.500502] kasan_report+0x102/0x140 [ 34.501147] ? kasan_atomics_helper+0x1eab/0x5450 [ 34.501539] ? kasan_atomics_helper+0x1eab/0x5450 [ 34.502279] kasan_check_range+0x10c/0x1c0 [ 34.502659] __kasan_check_write+0x18/0x20 [ 34.503212] kasan_atomics_helper+0x1eab/0x5450 [ 34.503734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.504332] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.504744] ? kasan_atomics+0x153/0x310 [ 34.505290] kasan_atomics+0x1dd/0x310 [ 34.505816] ? __pfx_kasan_atomics+0x10/0x10 [ 34.506410] ? __pfx_read_tsc+0x10/0x10 [ 34.507091] ? ktime_get_ts64+0x86/0x230 [ 34.507560] kunit_try_run_case+0x1b3/0x490 [ 34.508230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.508810] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.509322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.509931] ? __kthread_parkme+0x82/0x160 [ 34.510458] ? preempt_count_sub+0x50/0x80 [ 34.511023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.511530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.512174] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.512962] kthread+0x257/0x310 [ 34.513526] ? __pfx_kthread+0x10/0x10 [ 34.514169] ret_from_fork+0x41/0x80 [ 34.514571] ? __pfx_kthread+0x10/0x10 [ 34.514994] ret_from_fork_asm+0x1a/0x30 [ 34.515363] </TASK> [ 34.515644] [ 34.515924] Allocated by task 272: [ 34.516312] kasan_save_stack+0x3d/0x60 [ 34.516730] kasan_save_track+0x18/0x40 [ 34.517153] kasan_save_alloc_info+0x3b/0x50 [ 34.517621] __kasan_kmalloc+0xb7/0xc0 [ 34.518182] __kmalloc_cache_noprof+0x184/0x410 [ 34.518748] kasan_atomics+0x96/0x310 [ 34.519247] kunit_try_run_case+0x1b3/0x490 [ 34.519582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.520303] kthread+0x257/0x310 [ 34.520740] ret_from_fork+0x41/0x80 [ 34.521184] ret_from_fork_asm+0x1a/0x30 [ 34.521490] [ 34.521808] The buggy address belongs to the object at ffff888102a0ec00 [ 34.521808] which belongs to the cache kmalloc-64 of size 64 [ 34.522919] The buggy address is located 0 bytes to the right of [ 34.522919] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.523936] [ 34.524110] The buggy address belongs to the physical page: [ 34.524746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.525337] flags: 0x200000000000000(node=0|zone=2) [ 34.525965] page_type: f5(slab) [ 34.526376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.527101] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.527714] page dumped because: kasan: bad access detected [ 34.528238] [ 34.528488] Memory state around the buggy address: [ 34.528962] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.529576] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.530227] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.530832] ^ [ 34.531156] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.531956] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.532601] ================================================================== [ 33.586522] ================================================================== [ 33.587329] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 33.588059] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.588619] [ 33.589016] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.589954] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.590510] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.591385] Call Trace: [ 33.591769] <TASK> [ 33.592122] dump_stack_lvl+0x73/0xb0 [ 33.592516] print_report+0xd1/0x640 [ 33.593181] ? __virt_addr_valid+0x1db/0x2d0 [ 33.593627] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.594387] kasan_report+0x102/0x140 [ 33.594855] ? kasan_atomics_helper+0x13b6/0x5450 [ 33.595451] ? kasan_atomics_helper+0x13b6/0x5450 [ 33.596036] kasan_check_range+0x10c/0x1c0 [ 33.596620] __kasan_check_read+0x15/0x20 [ 33.597187] kasan_atomics_helper+0x13b6/0x5450 [ 33.597851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.598340] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.598845] ? kasan_atomics+0x153/0x310 [ 33.599435] kasan_atomics+0x1dd/0x310 [ 33.600033] ? __pfx_kasan_atomics+0x10/0x10 [ 33.600518] ? __pfx_read_tsc+0x10/0x10 [ 33.600971] ? ktime_get_ts64+0x86/0x230 [ 33.601347] kunit_try_run_case+0x1b3/0x490 [ 33.602080] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.602741] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.603299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.603707] ? __kthread_parkme+0x82/0x160 [ 33.604316] ? preempt_count_sub+0x50/0x80 [ 33.604858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.605321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.605962] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.606585] kthread+0x257/0x310 [ 33.606968] ? __pfx_kthread+0x10/0x10 [ 33.607306] ret_from_fork+0x41/0x80 [ 33.607880] ? __pfx_kthread+0x10/0x10 [ 33.608229] ret_from_fork_asm+0x1a/0x30 [ 33.608669] </TASK> [ 33.609037] [ 33.609298] Allocated by task 272: [ 33.609607] kasan_save_stack+0x3d/0x60 [ 33.610037] kasan_save_track+0x18/0x40 [ 33.610529] kasan_save_alloc_info+0x3b/0x50 [ 33.611042] __kasan_kmalloc+0xb7/0xc0 [ 33.611427] __kmalloc_cache_noprof+0x184/0x410 [ 33.611896] kasan_atomics+0x96/0x310 [ 33.612498] kunit_try_run_case+0x1b3/0x490 [ 33.613001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.613503] kthread+0x257/0x310 [ 33.613872] ret_from_fork+0x41/0x80 [ 33.614421] ret_from_fork_asm+0x1a/0x30 [ 33.615035] [ 33.615299] The buggy address belongs to the object at ffff888102a0ec00 [ 33.615299] which belongs to the cache kmalloc-64 of size 64 [ 33.616269] The buggy address is located 0 bytes to the right of [ 33.616269] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.617358] [ 33.617626] The buggy address belongs to the physical page: [ 33.618210] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.619100] flags: 0x200000000000000(node=0|zone=2) [ 33.619497] page_type: f5(slab) [ 33.620092] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.620923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.621508] page dumped because: kasan: bad access detected [ 33.622117] [ 33.622347] Memory state around the buggy address: [ 33.622900] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.623450] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.624217] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.625025] ^ [ 33.625503] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.626235] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.626992] ================================================================== [ 33.059297] ================================================================== [ 33.059905] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 33.061784] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.062297] [ 33.062765] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.064364] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.064806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.065743] Call Trace: [ 33.066234] <TASK> [ 33.066455] dump_stack_lvl+0x73/0xb0 [ 33.066983] print_report+0xd1/0x640 [ 33.067419] ? __virt_addr_valid+0x1db/0x2d0 [ 33.068035] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.068662] kasan_report+0x102/0x140 [ 33.069190] ? kasan_atomics_helper+0xe79/0x5450 [ 33.069984] ? kasan_atomics_helper+0xe79/0x5450 [ 33.070490] kasan_check_range+0x10c/0x1c0 [ 33.071067] __kasan_check_write+0x18/0x20 [ 33.071579] kasan_atomics_helper+0xe79/0x5450 [ 33.072051] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.072477] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.072921] ? kasan_atomics+0x153/0x310 [ 33.073448] kasan_atomics+0x1dd/0x310 [ 33.073923] ? __pfx_kasan_atomics+0x10/0x10 [ 33.074341] ? __pfx_read_tsc+0x10/0x10 [ 33.074927] ? ktime_get_ts64+0x86/0x230 [ 33.075435] kunit_try_run_case+0x1b3/0x490 [ 33.076004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.076457] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.077050] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.077526] ? __kthread_parkme+0x82/0x160 [ 33.078025] ? preempt_count_sub+0x50/0x80 [ 33.078373] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.079026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.079583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.080087] kthread+0x257/0x310 [ 33.080538] ? __pfx_kthread+0x10/0x10 [ 33.081012] ret_from_fork+0x41/0x80 [ 33.081503] ? __pfx_kthread+0x10/0x10 [ 33.081892] ret_from_fork_asm+0x1a/0x30 [ 33.082441] </TASK> [ 33.082726] [ 33.083009] Allocated by task 272: [ 33.083402] kasan_save_stack+0x3d/0x60 [ 33.083952] kasan_save_track+0x18/0x40 [ 33.084343] kasan_save_alloc_info+0x3b/0x50 [ 33.084945] __kasan_kmalloc+0xb7/0xc0 [ 33.085350] __kmalloc_cache_noprof+0x184/0x410 [ 33.085860] kasan_atomics+0x96/0x310 [ 33.086306] kunit_try_run_case+0x1b3/0x490 [ 33.086712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.087268] kthread+0x257/0x310 [ 33.087639] ret_from_fork+0x41/0x80 [ 33.088076] ret_from_fork_asm+0x1a/0x30 [ 33.088611] [ 33.088964] The buggy address belongs to the object at ffff888102a0ec00 [ 33.088964] which belongs to the cache kmalloc-64 of size 64 [ 33.089842] The buggy address is located 0 bytes to the right of [ 33.089842] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.090990] [ 33.091251] The buggy address belongs to the physical page: [ 33.091671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.092471] flags: 0x200000000000000(node=0|zone=2) [ 33.092926] page_type: f5(slab) [ 33.093339] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.094083] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.094710] page dumped because: kasan: bad access detected [ 33.095359] [ 33.095619] Memory state around the buggy address: [ 33.096167] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.096673] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.097406] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.098168] ^ [ 33.098492] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.099281] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.100076] ================================================================== [ 32.551393] ================================================================== [ 32.551956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 32.553019] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.553754] [ 32.553989] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.555228] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.555576] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.556436] Call Trace: [ 32.556846] <TASK> [ 32.557223] dump_stack_lvl+0x73/0xb0 [ 32.557643] print_report+0xd1/0x640 [ 32.558270] ? __virt_addr_valid+0x1db/0x2d0 [ 32.558613] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.559393] kasan_report+0x102/0x140 [ 32.559759] ? kasan_atomics_helper+0x7c8/0x5450 [ 32.560477] ? kasan_atomics_helper+0x7c8/0x5450 [ 32.561085] kasan_check_range+0x10c/0x1c0 [ 32.561576] __kasan_check_write+0x18/0x20 [ 32.562186] kasan_atomics_helper+0x7c8/0x5450 [ 32.562625] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.563362] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.563946] ? kasan_atomics+0x153/0x310 [ 32.564452] kasan_atomics+0x1dd/0x310 [ 32.564903] ? __pfx_kasan_atomics+0x10/0x10 [ 32.565469] ? __pfx_read_tsc+0x10/0x10 [ 32.566052] ? ktime_get_ts64+0x86/0x230 [ 32.566433] kunit_try_run_case+0x1b3/0x490 [ 32.567116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.567611] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.568323] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.568745] ? __kthread_parkme+0x82/0x160 [ 32.569482] ? preempt_count_sub+0x50/0x80 [ 32.570336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.570809] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.571296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.572094] kthread+0x257/0x310 [ 32.572472] ? __pfx_kthread+0x10/0x10 [ 32.573048] ret_from_fork+0x41/0x80 [ 32.573482] ? __pfx_kthread+0x10/0x10 [ 32.573913] ret_from_fork_asm+0x1a/0x30 [ 32.574484] </TASK> [ 32.574889] [ 32.575096] Allocated by task 272: [ 32.575523] kasan_save_stack+0x3d/0x60 [ 32.576176] kasan_save_track+0x18/0x40 [ 32.576773] kasan_save_alloc_info+0x3b/0x50 [ 32.577205] __kasan_kmalloc+0xb7/0xc0 [ 32.577751] __kmalloc_cache_noprof+0x184/0x410 [ 32.578219] kasan_atomics+0x96/0x310 [ 32.578745] kunit_try_run_case+0x1b3/0x490 [ 32.579206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.579878] kthread+0x257/0x310 [ 32.580365] ret_from_fork+0x41/0x80 [ 32.580912] ret_from_fork_asm+0x1a/0x30 [ 32.581426] [ 32.581762] The buggy address belongs to the object at ffff888102a0ec00 [ 32.581762] which belongs to the cache kmalloc-64 of size 64 [ 32.582947] The buggy address is located 0 bytes to the right of [ 32.582947] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.584117] [ 32.584545] The buggy address belongs to the physical page: [ 32.584966] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.586015] flags: 0x200000000000000(node=0|zone=2) [ 32.586477] page_type: f5(slab) [ 32.586945] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.587724] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.588540] page dumped because: kasan: bad access detected [ 32.589094] [ 32.589458] Memory state around the buggy address: [ 32.589925] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.590555] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.591499] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.592144] ^ [ 32.592769] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.593569] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.594394] ================================================================== [ 34.447259] ================================================================== [ 34.447999] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 34.448724] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.449290] [ 34.449599] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.450850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.451140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.452312] Call Trace: [ 34.452755] <TASK> [ 34.452970] dump_stack_lvl+0x73/0xb0 [ 34.453834] print_report+0xd1/0x640 [ 34.454146] ? __virt_addr_valid+0x1db/0x2d0 [ 34.454503] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.455467] kasan_report+0x102/0x140 [ 34.456082] ? kasan_atomics_helper+0x1e13/0x5450 [ 34.456628] ? kasan_atomics_helper+0x1e13/0x5450 [ 34.457293] kasan_check_range+0x10c/0x1c0 [ 34.457882] __kasan_check_write+0x18/0x20 [ 34.458348] kasan_atomics_helper+0x1e13/0x5450 [ 34.459025] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.459522] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.460252] ? kasan_atomics+0x153/0x310 [ 34.460584] kasan_atomics+0x1dd/0x310 [ 34.461228] ? __pfx_kasan_atomics+0x10/0x10 [ 34.461602] ? __pfx_read_tsc+0x10/0x10 [ 34.462193] ? ktime_get_ts64+0x86/0x230 [ 34.462724] kunit_try_run_case+0x1b3/0x490 [ 34.463291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.464001] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.464666] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.465194] ? __kthread_parkme+0x82/0x160 [ 34.465606] ? preempt_count_sub+0x50/0x80 [ 34.466328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.466888] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.467577] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.468335] kthread+0x257/0x310 [ 34.468828] ? __pfx_kthread+0x10/0x10 [ 34.469264] ret_from_fork+0x41/0x80 [ 34.469667] ? __pfx_kthread+0x10/0x10 [ 34.470213] ret_from_fork_asm+0x1a/0x30 [ 34.470541] </TASK> [ 34.470890] [ 34.471224] Allocated by task 272: [ 34.471792] kasan_save_stack+0x3d/0x60 [ 34.472397] kasan_save_track+0x18/0x40 [ 34.472876] kasan_save_alloc_info+0x3b/0x50 [ 34.473356] __kasan_kmalloc+0xb7/0xc0 [ 34.473652] __kmalloc_cache_noprof+0x184/0x410 [ 34.474313] kasan_atomics+0x96/0x310 [ 34.474940] kunit_try_run_case+0x1b3/0x490 [ 34.475287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.476044] kthread+0x257/0x310 [ 34.476449] ret_from_fork+0x41/0x80 [ 34.477013] ret_from_fork_asm+0x1a/0x30 [ 34.477432] [ 34.477604] The buggy address belongs to the object at ffff888102a0ec00 [ 34.477604] which belongs to the cache kmalloc-64 of size 64 [ 34.479249] The buggy address is located 0 bytes to the right of [ 34.479249] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.481020] [ 34.481542] The buggy address belongs to the physical page: [ 34.482216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.482530] flags: 0x200000000000000(node=0|zone=2) [ 34.482775] page_type: f5(slab) [ 34.483291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.484539] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.485169] page dumped because: kasan: bad access detected [ 34.485936] [ 34.486231] Memory state around the buggy address: [ 34.486806] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.487475] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.488373] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.489269] ^ [ 34.489914] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.490459] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.491263] ================================================================== [ 32.507616] ================================================================== [ 32.508313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 32.509139] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.510187] [ 32.510465] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.511481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.512106] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.513070] Call Trace: [ 32.513424] <TASK> [ 32.513746] dump_stack_lvl+0x73/0xb0 [ 32.514381] print_report+0xd1/0x640 [ 32.514862] ? __virt_addr_valid+0x1db/0x2d0 [ 32.515484] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.516149] kasan_report+0x102/0x140 [ 32.516561] ? kasan_atomics_helper+0x730/0x5450 [ 32.517209] ? kasan_atomics_helper+0x730/0x5450 [ 32.517702] kasan_check_range+0x10c/0x1c0 [ 32.518252] __kasan_check_write+0x18/0x20 [ 32.518889] kasan_atomics_helper+0x730/0x5450 [ 32.519411] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.520146] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.520551] ? kasan_atomics+0x153/0x310 [ 32.521170] kasan_atomics+0x1dd/0x310 [ 32.521736] ? __pfx_kasan_atomics+0x10/0x10 [ 32.522310] ? __pfx_read_tsc+0x10/0x10 [ 32.522718] ? ktime_get_ts64+0x86/0x230 [ 32.523388] kunit_try_run_case+0x1b3/0x490 [ 32.523965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.524610] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.525268] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.525902] ? __kthread_parkme+0x82/0x160 [ 32.526455] ? preempt_count_sub+0x50/0x80 [ 32.526933] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.527554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.528193] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.528800] kthread+0x257/0x310 [ 32.529254] ? __pfx_kthread+0x10/0x10 [ 32.529617] ret_from_fork+0x41/0x80 [ 32.530147] ? __pfx_kthread+0x10/0x10 [ 32.530513] ret_from_fork_asm+0x1a/0x30 [ 32.531127] </TASK> [ 32.531515] [ 32.531844] Allocated by task 272: [ 32.532267] kasan_save_stack+0x3d/0x60 [ 32.532676] kasan_save_track+0x18/0x40 [ 32.533246] kasan_save_alloc_info+0x3b/0x50 [ 32.533593] __kasan_kmalloc+0xb7/0xc0 [ 32.534218] __kmalloc_cache_noprof+0x184/0x410 [ 32.534620] kasan_atomics+0x96/0x310 [ 32.535141] kunit_try_run_case+0x1b3/0x490 [ 32.535583] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.536340] kthread+0x257/0x310 [ 32.536727] ret_from_fork+0x41/0x80 [ 32.537216] ret_from_fork_asm+0x1a/0x30 [ 32.537904] [ 32.538105] The buggy address belongs to the object at ffff888102a0ec00 [ 32.538105] which belongs to the cache kmalloc-64 of size 64 [ 32.539265] The buggy address is located 0 bytes to the right of [ 32.539265] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.540432] [ 32.540815] The buggy address belongs to the physical page: [ 32.541375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.542186] flags: 0x200000000000000(node=0|zone=2) [ 32.542718] page_type: f5(slab) [ 32.543160] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.543974] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.544654] page dumped because: kasan: bad access detected [ 32.545299] [ 32.545600] Memory state around the buggy address: [ 32.546273] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.547071] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.547748] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.548429] ^ [ 32.548974] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.549623] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.550284] ================================================================== [ 32.160322] ================================================================== [ 32.161930] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 32.162798] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.163841] [ 32.164108] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.165212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.166271] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.167233] Call Trace: [ 32.167504] <TASK> [ 32.167833] dump_stack_lvl+0x73/0xb0 [ 32.168381] print_report+0xd1/0x640 [ 