Date
Dec. 6, 2024, 3:11 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 35.288398] ================================================================== [ 35.289036] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 35.289963] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.290976] [ 35.291432] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.292501] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.293182] Hardware name: linux,dummy-virt (DT) [ 35.293913] Call trace: [ 35.294418] show_stack+0x20/0x38 (C) [ 35.295088] dump_stack_lvl+0x8c/0xd0 [ 35.295830] print_report+0x118/0x5e0 [ 35.296442] kasan_report+0xc8/0x118 [ 35.297155] kasan_check_range+0x100/0x1a8 [ 35.297906] __kasan_check_read+0x20/0x30 [ 35.298598] kasan_atomics_helper+0x2b0/0x4858 [ 35.299290] kasan_atomics+0x198/0x2e8 [ 35.300003] kunit_try_run_case+0x14c/0x3d0 [ 35.300637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.301485] kthread+0x24c/0x2d0 [ 35.302075] ret_from_fork+0x10/0x20 [ 35.302729] [ 35.303230] Allocated by task 254: [ 35.303786] kasan_save_stack+0x3c/0x68 [ 35.304483] kasan_save_track+0x20/0x40 [ 35.305268] kasan_save_alloc_info+0x40/0x58 [ 35.305868] __kasan_kmalloc+0xd4/0xd8 [ 35.306155] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.306441] kasan_atomics+0xb8/0x2e8 [ 35.306894] kunit_try_run_case+0x14c/0x3d0 [ 35.307583] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.308368] kthread+0x24c/0x2d0 [ 35.308964] ret_from_fork+0x10/0x20 [ 35.309491] [ 35.309932] The buggy address belongs to the object at fff00000c69ef080 [ 35.309932] which belongs to the cache kmalloc-64 of size 64 [ 35.311087] The buggy address is located 0 bytes to the right of [ 35.311087] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.312646] [ 35.313033] The buggy address belongs to the physical page: [ 35.313852] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.314794] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.315740] page_type: f5(slab) [ 35.316287] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.317194] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.318137] page dumped because: kasan: bad access detected [ 35.318907] [ 35.319272] Memory state around the buggy address: [ 35.320002] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.320874] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.321724] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.322601] ^ [ 35.323273] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.324137] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.324841] ================================================================== [ 37.472359] ================================================================== [ 37.473319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 37.474922] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.475923] [ 37.476303] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.477375] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.478010] Hardware name: linux,dummy-virt (DT) [ 37.478622] Call trace: [ 37.479097] show_stack+0x20/0x38 (C) [ 37.479717] dump_stack_lvl+0x8c/0xd0 [ 37.480335] print_report+0x118/0x5e0 [ 37.481003] kasan_report+0xc8/0x118 [ 37.481653] __asan_report_load8_noabort+0x20/0x30 [ 37.482333] kasan_atomics_helper+0x3e10/0x4858 [ 37.483035] kasan_atomics+0x198/0x2e8 [ 37.483608] kunit_try_run_case+0x14c/0x3d0 [ 37.484311] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.485132] kthread+0x24c/0x2d0 [ 37.485692] ret_from_fork+0x10/0x20 [ 37.486380] [ 37.486768] Allocated by task 254: [ 37.487344] kasan_save_stack+0x3c/0x68 [ 37.487888] kasan_save_track+0x20/0x40 [ 37.488539] kasan_save_alloc_info+0x40/0x58 [ 37.489192] __kasan_kmalloc+0xd4/0xd8 [ 37.489812] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.490500] kasan_atomics+0xb8/0x2e8 [ 37.491145] kunit_try_run_case+0x14c/0x3d0 [ 37.491736] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.492490] kthread+0x24c/0x2d0 [ 37.493097] ret_from_fork+0x10/0x20 [ 37.493678] [ 37.494050] The buggy address belongs to the object at fff00000c69ef080 [ 37.494050] which belongs to the cache kmalloc-64 of size 64 [ 37.495318] The buggy address is located 0 bytes to the right of [ 37.495318] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.496710] [ 37.497094] The buggy address belongs to the physical page: [ 37.497752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.498769] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.499528] page_type: f5(slab) [ 37.500100] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.500836] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.501811] page dumped because: kasan: bad access detected [ 37.502561] [ 37.502949] Memory state around the buggy address: [ 37.503593] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.504441] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.505318] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.506131] ^ [ 37.506780] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.507630] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.508383] ================================================================== [ 36.052666] ================================================================== [ 36.053437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 36.054353] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.055384] [ 36.055874] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.057115] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.057756] Hardware name: linux,dummy-virt (DT) [ 36.058402] Call trace: [ 36.058850] show_stack+0x20/0x38 (C) [ 36.059580] dump_stack_lvl+0x8c/0xd0 [ 36.060240] print_report+0x118/0x5e0 [ 36.060917] kasan_report+0xc8/0x118 [ 36.061625] kasan_check_range+0x100/0x1a8 [ 36.062341] __kasan_check_write+0x20/0x30 [ 36.063026] kasan_atomics_helper+0xa6c/0x4858 [ 36.063745] kasan_atomics+0x198/0x2e8 [ 36.064388] kunit_try_run_case+0x14c/0x3d0 [ 36.065113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.065885] kthread+0x24c/0x2d0 [ 36.066431] ret_from_fork+0x10/0x20 [ 36.067043] [ 36.067371] Allocated by task 254: [ 36.067953] kasan_save_stack+0x3c/0x68 [ 36.068461] kasan_save_track+0x20/0x40 [ 36.069109] kasan_save_alloc_info+0x40/0x58 [ 36.069734] __kasan_kmalloc+0xd4/0xd8 [ 36.070365] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.071055] kasan_atomics+0xb8/0x2e8 [ 36.071570] kunit_try_run_case+0x14c/0x3d0 [ 36.072245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.072923] kthread+0x24c/0x2d0 [ 36.073497] ret_from_fork+0x10/0x20 [ 36.073985] [ 36.074357] The buggy address belongs to the object at fff00000c69ef080 [ 36.074357] which belongs to the cache kmalloc-64 of size 64 [ 36.075625] The buggy address is located 0 bytes to the right of [ 36.075625] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.076844] [ 36.077220] The buggy address belongs to the physical page: [ 36.077998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.078799] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.079696] page_type: f5(slab) [ 36.080265] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.081229] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.082196] page dumped because: kasan: bad access detected [ 36.082870] [ 36.083244] Memory state around the buggy address: [ 36.084130] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.084933] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.085998] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.086776] ^ [ 36.087088] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.087453] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.088159] ================================================================== [ 35.825236] ================================================================== [ 35.826140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 35.826973] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.827957] [ 35.828374] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.829678] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.830460] Hardware name: linux,dummy-virt (DT) [ 35.831186] Call trace: [ 35.831676] show_stack+0x20/0x38 (C) [ 35.832303] dump_stack_lvl+0x8c/0xd0 [ 35.832983] print_report+0x118/0x5e0 [ 35.833535] kasan_report+0xc8/0x118 [ 35.834195] kasan_check_range+0x100/0x1a8 [ 35.834909] __kasan_check_write+0x20/0x30 [ 35.835628] kasan_atomics_helper+0x7cc/0x4858 [ 35.836304] kasan_atomics+0x198/0x2e8 [ 35.836909] kunit_try_run_case+0x14c/0x3d0 [ 35.837565] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.838368] kthread+0x24c/0x2d0 [ 35.839008] ret_from_fork+0x10/0x20 [ 35.839650] [ 35.839967] Allocated by task 254: [ 35.840554] kasan_save_stack+0x3c/0x68 [ 35.841094] kasan_save_track+0x20/0x40 [ 35.841720] kasan_save_alloc_info+0x40/0x58 [ 35.842388] __kasan_kmalloc+0xd4/0xd8 [ 35.842918] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.843636] kasan_atomics+0xb8/0x2e8 [ 35.844130] kunit_try_run_case+0x14c/0x3d0 [ 35.844815] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.845498] kthread+0x24c/0x2d0 [ 35.846119] ret_from_fork+0x10/0x20 [ 35.846682] [ 35.847066] The buggy address belongs to the object at fff00000c69ef080 [ 35.847066] which belongs to the cache kmalloc-64 of size 64 [ 35.848158] The buggy address is located 0 bytes to the right of [ 35.848158] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.849466] [ 35.849863] The buggy address belongs to the physical page: [ 35.850614] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.851564] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.852310] page_type: f5(slab) [ 35.852895] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.853685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.854652] page dumped because: kasan: bad access detected [ 35.855352] [ 35.855783] Memory state around the buggy address: [ 35.856298] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.857208] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.858039] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.858803] ^ [ 