32.168947] ? __virt_addr_valid+0x1db/0x2d0 [ 32.169366] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.170122] kasan_report+0x102/0x140 [ 32.170507] ? kasan_atomics_helper+0x4b70/0x5450 [ 32.171163] ? kasan_atomics_helper+0x4b70/0x5450 [ 32.171575] __asan_report_store4_noabort+0x1b/0x30 [ 32.172052] kasan_atomics_helper+0x4b70/0x5450 [ 32.172608] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.173232] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.173968] ? kasan_atomics+0x153/0x310 [ 32.174340] kasan_atomics+0x1dd/0x310 [ 32.174884] ? __pfx_kasan_atomics+0x10/0x10 [ 32.175301] ? __pfx_read_tsc+0x10/0x10 [ 32.175872] ? ktime_get_ts64+0x86/0x230 [ 32.176298] kunit_try_run_case+0x1b3/0x490 [ 32.176743] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.177573] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.178257] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.178744] ? __kthread_parkme+0x82/0x160 [ 32.179220] ? preempt_count_sub+0x50/0x80 [ 32.179628] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.180371] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.181153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.181604] kthread+0x257/0x310 [ 32.182207] ? __pfx_kthread+0x10/0x10 [ 32.182558] ret_from_fork+0x41/0x80 [ 32.183134] ? __pfx_kthread+0x10/0x10 [ 32.183814] ret_from_fork_asm+0x1a/0x30 [ 32.184210] </TASK> [ 32.184522] [ 32.184842] Allocated by task 272: [ 32.185124] kasan_save_stack+0x3d/0x60 [ 32.185650] kasan_save_track+0x18/0x40 [ 32.186124] kasan_save_alloc_info+0x3b/0x50 [ 32.186464] __kasan_kmalloc+0xb7/0xc0 [ 32.186861] __kmalloc_cache_noprof+0x184/0x410 [ 32.187714] kasan_atomics+0x96/0x310 [ 32.188175] kunit_try_run_case+0x1b3/0x490 [ 32.188652] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.189424] kthread+0x257/0x310 [ 32.189841] ret_from_fork+0x41/0x80 [ 32.190441] ret_from_fork_asm+0x1a/0x30 [ 32.190853] [ 32.191019] The buggy address belongs to the object at ffff888102a0ec00 [ 32.191019] which belongs to the cache kmalloc-64 of size 64 [ 32.192493] The buggy address is located 0 bytes to the right of [ 32.192493] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.193631] [ 32.194056] The buggy address belongs to the physical page: [ 32.194832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.195468] flags: 0x200000000000000(node=0|zone=2) [ 32.195976] page_type: f5(slab) [ 32.196593] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.197304] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.198171] page dumped because: kasan: bad access detected [ 32.198896] [ 32.199206] Memory state around the buggy address: [ 32.199666] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.200563] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.201267] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.202107] ^ [ 32.202502] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.204099] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.204770] ================================================================== [ 33.716649] ================================================================== [ 33.717454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 33.718018] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.718740] [ 33.718954] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.720126] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.720587] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.722235] Call Trace: [ 33.722569] <TASK> [ 33.722974] dump_stack_lvl+0x73/0xb0 [ 33.723490] print_report+0xd1/0x640 [ 33.724107] ? __virt_addr_valid+0x1db/0x2d0 [ 33.724575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.725223] kasan_report+0x102/0x140 [ 33.725893] ? kasan_atomics_helper+0x50d6/0x5450 [ 33.726295] ? kasan_atomics_helper+0x50d6/0x5450 [ 33.726945] __asan_report_store8_noabort+0x1b/0x30 [ 33.727571] kasan_atomics_helper+0x50d6/0x5450 [ 33.728046] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.728723] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.729309] ? kasan_atomics+0x153/0x310 [ 33.729895] kasan_atomics+0x1dd/0x310 [ 33.730423] ? __pfx_kasan_atomics+0x10/0x10 [ 33.730977] ? __pfx_read_tsc+0x10/0x10 [ 33.731462] ? ktime_get_ts64+0x86/0x230 [ 33.731939] kunit_try_run_case+0x1b3/0x490 [ 33.732393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.733066] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.733487] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.734195] ? __kthread_parkme+0x82/0x160 [ 33.734594] ? preempt_count_sub+0x50/0x80 [ 33.735270] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.735835] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.736539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.737088] kthread+0x257/0x310 [ 33.737602] ? __pfx_kthread+0x10/0x10 [ 33.738075] ret_from_fork+0x41/0x80 [ 33.738600] ? __pfx_kthread+0x10/0x10 [ 33.739142] ret_from_fork_asm+0x1a/0x30 [ 33.739583] </TASK> [ 33.740076] [ 33.740277] Allocated by task 272: [ 33.740821] kasan_save_stack+0x3d/0x60 [ 33.741254] kasan_save_track+0x18/0x40 [ 33.741713] kasan_save_alloc_info+0x3b/0x50 [ 33.742221] __kasan_kmalloc+0xb7/0xc0 [ 33.742795] __kmalloc_cache_noprof+0x184/0x410 [ 33.743268] kasan_atomics+0x96/0x310 [ 33.743802] kunit_try_run_case+0x1b3/0x490 [ 33.744318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.744824] kthread+0x257/0x310 [ 33.745279] ret_from_fork+0x41/0x80 [ 33.745983] ret_from_fork_asm+0x1a/0x30 [ 33.746391] [ 33.746562] The buggy address belongs to the object at ffff888102a0ec00 [ 33.746562] which belongs to the cache kmalloc-64 of size 64 [ 33.747989] The buggy address is located 0 bytes to the right of [ 33.747989] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.749158] [ 33.749406] The buggy address belongs to the physical page: [ 33.750033] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.750852] flags: 0x200000000000000(node=0|zone=2) [ 33.751329] page_type: f5(slab) [ 33.751830] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.752608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.753390] page dumped because: kasan: bad access detected [ 33.753995] [ 33.754170] Memory state around the buggy address: [ 33.754734] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.755479] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.756112] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.756845] ^ [ 33.757405] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.758190] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.758940] ================================================================== [ 33.673913] ================================================================== [ 33.674470] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 33.675376] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.676133] [ 33.676428] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.677387] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.678006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.678945] Call Trace: [ 33.679192] <TASK> [ 33.679582] dump_stack_lvl+0x73/0xb0 [ 33.680048] print_report+0xd1/0x640 [ 33.680478] ? __virt_addr_valid+0x1db/0x2d0 [ 33.681092] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.681715] kasan_report+0x102/0x140 [ 33.682137] ? kasan_atomics_helper+0x1468/0x5450 [ 33.682639] ? kasan_atomics_helper+0x1468/0x5450 [ 33.683227] kasan_check_range+0x10c/0x1c0 [ 33.683894] __kasan_check_write+0x18/0x20 [ 33.684413] kasan_atomics_helper+0x1468/0x5450 [ 33.685115] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.685573] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.686223] ? kasan_atomics+0x153/0x310 [ 33.686668] kasan_atomics+0x1dd/0x310 [ 33.687290] ? __pfx_kasan_atomics+0x10/0x10 [ 33.687718] ? __pfx_read_tsc+0x10/0x10 [ 33.688227] ? ktime_get_ts64+0x86/0x230 [ 33.688719] kunit_try_run_case+0x1b3/0x490 [ 33.689239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.690010] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.690553] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.691084] ? __kthread_parkme+0x82/0x160 [ 33.691674] ? preempt_count_sub+0x50/0x80 [ 33.692246] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.692658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.693435] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.693914] kthread+0x257/0x310 [ 33.694422] ? __pfx_kthread+0x10/0x10 [ 33.694987] ret_from_fork+0x41/0x80 [ 33.695345] ? __pfx_kthread+0x10/0x10 [ 33.695949] ret_from_fork_asm+0x1a/0x30 [ 33.696330] </TASK> [ 33.696741] [ 33.697056] Allocated by task 272: [ 33.697361] kasan_save_stack+0x3d/0x60 [ 33.697986] kasan_save_track+0x18/0x40 [ 33.698356] kasan_save_alloc_info+0x3b/0x50 [ 33.698999] __kasan_kmalloc+0xb7/0xc0 [ 33.699475] __kmalloc_cache_noprof+0x184/0x410 [ 33.699956] kasan_atomics+0x96/0x310 [ 33.700436] kunit_try_run_case+0x1b3/0x490 [ 33.701071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.701708] kthread+0x257/0x310 [ 33.702100] ret_from_fork+0x41/0x80 [ 33.702636] ret_from_fork_asm+0x1a/0x30 [ 33.703058] [ 33.703383] The buggy address belongs to the object at ffff888102a0ec00 [ 33.703383] which belongs to the cache kmalloc-64 of size 64 [ 33.704483] The buggy address is located 0 bytes to the right of [ 33.704483] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.705594] [ 33.706001] The buggy address belongs to the physical page: [ 33.706407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.707224] flags: 0x200000000000000(node=0|zone=2) [ 33.707930] page_type: f5(slab) [ 33.708284] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.709116] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.709909] page dumped because: kasan: bad access detected [ 33.710434] [ 33.710718] Memory state around the buggy address: [ 33.711240] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.712054] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.712936] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.713595] ^ [ 33.714077] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.714816] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.715446] ================================================================== [ 33.327330] ================================================================== [ 33.329039] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 33.330569] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.331917] [ 33.332202] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.333281] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.333747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.334583] Call Trace: [ 33.334926] <TASK> [ 33.335217] dump_stack_lvl+0x73/0xb0 [ 33.335644] print_report+0xd1/0x640 [ 33.336366] ? __virt_addr_valid+0x1db/0x2d0 [ 33.337134] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.337668] kasan_report+0x102/0x140 [ 33.338289] ? kasan_atomics_helper+0x1149/0x5450 [ 33.338826] ? kasan_atomics_helper+0x1149/0x5450 [ 33.339433] kasan_check_range+0x10c/0x1c0 [ 33.340087] __kasan_check_write+0x18/0x20 [ 33.340517] kasan_atomics_helper+0x1149/0x5450 [ 33.341359] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.342195] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.342694] ? kasan_atomics+0x153/0x310 [ 33.343154] kasan_atomics+0x1dd/0x310 [ 33.343562] ? __pfx_kasan_atomics+0x10/0x10 [ 33.344121] ? __pfx_read_tsc+0x10/0x10 [ 33.344608] ? ktime_get_ts64+0x86/0x230 [ 33.345075] kunit_try_run_case+0x1b3/0x490 [ 33.345602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.346099] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.346595] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.347144] ? __kthread_parkme+0x82/0x160 [ 33.347607] ? preempt_count_sub+0x50/0x80 [ 33.348046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.348537] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.349080] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.349741] kthread+0x257/0x310 [ 33.350235] ? __pfx_kthread+0x10/0x10 [ 33.350659] ret_from_fork+0x41/0x80 [ 33.351112] ? __pfx_kthread+0x10/0x10 [ 33.351497] ret_from_fork_asm+0x1a/0x30 [ 33.351936] </TASK> [ 33.352248] [ 33.352508] Allocated by task 272: [ 33.352915] kasan_save_stack+0x3d/0x60 [ 33.353282] kasan_save_track+0x18/0x40 [ 33.353653] kasan_save_alloc_info+0x3b/0x50 [ 33.354265] __kasan_kmalloc+0xb7/0xc0 [ 33.354654] __kmalloc_cache_noprof+0x184/0x410 [ 33.355135] kasan_atomics+0x96/0x310 [ 33.355535] kunit_try_run_case+0x1b3/0x490 [ 33.356026] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.356642] kthread+0x257/0x310 [ 33.357044] ret_from_fork+0x41/0x80 [ 33.357395] ret_from_fork_asm+0x1a/0x30 [ 33.357847] [ 33.358106] The buggy address belongs to the object at ffff888102a0ec00 [ 33.358106] which belongs to the cache kmalloc-64 of size 64 [ 33.359095] The buggy address is located 0 bytes to the right of [ 33.359095] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.360354] [ 33.360635] The buggy address belongs to the physical page: [ 33.361190] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.361663] flags: 0x200000000000000(node=0|zone=2) [ 33.362280] page_type: f5(slab) [ 33.362649] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.363478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.364236] page dumped because: kasan: bad access detected [ 33.364859] [ 33.365057] Memory state around the buggy address: [ 33.365375] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.366079] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.366573] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.367284] ^ [ 33.367807] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.368335] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.368907] ================================================================== [ 32.109660] ================================================================== [ 32.110370] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 32.111311] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.112093] [ 32.112346] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.113519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.114148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.115508] Call Trace: [ 32.115843] <TASK> [ 32.116266] dump_stack_lvl+0x73/0xb0 [ 32.116578] print_report+0xd1/0x640 [ 32.117479] ? __virt_addr_valid+0x1db/0x2d0 [ 32.118328] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.118774] kasan_report+0x102/0x140 [ 32.119585] ? kasan_atomics_helper+0x4b8a/0x5450 [ 32.120057] ? kasan_atomics_helper+0x4b8a/0x5450 [ 32.120938] __asan_report_load4_noabort+0x18/0x20 [ 32.121612] kasan_atomics_helper+0x4b8a/0x5450 [ 32.122468] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.123189] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.123995] ? kasan_atomics+0x153/0x310 [ 32.124817] kasan_atomics+0x1dd/0x310 [ 32.125140] ? __pfx_kasan_atomics+0x10/0x10 [ 32.125849] ? __pfx_read_tsc+0x10/0x10 [ 32.126670] ? ktime_get_ts64+0x86/0x230 [ 32.127038] kunit_try_run_case+0x1b3/0x490 [ 32.127535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.128539] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.128914] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.129871] ? __kthread_parkme+0x82/0x160 [ 32.130583] ? preempt_count_sub+0x50/0x80 [ 32.131187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.131719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.132487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.133081] kthread+0x257/0x310 [ 32.133803] ? __pfx_kthread+0x10/0x10 [ 32.134349] ret_from_fork+0x41/0x80 [ 32.134847] ? __pfx_kthread+0x10/0x10 [ 32.135332] ret_from_fork_asm+0x1a/0x30 [ 32.135806] </TASK> [ 32.136175] [ 32.136475] Allocated by task 272: [ 32.137276] kasan_save_stack+0x3d/0x60 [ 32.137577] kasan_save_track+0x18/0x40 [ 32.138467] kasan_save_alloc_info+0x3b/0x50 [ 32.139059] __kasan_kmalloc+0xb7/0xc0 [ 32.139430] __kmalloc_cache_noprof+0x184/0x410 [ 32.140309] kasan_atomics+0x96/0x310 [ 32.140744] kunit_try_run_case+0x1b3/0x490 [ 32.141502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.142193] kthread+0x257/0x310 [ 32.142639] ret_from_fork+0x41/0x80 [ 32.143114] ret_from_fork_asm+0x1a/0x30 [ 32.143950] [ 32.144196] The buggy address belongs to the object at ffff888102a0ec00 [ 32.144196] which belongs to the cache kmalloc-64 of size 64 [ 32.145604] The buggy address is located 0 bytes to the right of [ 32.145604] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.146843] [ 32.147012] The buggy address belongs to the physical page: [ 32.148035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.149202] flags: 0x200000000000000(node=0|zone=2) [ 32.149665] page_type: f5(slab) [ 32.150641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.151535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.152839] page dumped because: kasan: bad access detected [ 32.153344] [ 32.153729] Memory state around the buggy address: [ 32.154272] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.155468] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.156315] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.156971] ^ [ 32.157593] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.158281] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.158971] ================================================================== [ 34.935304] ================================================================== [ 34.935807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 34.938415] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.939290] [ 34.939489] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.940671] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.941305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.942026] Call Trace: [ 34.942341] <TASK> [ 34.942629] dump_stack_lvl+0x73/0xb0 [ 34.943186] print_report+0xd1/0x640 [ 34.943723] ? __virt_addr_valid+0x1db/0x2d0 [ 34.944207] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.944910] kasan_report+0x102/0x140 [ 34.945322] ? kasan_atomics_helper+0x5117/0x5450 [ 34.945965] ? kasan_atomics_helper+0x5117/0x5450 [ 34.946440] __asan_report_load8_noabort+0x18/0x20 [ 34.946989] kasan_atomics_helper+0x5117/0x5450 [ 34.947421] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.947847] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.948503] ? kasan_atomics+0x153/0x310 [ 34.949124] kasan_atomics+0x1dd/0x310 [ 34.949590] ? __pfx_kasan_atomics+0x10/0x10 [ 34.950020] ? __pfx_read_tsc+0x10/0x10 [ 34.950591] ? ktime_get_ts64+0x86/0x230 [ 34.951197] kunit_try_run_case+0x1b3/0x490 [ 34.951869] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.952410] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.952929] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.953527] ? __kthread_parkme+0x82/0x160 [ 34.954052] ? preempt_count_sub+0x50/0x80 [ 34.954385] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.955121] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.955965] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.956511] kthread+0x257/0x310 [ 34.957098] ? __pfx_kthread+0x10/0x10 [ 34.957473] ret_from_fork+0x41/0x80 [ 34.958026] ? __pfx_kthread+0x10/0x10 [ 34.958431] ret_from_fork_asm+0x1a/0x30 [ 34.958998] </TASK> [ 34.959308] [ 34.959477] Allocated by task 272: [ 34.960050] kasan_save_stack+0x3d/0x60 [ 34.960507] kasan_save_track+0x18/0x40 [ 34.961386] kasan_save_alloc_info+0x3b/0x50 [ 34.962289] __kasan_kmalloc+0xb7/0xc0 [ 34.962725] __kmalloc_cache_noprof+0x184/0x410 [ 34.963109] kasan_atomics+0x96/0x310 [ 34.963607] kunit_try_run_case+0x1b3/0x490 [ 34.964267] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.965205] kthread+0x257/0x310 [ 34.965809] ret_from_fork+0x41/0x80 [ 34.966232] ret_from_fork_asm+0x1a/0x30 [ 34.966610] [ 34.966888] The buggy address belongs to the object at ffff888102a0ec00 [ 34.966888] which belongs to the cache kmalloc-64 of size 64 [ 34.968207] The buggy address is located 0 bytes to the right of [ 34.968207] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.968664] [ 34.968840] The buggy address belongs to the physical page: [ 34.969070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.969374] flags: 0x200000000000000(node=0|zone=2) [ 34.969591] page_type: f5(slab) [ 34.970088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.971452] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.972808] page dumped because: kasan: bad access detected [ 34.973565] [ 34.974038] Memory state around the buggy address: [ 34.974365] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.975408] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.976419] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.977037] ^ [ 34.977696] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.978838] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.979408] ================================================================== [ 32.863944] ================================================================== [ 32.864650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 32.865319] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.866385] [ 32.867061] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.867972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.868375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.868909] Call Trace: [ 32.869279] <TASK> [ 32.869767] dump_stack_lvl+0x73/0xb0 [ 32.870501] print_report+0xd1/0x640 [ 