35.859531] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.860281] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.861222] ================================================================== [ 35.327852] ================================================================== [ 35.328809] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 35.329772] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.330761] [ 35.331804] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.332875] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.333151] Hardware name: linux,dummy-virt (DT) [ 35.333425] Call trace: [ 35.333731] show_stack+0x20/0x38 (C) [ 35.334472] dump_stack_lvl+0x8c/0xd0 [ 35.335875] print_report+0x118/0x5e0 [ 35.336539] kasan_report+0xc8/0x118 [ 35.337178] __asan_report_load4_noabort+0x20/0x30 [ 35.338580] kasan_atomics_helper+0x40fc/0x4858 [ 35.339378] kasan_atomics+0x198/0x2e8 [ 35.339972] kunit_try_run_case+0x14c/0x3d0 [ 35.340740] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.341527] kthread+0x24c/0x2d0 [ 35.342112] ret_from_fork+0x10/0x20 [ 35.342804] [ 35.343223] Allocated by task 254: [ 35.343849] kasan_save_stack+0x3c/0x68 [ 35.344540] kasan_save_track+0x20/0x40 [ 35.345136] kasan_save_alloc_info+0x40/0x58 [ 35.345868] __kasan_kmalloc+0xd4/0xd8 [ 35.346540] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.347189] kasan_atomics+0xb8/0x2e8 [ 35.347872] kunit_try_run_case+0x14c/0x3d0 [ 35.348596] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.349297] kthread+0x24c/0x2d0 [ 35.349940] ret_from_fork+0x10/0x20 [ 35.350487] [ 35.350922] The buggy address belongs to the object at fff00000c69ef080 [ 35.350922] which belongs to the cache kmalloc-64 of size 64 [ 35.352232] The buggy address is located 0 bytes to the right of [ 35.352232] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.353570] [ 35.353997] The buggy address belongs to the physical page: [ 35.354838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.355752] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.356700] page_type: f5(slab) [ 35.357310] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.358268] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.359204] page dumped because: kasan: bad access detected [ 35.359922] [ 35.360279] Memory state around the buggy address: [ 35.360965] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.361902] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.362787] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.363502] ^ [ 35.364262] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365125] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.365918] ================================================================== [ 35.711921] ================================================================== [ 35.712694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 35.713658] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.714505] [ 35.714955] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.716165] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.716743] Hardware name: linux,dummy-virt (DT) [ 35.717351] Call trace: [ 35.717765] show_stack+0x20/0x38 (C) [ 35.718413] dump_stack_lvl+0x8c/0xd0 [ 35.719097] print_report+0x118/0x5e0 [ 35.719771] kasan_report+0xc8/0x118 [ 35.720346] kasan_check_range+0x100/0x1a8 [ 35.721054] __kasan_check_write+0x20/0x30 [ 35.721608] kasan_atomics_helper+0x684/0x4858 [ 35.722334] kasan_atomics+0x198/0x2e8 [ 35.723021] kunit_try_run_case+0x14c/0x3d0 [ 35.723620] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.724386] kthread+0x24c/0x2d0 [ 35.724966] ret_from_fork+0x10/0x20 [ 35.725573] [ 35.725993] Allocated by task 254: [ 35.726580] kasan_save_stack+0x3c/0x68 [ 35.727195] kasan_save_track+0x20/0x40 [ 35.727830] kasan_save_alloc_info+0x40/0x58 [ 35.728434] __kasan_kmalloc+0xd4/0xd8 [ 35.729074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.729716] kasan_atomics+0xb8/0x2e8 [ 35.730334] kunit_try_run_case+0x14c/0x3d0 [ 35.731025] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.731726] kthread+0x24c/0x2d0 [ 35.732212] ret_from_fork+0x10/0x20 [ 35.732877] [ 35.733244] The buggy address belongs to the object at fff00000c69ef080 [ 35.733244] which belongs to the cache kmalloc-64 of size 64 [ 35.734495] The buggy address is located 0 bytes to the right of [ 35.734495] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.735756] [ 35.736130] The buggy address belongs to the physical page: [ 35.736828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.737709] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.738541] page_type: f5(slab) [ 35.739065] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.739959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.740827] page dumped because: kasan: bad access detected [ 35.741601] [ 35.741968] Memory state around the buggy address: [ 35.742539] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.743461] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.744297] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.745030] ^ [ 35.745779] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.746630] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.747467] ================================================================== [ 35.749069] ================================================================== [ 35.750037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 35.751366] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.752274] [ 35.752739] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.754045] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.754729] Hardware name: linux,dummy-virt (DT) [ 35.755384] Call trace: [ 35.755898] show_stack+0x20/0x38 (C) [ 35.756529] dump_stack_lvl+0x8c/0xd0 [ 35.757233] print_report+0x118/0x5e0 [ 35.757940] kasan_report+0xc8/0x118 [ 35.758620] kasan_check_range+0x100/0x1a8 [ 35.759310] __kasan_check_write+0x20/0x30 [ 35.760064] kasan_atomics_helper+0x6ec/0x4858 [ 35.760741] kasan_atomics+0x198/0x2e8 [ 35.761446] kunit_try_run_case+0x14c/0x3d0 [ 35.762151] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.763016] kthread+0x24c/0x2d0 [ 35.763681] ret_from_fork+0x10/0x20 [ 35.764304] [ 35.764649] Allocated by task 254: [ 35.765147] kasan_save_stack+0x3c/0x68 [ 35.765839] kasan_save_track+0x20/0x40 [ 35.766323] kasan_save_alloc_info+0x40/0x58 [ 35.767020] __kasan_kmalloc+0xd4/0xd8 [ 35.767575] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.768283] kasan_atomics+0xb8/0x2e8 [ 35.768848] kunit_try_run_case+0x14c/0x3d0 [ 35.769528] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.770217] kthread+0x24c/0x2d0 [ 35.770821] ret_from_fork+0x10/0x20 [ 35.771373] [ 35.771768] The buggy address belongs to the object at fff00000c69ef080 [ 35.771768] which belongs to the cache kmalloc-64 of size 64 [ 35.772840] The buggy address is located 0 bytes to the right of [ 35.772840] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.774328] [ 35.774709] The buggy address belongs to the physical page: [ 35.775376] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.776246] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.777144] page_type: f5(slab) [ 35.777733] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.778594] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.779589] page dumped because: kasan: bad access detected [ 35.780230] [ 35.780590] Memory state around the buggy address: [ 35.781143] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.781997] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.782805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.783676] ^ [ 35.784355] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.785234] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.786095] ================================================================== [ 37.510337] ================================================================== [ 37.511264] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 37.513043] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.514617] [ 37.515125] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.516384] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.516910] Hardware name: linux,dummy-virt (DT) [ 37.517536] Call trace: [ 37.517993] show_stack+0x20/0x38 (C) [ 37.518629] dump_stack_lvl+0x8c/0xd0 [ 37.519288] print_report+0x118/0x5e0 [ 37.519881] kasan_report+0xc8/0x118 [ 37.520408] kasan_check_range+0x100/0x1a8 [ 37.521127] __kasan_check_write+0x20/0x30 [ 37.521803] kasan_atomics_helper+0x175c/0x4858 [ 37.522466] kasan_atomics+0x198/0x2e8 [ 37.523100] kunit_try_run_case+0x14c/0x3d0 [ 37.523751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.524410] kthread+0x24c/0x2d0 [ 37.525068] ret_from_fork+0x10/0x20 [ 37.525766] [ 37.526144] Allocated by task 254: [ 37.526715] kasan_save_stack+0x3c/0x68 [ 37.527251] kasan_save_track+0x20/0x40 [ 37.527890] kasan_save_alloc_info+0x40/0x58 [ 37.528425] __kasan_kmalloc+0xd4/0xd8 [ 37.529065] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.529672] kasan_atomics+0xb8/0x2e8 [ 37.530297] kunit_try_run_case+0x14c/0x3d0 [ 37.531003] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.531755] kthread+0x24c/0x2d0 [ 37.532256] ret_from_fork+0x10/0x20 [ 37.532885] [ 37.533263] The buggy address belongs to the object at fff00000c69ef080 [ 37.533263] which belongs to the cache kmalloc-64 of size 64 [ 37.534425] The buggy address is located 0 bytes to the right of [ 37.534425] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.535808] [ 37.536192] The buggy address belongs to the physical page: [ 37.536788] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.537781] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.538575] page_type: f5(slab) [ 37.539079] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.540002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.540752] page dumped because: kasan: bad access detected [ 37.541499] [ 37.541850] Memory state around the buggy address: [ 37.542435] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.543225] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.544170] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.544968] ^ [ 37.545551] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.546456] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.547275] ================================================================== [ 36.857160] ================================================================== [ 36.858010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 36.858792] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.859782] [ 36.860192] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.861236] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.861887] Hardware name: linux,dummy-virt (DT) [ 36.862575] Call trace: [ 36.863032] show_stack+0x20/0x38 (C) [ 36.863606] dump_stack_lvl+0x8c/0xd0 [ 36.864269] print_report+0x118/0x5e0 [ 36.864952] kasan_report+0xc8/0x118 [ 36.865505] kasan_check_range+0x100/0x1a8 [ 36.866220] __kasan_check_write+0x20/0x30 [ 36.866939] kasan_atomics_helper+0x1128/0x4858 [ 36.867630] kasan_atomics+0x198/0x2e8 [ 36.868142] kunit_try_run_case+0x14c/0x3d0 [ 36.868875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.869547] kthread+0x24c/0x2d0 [ 36.870156] ret_from_fork+0x10/0x20 [ 36.870840] [ 36.871221] Allocated by task 254: [ 36.871803] kasan_save_stack+0x3c/0x68 [ 36.872367] kasan_save_track+0x20/0x40 [ 36.872884] kasan_save_alloc_info+0x40/0x58 [ 36.873579] __kasan_kmalloc+0xd4/0xd8 [ 36.874149] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.874777] kasan_atomics+0xb8/0x2e8 [ 36.875371] kunit_try_run_case+0x14c/0x3d0 [ 36.875924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.876718] kthread+0x24c/0x2d0 [ 36.877211] ret_from_fork+0x10/0x20 [ 36.877811] [ 36.878143] The buggy address belongs to the object at fff00000c69ef080 [ 36.878143] which belongs to the cache kmalloc-64 of size 64 [ 36.879543] The buggy address is located 0 bytes to the right of [ 36.879543] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.881261] [ 36.881620] The buggy address belongs to the physical page: [ 36.882292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.883088] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.884012] page_type: f5(slab) [ 36.884275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.884819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.885796] page dumped because: kasan: bad access detected [ 36.886413] [ 36.886797] Memory state around the buggy address: [ 36.887491] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.888314] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.889114] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.889985] ^ [ 36.890710] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.891534] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.892360] ================================================================== [ 36.626931] ================================================================== [ 36.627674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 36.628460] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.629244] [ 36.629663] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.630851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.631360] Hardware name: linux,dummy-virt (DT) [ 36.632559] Call trace: [ 36.632940] show_stack+0x20/0x38 (C) [ 36.633869] dump_stack_lvl+0x8c/0xd0 [ 36.634398] print_report+0x118/0x5e0 [ 36.635011] kasan_report+0xc8/0x118 [ 36.635663] kasan_check_range+0x100/0x1a8 [ 36.636325] __kasan_check_write+0x20/0x30 [ 36.636962] kasan_atomics_helper+0xeb8/0x4858 [ 36.637572] kasan_atomics+0x198/0x2e8 [ 36.638217] kunit_try_run_case+0x14c/0x3d0 [ 36.638874] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.639567] kthread+0x24c/0x2d0 [ 36.640157] ret_from_fork+0x10/0x20 [ 36.640766] [ 36.641146] Allocated by task 254: [ 36.641693] kasan_save_stack+0x3c/0x68 [ 36.642260] kasan_save_track+0x20/0x40 [ 36.642889] kasan_save_alloc_info+0x40/0x58 [ 36.643455] __kasan_kmalloc+0xd4/0xd8 [ 36.644072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.644717] kasan_atomics+0xb8/0x2e8 [ 36.645241] kunit_try_run_case+0x14c/0x3d0 [ 36.645964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.646692] kthread+0x24c/0x2d0 [ 36.647278] ret_from_fork+0x10/0x20 [ 36.647896] [ 36.648226] The buggy address belongs to the object at fff00000c69ef080 [ 36.648226] which belongs to the cache kmalloc-64 of size 64 [ 36.649559] The buggy address is located 0 bytes to the right of [ 36.649559] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.650919] [ 36.651257] The buggy address belongs to the physical page: [ 36.651929] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.652846] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.653628] page_type: f5(slab) [ 36.654201] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.655040] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.656024] page dumped because: kasan: bad access detected [ 36.656758] [ 36.657128] Memory state around the buggy address: [ 