32.870911] ? __virt_addr_valid+0x1db/0x2d0 [ 32.871565] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.872033] kasan_report+0x102/0x140 [ 32.872618] ? kasan_atomics_helper+0xc71/0x5450 [ 32.873167] ? kasan_atomics_helper+0xc71/0x5450 [ 32.873858] kasan_check_range+0x10c/0x1c0 [ 32.874428] __kasan_check_write+0x18/0x20 [ 32.875155] kasan_atomics_helper+0xc71/0x5450 [ 32.875760] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.876271] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.877220] ? kasan_atomics+0x153/0x310 [ 32.877644] kasan_atomics+0x1dd/0x310 [ 32.878255] ? __pfx_kasan_atomics+0x10/0x10 [ 32.879069] ? __pfx_read_tsc+0x10/0x10 [ 32.879750] ? ktime_get_ts64+0x86/0x230 [ 32.880189] kunit_try_run_case+0x1b3/0x490 [ 32.880631] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.881225] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.882055] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.882780] ? __kthread_parkme+0x82/0x160 [ 32.883476] ? preempt_count_sub+0x50/0x80 [ 32.884267] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.885341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.886239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.886735] kthread+0x257/0x310 [ 32.887372] ? __pfx_kthread+0x10/0x10 [ 32.888068] ret_from_fork+0x41/0x80 [ 32.888358] ? __pfx_kthread+0x10/0x10 [ 32.888901] ret_from_fork_asm+0x1a/0x30 [ 32.889763] </TASK> [ 32.890222] [ 32.890468] Allocated by task 272: [ 32.891469] kasan_save_stack+0x3d/0x60 [ 32.891851] kasan_save_track+0x18/0x40 [ 32.892337] kasan_save_alloc_info+0x3b/0x50 [ 32.893210] __kasan_kmalloc+0xb7/0xc0 [ 32.893617] __kmalloc_cache_noprof+0x184/0x410 [ 32.894306] kasan_atomics+0x96/0x310 [ 32.894903] kunit_try_run_case+0x1b3/0x490 [ 32.895119] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.895354] kthread+0x257/0x310 [ 32.895526] ret_from_fork+0x41/0x80 [ 32.895812] ret_from_fork_asm+0x1a/0x30 [ 32.896523] [ 32.897116] The buggy address belongs to the object at ffff888102a0ec00 [ 32.897116] which belongs to the cache kmalloc-64 of size 64 [ 32.899140] The buggy address is located 0 bytes to the right of [ 32.899140] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.901072] [ 32.901224] The buggy address belongs to the physical page: [ 32.902244] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.903130] flags: 0x200000000000000(node=0|zone=2) [ 32.904278] page_type: f5(slab) [ 32.904639] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.905986] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.906769] page dumped because: kasan: bad access detected [ 32.907162] [ 32.907410] Memory state around the buggy address: [ 32.908419] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.908975] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.910321] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.911259] ^ [ 32.911646] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.912627] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.914220] ================================================================== [ 33.370131] ================================================================== [ 33.370568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 33.372755] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.373395] [ 33.373588] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.374399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.374876] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.375616] Call Trace: [ 33.376050] <TASK> [ 33.376323] dump_stack_lvl+0x73/0xb0 [ 33.376877] print_report+0xd1/0x640 [ 33.377227] ? __virt_addr_valid+0x1db/0x2d0 [ 33.377669] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.378387] kasan_report+0x102/0x140 [ 33.378836] ? kasan_atomics_helper+0x4a04/0x5450 [ 33.379262] ? kasan_atomics_helper+0x4a04/0x5450 [ 33.379901] __asan_report_load4_noabort+0x18/0x20 [ 33.380410] kasan_atomics_helper+0x4a04/0x5450 [ 33.381040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.381519] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.382083] ? kasan_atomics+0x153/0x310 [ 33.382446] kasan_atomics+0x1dd/0x310 [ 33.383012] ? __pfx_kasan_atomics+0x10/0x10 [ 33.383461] ? __pfx_read_tsc+0x10/0x10 [ 33.383892] ? ktime_get_ts64+0x86/0x230 [ 33.384410] kunit_try_run_case+0x1b3/0x490 [ 33.384874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.385382] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.386032] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.386487] ? __kthread_parkme+0x82/0x160 [ 33.387032] ? preempt_count_sub+0x50/0x80 [ 33.387454] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.388032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.388595] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.389165] kthread+0x257/0x310 [ 33.389476] ? __pfx_kthread+0x10/0x10 [ 33.390027] ret_from_fork+0x41/0x80 [ 33.390386] ? __pfx_kthread+0x10/0x10 [ 33.390909] ret_from_fork_asm+0x1a/0x30 [ 33.391275] </TASK> [ 33.391576] [ 33.391841] Allocated by task 272: [ 33.392265] kasan_save_stack+0x3d/0x60 [ 33.392584] kasan_save_track+0x18/0x40 [ 33.393114] kasan_save_alloc_info+0x3b/0x50 [ 33.393530] __kasan_kmalloc+0xb7/0xc0 [ 33.393957] __kmalloc_cache_noprof+0x184/0x410 [ 33.394521] kasan_atomics+0x96/0x310 [ 33.394940] kunit_try_run_case+0x1b3/0x490 [ 33.395411] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.396035] kthread+0x257/0x310 [ 33.396369] ret_from_fork+0x41/0x80 [ 33.396929] ret_from_fork_asm+0x1a/0x30 [ 33.397356] [ 33.397592] The buggy address belongs to the object at ffff888102a0ec00 [ 33.397592] which belongs to the cache kmalloc-64 of size 64 [ 33.398497] The buggy address is located 0 bytes to the right of [ 33.398497] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.399555] [ 33.399886] The buggy address belongs to the physical page: [ 33.400458] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.401126] flags: 0x200000000000000(node=0|zone=2) [ 33.401623] page_type: f5(slab) [ 33.402121] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.403384] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.404012] page dumped because: kasan: bad access detected [ 33.404723] [ 33.405027] Memory state around the buggy address: [ 33.405541] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.406282] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.407019] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.407739] ^ [ 33.408207] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.408899] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.409538] ================================================================== [ 34.107491] ================================================================== [ 34.108162] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 34.108890] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.109940] [ 34.110131] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.111631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.112346] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.113482] Call Trace: [ 34.114137] <TASK> [ 34.114475] dump_stack_lvl+0x73/0xb0 [ 34.114802] print_report+0xd1/0x640 [ 34.115565] ? __virt_addr_valid+0x1db/0x2d0 [ 34.116763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.117322] kasan_report+0x102/0x140 [ 34.117718] ? kasan_atomics_helper+0x19e4/0x5450 [ 34.118191] ? kasan_atomics_helper+0x19e4/0x5450 [ 34.118821] kasan_check_range+0x10c/0x1c0 [ 34.119301] __kasan_check_write+0x18/0x20 [ 34.119867] kasan_atomics_helper+0x19e4/0x5450 [ 34.120839] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.121308] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.121876] ? kasan_atomics+0x153/0x310 [ 34.122489] kasan_atomics+0x1dd/0x310 [ 34.122964] ? __pfx_kasan_atomics+0x10/0x10 [ 34.123566] ? __pfx_read_tsc+0x10/0x10 [ 34.124012] ? ktime_get_ts64+0x86/0x230 [ 34.124603] kunit_try_run_case+0x1b3/0x490 [ 34.125018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.125607] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.126171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.126705] ? __kthread_parkme+0x82/0x160 [ 34.127294] ? preempt_count_sub+0x50/0x80 [ 34.127798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.128324] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.129008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.129605] kthread+0x257/0x310 [ 34.130056] ? __pfx_kthread+0x10/0x10 [ 34.130538] ret_from_fork+0x41/0x80 [ 34.131060] ? __pfx_kthread+0x10/0x10 [ 34.131538] ret_from_fork_asm+0x1a/0x30 [ 34.132111] </TASK> [ 34.132404] [ 34.132672] Allocated by task 272: [ 34.133001] kasan_save_stack+0x3d/0x60 [ 34.133486] kasan_save_track+0x18/0x40 [ 34.134090] kasan_save_alloc_info+0x3b/0x50 [ 34.134445] __kasan_kmalloc+0xb7/0xc0 [ 34.134929] __kmalloc_cache_noprof+0x184/0x410 [ 34.135851] kasan_atomics+0x96/0x310 [ 34.136224] kunit_try_run_case+0x1b3/0x490 [ 34.136704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.137323] kthread+0x257/0x310 [ 34.137933] ret_from_fork+0x41/0x80 [ 34.138245] ret_from_fork_asm+0x1a/0x30 [ 34.138550] [ 34.138840] The buggy address belongs to the object at ffff888102a0ec00 [ 34.138840] which belongs to the cache kmalloc-64 of size 64 [ 34.139956] The buggy address is located 0 bytes to the right of [ 34.139956] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.141414] [ 34.141705] The buggy address belongs to the physical page: [ 34.142052] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.143147] flags: 0x200000000000000(node=0|zone=2) [ 34.143831] page_type: f5(slab) [ 34.144102] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.145064] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.145775] page dumped because: kasan: bad access detected [ 34.146527] [ 34.146763] Memory state around the buggy address: [ 34.147328] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149035] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.149572] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.150380] ^ [ 34.150980] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.151560] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.152563] ================================================================== [ 32.249954] ================================================================== [ 32.251145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 32.251651] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.252381] [ 32.252657] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.253534] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.254211] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.254942] Call Trace: [ 32.255250] <TASK> [ 32.255470] dump_stack_lvl+0x73/0xb0 [ 32.256056] print_report+0xd1/0x640 [ 32.256363] ? __virt_addr_valid+0x1db/0x2d0 [ 32.256751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.257439] kasan_report+0x102/0x140 [ 32.257863] ? kasan_atomics_helper+0x4b56/0x5450 [ 32.258294] ? kasan_atomics_helper+0x4b56/0x5450 [ 32.258839] __asan_report_load4_noabort+0x18/0x20 [ 32.259316] kasan_atomics_helper+0x4b56/0x5450 [ 32.259840] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.260329] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.260837] ? kasan_atomics+0x153/0x310 [ 32.261183] kasan_atomics+0x1dd/0x310 [ 32.261494] ? __pfx_kasan_atomics+0x10/0x10 [ 32.262067] ? __pfx_read_tsc+0x10/0x10 [ 32.262707] ? ktime_get_ts64+0x86/0x230 [ 32.263031] kunit_try_run_case+0x1b3/0x490 [ 32.263859] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.264283] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.264856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.265368] ? __kthread_parkme+0x82/0x160 [ 32.265696] ? preempt_count_sub+0x50/0x80 [ 32.266347] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.267188] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.268406] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.269429] kthread+0x257/0x310 [ 32.269722] ? __pfx_kthread+0x10/0x10 [ 32.270237] ret_from_fork+0x41/0x80 [ 32.270526] ? __pfx_kthread+0x10/0x10 [ 32.271001] ret_from_fork_asm+0x1a/0x30 [ 32.271608] </TASK> [ 32.271891] [ 32.272136] Allocated by task 272: [ 32.272412] kasan_save_stack+0x3d/0x60 [ 32.272878] kasan_save_track+0x18/0x40 [ 32.273274] kasan_save_alloc_info+0x3b/0x50 [ 32.273865] __kasan_kmalloc+0xb7/0xc0 [ 32.274264] __kmalloc_cache_noprof+0x184/0x410 [ 32.274597] kasan_atomics+0x96/0x310 [ 32.275101] kunit_try_run_case+0x1b3/0x490 [ 32.275761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.276121] kthread+0x257/0x310 [ 32.276600] ret_from_fork+0x41/0x80 [ 32.277129] ret_from_fork_asm+0x1a/0x30 [ 32.277647] [ 32.277895] The buggy address belongs to the object at ffff888102a0ec00 [ 32.277895] which belongs to the cache kmalloc-64 of size 64 [ 32.278565] The buggy address is located 0 bytes to the right of [ 32.278565] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.279918] [ 32.280177] The buggy address belongs to the physical page: [ 32.280643] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.281130] flags: 0x200000000000000(node=0|zone=2) [ 32.281721] page_type: f5(slab) [ 32.282269] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.282758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.283539] page dumped because: kasan: bad access detected [ 32.283919] [ 32.284083] Memory state around the buggy address: [ 32.285009] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.285781] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.286384] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.286950] ^ [ 32.287467] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.288096] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.288836] ================================================================== [ 33.101298] ================================================================== [ 33.101839] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 33.102495] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.103304] [ 33.103568] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.104449] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.104918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.105652] Call Trace: [ 33.106043] <TASK> [ 33.106328] dump_stack_lvl+0x73/0xb0 [ 33.106834] print_report+0xd1/0x640 [ 33.107285] ? __virt_addr_valid+0x1db/0x2d0 [ 33.108321] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.108766] kasan_report+0x102/0x140 [ 33.109956] ? kasan_atomics_helper+0xf11/0x5450 [ 33.111010] ? kasan_atomics_helper+0xf11/0x5450 [ 33.111555] kasan_check_range+0x10c/0x1c0 [ 33.112458] __kasan_check_write+0x18/0x20 [ 33.113473] kasan_atomics_helper+0xf11/0x5450 [ 33.114093] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.114562] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.115159] ? kasan_atomics+0x153/0x310 [ 33.115740] kasan_atomics+0x1dd/0x310 [ 33.116298] ? __pfx_kasan_atomics+0x10/0x10 [ 33.116782] ? __pfx_read_tsc+0x10/0x10 [ 33.117565] ? ktime_get_ts64+0x86/0x230 [ 33.117942] kunit_try_run_case+0x1b3/0x490 [ 33.118498] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.118971] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.119420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.120219] ? __kthread_parkme+0x82/0x160 [ 33.120972] ? preempt_count_sub+0x50/0x80 [ 33.121538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.122176] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.122858] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.123526] kthread+0x257/0x310 [ 33.124055] ? __pfx_kthread+0x10/0x10 [ 33.124409] ret_from_fork+0x41/0x80 [ 33.125198] ? __pfx_kthread+0x10/0x10 [ 33.125588] ret_from_fork_asm+0x1a/0x30 [ 33.126553] </TASK> [ 33.127015] [ 33.127223] Allocated by task 272: [ 33.127566] kasan_save_stack+0x3d/0x60 [ 33.128662] kasan_save_track+0x18/0x40 [ 33.128981] kasan_save_alloc_info+0x3b/0x50 [ 33.129900] __kasan_kmalloc+0xb7/0xc0 [ 33.130281] __kmalloc_cache_noprof+0x184/0x410 [ 33.130744] kasan_atomics+0x96/0x310 [ 33.131115] kunit_try_run_case+0x1b3/0x490 [ 33.131516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.132133] kthread+0x257/0x310 [ 33.132415] ret_from_fork+0x41/0x80 [ 33.132931] ret_from_fork_asm+0x1a/0x30 [ 33.133454] [ 33.133752] The buggy address belongs to the object at ffff888102a0ec00 [ 33.133752] which belongs to the cache kmalloc-64 of size 64 [ 33.134956] The buggy address is located 0 bytes to the right of [ 33.134956] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.135755] [ 33.136165] The buggy address belongs to the physical page: [ 33.137061] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.138295] flags: 0x200000000000000(node=0|zone=2) [ 33.138989] page_type: f5(slab) [ 33.139457] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.140046] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.140893] page dumped because: kasan: bad access detected [ 33.141471] [ 33.141780] Memory state around the buggy address: [ 33.142304] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.142896] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.144136] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.144788] ^ [ 33.145543] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.146195] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.146867] ================================================================== [ 33.760132] ================================================================== [ 33.760599] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 33.761551] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.762258] [ 33.762549] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.763519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.764011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.764927] Call Trace: [ 33.765198] <TASK> [ 33.765581] dump_stack_lvl+0x73/0xb0 [ 33.766059] print_report+0xd1/0x640 [ 33.766538] ? __virt_addr_valid+0x1db/0x2d0 [ 33.767160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.767566] kasan_report+0x102/0x140 [ 33.768091] ? kasan_atomics_helper+0x151e/0x5450 [ 33.768613] ? kasan_atomics_helper+0x151e/0x5450 [ 33.769313] kasan_check_range+0x10c/0x1c0 [ 33.769856] __kasan_check_write+0x18/0x20 [ 33.770421] kasan_atomics_helper+0x151e/0x5450 [ 33.771100] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.771589] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.772219] ? kasan_atomics+0x153/0x310 [ 33.772813] kasan_atomics+0x1dd/0x310 [ 33.773317] ? __pfx_kasan_atomics+0x10/0x10 [ 33.773860] ? __pfx_read_tsc+0x10/0x10 [ 33.774363] ? ktime_get_ts64+0x86/0x230 [ 33.774942] kunit_try_run_case+0x1b3/0x490 [ 33.775419] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.776125] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.776653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.777252] ? __kthread_parkme+0x82/0x160 [ 33.777708] ? preempt_count_sub+0x50/0x80 [ 33.778292] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.778879] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.779581] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.780306] kthread+0x257/0x310 [ 33.780629] ? __pfx_kthread+0x10/0x10 [ 33.781167] ret_from_fork+0x41/0x80 [ 33.781708] ? __pfx_kthread+0x10/0x10 [ 33.782105] ret_from_fork_asm+0x1a/0x30 [ 33.782751] </TASK> [ 33.783394] [ 33.783564] Allocated by task 272: [ 33.784309] kasan_save_stack+0x3d/0x60 [ 33.785117] kasan_save_track+0x18/0x40 [ 33.785796] kasan_save_alloc_info+0x3b/0x50 [ 33.786232] __kasan_kmalloc+0xb7/0xc0 [ 33.786652] __kmalloc_cache_noprof+0x184/0x410 [ 33.787818] kasan_atomics+0x96/0x310 [ 33.788189] kunit_try_run_case+0x1b3/0x490 [ 33.788696] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.789712] kthread+0x257/0x310 [ 33.790469] ret_from_fork+0x41/0x80 [ 33.790915] ret_from_fork_asm+0x1a/0x30 [ 33.791594] [ 33.791946] The buggy address belongs to the object at ffff888102a0ec00 [ 33.791946] which belongs to the cache kmalloc-64 of size 64 [ 33.793399] The buggy address is located 0 bytes to the right of [ 33.793399] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.794824] [ 33.795439] The buggy address belongs to the physical page: [ 33.795949] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.796589] flags: 0x200000000000000(node=0|zone=2) [ 33.797306] page_type: f5(slab) [ 33.797630] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.798572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.799361] page dumped because: kasan: bad access detected [ 33.799830] [ 33.800202] Memory state around the buggy address: [ 33.800667] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.801165] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.802060] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.802559] ^ [ 33.803479] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.804725] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.805798] ================================================================== [ 33.851481] ================================================================== [ 33.852442] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 33.853274] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.854341] [ 33.854562] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.856099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.856371] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.857194] Call Trace: [ 33.857710] <TASK> [ 33.858077] dump_stack_lvl+0x73/0xb0 [ 33.858471] print_report+0xd1/0x640 [ 33.858812] ? __virt_addr_valid+0x1db/0x2d0 [ 33.859597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.860190] kasan_report+0x102/0x140 [ 33.860592] ? kasan_atomics_helper+0x1650/0x5450 [ 33.861504] ? kasan_atomics_helper+0x1650/0x5450 [ 33.862173] kasan_check_range+0x10c/0x1c0 [ 33.862710] __kasan_check_write+0x18/0x20 [ 33.863137] kasan_atomics_helper+0x1650/0x5450 [ 33.863824] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.864411] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.865160] ? kasan_atomics+0x153/0x310 [ 33.865797] kasan_atomics+0x1dd/0x310 [ 33.866520] ? __pfx_kasan_atomics+0x10/0x10 [ 33.867357] ? __pfx_read_tsc+0x10/0x10 [ 33.868152] ? ktime_get_ts64+0x86/0x230 [ 33.868531] kunit_try_run_case+0x1b3/0x490 [ 33.869000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.869414] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.870004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.870538] ? __kthread_parkme+0x82/0x160 [ 33.870945] ? preempt_count_sub+0x50/0x80 [ 33.871467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.871986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.872612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.873281] kthread+0x257/0x310 [ 33.873659] ? __pfx_kthread+0x10/0x10 [ 33.874161] ret_from_fork+0x41/0x80 [ 33.874523] ? __pfx_kthread+0x10/0x10 [ 33.875002] ret_from_fork_asm+0x1a/0x30 [ 33.875502] </TASK> [ 33.875840] [ 33.876098] Allocated by task 272: [ 33.876521] kasan_save_stack+0x3d/0x60 [ 33.876990] kasan_save_track+0x18/0x40 [ 33.877399] kasan_save_alloc_info+0x3b/0x50 [ 33.877920] __kasan_kmalloc+0xb7/0xc0 [ 33.878409] __kmalloc_cache_noprof+0x184/0x410 [ 33.878877] kasan_atomics+0x96/0x310 [ 33.879350] kunit_try_run_case+0x1b3/0x490 [ 33.879727] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.880297] kthread+0x257/0x310 [ 33.880733] ret_from_fork+0x41/0x80 [ 33.881120] ret_from_fork_asm+0x1a/0x30 [ 33.881569] [ 33.881882] The buggy address belongs to the object at ffff888102a0ec00 [ 33.881882] which belongs to the cache kmalloc-64 of size 64 [ 33.882640] The buggy address is located 0 bytes to the right of [ 33.882640] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.884037] [ 33.884239] The buggy address belongs to the physical page: [ 33.884656] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.885417] flags: 0x200000000000000(node=0|zone=2) [ 33.885905] page_type: f5(slab) [ 33.886337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.887188] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.888009] page dumped because: kasan: bad access detected [ 33.888478] [ 33.888674] Memory state around the buggy address: [ 33.889173] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.889880] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.890484] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.891226] ^ [ 33.891605] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.892430] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.893008] ================================================================== [ 34.851609] ================================================================== [ 34.852314] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 34.852839] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.854080] [ 34.854427] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.855293] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.855660] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.856416] Call Trace: [ 34.856819] <TASK> [ 34.857132] dump_stack_lvl+0x73/0xb0 [ 34.857593] print_report+0xd1/0x640 [ 34.858147] ? __virt_addr_valid+0x1db/0x2d0 [ 34.858522] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.859190] kasan_report+0x102/0x140 [ 34.859552] ? kasan_atomics_helper+0x4fa7/0x5450 [ 34.860101] ? kasan_atomics_helper+0x4fa7/0x5450 [ 34.860731] __asan_report_load8_noabort+0x18/0x20 [ 34.861204] kasan_atomics_helper+0x4fa7/0x5450 [ 34.861717] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.862264] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.862744] ? kasan_atomics+0x153/0x310 [ 34.863310] kasan_atomics+0x1dd/0x310 [ 34.863654] ? __pfx_kasan_atomics+0x10/0x10 [ 34.864255] ? __pfx_read_tsc+0x10/0x10 [ 34.864671] ? ktime_get_ts64+0x86/0x230 [ 34.865216] kunit_try_run_case+0x1b3/0x490 [ 34.865635] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.866153] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.866734] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.867267] ? __kthread_parkme+0x82/0x160 [ 34.867751] ? preempt_count_sub+0x50/0x80 [ 34.868148] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.868594] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.869354] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.869924] kthread+0x257/0x310 [ 34.870213] ? __pfx_kthread+0x10/0x10 [ 34.870724] ret_from_fork+0x41/0x80 [ 34.871247] ? __pfx_kthread+0x10/0x10 [ 34.871745] ret_from_fork_asm+0x1a/0x30 [ 34.872197] </TASK> [ 34.872452] [ 34.872625] Allocated by task 272: [ 34.873122] kasan_save_stack+0x3d/0x60 [ 34.873591] kasan_save_track+0x18/0x40 [ 34.873980] kasan_save_alloc_info+0x3b/0x50 [ 34.874534] __kasan_kmalloc+0xb7/0xc0 [ 34.874947] __kmalloc_cache_noprof+0x184/0x410 [ 34.875489] kasan_atomics+0x96/0x310 [ 34.876019] kunit_try_run_case+0x1b3/0x490 [ 34.876417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.877090] kthread+0x257/0x310 [ 34.877470] ret_from_fork+0x41/0x80 [ 34.877854] ret_from_fork_asm+0x1a/0x30 [ 34.878395] [ 34.878645] The buggy address belongs to the object at ffff888102a0ec00 [ 34.878645] which belongs to the cache kmalloc-64 of size 64 [ 34.879533] The buggy address is located 0 bytes to the right of [ 34.879533] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.880711] [ 34.881024] The buggy address belongs to the physical page: [ 34.881513] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.882263] flags: 0x200000000000000(node=0|zone=2) [ 34.882626] page_type: f5(slab) [ 34.883037] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.883868] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.884627] page dumped because: kasan: bad access detected [ 34.885196] [ 34.885382] Memory state around the buggy address: [ 34.886029] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.886554] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.887263] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.887872] ^ [ 34.888366] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.888939] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.889640] ================================================================== [ 32.775367] ================================================================== [ 32.776093] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 32.777195] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.778317] [ 32.778503] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.779471] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.780077] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.780956] Call Trace: [ 32.781351] <TASK> [ 32.781640] dump_stack_lvl+0x73/0xb0 [ 32.782403] print_report+0xd1/0x640 [ 32.782611] ? __virt_addr_valid+0x1db/0x2d0 [ 32.782985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.783754] kasan_report+0x102/0x140 [ 32.784247] ? kasan_atomics_helper+0xac8/0x5450 [ 32.784651] ? kasan_atomics_helper+0xac8/0x5450 [ 32.785485] kasan_check_range+0x10c/0x1c0 [ 32.786014] __kasan_check_write+0x18/0x20 [ 32.786653] kasan_atomics_helper+0xac8/0x5450 [ 32.787281] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.787990] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.788496] ? kasan_atomics+0x153/0x310 [ 32.789494] kasan_atomics+0x1dd/0x310 [ 32.790003] ? __pfx_kasan_atomics+0x10/0x10 [ 32.790469] ? __pfx_read_tsc+0x10/0x10 [ 32.791259] ? ktime_get_ts64+0x86/0x230 [ 32.791723] kunit_try_run_case+0x1b3/0x490 [ 32.792636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.793519] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.794352] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.795082] ? __kthread_parkme+0x82/0x160 [ 32.795517] ? preempt_count_sub+0x50/0x80 [ 32.796223] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.796460] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.796785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.797450] kthread+0x257/0x310 [ 32.798283] ? __pfx_kthread+0x10/0x10 [ 32.798851] ret_from_fork+0x41/0x80 [ 32.799229] ? __pfx_kthread+0x10/0x10 [ 32.799739] ret_from_fork_asm+0x1a/0x30 [ 32.800283] </TASK> [ 32.800629] [ 32.800992] Allocated by task 272: [ 32.801301] kasan_save_stack+0x3d/0x60 [ 32.801635] kasan_save_track+0x18/0x40 [ 32.802160] kasan_save_alloc_info+0x3b/0x50 [ 32.802617] __kasan_kmalloc+0xb7/0xc0 [ 32.803143] __kmalloc_cache_noprof+0x184/0x410 [ 32.803885] kasan_atomics+0x96/0x310 [ 32.804319] kunit_try_run_case+0x1b3/0x490 [ 32.804886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.805479] kthread+0x257/0x310 [ 32.805971] ret_from_fork+0x41/0x80 [ 32.806469] ret_from_fork_asm+0x1a/0x30 [ 32.807046] [ 32.807315] The buggy address belongs to the object at ffff888102a0ec00 [ 32.807315] which belongs to the cache kmalloc-64 of size 64 [ 32.808497] The buggy address is located 0 bytes to the right of [ 32.808497] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.809754] [ 32.810043] The buggy address belongs to the physical page: [ 32.810609] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.811452] flags: 0x200000000000000(node=0|zone=2) [ 32.812146] page_type: f5(slab) [ 32.812441] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.813291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.814099] page dumped because: kasan: bad access detected [ 32.814635] [ 32.814949] Memory state around the buggy address: [ 32.815434] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.816251] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.816947] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.817706] ^ [ 32.818266] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.818999] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.819641] ================================================================== [ 32.966480] ================================================================== [ 32.967394] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 32.968301] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.968945] [ 32.969135] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.970481] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.970982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.972755] Call Trace: [ 32.973100] <TASK> [ 32.973392] dump_stack_lvl+0x73/0xb0 [ 32.973741] print_report+0xd1/0x640 [ 32.974587] ? __virt_addr_valid+0x1db/0x2d0 [ 32.975294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.976060] kasan_report+0x102/0x140 [ 32.976659] ? kasan_atomics_helper+0xd48/0x5450 [ 32.977360] ? kasan_atomics_helper+0xd48/0x5450 [ 32.978125] kasan_check_range+0x10c/0x1c0 [ 32.978614] __kasan_check_write+0x18/0x20 [ 32.979386] kasan_atomics_helper+0xd48/0x5450 [ 32.980220] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.981312] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.981729] ? kasan_atomics+0x153/0x310 [ 32.982383] kasan_atomics+0x1dd/0x310 [ 32.983371] ? __pfx_kasan_atomics+0x10/0x10 [ 32.984189] ? __pfx_read_tsc+0x10/0x10 [ 32.984590] ? ktime_get_ts64+0x86/0x230 [ 32.985545] kunit_try_run_case+0x1b3/0x490 [ 32.986175] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.986700] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.987846] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.988331] ? __kthread_parkme+0x82/0x160 [ 32.989008] ? preempt_count_sub+0x50/0x80 [ 32.989704] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.990209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.991024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.991517] kthread+0x257/0x310 [ 32.992071] ? __pfx_kthread+0x10/0x10 [ 32.992514] ret_from_fork+0x41/0x80 [ 32.992960] ? __pfx_kthread+0x10/0x10 [ 32.993494] ret_from_fork_asm+0x1a/0x30 [ 32.994121] </TASK> [ 32.994612] [ 32.994995] Allocated by task 272: [ 32.995400] kasan_save_stack+0x3d/0x60 [ 32.996610] kasan_save_track+0x18/0x40 [ 32.997147] kasan_save_alloc_info+0x3b/0x50 [ 32.997764] __kasan_kmalloc+0xb7/0xc0 [ 32.998435] __kmalloc_cache_noprof+0x184/0x410 [ 32.999200] kasan_atomics+0x96/0x310 [ 32.999562] kunit_try_run_case+0x1b3/0x490 [ 33.000102] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.000615] kthread+0x257/0x310 [ 33.001161] ret_from_fork+0x41/0x80 [ 33.001540] ret_from_fork_asm+0x1a/0x30 [ 33.002132] [ 33.002389] The buggy address belongs to the object at ffff888102a0ec00 [ 33.002389] which belongs to the cache kmalloc-64 of size 64 [ 33.003483] The buggy address is located 0 bytes to the right of [ 33.003483] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.004706] [ 33.005046] The buggy address belongs to the physical page: [ 33.005574] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.006403] flags: 0x200000000000000(node=0|zone=2) [ 33.006957] page_type: f5(slab) [ 33.007369] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.008179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.008885] page dumped because: kasan: bad access detected [ 33.009415] [ 33.009663] Memory state around the buggy address: [ 33.010383] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.011184] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.011859] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.012485] ^ [ 33.012999] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.013756] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.014393] ================================================================== [ 33.015403] ================================================================== [ 33.016165] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 33.017101] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.017704] [ 33.017971] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.019326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.019843] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.020730] Call Trace: [ 33.021037] <TASK> [ 33.021407] dump_stack_lvl+0x73/0xb0 [ 33.022021] print_report+0xd1/0x640 [ 33.022404] ? __virt_addr_valid+0x1db/0x2d0 [ 33.022987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.023603] kasan_report+0x102/0x140 [ 33.024232] ? kasan_atomics_helper+0xde1/0x5450 [ 33.024950] ? kasan_atomics_helper+0xde1/0x5450 [ 33.025391] kasan_check_range+0x10c/0x1c0 [ 33.025999] __kasan_check_write+0x18/0x20 [ 33.026421] kasan_atomics_helper+0xde1/0x5450 [ 33.026999] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.027545] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.028131] ? kasan_atomics+0x153/0x310 [ 33.028707] kasan_atomics+0x1dd/0x310 [ 33.029296] ? __pfx_kasan_atomics+0x10/0x10 [ 33.029716] ? __pfx_read_tsc+0x10/0x10 [ 33.030207] ? ktime_get_ts64+0x86/0x230 [ 33.030833] kunit_try_run_case+0x1b3/0x490 [ 33.031332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.031811] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.032430] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.033043] ? __kthread_parkme+0x82/0x160 [ 33.033531] ? preempt_count_sub+0x50/0x80 [ 33.034179] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.034843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.035414] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.036057] kthread+0x257/0x310 [ 33.036511] ? __pfx_kthread+0x10/0x10 [ 33.037128] ret_from_fork+0x41/0x80 [ 33.037628] ? __pfx_kthread+0x10/0x10 [ 33.038071] ret_from_fork_asm+0x1a/0x30 [ 33.038666] </TASK> [ 33.039064] [ 33.039380] Allocated by task 272: [ 33.039891] kasan_save_stack+0x3d/0x60 [ 33.040341] kasan_save_track+0x18/0x40 [ 33.040869] kasan_save_alloc_info+0x3b/0x50 [ 33.041401] __kasan_kmalloc+0xb7/0xc0 [ 33.041852] __kmalloc_cache_noprof+0x184/0x410 [ 33.042413] kasan_atomics+0x96/0x310 [ 33.042837] kunit_try_run_case+0x1b3/0x490 [ 33.043400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.044033] kthread+0x257/0x310 [ 33.044467] ret_from_fork+0x41/0x80 [ 33.044884] ret_from_fork_asm+0x1a/0x30 [ 33.045317] [ 33.045564] The buggy address belongs to the object at ffff888102a0ec00 [ 33.045564] which belongs to the cache kmalloc-64 of size 64 [ 33.046744] The buggy address is located 0 bytes to the right of [ 33.046744] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.047856] [ 33.048029] The buggy address belongs to the physical page: [ 33.048585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.049423] flags: 0x200000000000000(node=0|zone=2) [ 33.049991] page_type: f5(slab) [ 33.050297] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.051179] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.051991] page dumped because: kasan: bad access detected [ 33.052498] [ 33.052753] Memory state around the buggy address: [ 33.053253] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.054030] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.054886] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.055463] ^ [ 33.056145] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.057324] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.058021] ================================================================== [ 34.399418] ================================================================== [ 34.399899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 34.400383] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.401355] [ 34.401549] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.402132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.402967] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.404203] Call Trace: [ 34.404429] <TASK> [ 34.404638] dump_stack_lvl+0x73/0xb0 [ 34.404976] print_report+0xd1/0x640 [ 34.405632] ? __virt_addr_valid+0x1db/0x2d0 [ 34.406184] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.406950] kasan_report+0x102/0x140 [ 34.407418] ? kasan_atomics_helper+0x1d7b/0x5450 [ 34.407805] ? kasan_atomics_helper+0x1d7b/0x5450 [ 34.408654] kasan_check_range+0x10c/0x1c0 [ 34.409044] __kasan_check_write+0x18/0x20 [ 34.409366] kasan_atomics_helper+0x1d7b/0x5450 [ 34.409736] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.410353] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.411111] ? kasan_atomics+0x153/0x310 [ 34.411632] kasan_atomics+0x1dd/0x310 [ 34.412509] ? __pfx_kasan_atomics+0x10/0x10 [ 34.413016] ? __pfx_read_tsc+0x10/0x10 [ 34.413325] ? ktime_get_ts64+0x86/0x230 [ 34.413646] kunit_try_run_case+0x1b3/0x490 [ 34.414241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.414838] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.415384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.415957] ? __kthread_parkme+0x82/0x160 [ 34.416335] ? preempt_count_sub+0x50/0x80 [ 34.417156] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.417574] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.418565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.421098] kthread+0x257/0x310 [ 34.421648] ? __pfx_kthread+0x10/0x10 [ 34.422182] ret_from_fork+0x41/0x80 [ 34.422639] ? __pfx_kthread+0x10/0x10 [ 34.423188] ret_from_fork_asm+0x1a/0x30 [ 34.423763] </TASK> [ 34.424240] [ 34.424568] Allocated by task 272: [ 34.424945] kasan_save_stack+0x3d/0x60 [ 34.425588] kasan_save_track+0x18/0x40 [ 34.426302] kasan_save_alloc_info+0x3b/0x50 [ 34.426815] __kasan_kmalloc+0xb7/0xc0 [ 34.427318] __kmalloc_cache_noprof+0x184/0x410 [ 34.428111] kasan_atomics+0x96/0x310 [ 34.428522] kunit_try_run_case+0x1b3/0x490 [ 34.429155] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.429761] kthread+0x257/0x310 [ 34.430405] ret_from_fork+0x41/0x80 [ 34.430741] ret_from_fork_asm+0x1a/0x30 [ 34.431394] [ 34.431730] The buggy address belongs to the object at ffff888102a0ec00 [ 34.431730] which belongs to the cache kmalloc-64 of size 64 [ 34.433081] The buggy address is located 0 bytes to the right of [ 34.433081] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.434835] [ 34.435046] The buggy address belongs to the physical page: [ 34.435571] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.436334] flags: 0x200000000000000(node=0|zone=2) [ 34.437758] page_type: f5(slab) [ 34.438061] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.438697] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.439214] page dumped because: kasan: bad access detected [ 34.440236] [ 34.440648] Memory state around the buggy address: [ 34.441173] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.442469] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.443268] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.443723] ^ [ 34.444596] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.445574] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.446261] ================================================================== [ 32.640863] ================================================================== [ 32.641586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 32.642109] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.642947] [ 32.643239] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.644162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.644618] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.645354] Call