36.657730] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.658545] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.659410] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.660175] ^ [ 36.660818] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.661663] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.662570] ================================================================== [ 36.931370] ================================================================== [ 36.932233] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 36.932944] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.933908] [ 36.934364] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.935649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.936184] Hardware name: linux,dummy-virt (DT) [ 36.936874] Call trace: [ 36.937342] show_stack+0x20/0x38 (C) [ 36.938032] dump_stack_lvl+0x8c/0xd0 [ 36.938669] print_report+0x118/0x5e0 [ 36.939333] kasan_report+0xc8/0x118 [ 36.939991] kasan_check_range+0x100/0x1a8 [ 36.940604] __kasan_check_write+0x20/0x30 [ 36.941292] kasan_atomics_helper+0x11f8/0x4858 [ 36.941945] kasan_atomics+0x198/0x2e8 [ 36.942543] kunit_try_run_case+0x14c/0x3d0 [ 36.943216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.944065] kthread+0x24c/0x2d0 [ 36.944687] ret_from_fork+0x10/0x20 [ 36.945271] [ 36.945674] Allocated by task 254: [ 36.946146] kasan_save_stack+0x3c/0x68 [ 36.946808] kasan_save_track+0x20/0x40 [ 36.947404] kasan_save_alloc_info+0x40/0x58 [ 36.948099] __kasan_kmalloc+0xd4/0xd8 [ 36.948612] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.949311] kasan_atomics+0xb8/0x2e8 [ 36.949959] kunit_try_run_case+0x14c/0x3d0 [ 36.950550] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.951312] kthread+0x24c/0x2d0 [ 36.951909] ret_from_fork+0x10/0x20 [ 36.952502] [ 36.952898] The buggy address belongs to the object at fff00000c69ef080 [ 36.952898] which belongs to the cache kmalloc-64 of size 64 [ 36.954179] The buggy address is located 0 bytes to the right of [ 36.954179] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.955559] [ 36.955944] The buggy address belongs to the physical page: [ 36.956588] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.957526] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.958296] page_type: f5(slab) [ 36.958792] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.959690] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.960602] page dumped because: kasan: bad access detected [ 36.961350] [ 36.961742] Memory state around the buggy address: [ 36.962350] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.963292] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.964110] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.965020] ^ [ 36.965651] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.966413] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.967260] ================================================================== [ 37.239220] ================================================================== [ 37.239964] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 37.240853] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.241564] [ 37.242015] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.243424] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.244060] Hardware name: linux,dummy-virt (DT) [ 37.244796] Call trace: [ 37.245251] show_stack+0x20/0x38 (C) [ 37.245954] dump_stack_lvl+0x8c/0xd0 [ 37.246669] print_report+0x118/0x5e0 [ 37.247282] kasan_report+0xc8/0x118 [ 37.247970] kasan_check_range+0x100/0x1a8 [ 37.248641] __kasan_check_write+0x20/0x30 [ 37.249348] kasan_atomics_helper+0x154c/0x4858 [ 37.250075] kasan_atomics+0x198/0x2e8 [ 37.250755] kunit_try_run_case+0x14c/0x3d0 [ 37.251463] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.252260] kthread+0x24c/0x2d0 [ 37.252865] ret_from_fork+0x10/0x20 [ 37.253546] [ 37.253902] Allocated by task 254: [ 37.254499] kasan_save_stack+0x3c/0x68 [ 37.255206] kasan_save_track+0x20/0x40 [ 37.255840] kasan_save_alloc_info+0x40/0x58 [ 37.256580] __kasan_kmalloc+0xd4/0xd8 [ 37.257115] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.257864] kasan_atomics+0xb8/0x2e8 [ 37.258410] kunit_try_run_case+0x14c/0x3d0 [ 37.259134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.259895] kthread+0x24c/0x2d0 [ 37.260466] ret_from_fork+0x10/0x20 [ 37.261060] [ 37.261466] The buggy address belongs to the object at fff00000c69ef080 [ 37.261466] which belongs to the cache kmalloc-64 of size 64 [ 37.262770] The buggy address is located 0 bytes to the right of [ 37.262770] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.264104] [ 37.264488] The buggy address belongs to the physical page: [ 37.265096] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.266205] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.267232] page_type: f5(slab) [ 37.267994] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.269091] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.270132] page dumped because: kasan: bad access detected [ 37.271004] [ 