Trace: [ 32.645596] <TASK> [ 32.645888] dump_stack_lvl+0x73/0xb0 [ 32.646359] print_report+0xd1/0x640 [ 32.646882] ? __virt_addr_valid+0x1db/0x2d0 [ 32.647287] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.647845] kasan_report+0x102/0x140 [ 32.648322] ? kasan_atomics_helper+0x8fa/0x5450 [ 32.648918] ? kasan_atomics_helper+0x8fa/0x5450 [ 32.649429] kasan_check_range+0x10c/0x1c0 [ 32.649835] __kasan_check_write+0x18/0x20 [ 32.650295] kasan_atomics_helper+0x8fa/0x5450 [ 32.650821] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.651410] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.651855] ? kasan_atomics+0x153/0x310 [ 32.652363] kasan_atomics+0x1dd/0x310 [ 32.652840] ? __pfx_kasan_atomics+0x10/0x10 [ 32.653301] ? __pfx_read_tsc+0x10/0x10 [ 32.653656] ? ktime_get_ts64+0x86/0x230 [ 32.654205] kunit_try_run_case+0x1b3/0x490 [ 32.654554] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.655129] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.655735] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.656217] ? __kthread_parkme+0x82/0x160 [ 32.656733] ? preempt_count_sub+0x50/0x80 [ 32.657314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.657927] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.658525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.659127] kthread+0x257/0x310 [ 32.659477] ? __pfx_kthread+0x10/0x10 [ 32.659916] ret_from_fork+0x41/0x80 [ 32.660537] ? __pfx_kthread+0x10/0x10 [ 32.661802] ret_from_fork_asm+0x1a/0x30 [ 32.662165] </TASK> [ 32.662611] [ 32.663033] Allocated by task 272: [ 32.663466] kasan_save_stack+0x3d/0x60 [ 32.663670] kasan_save_track+0x18/0x40 [ 32.664217] kasan_save_alloc_info+0x3b/0x50 [ 32.664721] __kasan_kmalloc+0xb7/0xc0 [ 32.665168] __kmalloc_cache_noprof+0x184/0x410 [ 32.665742] kasan_atomics+0x96/0x310 [ 32.666293] kunit_try_run_case+0x1b3/0x490 [ 32.666739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.667415] kthread+0x257/0x310 [ 32.667787] ret_from_fork+0x41/0x80 [ 32.668269] ret_from_fork_asm+0x1a/0x30 [ 32.668768] [ 32.669051] The buggy address belongs to the object at ffff888102a0ec00 [ 32.669051] which belongs to the cache kmalloc-64 of size 64 [ 32.670035] The buggy address is located 0 bytes to the right of [ 32.670035] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.671351] [ 32.671599] The buggy address belongs to the physical page: [ 32.672123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.672963] flags: 0x200000000000000(node=0|zone=2) [ 32.673532] page_type: f5(slab) [ 32.673852] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.674659] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.675350] page dumped because: kasan: bad access detected [ 32.676133] [ 32.676395] Memory state around the buggy address: [ 32.676808] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.677771] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.678337] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.679017] ^ [ 32.679481] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.680195] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.680854] ================================================================== [ 32.421632] ================================================================== [ 32.422523] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 32.423094] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.424094] [ 32.424350] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.425234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.425717] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.426406] Call Trace: [ 32.426731] <TASK> [ 32.427090] dump_stack_lvl+0x73/0xb0 [ 32.427472] print_report+0xd1/0x640 [ 32.428045] ? __virt_addr_valid+0x1db/0x2d0 [ 32.428482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.429160] kasan_report+0x102/0x140 [ 32.429468] ? kasan_atomics_helper+0x5ff/0x5450 [ 32.430064] ? kasan_atomics_helper+0x5ff/0x5450 [ 32.430521] kasan_check_range+0x10c/0x1c0 [ 32.430939] __kasan_check_write+0x18/0x20 [ 32.431466] kasan_atomics_helper+0x5ff/0x5450 [ 32.431928] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.432413] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.432979] ? kasan_atomics+0x153/0x310 [ 32.433473] kasan_atomics+0x1dd/0x310 [ 32.433850] ? __pfx_kasan_atomics+0x10/0x10 [ 32.434381] ? __pfx_read_tsc+0x10/0x10 [ 32.434942] ? ktime_get_ts64+0x86/0x230 [ 32.435460] kunit_try_run_case+0x1b3/0x490 [ 32.435996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.436359] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.437018] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.437482] ? __kthread_parkme+0x82/0x160 [ 32.437978] ? preempt_count_sub+0x50/0x80 [ 32.438515] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.438998] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.439484] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.440193] kthread+0x257/0x310 [ 32.440562] ? __pfx_kthread+0x10/0x10 [ 32.440930] ret_from_fork+0x41/0x80 [ 32.441320] ? __pfx_kthread+0x10/0x10 [ 32.441885] ret_from_fork_asm+0x1a/0x30 [ 32.442379] </TASK> [ 32.442728] [ 32.443257] Allocated by task 272: [ 32.443728] kasan_save_stack+0x3d/0x60 [ 32.444262] kasan_save_track+0x18/0x40 [ 32.444567] kasan_save_alloc_info+0x3b/0x50 [ 32.445013] __kasan_kmalloc+0xb7/0xc0 [ 32.445495] __kmalloc_cache_noprof+0x184/0x410 [ 32.446129] kasan_atomics+0x96/0x310 [ 32.446508] kunit_try_run_case+0x1b3/0x490 [ 32.446982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.447448] kthread+0x257/0x310 [ 32.447846] ret_from_fork+0x41/0x80 [ 32.448284] ret_from_fork_asm+0x1a/0x30 [ 32.448803] [ 32.448980] The buggy address belongs to the object at ffff888102a0ec00 [ 32.448980] which belongs to the cache kmalloc-64 of size 64 [ 32.450025] The buggy address is located 0 bytes to the right of [ 32.450025] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.451148] [ 32.451416] The buggy address belongs to the physical page: [ 32.451878] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.452539] flags: 0x200000000000000(node=0|zone=2) [ 32.452949] page_type: f5(slab) [ 32.453254] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.454200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.455079] page dumped because: kasan: bad access detected [ 32.455618] [ 32.456059] Memory state around the buggy address: [ 32.456485] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.456981] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.457993] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.458922] ^ [ 32.459538] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.460365] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.461187] ================================================================== [ 34.534121] ================================================================== [ 34.535466] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 34.536636] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.537602] [ 34.538057] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.538922] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.539245] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.540126] Call Trace: [ 34.540485] <TASK> [ 34.540745] dump_stack_lvl+0x73/0xb0 [ 34.541272] print_report+0xd1/0x640 [ 34.541631] ? __virt_addr_valid+0x1db/0x2d0 [ 34.542137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.542583] kasan_report+0x102/0x140 [ 34.543141] ? kasan_atomics_helper+0x1f44/0x5450 [ 34.543653] ? kasan_atomics_helper+0x1f44/0x5450 [ 34.544660] kasan_check_range+0x10c/0x1c0 [ 34.545135] __kasan_check_write+0x18/0x20 [ 34.545727] kasan_atomics_helper+0x1f44/0x5450 [ 34.546412] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.546923] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.547410] ? kasan_atomics+0x153/0x310 [ 34.547929] kasan_atomics+0x1dd/0x310 [ 34.548533] ? __pfx_kasan_atomics+0x10/0x10 [ 34.549602] ? __pfx_read_tsc+0x10/0x10 [ 34.550300] ? ktime_get_ts64+0x86/0x230 [ 34.550758] kunit_try_run_case+0x1b3/0x490 [ 34.551230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.552538] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.553244] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.553861] ? __kthread_parkme+0x82/0x160 [ 34.554277] ? preempt_count_sub+0x50/0x80 [ 34.554705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.555190] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.556086] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.556737] kthread+0x257/0x310 [ 34.557174] ? __pfx_kthread+0x10/0x10 [ 34.557743] ret_from_fork+0x41/0x80 [ 34.558169] ? __pfx_kthread+0x10/0x10 [ 34.558775] ret_from_fork_asm+0x1a/0x30 [ 34.559352] </TASK> [ 34.559783] [ 34.560095] Allocated by task 272: [ 34.560557] kasan_save_stack+0x3d/0x60 [ 34.561108] kasan_save_track+0x18/0x40 [ 34.561743] kasan_save_alloc_info+0x3b/0x50 [ 34.562334] __kasan_kmalloc+0xb7/0xc0 [ 34.562851] __kmalloc_cache_noprof+0x184/0x410 [ 34.563573] kasan_atomics+0x96/0x310 [ 34.564332] kunit_try_run_case+0x1b3/0x490 [ 34.564950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.565549] kthread+0x257/0x310 [ 34.565969] ret_from_fork+0x41/0x80 [ 34.566490] ret_from_fork_asm+0x1a/0x30 [ 34.567141] [ 34.567333] The buggy address belongs to the object at ffff888102a0ec00 [ 34.567333] which belongs to the cache kmalloc-64 of size 64 [ 34.568652] The buggy address is located 0 bytes to the right of [ 34.568652] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.569705] [ 34.570068] The buggy address belongs to the physical page: [ 34.570973] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.571808] flags: 0x200000000000000(node=0|zone=2) [ 34.572222] page_type: f5(slab) [ 34.572843] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.573434] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.574464] page dumped because: kasan: bad access detected [ 34.574951] [ 34.575327] Memory state around the buggy address: [ 34.576009] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.576564] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.577589] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.578428] ^ [ 34.579086] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.579763] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.580533] ================================================================== [ 32.915401] ================================================================== [ 32.916779] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 32.917953] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.918654] [ 32.919204] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.919935] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.920127] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.920462] Call Trace: [ 32.920600] <TASK> [ 32.921108] dump_stack_lvl+0x73/0xb0 [ 32.921817] print_report+0xd1/0x640 [ 32.922513] ? __virt_addr_valid+0x1db/0x2d0 [ 32.923458] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.924487] kasan_report+0x102/0x140 [ 32.925157] ? kasan_atomics_helper+0x4a86/0x5450 [ 32.926308] ? kasan_atomics_helper+0x4a86/0x5450 [ 32.927146] __asan_report_load4_noabort+0x18/0x20 [ 32.927617] kasan_atomics_helper+0x4a86/0x5450 [ 32.928105] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.928618] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.929277] ? kasan_atomics+0x153/0x310 [ 32.929716] kasan_atomics+0x1dd/0x310 [ 32.930221] ? __pfx_kasan_atomics+0x10/0x10 [ 32.931033] ? __pfx_read_tsc+0x10/0x10 [ 32.931635] ? ktime_get_ts64+0x86/0x230 [ 32.932306] kunit_try_run_case+0x1b3/0x490 [ 32.933355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.933856] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.934558] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.935154] ? __kthread_parkme+0x82/0x160 [ 32.936034] ? preempt_count_sub+0x50/0x80 [ 32.936485] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.937421] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.938400] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.939253] kthread+0x257/0x310 [ 32.939674] ? __pfx_kthread+0x10/0x10 [ 32.940328] ret_from_fork+0x41/0x80 [ 32.940725] ? __pfx_kthread+0x10/0x10 [ 32.941145] ret_from_fork_asm+0x1a/0x30 [ 32.941621] </TASK> [ 32.941949] [ 32.942137] Allocated by task 272: [ 32.942642] kasan_save_stack+0x3d/0x60 [ 32.943038] kasan_save_track+0x18/0x40 [ 32.944209] kasan_save_alloc_info+0x3b/0x50 [ 32.944739] __kasan_kmalloc+0xb7/0xc0 [ 32.945121] __kmalloc_cache_noprof+0x184/0x410 [ 32.945581] kasan_atomics+0x96/0x310 [ 32.946404] kunit_try_run_case+0x1b3/0x490 [ 32.947247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.947753] kthread+0x257/0x310 [ 32.948415] ret_from_fork+0x41/0x80 [ 32.948755] ret_from_fork_asm+0x1a/0x30 [ 32.949497] [ 32.949723] The buggy address belongs to the object at ffff888102a0ec00 [ 32.949723] which belongs to the cache kmalloc-64 of size 64 [ 32.951230] The buggy address is located 0 bytes to the right of [ 32.951230] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.952667] [ 32.952943] The buggy address belongs to the physical page: [ 32.953833] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.955113] flags: 0x200000000000000(node=0|zone=2) [ 32.955600] page_type: f5(slab) [ 32.956355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.957375] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.958365] page dumped because: kasan: bad access detected [ 32.958999] [ 32.959226] Memory state around the buggy address: [ 32.959732] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.961061] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.962231] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.962822] ^ [ 32.963441] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.964406] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.965079] ================================================================== [ 32.682011] ================================================================== [ 32.682653] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 32.684005] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.684887] [ 32.685205] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.686328] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.686718] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.687567] Call Trace: [ 32.688076] <TASK> [ 32.688384] dump_stack_lvl+0x73/0xb0 [ 32.688950] print_report+0xd1/0x640 [ 32.689304] ? __virt_addr_valid+0x1db/0x2d0 [ 32.689885] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.690374] kasan_report+0x102/0x140 [ 32.690859] ? kasan_atomics_helper+0x993/0x5450 [ 32.691387] ? kasan_atomics_helper+0x993/0x5450 [ 32.691924] kasan_check_range+0x10c/0x1c0 [ 32.692472] __kasan_check_write+0x18/0x20 [ 32.693186] kasan_atomics_helper+0x993/0x5450 [ 32.693623] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.694209] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.694653] ? kasan_atomics+0x153/0x310 [ 32.695361] kasan_atomics+0x1dd/0x310 [ 32.695961] ? __pfx_kasan_atomics+0x10/0x10 [ 32.696514] ? __pfx_read_tsc+0x10/0x10 [ 32.697154] ? ktime_get_ts64+0x86/0x230 [ 32.697568] kunit_try_run_case+0x1b3/0x490 [ 32.698230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.698766] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.699447] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.700013] ? __kthread_parkme+0x82/0x160 [ 32.700506] ? preempt_count_sub+0x50/0x80 [ 32.701119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.701615] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.702207] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.702984] kthread+0x257/0x310 [ 32.703360] ? __pfx_kthread+0x10/0x10 [ 32.703802] ret_from_fork+0x41/0x80 [ 32.704331] ? __pfx_kthread+0x10/0x10 [ 32.704912] ret_from_fork_asm+0x1a/0x30 [ 32.705456] </TASK> [ 32.705919] [ 32.706098] Allocated by task 272: [ 32.706566] kasan_save_stack+0x3d/0x60 [ 32.706985] kasan_save_track+0x18/0x40 [ 32.707428] kasan_save_alloc_info+0x3b/0x50 [ 32.708175] __kasan_kmalloc+0xb7/0xc0 [ 32.708632] __kmalloc_cache_noprof+0x184/0x410 [ 32.709283] kasan_atomics+0x96/0x310 [ 32.709846] kunit_try_run_case+0x1b3/0x490 [ 32.710172] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.710820] kthread+0x257/0x310 [ 32.711257] ret_from_fork+0x41/0x80 [ 32.711620] ret_from_fork_asm+0x1a/0x30 [ 32.712215] [ 32.712500] The buggy address belongs to the object at ffff888102a0ec00 [ 32.712500] which belongs to the cache kmalloc-64 of size 64 [ 32.713554] The buggy address is located 0 bytes to the right of [ 32.713554] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.715054] [ 32.715324] The buggy address belongs to the physical page: [ 32.715785] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.716555] flags: 0x200000000000000(node=0|zone=2) [ 32.717208] page_type: f5(slab) [ 32.717554] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.718420] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.719553] page dumped because: kasan: bad access detected [ 32.720338] [ 32.720560] Memory state around the buggy address: [ 32.721209] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.721882] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.722733] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.723480] ^ [ 32.723965] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.724835] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.725574] ================================================================== [ 33.451385] ================================================================== [ 33.453026] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 33.454181] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.456102] [ 33.456306] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.457227] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.457418] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.457814] Call Trace: [ 33.458532] <TASK> [ 33.459011] dump_stack_lvl+0x73/0xb0 [ 33.459712] print_report+0xd1/0x640 [ 33.460086] ? __virt_addr_valid+0x1db/0x2d0 [ 33.460604] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.461120] kasan_report+0x102/0x140 [ 33.461577] ? kasan_atomics_helper+0x49ea/0x5450 [ 33.462116] ? kasan_atomics_helper+0x49ea/0x5450 [ 33.462748] __asan_report_load4_noabort+0x18/0x20 [ 33.463190] kasan_atomics_helper+0x49ea/0x5450 [ 33.463850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.464302] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.465041] ? kasan_atomics+0x153/0x310 [ 33.465439] kasan_atomics+0x1dd/0x310 [ 33.466013] ? __pfx_kasan_atomics+0x10/0x10 [ 33.466546] ? __pfx_read_tsc+0x10/0x10 [ 33.466924] ? ktime_get_ts64+0x86/0x230 [ 33.467490] kunit_try_run_case+0x1b3/0x490 [ 33.468117] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.468695] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.469252] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.469870] ? __kthread_parkme+0x82/0x160 [ 33.470319] ? preempt_count_sub+0x50/0x80 [ 33.470803] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.471395] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.472161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.472722] kthread+0x257/0x310 [ 33.473250] ? __pfx_kthread+0x10/0x10 [ 33.473742] ret_from_fork+0x41/0x80 [ 33.474193] ? __pfx_kthread+0x10/0x10 [ 33.474619] ret_from_fork_asm+0x1a/0x30 [ 33.475280] </TASK> [ 33.475670] [ 33.475984] Allocated by task 272: [ 33.476392] kasan_save_stack+0x3d/0x60 [ 33.476727] kasan_save_track+0x18/0x40 [ 33.477220] kasan_save_alloc_info+0x3b/0x50 [ 33.477762] __kasan_kmalloc+0xb7/0xc0 [ 33.478239] __kmalloc_cache_noprof+0x184/0x410 [ 33.478756] kasan_atomics+0x96/0x310 [ 33.479317] kunit_try_run_case+0x1b3/0x490 [ 33.479804] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.480489] kthread+0x257/0x310 [ 33.480916] ret_from_fork+0x41/0x80 [ 33.481353] ret_from_fork_asm+0x1a/0x30 [ 33.481909] [ 33.482233] The buggy address belongs to the object at ffff888102a0ec00 [ 33.482233] which belongs to the cache kmalloc-64 of size 64 [ 33.483212] The buggy address is located 0 bytes to the right of [ 33.483212] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.485626] [ 33.485987] The buggy address belongs to the physical page: [ 33.486497] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.487816] flags: 0x200000000000000(node=0|zone=2) [ 33.488587] page_type: f5(slab) [ 33.489075] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.490399] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.491358] page dumped because: kasan: bad access detected [ 33.492013] [ 33.492123] Memory state around the buggy address: [ 33.492328] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.492607] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.493472] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.494073] ^ [ 33.494625] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.495290] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.496491] ================================================================== [ 34.154259] ================================================================== [ 34.155455] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 34.156699] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.157636] [ 34.158177] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.159474] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.159933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.160995] Call Trace: [ 34.161222] <TASK> [ 34.161543] dump_stack_lvl+0x73/0xb0 [ 34.162396] print_report+0xd1/0x640 [ 34.163048] ? __virt_addr_valid+0x1db/0x2d0 [ 34.163494] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.164419] kasan_report+0x102/0x140 [ 34.164937] ? kasan_atomics_helper+0x1a80/0x5450 [ 34.165573] ? kasan_atomics_helper+0x1a80/0x5450 [ 34.166443] kasan_check_range+0x10c/0x1c0 [ 34.166919] __kasan_check_write+0x18/0x20 [ 34.167378] kasan_atomics_helper+0x1a80/0x5450 [ 34.168194] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.168797] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.169497] ? kasan_atomics+0x153/0x310 [ 34.170226] kasan_atomics+0x1dd/0x310 [ 34.170629] ? __pfx_kasan_atomics+0x10/0x10 [ 34.171451] ? __pfx_read_tsc+0x10/0x10 [ 34.172543] ? ktime_get_ts64+0x86/0x230 [ 34.173193] kunit_try_run_case+0x1b3/0x490 [ 34.173646] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.174377] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.175196] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.176151] ? __kthread_parkme+0x82/0x160 [ 34.176570] ? preempt_count_sub+0x50/0x80 [ 34.177215] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.177672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.178588] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.179430] kthread+0x257/0x310 [ 34.180394] ? __pfx_kthread+0x10/0x10 [ 34.180801] ret_from_fork+0x41/0x80 [ 34.181817] ? __pfx_kthread+0x10/0x10 [ 34.182234] ret_from_fork_asm+0x1a/0x30 [ 34.182699] </TASK> [ 34.182907] [ 34.183222] Allocated by task 272: [ 34.184239] kasan_save_stack+0x3d/0x60 [ 34.184659] kasan_save_track+0x18/0x40 [ 34.185373] kasan_save_alloc_info+0x3b/0x50 [ 34.185832] __kasan_kmalloc+0xb7/0xc0 [ 34.186654] __kmalloc_cache_noprof+0x184/0x410 [ 34.187275] kasan_atomics+0x96/0x310 [ 34.187772] kunit_try_run_case+0x1b3/0x490 [ 34.188453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.189179] kthread+0x257/0x310 [ 34.189594] ret_from_fork+0x41/0x80 [ 34.190280] ret_from_fork_asm+0x1a/0x30 [ 34.190751] [ 34.191044] The buggy address belongs to the object at ffff888102a0ec00 [ 34.191044] which belongs to the cache kmalloc-64 of size 64 [ 34.192622] The buggy address is located 0 bytes to the right of [ 34.192622] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.194071] [ 34.194304] The buggy address belongs to the physical page: [ 34.195213] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.195845] flags: 0x200000000000000(node=0|zone=2) [ 34.196325] page_type: f5(slab) [ 34.196729] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.197830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.198650] page dumped because: kasan: bad access detected [ 34.199469] [ 34.199709] Memory state around the buggy address: [ 34.200661] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.201701] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.202446] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.203300] ^ [ 34.203825] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.204416] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.205460] ================================================================== [ 33.148648] ================================================================== [ 33.149483] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 33.150106] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.150980] [ 33.151178] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.152583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.153329] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.154228] Call Trace: [ 33.154564] <TASK> [ 33.154897] dump_stack_lvl+0x73/0xb0 [ 33.155655] print_report+0xd1/0x640 [ 33.156292] ? __virt_addr_valid+0x1db/0x2d0 [ 33.156890] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.157535] kasan_report+0x102/0x140 [ 33.158222] ? kasan_atomics_helper+0xfaa/0x5450 [ 33.158872] ? kasan_atomics_helper+0xfaa/0x5450 [ 33.159403] kasan_check_range+0x10c/0x1c0 [ 33.160144] __kasan_check_write+0x18/0x20 [ 33.160932] kasan_atomics_helper+0xfaa/0x5450 [ 33.161428] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.161903] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.162843] ? kasan_atomics+0x153/0x310 [ 33.163482] kasan_atomics+0x1dd/0x310 [ 33.164191] ? __pfx_kasan_atomics+0x10/0x10 [ 33.164841] ? __pfx_read_tsc+0x10/0x10 [ 33.165264] ? ktime_get_ts64+0x86/0x230 [ 33.166026] kunit_try_run_case+0x1b3/0x490 [ 33.166712] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.167239] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.168000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.168750] ? __kthread_parkme+0x82/0x160 [ 33.169410] ? preempt_count_sub+0x50/0x80 [ 33.169890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.170618] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.171664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.172246] kthread+0x257/0x310 [ 33.172622] ? __pfx_kthread+0x10/0x10 [ 33.173501] ret_from_fork+0x41/0x80 [ 33.174237] ? __pfx_kthread+0x10/0x10 [ 33.174945] ret_from_fork_asm+0x1a/0x30 [ 33.175450] </TASK> [ 33.176102] [ 33.176258] Allocated by task 272: [ 33.176740] kasan_save_stack+0x3d/0x60 [ 33.177296] kasan_save_track+0x18/0x40 [ 33.178186] kasan_save_alloc_info+0x3b/0x50 [ 33.178408] __kasan_kmalloc+0xb7/0xc0 [ 33.178595] __kmalloc_cache_noprof+0x184/0x410 [ 33.179106] kasan_atomics+0x96/0x310 [ 33.179395] kunit_try_run_case+0x1b3/0x490 [ 33.179899] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.180408] kthread+0x257/0x310 [ 33.180728] ret_from_fork+0x41/0x80 [ 33.181450] ret_from_fork_asm+0x1a/0x30 [ 33.181967] [ 33.182201] The buggy address belongs to the object at ffff888102a0ec00 [ 33.182201] which belongs to the cache kmalloc-64 of size 64 [ 33.183180] The buggy address is located 0 bytes to the right of [ 33.183180] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.184461] [ 33.184775] The buggy address belongs to the physical page: [ 33.185318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.186099] flags: 0x200000000000000(node=0|zone=2) [ 33.186468] page_type: f5(slab) [ 33.187031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.187829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.188515] page dumped because: kasan: bad access detected [ 33.188970] [ 33.189245] Memory state around the buggy address: [ 33.189813] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.190389] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.191073] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.191901] ^ [ 33.192309] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.193123] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.193720] ================================================================== [ 34.016218] ================================================================== [ 34.016908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 34.017531] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.018371] [ 34.018561] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.019752] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.020284] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.021106] Call Trace: [ 34.021367] <TASK> [ 34.021567] dump_stack_lvl+0x73/0xb0 [ 34.021998] print_report+0xd1/0x640 [ 34.022529] ? __virt_addr_valid+0x1db/0x2d0 [ 34.023146] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.023729] kasan_report+0x102/0x140 [ 34.024229] ? kasan_atomics_helper+0x18b2/0x5450 [ 34.024837] ? kasan_atomics_helper+0x18b2/0x5450 [ 34.025203] kasan_check_range+0x10c/0x1c0 [ 34.025873] __kasan_check_write+0x18/0x20 [ 34.026454] kasan_atomics_helper+0x18b2/0x5450 [ 34.027146] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.027719] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.028334] ? kasan_atomics+0x153/0x310 [ 34.028961] kasan_atomics+0x1dd/0x310 [ 34.029410] ? __pfx_kasan_atomics+0x10/0x10 [ 34.029989] ? __pfx_read_tsc+0x10/0x10 [ 34.030362] ? ktime_get_ts64+0x86/0x230 [ 34.030887] kunit_try_run_case+0x1b3/0x490 [ 34.031398] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.031987] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.032387] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.033118] ? __kthread_parkme+0x82/0x160 [ 34.033586] ? preempt_count_sub+0x50/0x80 [ 34.034002] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.034613] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.035389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.036045] kthread+0x257/0x310 [ 34.036442] ? __pfx_kthread+0x10/0x10 [ 34.036996] ret_from_fork+0x41/0x80 [ 34.037418] ? __pfx_kthread+0x10/0x10 [ 34.038021] ret_from_fork_asm+0x1a/0x30 [ 34.038572] </TASK> [ 34.038986] [ 34.039184] Allocated by task 272: [ 34.039624] kasan_save_stack+0x3d/0x60 [ 34.040023] kasan_save_track+0x18/0x40 [ 34.040538] kasan_save_alloc_info+0x3b/0x50 [ 34.041024] __kasan_kmalloc+0xb7/0xc0 [ 34.041549] __kmalloc_cache_noprof+0x184/0x410 [ 34.042061] kasan_atomics+0x96/0x310 [ 34.042602] kunit_try_run_case+0x1b3/0x490 [ 34.043194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.043839] kthread+0x257/0x310 [ 34.044246] ret_from_fork+0x41/0x80 [ 34.044752] ret_from_fork_asm+0x1a/0x30 [ 34.045158] [ 34.045463] The buggy address belongs to the object at ffff888102a0ec00 [ 34.045463] which belongs to the cache kmalloc-64 of size 64 [ 34.046393] The buggy address is located 0 bytes to the right of [ 34.046393] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.047727] [ 34.047975] The buggy address belongs to the physical page: [ 34.048614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.049368] flags: 0x200000000000000(node=0|zone=2) [ 34.049821] page_type: f5(slab) [ 34.050227] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.051001] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.051666] page dumped because: kasan: bad access detected [ 34.052297] [ 34.052555] Memory state around the buggy address: [ 34.053121] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.053757] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.054276] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.055019] ^ [ 34.055480] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.056287] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.056990] ================================================================== [ 33.194571] ================================================================== [ 33.195515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 33.196473] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.196977] [ 33.197311] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.198303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.198921] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.199644] Call Trace: [ 33.200108] <TASK> [ 33.200318] dump_stack_lvl+0x73/0xb0 [ 33.200646] print_report+0xd1/0x640 [ 33.201318] ? __virt_addr_valid+0x1db/0x2d0 [ 33.201862] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.202582] kasan_report+0x102/0x140 [ 33.203011] ? kasan_atomics_helper+0x4a38/0x5450 [ 33.203628] ? kasan_atomics_helper+0x4a38/0x5450 [ 33.204062] __asan_report_load4_noabort+0x18/0x20 [ 33.204768] kasan_atomics_helper+0x4a38/0x5450 [ 33.205192] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.205555] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.206501] ? kasan_atomics+0x153/0x310 [ 33.207202] kasan_atomics+0x1dd/0x310 [ 33.207615] ? __pfx_kasan_atomics+0x10/0x10 [ 33.208315] ? __pfx_read_tsc+0x10/0x10 [ 33.208947] ? ktime_get_ts64+0x86/0x230 [ 33.209275] kunit_try_run_case+0x1b3/0x490 [ 33.210711] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.211415] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.211706] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.212534] ? __kthread_parkme+0x82/0x160 [ 33.213353] ? preempt_count_sub+0x50/0x80 [ 33.214077] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.214577] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.215096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.215719] kthread+0x257/0x310 [ 33.216149] ? __pfx_kthread+0x10/0x10 [ 33.216525] ret_from_fork+0x41/0x80 [ 33.217040] ? __pfx_kthread+0x10/0x10 [ 33.217491] ret_from_fork_asm+0x1a/0x30 [ 33.217967] </TASK> [ 33.218597] [ 33.219108] Allocated by task 272: [ 33.219354] kasan_save_stack+0x3d/0x60 [ 33.220112] kasan_save_track+0x18/0x40 [ 33.220541] kasan_save_alloc_info+0x3b/0x50 [ 33.221155] __kasan_kmalloc+0xb7/0xc0 [ 33.221511] __kmalloc_cache_noprof+0x184/0x410 [ 33.222094] kasan_atomics+0x96/0x310 [ 33.222432] kunit_try_run_case+0x1b3/0x490 [ 33.223105] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.223725] kthread+0x257/0x310 [ 33.224165] ret_from_fork+0x41/0x80 [ 33.224589] ret_from_fork_asm+0x1a/0x30 [ 33.225193] [ 33.225554] The buggy address belongs to the object at ffff888102a0ec00 [ 33.225554] which belongs to the cache kmalloc-64 of size 64 [ 33.226727] The buggy address is located 0 bytes to the right of [ 33.226727] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.227873] [ 33.228138] The buggy address belongs to the physical page: [ 33.228611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.229446] flags: 0x200000000000000(node=0|zone=2) [ 33.230105] page_type: f5(slab) [ 33.230433] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.231312] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.232001] page dumped because: kasan: bad access detected [ 33.232546] [ 33.232814] Memory state around the buggy address: [ 33.233317] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.234117] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.234750] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.235447] ^ [ 33.236016] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.236800] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.237506] ================================================================== [ 33.974266] ================================================================== [ 33.974743] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 33.975592] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.976110] [ 33.976300] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.977904] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.978361] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.979194] Call Trace: [ 33.979469] <TASK> [ 33.979706] dump_stack_lvl+0x73/0xb0 [ 33.980287] print_report+0xd1/0x640 [ 33.980891] ? __virt_addr_valid+0x1db/0x2d0 [ 33.981370] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.982110] kasan_report+0x102/0x140 [ 33.982562] ? kasan_atomics_helper+0x1819/0x5450 [ 33.983114] ? kasan_atomics_helper+0x1819/0x5450 [ 33.983730] kasan_check_range+0x10c/0x1c0 [ 33.984189] __kasan_check_write+0x18/0x20 [ 33.984655] kasan_atomics_helper+0x1819/0x5450 [ 33.985296] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.985875] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.986522] ? kasan_atomics+0x153/0x310 [ 33.987156] kasan_atomics+0x1dd/0x310 [ 33.987717] ? __pfx_kasan_atomics+0x10/0x10 [ 33.988200] ? __pfx_read_tsc+0x10/0x10 [ 33.988592] ? ktime_get_ts64+0x86/0x230 [ 33.989105] kunit_try_run_case+0x1b3/0x490 [ 33.989568] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.990216] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.990822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.991469] ? __kthread_parkme+0x82/0x160 [ 33.992118] ? preempt_count_sub+0x50/0x80 [ 33.992565] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.993150] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.993660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.994396] kthread+0x257/0x310 [ 33.994844] ? __pfx_kthread+0x10/0x10 [ 33.995171] ret_from_fork+0x41/0x80 [ 33.995714] ? __pfx_kthread+0x10/0x10 [ 33.996140] ret_from_fork_asm+0x1a/0x30 [ 33.996657] </TASK> [ 33.997093] [ 33.997274] Allocated by task 272: [ 33.997636] kasan_save_stack+0x3d/0x60 [ 33.998236] kasan_save_track+0x18/0x40 [ 33.998563] kasan_save_alloc_info+0x3b/0x50 [ 33.999170] __kasan_kmalloc+0xb7/0xc0 [ 33.999672] __kmalloc_cache_noprof+0x184/0x410 [ 34.000172] kasan_atomics+0x96/0x310 [ 34.000576] kunit_try_run_case+0x1b3/0x490 [ 34.001101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.001608] kthread+0x257/0x310 [ 34.001979] ret_from_fork+0x41/0x80 [ 34.002345] ret_from_fork_asm+0x1a/0x30 [ 34.002851] [ 34.003021] The buggy address belongs to the object at ffff888102a0ec00 [ 34.003021] which belongs to the cache kmalloc-64 of size 64 [ 34.003887] The buggy address is located 0 bytes to the right of [ 34.003887] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.005340] [ 34.005597] The buggy address belongs to the physical page: [ 34.006068] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.006600] flags: 0x200000000000000(node=0|zone=2) [ 34.007345] page_type: f5(slab) [ 34.007866] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.008825] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.009341] page dumped because: kasan: bad access detected [ 34.010083] [ 34.010298] Memory state around the buggy address: [ 34.010751] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.011515] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.012298] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.013028] ^ [ 34.013554] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.014270] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.015010] ================================================================== [ 34.356353] ================================================================== [ 34.357022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 34.357949] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.358733] [ 34.359161] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.360317] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.360845] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.362012] Call Trace: [ 34.362249] <TASK> [ 34.362579] dump_stack_lvl+0x73/0xb0 [ 34.363064] print_report+0xd1/0x640 [ 34.363454] ? __virt_addr_valid+0x1db/0x2d0 [ 34.364091] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.364564] kasan_report+0x102/0x140 [ 34.364997] ? kasan_atomics_helper+0x1ce2/0x5450 [ 34.365543] ? kasan_atomics_helper+0x1ce2/0x5450 [ 34.366148] kasan_check_range+0x10c/0x1c0 [ 34.366727] __kasan_check_write+0x18/0x20 [ 34.367334] kasan_atomics_helper+0x1ce2/0x5450 [ 34.367836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.368427] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.369093] ? kasan_atomics+0x153/0x310 [ 34.369612] kasan_atomics+0x1dd/0x310 [ 34.370365] ? __pfx_kasan_atomics+0x10/0x10 [ 34.370856] ? __pfx_read_tsc+0x10/0x10 [ 34.371269] ? ktime_get_ts64+0x86/0x230 [ 34.371915] kunit_try_run_case+0x1b3/0x490 [ 34.372369] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.373041] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.373631] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.374218] ? __kthread_parkme+0x82/0x160 [ 34.374807] ? preempt_count_sub+0x50/0x80 [ 34.375256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.375953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.376635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.377252] kthread+0x257/0x310 [ 34.377821] ? __pfx_kthread+0x10/0x10 [ 34.378279] ret_from_fork+0x41/0x80 [ 34.378849] ? __pfx_kthread+0x10/0x10 [ 34.379216] ret_from_fork_asm+0x1a/0x30 [ 34.379883] </TASK> [ 34.380180] [ 34.380469] Allocated by task 272: [ 34.380957] kasan_save_stack+0x3d/0x60 [ 34.381269] kasan_save_track+0x18/0x40 [ 34.381754] kasan_save_alloc_info+0x3b/0x50 [ 34.382242] __kasan_kmalloc+0xb7/0xc0 [ 34.382824] __kmalloc_cache_noprof+0x184/0x410 [ 34.383418] kasan_atomics+0x96/0x310 [ 34.383980] kunit_try_run_case+0x1b3/0x490 [ 34.384355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.385124] kthread+0x257/0x310 [ 34.385616] ret_from_fork+0x41/0x80 [ 34.386411] ret_from_fork_asm+0x1a/0x30 [ 34.386738] [ 34.386993] The buggy address belongs to the object at ffff888102a0ec00 [ 34.386993] which belongs to the cache kmalloc-64 of size 64 [ 34.387929] The buggy address is located 0 bytes to the right of [ 34.387929] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.389012] [ 34.389266] The buggy address belongs to the physical page: [ 34.389763] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.390470] flags: 0x200000000000000(node=0|zone=2) [ 34.391070] page_type: f5(slab) [ 34.391478] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.392345] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.392954] page dumped because: kasan: bad access detected [ 34.393461] [ 34.393648] Memory state around the buggy address: [ 34.394122] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.394808] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.395243] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.396131] ^ [ 34.396454] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.397641] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.398155] ================================================================== [ 34.807165] ================================================================== [ 34.808219] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 34.809090] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.810471] [ 34.810719] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.812043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.812606] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.813508] Call Trace: [ 34.813768] <TASK> [ 34.814420] dump_stack_lvl+0x73/0xb0 [ 34.815361] print_report+0xd1/0x640 [ 34.815752] ? __virt_addr_valid+0x1db/0x2d0 [ 34.816509] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.817096] kasan_report+0x102/0x140 [ 34.817303] ? kasan_atomics_helper+0x218b/0x5450 [ 34.817529] ? kasan_atomics_helper+0x218b/0x5450 [ 34.817880] kasan_check_range+0x10c/0x1c0 [ 34.818528] __kasan_check_write+0x18/0x20 [ 34.819287] kasan_atomics_helper+0x218b/0x5450 [ 34.819860] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.820546] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.821250] ? kasan_atomics+0x153/0x310 [ 34.821646] kasan_atomics+0x1dd/0x310 [ 34.822275] ? __pfx_kasan_atomics+0x10/0x10 [ 34.822809] ? __pfx_read_tsc+0x10/0x10 [ 34.823204] ? ktime_get_ts64+0x86/0x230 [ 34.823841] kunit_try_run_case+0x1b3/0x490 [ 34.824265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.824951] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.825524] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.826160] ? __kthread_parkme+0x82/0x160 [ 34.826566] ? preempt_count_sub+0x50/0x80 [ 34.827231] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.827843] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.828338] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.829037] kthread+0x257/0x310 [ 34.829438] ? __pfx_kthread+0x10/0x10 [ 34.829948] ret_from_fork+0x41/0x80 [ 34.830438] ? __pfx_kthread+0x10/0x10 [ 34.830978] ret_from_fork_asm+0x1a/0x30 [ 34.831361] </TASK> [ 34.831813] [ 34.832108] Allocated by task 272: [ 34.832522] kasan_save_stack+0x3d/0x60 [ 34.833062] kasan_save_track+0x18/0x40 [ 34.833497] kasan_save_alloc_info+0x3b/0x50 [ 34.834085] __kasan_kmalloc+0xb7/0xc0 [ 34.834450] __kmalloc_cache_noprof+0x184/0x410 [ 34.835166] kasan_atomics+0x96/0x310 [ 34.835506] kunit_try_run_case+0x1b3/0x490 [ 34.836072] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.836742] kthread+0x257/0x310 [ 34.837092] ret_from_fork+0x41/0x80 [ 34.837630] ret_from_fork_asm+0x1a/0x30 [ 34.838067] [ 34.838376] The buggy address belongs to the object at ffff888102a0ec00 [ 34.838376] which belongs to the cache kmalloc-64 of size 64 [ 34.839497] The buggy address is located 0 bytes to the right of [ 34.839497] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.840486] [ 34.840846] The buggy address belongs to the physical page: [ 34.841411] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.842289] flags: 0x200000000000000(node=0|zone=2) [ 34.842889] page_type: f5(slab) [ 34.843275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.844149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.844966] page dumped because: kasan: bad access detected [ 34.845477] [ 34.845828] Memory state around the buggy address: [ 34.846319] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.846994] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.847672] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.848328] ^ [ 34.849016] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.849827] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.850568] ================================================================== [ 33.238632] ================================================================== [ 33.239377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 33.239954] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.240834] [ 33.241122] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.242075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.242659] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.244047] Call Trace: [ 33.244357] <TASK> [ 33.244713] dump_stack_lvl+0x73/0xb0 [ 33.245104] print_report+0xd1/0x640 [ 33.245613] ? __virt_addr_valid+0x1db/0x2d0 [ 33.246137] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.246632] kasan_report+0x102/0x140 [ 33.247323] ? kasan_atomics_helper+0x107a/0x5450 [ 33.248000] ? kasan_atomics_helper+0x107a/0x5450 [ 33.248828] kasan_check_range+0x10c/0x1c0 [ 33.249194] __kasan_check_write+0x18/0x20 [ 33.249708] kasan_atomics_helper+0x107a/0x5450 [ 33.250217] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.250839] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.251242] ? kasan_atomics+0x153/0x310 [ 33.251779] kasan_atomics+0x1dd/0x310 [ 33.252186] ? __pfx_kasan_atomics+0x10/0x10 [ 33.252660] ? __pfx_read_tsc+0x10/0x10 [ 33.253140] ? ktime_get_ts64+0x86/0x230 [ 33.253656] kunit_try_run_case+0x1b3/0x490 [ 33.254259] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.254713] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.255322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.255861] ? __kthread_parkme+0x82/0x160 [ 33.256337] ? preempt_count_sub+0x50/0x80 [ 33.256773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.257151] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.257742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.258473] kthread+0x257/0x310 [ 33.258831] ? __pfx_kthread+0x10/0x10 [ 33.259294] ret_from_fork+0x41/0x80 [ 33.259942] ? __pfx_kthread+0x10/0x10 [ 33.260267] ret_from_fork_asm+0x1a/0x30 [ 33.260823] </TASK> [ 33.261160] [ 33.261400] Allocated by task 272: [ 33.261746] kasan_save_stack+0x3d/0x60 [ 33.262236] kasan_save_track+0x18/0x40 [ 33.262587] kasan_save_alloc_info+0x3b/0x50 [ 33.262937] __kasan_kmalloc+0xb7/0xc0 [ 33.263560] __kmalloc_cache_noprof+0x184/0x410 [ 33.264158] kasan_atomics+0x96/0x310 [ 33.264455] kunit_try_run_case+0x1b3/0x490 [ 33.265233] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.265864] kthread+0x257/0x310 [ 33.266278] ret_from_fork+0x41/0x80 [ 33.266569] ret_from_fork_asm+0x1a/0x30 [ 33.267296] [ 33.267555] The buggy address belongs to the object at ffff888102a0ec00 [ 33.267555] which belongs to the cache kmalloc-64 of size 64 [ 33.268377] The buggy address is located 0 bytes to the right of [ 33.268377] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.269769] [ 33.269997] The buggy address belongs to the physical page: [ 33.270347] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.271244] flags: 0x200000000000000(node=0|zone=2) [ 33.271726] page_type: f5(slab) [ 33.272840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.273350] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.273938] page dumped because: kasan: bad access detected [ 33.274485] [ 33.274713] Memory state around the buggy address: [ 33.275234] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.276015] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.276561] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.277105] ^ [ 33.277989] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.278486] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.279718] ================================================================== [ 33.540109] ================================================================== [ 33.541671] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 33.542670] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.543323] [ 33.543616] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.544591] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.544961] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.545765] Call Trace: [ 33.546053] <TASK> [ 33.546259] dump_stack_lvl+0x73/0xb0 [ 33.546894] print_report+0xd1/0x640 [ 33.547440] ? __virt_addr_valid+0x1db/0x2d0 [ 33.547976] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.548570] kasan_report+0x102/0x140 [ 33.549087] ? kasan_atomics_helper+0x49d0/0x5450 [ 33.550382] ? kasan_atomics_helper+0x49d0/0x5450 [ 33.550864] __asan_report_load4_noabort+0x18/0x20 [ 33.551514] kasan_atomics_helper+0x49d0/0x5450 [ 33.552173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.552615] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.553495] ? kasan_atomics+0x153/0x310 [ 33.554148] kasan_atomics+0x1dd/0x310 [ 33.554634] ? __pfx_kasan_atomics+0x10/0x10 [ 33.555157] ? __pfx_read_tsc+0x10/0x10 [ 33.556060] ? ktime_get_ts64+0x86/0x230 [ 33.556638] kunit_try_run_case+0x1b3/0x490 [ 33.557289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.557749] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.558534] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.559325] ? __kthread_parkme+0x82/0x160 [ 33.559773] ? preempt_count_sub+0x50/0x80 [ 33.560633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.560960] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.561455] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.562268] kthread+0x257/0x310 [ 33.562641] ? __pfx_kthread+0x10/0x10 [ 33.563333] ret_from_fork+0x41/0x80 [ 33.564005] ? __pfx_kthread+0x10/0x10 [ 33.564361] ret_from_fork_asm+0x1a/0x30 [ 33.564845] </TASK> [ 33.565143] [ 33.565367] Allocated by task 272: [ 33.566340] kasan_save_stack+0x3d/0x60 [ 33.566746] kasan_save_track+0x18/0x40 [ 33.567544] kasan_save_alloc_info+0x3b/0x50 [ 33.568311] __kasan_kmalloc+0xb7/0xc0 [ 33.569007] __kmalloc_cache_noprof+0x184/0x410 [ 33.569287] kasan_atomics+0x96/0x310 [ 33.569505] kunit_try_run_case+0x1b3/0x490 [ 33.570024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.570719] kthread+0x257/0x310 [ 33.571125] ret_from_fork+0x41/0x80 [ 33.571565] ret_from_fork_asm+0x1a/0x30 [ 33.572503] [ 33.572935] The buggy address belongs to the object at ffff888102a0ec00 [ 33.572935] which belongs to the cache kmalloc-64 of size 64 [ 33.574252] The buggy address is located 0 bytes to the right of [ 33.574252] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.575403] [ 33.575706] The buggy address belongs to the physical page: [ 33.576199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.577328] flags: 0x200000000000000(node=0|zone=2) [ 33.577702] page_type: f5(slab) [ 33.578202] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.578870] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.579653] page dumped because: kasan: bad access detected [ 33.580348] [ 33.580546] Memory state around the buggy address: [ 33.581234] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.581917] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.582667] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.583209] ^ [ 33.583910] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.584493] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.585257] ================================================================== [ 33.807156] ================================================================== [ 33.807572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 33.808377] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.809346] [ 33.809544] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.810570] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.811014] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.811949] Call Trace: [ 33.812288] <TASK> [ 33.813201] dump_stack_lvl+0x73/0xb0 [ 33.813655] print_report+0xd1/0x640 [ 33.814358] ? __virt_addr_valid+0x1db/0x2d0 [ 33.815050] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.815627] kasan_report+0x102/0x140 [ 33.816118] ? kasan_atomics_helper+0x15b7/0x5450 [ 33.816716] ? kasan_atomics_helper+0x15b7/0x5450 [ 33.817406] kasan_check_range+0x10c/0x1c0 [ 33.818056] __kasan_check_write+0x18/0x20 [ 33.818514] kasan_atomics_helper+0x15b7/0x5450 [ 33.818871] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.819454] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.820125] ? kasan_atomics+0x153/0x310 [ 33.820712] kasan_atomics+0x1dd/0x310 [ 33.821148] ? __pfx_kasan_atomics+0x10/0x10 [ 33.821640] ? __pfx_read_tsc+0x10/0x10 [ 33.822132] ? ktime_get_ts64+0x86/0x230 [ 33.822733] kunit_try_run_case+0x1b3/0x490 [ 33.823236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.823917] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.824377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.825061] ? __kthread_parkme+0x82/0x160 [ 33.825599] ? preempt_count_sub+0x50/0x80 [ 33.826096] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.826756] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.827438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.828108] kthread+0x257/0x310 [ 33.828514] ? __pfx_kthread+0x10/0x10 [ 33.829036] ret_from_fork+0x41/0x80 [ 33.829524] ? __pfx_kthread+0x10/0x10 [ 33.829949] ret_from_fork_asm+0x1a/0x30 [ 33.830556] </TASK> [ 33.831011] [ 33.831175] Allocated by task 272: [ 33.831596] kasan_save_stack+0x3d/0x60 [ 33.831998] kasan_save_track+0x18/0x40 [ 33.832471] kasan_save_alloc_info+0x3b/0x50 [ 33.832992] __kasan_kmalloc+0xb7/0xc0 [ 33.833314] __kmalloc_cache_noprof+0x184/0x410 [ 33.833978] kasan_atomics+0x96/0x310 [ 33.834440] kunit_try_run_case+0x1b3/0x490 [ 33.834992] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.835674] kthread+0x257/0x310 [ 33.836112] ret_from_fork+0x41/0x80 [ 33.836563] ret_from_fork_asm+0x1a/0x30 [ 33.837177] [ 33.837396] The buggy address belongs to the object at ffff888102a0ec00 [ 33.837396] which belongs to the cache kmalloc-64 of size 64 [ 33.838526] The buggy address is located 0 bytes to the right of [ 33.838526] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.839911] [ 33.840084] The buggy address belongs to the physical page: [ 33.840657] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.841468] flags: 0x200000000000000(node=0|zone=2) [ 33.842082] page_type: f5(slab) [ 33.842543] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.843370] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.844217] page dumped because: kasan: bad access detected [ 33.844806] [ 33.845081] Memory state around the buggy address: [ 33.845538] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.846276] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.846971] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.847631] ^ [ 33.848210] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.848987] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.849617] ================================================================== [ 32.378675] ================================================================== [ 32.379240] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 32.381129] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.381668] [ 32.381919] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.383787] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.384190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.385043] Call Trace: [ 32.385367] <TASK> [ 32.385740] dump_stack_lvl+0x73/0xb0 [ 32.386394] print_report+0xd1/0x640 [ 32.387119] ? __virt_addr_valid+0x1db/0x2d0 [ 32.387637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.388369] kasan_report+0x102/0x140 [ 32.388729] ? kasan_atomics_helper+0x566/0x5450 [ 32.389288] ? kasan_atomics_helper+0x566/0x5450 [ 32.389977] kasan_check_range+0x10c/0x1c0 [ 32.390383] __kasan_check_write+0x18/0x20 [ 32.390959] kasan_atomics_helper+0x566/0x5450 [ 32.391463] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.392177] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.392586] ? kasan_atomics+0x153/0x310 [ 32.393110] kasan_atomics+0x1dd/0x310 [ 32.393499] ? __pfx_kasan_atomics+0x10/0x10 [ 32.393984] ? __pfx_read_tsc+0x10/0x10 [ 32.394396] ? ktime_get_ts64+0x86/0x230 [ 32.394950] kunit_try_run_case+0x1b3/0x490 [ 32.395463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.395963] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.396412] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.397534] ? __kthread_parkme+0x82/0x160 [ 32.398301] ? preempt_count_sub+0x50/0x80 [ 32.398836] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.399391] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.399993] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.400512] kthread+0x257/0x310 [ 32.401006] ? __pfx_kthread+0x10/0x10 [ 32.401365] ret_from_fork+0x41/0x80 [ 32.401928] ? __pfx_kthread+0x10/0x10 [ 32.402311] ret_from_fork_asm+0x1a/0x30 [ 32.402753] </TASK> [ 32.403114] [ 32.403339] Allocated by task 272: [ 32.403717] kasan_save_stack+0x3d/0x60 [ 32.404195] kasan_save_track+0x18/0x40 [ 32.404607] kasan_save_alloc_info+0x3b/0x50 [ 32.405130] __kasan_kmalloc+0xb7/0xc0 [ 32.405529] __kmalloc_cache_noprof+0x184/0x410 [ 32.405994] kasan_atomics+0x96/0x310 [ 32.406463] kunit_try_run_case+0x1b3/0x490 [ 32.407022] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.407478] kthread+0x257/0x310 [ 32.407864] ret_from_fork+0x41/0x80 [ 32.408319] ret_from_fork_asm+0x1a/0x30 [ 32.408842] [ 32.409110] The buggy address belongs to the object at ffff888102a0ec00 [ 32.409110] which belongs to the cache kmalloc-64 of size 64 [ 32.409989] The buggy address is located 0 bytes to the right of [ 32.409989] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.410900] [ 32.411163] The buggy address belongs to the physical page: [ 32.411815] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.412528] flags: 0x200000000000000(node=0|zone=2) [ 32.413054] page_type: f5(slab) [ 32.413483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.414147] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.415015] page dumped because: kasan: bad access detected [ 32.415479] [ 32.415659] Memory state around the buggy address: [ 32.416219] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.416814] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.417569] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.418152] ^ [ 32.418645] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.419095] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.419999] ================================================================== [ 33.280875] ================================================================== [ 33.281533] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 33.282834] Read of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 33.283302] [ 33.283586] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 33.284966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 33.285339] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 33.285971] Call Trace: [ 33.286377] <TASK> [ 33.286664] dump_stack_lvl+0x73/0xb0 [ 33.287168] print_report+0xd1/0x640 [ 33.287817] ? __virt_addr_valid+0x1db/0x2d0 [ 33.288241] ? kasan_complete_mode_report_info+0x2a/0x200 [ 33.289002] kasan_report+0x102/0x140 [ 33.289493] ? kasan_atomics_helper+0x4a1e/0x5450 [ 33.289875] ? kasan_atomics_helper+0x4a1e/0x5450 [ 33.290843] __asan_report_load4_noabort+0x18/0x20 [ 33.291492] kasan_atomics_helper+0x4a1e/0x5450 [ 33.292043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 33.292445] ? __kmalloc_cache_noprof+0x184/0x410 [ 33.293091] ? kasan_atomics+0x153/0x310 [ 33.293621] kasan_atomics+0x1dd/0x310 [ 33.294213] ? __pfx_kasan_atomics+0x10/0x10 [ 33.294618] ? __pfx_read_tsc+0x10/0x10 [ 33.295443] ? ktime_get_ts64+0x86/0x230 [ 33.295833] kunit_try_run_case+0x1b3/0x490 [ 33.296388] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.297155] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 33.297605] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 33.298588] ? __kthread_parkme+0x82/0x160 [ 33.298991] ? preempt_count_sub+0x50/0x80 [ 33.299621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 33.300078] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 33.300854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.301460] kthread+0x257/0x310 [ 33.302096] ? __pfx_kthread+0x10/0x10 [ 33.302422] ret_from_fork+0x41/0x80 [ 33.303106] ? __pfx_kthread+0x10/0x10 [ 33.303519] ret_from_fork_asm+0x1a/0x30 [ 33.304076] </TASK> [ 33.304428] [ 33.304729] Allocated by task 272: [ 33.305013] kasan_save_stack+0x3d/0x60 [ 33.305524] kasan_save_track+0x18/0x40 [ 33.305952] kasan_save_alloc_info+0x3b/0x50 [ 33.306532] __kasan_kmalloc+0xb7/0xc0 [ 33.307116] __kmalloc_cache_noprof+0x184/0x410 [ 33.307608] kasan_atomics+0x96/0x310 [ 33.308338] kunit_try_run_case+0x1b3/0x490 [ 33.309206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 33.309712] kthread+0x257/0x310 [ 33.310769] ret_from_fork+0x41/0x80 [ 33.311371] ret_from_fork_asm+0x1a/0x30 [ 33.312132] [ 33.312325] The buggy address belongs to the object at ffff888102a0ec00 [ 33.312325] which belongs to the cache kmalloc-64 of size 64 [ 33.313875] The buggy address is located 0 bytes to the right of [ 33.313875] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 33.315425] [ 33.315666] The buggy address belongs to the physical page: [ 33.316715] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 33.317402] flags: 0x200000000000000(node=0|zone=2) [ 33.318064] page_type: f5(slab) [ 33.318325] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 33.319478] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 33.320156] page dumped because: kasan: bad access detected [ 33.320938] [ 33.321419] Memory state around the buggy address: [ 33.321637] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.322812] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 33.323461] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 33.324271] ^ [ 33.324747] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.325354] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.325946] ================================================================== [ 32.058845] ================================================================== [ 32.059904] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 32.060759] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.061611] [ 32.062010] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.063611] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.064287] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.065228] Call Trace: [ 32.065864] <TASK> [ 32.066395] dump_stack_lvl+0x73/0xb0 [ 32.067039] print_report+0xd1/0x640 [ 32.067661] ? __virt_addr_valid+0x1db/0x2d0 [ 32.068282] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.069191] kasan_report+0x102/0x140 [ 32.069728] ? kasan_atomics_helper+0x4ba4/0x5450 [ 32.070517] ? kasan_atomics_helper+0x4ba4/0x5450 [ 32.071127] __asan_report_store4_noabort+0x1b/0x30 [ 32.072009] kasan_atomics_helper+0x4ba4/0x5450 [ 32.072718] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.073381] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.074021] ? kasan_atomics+0x153/0x310 [ 32.074749] kasan_atomics+0x1dd/0x310 [ 32.075298] ? __pfx_kasan_atomics+0x10/0x10 [ 32.076094] ? __pfx_read_tsc+0x10/0x10 [ 32.076673] ? ktime_get_ts64+0x86/0x230 [ 32.077219] kunit_try_run_case+0x1b3/0x490 [ 32.078224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.078735] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.079598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.080316] ? __kthread_parkme+0x82/0x160 [ 32.080852] ? preempt_count_sub+0x50/0x80 [ 32.081303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.081933] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.082770] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.083418] kthread+0x257/0x310 [ 32.084028] ? __pfx_kthread+0x10/0x10 [ 32.084752] ret_from_fork+0x41/0x80 [ 32.085175] ? __pfx_kthread+0x10/0x10 [ 32.085788] ret_from_fork_asm+0x1a/0x30 [ 32.086325] </TASK> [ 32.086703] [ 32.086942] Allocated by task 272: [ 32.087293] kasan_save_stack+0x3d/0x60 [ 32.088060] kasan_save_track+0x18/0x40 [ 32.088616] kasan_save_alloc_info+0x3b/0x50 [ 32.089387] __kasan_kmalloc+0xb7/0xc0 [ 32.090020] __kmalloc_cache_noprof+0x184/0x410 [ 32.090601] kasan_atomics+0x96/0x310 [ 32.091117] kunit_try_run_case+0x1b3/0x490 [ 32.091729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.092315] kthread+0x257/0x310 [ 32.092901] ret_from_fork+0x41/0x80 [ 32.093533] ret_from_fork_asm+0x1a/0x30 [ 32.094335] [ 32.094590] The buggy address belongs to the object at ffff888102a0ec00 [ 32.094590] which belongs to the cache kmalloc-64 of size 64 [ 32.095984] The buggy address is located 0 bytes to the right of [ 32.095984] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.097211] [ 32.097383] The buggy address belongs to the physical page: [ 32.098467] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.099257] flags: 0x200000000000000(node=0|zone=2) [ 32.099993] page_type: f5(slab) [ 32.100459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.101482] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.102316] page dumped because: kasan: bad access detected [ 32.102978] [ 32.103234] Memory state around the buggy address: [ 32.103880] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.104594] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.105660] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.106513] ^ [ 32.106831] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.107545] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.108563] ================================================================== [ 32.333481] ================================================================== [ 32.334185] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 32.335257] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.336099] [ 32.336398] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.337358] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.337745] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.338675] Call Trace: [ 32.338983] <TASK> [ 32.339361] dump_stack_lvl+0x73/0xb0 [ 32.339945] print_report+0xd1/0x640 [ 32.340487] ? __virt_addr_valid+0x1db/0x2d0 [ 32.340985] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.341616] kasan_report+0x102/0x140 [ 32.341988] ? kasan_atomics_helper+0x4b3c/0x5450 [ 32.342436] ? kasan_atomics_helper+0x4b3c/0x5450 [ 32.343127] __asan_report_store4_noabort+0x1b/0x30 [ 32.343581] kasan_atomics_helper+0x4b3c/0x5450 [ 32.344309] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.344746] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.345460] ? kasan_atomics+0x153/0x310 [ 32.346104] kasan_atomics+0x1dd/0x310 [ 32.346574] ? __pfx_kasan_atomics+0x10/0x10 [ 32.347216] ? __pfx_read_tsc+0x10/0x10 [ 32.347845] ? ktime_get_ts64+0x86/0x230 [ 32.348220] kunit_try_run_case+0x1b3/0x490 [ 32.348820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.349403] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.349906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.350570] ? __kthread_parkme+0x82/0x160 [ 32.351067] ? preempt_count_sub+0x50/0x80 [ 32.351557] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.352227] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.352919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.353589] kthread+0x257/0x310 [ 32.354014] ? __pfx_kthread+0x10/0x10 [ 32.354482] ret_from_fork+0x41/0x80 [ 32.354999] ? __pfx_kthread+0x10/0x10 [ 32.355514] ret_from_fork_asm+0x1a/0x30 [ 32.356083] </TASK> [ 32.356377] [ 32.356708] Allocated by task 272: [ 32.357083] kasan_save_stack+0x3d/0x60 [ 32.357509] kasan_save_track+0x18/0x40 [ 32.358122] kasan_save_alloc_info+0x3b/0x50 [ 32.358513] __kasan_kmalloc+0xb7/0xc0 [ 32.359152] __kmalloc_cache_noprof+0x184/0x410 [ 32.359636] kasan_atomics+0x96/0x310 [ 32.360128] kunit_try_run_case+0x1b3/0x490 [ 32.360641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.361220] kthread+0x257/0x310 [ 32.361700] ret_from_fork+0x41/0x80 [ 32.362225] ret_from_fork_asm+0x1a/0x30 [ 32.362577] [ 32.363315] The buggy address belongs to the object at ffff888102a0ec00 [ 32.363315] which belongs to the cache kmalloc-64 of size 64 [ 32.364508] The buggy address is located 0 bytes to the right of [ 32.364508] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.365749] [ 32.366216] The buggy address belongs to the physical page: [ 32.366851] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.367569] flags: 0x200000000000000(node=0|zone=2) [ 32.368098] page_type: f5(slab) [ 32.368395] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.369636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.370872] page dumped because: kasan: bad access detected [ 32.371331] [ 32.371816] Memory state around the buggy address: [ 32.372475] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.373251] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.374108] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.375108] ^ [ 32.375608] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.376489] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.377580] ================================================================== [ 34.058127] ================================================================== [ 34.059017] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 34.059880] Write of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.060745] [ 34.061188] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.062050] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.062595] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.063470] Call Trace: [ 34.064001] <TASK> [ 34.064267] dump_stack_lvl+0x73/0xb0 [ 34.064677] print_report+0xd1/0x640 [ 34.065055] ? __virt_addr_valid+0x1db/0x2d0 [ 34.065323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.065576] kasan_report+0x102/0x140 [ 34.066001] ? kasan_atomics_helper+0x194b/0x5450 [ 34.067652] ? kasan_atomics_helper+0x194b/0x5450 [ 34.068338] kasan_check_range+0x10c/0x1c0 [ 34.068997] __kasan_check_write+0x18/0x20 [ 34.069488] kasan_atomics_helper+0x194b/0x5450 [ 34.070122] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.070782] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.071441] ? kasan_atomics+0x153/0x310 [ 34.071906] kasan_atomics+0x1dd/0x310 [ 34.072724] ? __pfx_kasan_atomics+0x10/0x10 [ 34.073375] ? __pfx_read_tsc+0x10/0x10 [ 34.074062] ? ktime_get_ts64+0x86/0x230 [ 34.074531] kunit_try_run_case+0x1b3/0x490 [ 34.075900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.076316] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.077063] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.077694] ? __kthread_parkme+0x82/0x160 [ 34.078550] ? preempt_count_sub+0x50/0x80 [ 34.079225] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.079741] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.080832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.081560] kthread+0x257/0x310 [ 34.082577] ? __pfx_kthread+0x10/0x10 [ 34.082999] ret_from_fork+0x41/0x80 [ 34.083638] ? __pfx_kthread+0x10/0x10 [ 34.084365] ret_from_fork_asm+0x1a/0x30 [ 34.085309] </TASK> [ 34.085617] [ 34.085819] Allocated by task 272: [ 34.086410] kasan_save_stack+0x3d/0x60 [ 34.087064] kasan_save_track+0x18/0x40 [ 34.087562] kasan_save_alloc_info+0x3b/0x50 [ 34.088181] __kasan_kmalloc+0xb7/0xc0 [ 34.088662] __kmalloc_cache_noprof+0x184/0x410 [ 34.089323] kasan_atomics+0x96/0x310 [ 34.089829] kunit_try_run_case+0x1b3/0x490 [ 34.090212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.090722] kthread+0x257/0x310 [ 34.091072] ret_from_fork+0x41/0x80 [ 34.091516] ret_from_fork_asm+0x1a/0x30 [ 34.092027] [ 34.092199] The buggy address belongs to the object at ffff888102a0ec00 [ 34.092199] which belongs to the cache kmalloc-64 of size 64 [ 34.093534] The buggy address is located 0 bytes to the right of [ 34.093534] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.094854] [ 34.095147] The buggy address belongs to the physical page: [ 34.095805] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.096707] flags: 0x200000000000000(node=0|zone=2) [ 34.097324] page_type: f5(slab) [ 34.097840] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.098666] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.099479] page dumped because: kasan: bad access detected [ 34.100125] [ 34.100437] Memory state around the buggy address: [ 34.101107] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.101847] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.102537] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.103325] ^ [ 34.103854] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.104629] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.105410] ================================================================== [ 34.307893] ================================================================== [ 34.308620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 34.309273] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.309774] [ 34.310254] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.312480] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.313560] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.315092] Call Trace: [ 34.315403] <TASK> [ 34.315752] dump_stack_lvl+0x73/0xb0 [ 34.316187] print_report+0xd1/0x640 [ 34.316736] ? __virt_addr_valid+0x1db/0x2d0 [ 34.317437] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.318066] kasan_report+0x102/0x140 [ 34.318636] ? kasan_atomics_helper+0x4f32/0x5450 [ 34.319225] ? kasan_atomics_helper+0x4f32/0x5450 [ 34.319840] __asan_report_load8_noabort+0x18/0x20 [ 34.320739] kasan_atomics_helper+0x4f32/0x5450 [ 34.321357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.322000] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.322611] ? kasan_atomics+0x153/0x310 [ 34.323367] kasan_atomics+0x1dd/0x310 [ 34.323938] ? __pfx_kasan_atomics+0x10/0x10 [ 34.324534] ? __pfx_read_tsc+0x10/0x10 [ 34.325155] ? ktime_get_ts64+0x86/0x230 [ 34.325699] kunit_try_run_case+0x1b3/0x490 [ 34.326146] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.326856] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.327377] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.328106] ? __kthread_parkme+0x82/0x160 [ 34.328727] ? preempt_count_sub+0x50/0x80 [ 34.329236] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.329937] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.330592] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.331437] kthread+0x257/0x310 [ 34.332011] ? __pfx_kthread+0x10/0x10 [ 34.332523] ret_from_fork+0x41/0x80 [ 34.333086] ? __pfx_kthread+0x10/0x10 [ 34.333624] ret_from_fork_asm+0x1a/0x30 [ 34.334367] </TASK> [ 34.334843] [ 34.335051] Allocated by task 272: [ 34.335508] kasan_save_stack+0x3d/0x60 [ 34.336030] kasan_save_track+0x18/0x40 [ 34.336665] kasan_save_alloc_info+0x3b/0x50 [ 34.337254] __kasan_kmalloc+0xb7/0xc0 [ 34.337670] __kmalloc_cache_noprof+0x184/0x410 [ 34.338244] kasan_atomics+0x96/0x310 [ 34.338954] kunit_try_run_case+0x1b3/0x490 [ 34.339287] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.340255] kthread+0x257/0x310 [ 34.340829] ret_from_fork+0x41/0x80 [ 34.341251] ret_from_fork_asm+0x1a/0x30 [ 34.341896] [ 34.342162] The buggy address belongs to the object at ffff888102a0ec00 [ 34.342162] which belongs to the cache kmalloc-64 of size 64 [ 34.343405] The buggy address is located 0 bytes to the right of [ 34.343405] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.344590] [ 34.345031] The buggy address belongs to the physical page: [ 34.345501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.346322] flags: 0x200000000000000(node=0|zone=2) [ 34.346951] page_type: f5(slab) [ 34.347346] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.348298] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.349089] page dumped because: kasan: bad access detected [ 34.349623] [ 34.349953] Memory state around the buggy address: [ 34.350571] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.351386] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.352046] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.352895] ^ [ 34.353371] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.354312] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.355287] ================================================================== [ 32.462526] ================================================================== [ 32.463425] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 32.464436] Write of size 4 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 32.465316] [ 32.465606] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 32.466594] Tainted: [B]=BAD_PAGE, [N]=TEST [ 32.467226] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 32.468180] Call Trace: [ 32.468557] <TASK> [ 32.469050] dump_stack_lvl+0x73/0xb0 [ 32.469531] print_report+0xd1/0x640 [ 32.470110] ? __virt_addr_valid+0x1db/0x2d0 [ 32.470642] ? kasan_complete_mode_report_info+0x2a/0x200 [ 32.471488] kasan_report+0x102/0x140 [ 32.472054] ? kasan_atomics_helper+0x698/0x5450 [ 32.472577] ? kasan_atomics_helper+0x698/0x5450 [ 32.473225] kasan_check_range+0x10c/0x1c0 [ 32.473711] __kasan_check_write+0x18/0x20 [ 32.474414] kasan_atomics_helper+0x698/0x5450 [ 32.475095] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 32.476143] ? __kmalloc_cache_noprof+0x184/0x410 [ 32.476487] ? kasan_atomics+0x153/0x310 [ 32.477086] kasan_atomics+0x1dd/0x310 [ 32.477496] ? __pfx_kasan_atomics+0x10/0x10 [ 32.477830] ? __pfx_read_tsc+0x10/0x10 [ 32.478326] ? ktime_get_ts64+0x86/0x230 [ 32.478676] kunit_try_run_case+0x1b3/0x490 [ 32.479024] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.479976] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 32.480397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 32.480954] ? __kthread_parkme+0x82/0x160 [ 32.481546] ? preempt_count_sub+0x50/0x80 [ 32.482191] ? __pfx_kunit_try_run_case+0x10/0x10 [ 32.482822] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 32.483504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.484142] kthread+0x257/0x310 [ 32.484746] ? __pfx_kthread+0x10/0x10 [ 32.485288] ret_from_fork+0x41/0x80 [ 32.485629] ? __pfx_kthread+0x10/0x10 [ 32.486075] ret_from_fork_asm+0x1a/0x30 [ 32.486486] </TASK> [ 32.486886] [ 32.487160] Allocated by task 272: [ 32.488016] kasan_save_stack+0x3d/0x60 [ 32.488477] kasan_save_track+0x18/0x40 [ 32.488953] kasan_save_alloc_info+0x3b/0x50 [ 32.489663] __kasan_kmalloc+0xb7/0xc0 [ 32.490406] __kmalloc_cache_noprof+0x184/0x410 [ 32.491047] kasan_atomics+0x96/0x310 [ 32.491524] kunit_try_run_case+0x1b3/0x490 [ 32.491944] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 32.492487] kthread+0x257/0x310 [ 32.492805] ret_from_fork+0x41/0x80 [ 32.493297] ret_from_fork_asm+0x1a/0x30 [ 32.493650] [ 32.494059] The buggy address belongs to the object at ffff888102a0ec00 [ 32.494059] which belongs to the cache kmalloc-64 of size 64 [ 32.495182] The buggy address is located 0 bytes to the right of [ 32.495182] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 32.496330] [ 32.496506] The buggy address belongs to the physical page: [ 32.497247] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 32.497971] flags: 0x200000000000000(node=0|zone=2) [ 32.498557] page_type: f5(slab) [ 32.499093] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 32.499966] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 32.500712] page dumped because: kasan: bad access detected [ 32.501351] [ 32.501610] Memory state around the buggy address: [ 32.502172] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.502923] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 32.503623] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 32.504352] ^ [ 32.504947] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.505671] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 32.506403] ================================================================== [ 34.581619] ================================================================== [ 34.582210] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 34.583116] Read of size 8 at addr ffff888102a0ec30 by task kunit_try_catch/272 [ 34.583778] [ 34.584072] CPU: 1 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241205 #1 [ 34.585425] Tainted: [B]=BAD_PAGE, [N]=TEST [ 34.586023] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 34.586998] Call Trace: [ 34.587384] <TASK> [ 34.587945] dump_stack_lvl+0x73/0xb0 [ 34.588325] print_report+0xd1/0x640 [ 34.589019] ? __virt_addr_valid+0x1db/0x2d0 [ 34.589632] ? kasan_complete_mode_report_info+0x2a/0x200 [ 34.590441] kasan_report+0x102/0x140 [ 34.591007] ? kasan_atomics_helper+0x4f73/0x5450 [ 34.591742] ? kasan_atomics_helper+0x4f73/0x5450 [ 34.592501] __asan_report_load8_noabort+0x18/0x20 [ 34.593208] kasan_atomics_helper+0x4f73/0x5450 [ 34.593877] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 34.594357] ? __kmalloc_cache_noprof+0x184/0x410 [ 34.595091] ? kasan_atomics+0x153/0x310 [ 34.595821] kasan_atomics+0x1dd/0x310 [ 34.596496] ? __pfx_kasan_atomics+0x10/0x10 [ 34.597047] ? __pfx_read_tsc+0x10/0x10 [ 34.597584] ? ktime_get_ts64+0x86/0x230 [ 34.598224] kunit_try_run_case+0x1b3/0x490 [ 34.598817] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.599399] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 34.600042] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 34.600717] ? __kthread_parkme+0x82/0x160 [ 34.601243] ? preempt_count_sub+0x50/0x80 [ 34.601765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 34.602461] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 34.603330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.604094] kthread+0x257/0x310 [ 34.604533] ? __pfx_kthread+0x10/0x10 [ 34.604964] ret_from_fork+0x41/0x80 [ 34.605521] ? __pfx_kthread+0x10/0x10 [ 34.605992] ret_from_fork_asm+0x1a/0x30 [ 34.606407] </TASK> [ 34.606648] [ 34.607019] Allocated by task 272: [ 34.607549] kasan_save_stack+0x3d/0x60 [ 34.607930] kasan_save_track+0x18/0x40 [ 34.608449] kasan_save_alloc_info+0x3b/0x50 [ 34.609016] __kasan_kmalloc+0xb7/0xc0 [ 34.609476] __kmalloc_cache_noprof+0x184/0x410 [ 34.609854] kasan_atomics+0x96/0x310 [ 34.610519] kunit_try_run_case+0x1b3/0x490 [ 34.610875] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 34.611510] kthread+0x257/0x310 [ 34.612070] ret_from_fork+0x41/0x80 [ 34.612470] ret_from_fork_asm+0x1a/0x30 [ 34.613419] [ 34.613600] The buggy address belongs to the object at ffff888102a0ec00 [ 34.613600] which belongs to the cache kmalloc-64 of size 64 [ 34.614262] The buggy address is located 0 bytes to the right of [ 34.614262] allocated 48-byte region [ffff888102a0ec00, ffff888102a0ec30) [ 34.615080] [ 34.615504] The buggy address belongs to the physical page: [ 34.616395] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102a0e [ 34.617231] flags: 0x200000000000000(node=0|zone=2) [ 34.617828] page_type: f5(slab) [ 34.618235] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 34.618985] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 34.619729] page dumped because: kasan: bad access detected [ 34.620358] [ 34.620589] Memory state around the buggy address: [ 34.621160] ffff888102a0eb00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.621897] ffff888102a0eb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 34.622475] >ffff888102a0ec00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 34.623261] ^ [ 34.623806] ffff888102a0ec80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.624559] ffff888102a0ed00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 34.625360] ==================================================================