37.271338] Memory state around the buggy address: [ 37.272039] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.273184] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.274080] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.274911] ^ [ 37.275627] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.276525] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.277253] ================================================================== [ 37.159976] ================================================================== [ 37.161426] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 37.163096] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.164015] [ 37.164366] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.165587] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.166106] Hardware name: linux,dummy-virt (DT) [ 37.166790] Call trace: [ 37.167230] show_stack+0x20/0x38 (C) [ 37.167870] dump_stack_lvl+0x8c/0xd0 [ 37.168439] print_report+0x118/0x5e0 [ 37.169111] kasan_report+0xc8/0x118 [ 37.169766] kasan_check_range+0x100/0x1a8 [ 37.170417] __kasan_check_write+0x20/0x30 [ 37.171089] kasan_atomics_helper+0x147c/0x4858 [ 37.171767] kasan_atomics+0x198/0x2e8 [ 37.172330] kunit_try_run_case+0x14c/0x3d0 [ 37.172962] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.173786] kthread+0x24c/0x2d0 [ 37.174345] ret_from_fork+0x10/0x20 [ 37.174935] [ 37.175302] Allocated by task 254: [ 37.175811] kasan_save_stack+0x3c/0x68 [ 37.176448] kasan_save_track+0x20/0x40 [ 37.177027] kasan_save_alloc_info+0x40/0x58 [ 37.177685] __kasan_kmalloc+0xd4/0xd8 [ 37.178284] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.179000] kasan_atomics+0xb8/0x2e8 [ 37.179535] kunit_try_run_case+0x14c/0x3d0 [ 37.180216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.180889] kthread+0x24c/0x2d0 [ 37.181433] ret_from_fork+0x10/0x20 [ 37.182064] [ 37.182425] The buggy address belongs to the object at fff00000c69ef080 [ 37.182425] which belongs to the cache kmalloc-64 of size 64 [ 37.183643] The buggy address is located 0 bytes to the right of [ 37.183643] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.184975] [ 37.185356] The buggy address belongs to the physical page: [ 37.186063] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.187097] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.187875] page_type: f5(slab) [ 37.188450] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.189357] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.190326] page dumped because: kasan: bad access detected [ 37.191067] [ 37.191447] Memory state around the buggy address: [ 37.192064] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.193017] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.193774] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.194680] ^ [ 37.195357] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.196230] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.196924] ================================================================== [ 35.936931] ================================================================== [ 35.937720] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 35.938493] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.939490] [ 35.939923] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.941053] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.941685] Hardware name: linux,dummy-virt (DT) [ 35.942334] Call trace: [ 35.942831] show_stack+0x20/0x38 (C) [ 35.943439] dump_stack_lvl+0x8c/0xd0 [ 35.943988] print_report+0x118/0x5e0 [ 35.944650] kasan_report+0xc8/0x118 [ 35.945266] kasan_check_range+0x100/0x1a8 [ 35.945895] __kasan_check_write+0x20/0x30 [ 35.946611] kasan_atomics_helper+0x934/0x4858 [ 35.947339] kasan_atomics+0x198/0x2e8 [ 35.947956] kunit_try_run_case+0x14c/0x3d0 [ 35.948571] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.949391] kthread+0x24c/0x2d0 [ 35.950019] ret_from_fork+0x10/0x20 [ 35.950561] [ 35.950944] Allocated by task 254: [ 35.951526] kasan_save_stack+0x3c/0x68 [ 35.952100] kasan_save_track+0x20/0x40 [ 35.952608] kasan_save_alloc_info+0x40/0x58 [ 35.953290] __kasan_kmalloc+0xd4/0xd8 [ 35.953878] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.954591] kasan_atomics+0xb8/0x2e8 [ 35.955095] kunit_try_run_case+0x14c/0x3d0 [ 35.955826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.956625] kthread+0x24c/0x2d0 [ 35.957160] ret_from_fork+0x10/0x20 [ 35.957692] [ 35.958058] The buggy address belongs to the object at fff00000c69ef080 [ 35.958058] which belongs to the cache kmalloc-64 of size 64 [ 35.959284] The buggy address is located 0 bytes to the right of [ 35.959284] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.960651] [ 35.961032] The buggy address belongs to the physical page: [ 35.961729] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.962577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.963430] page_type: f5(slab) [ 35.964018] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.964873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.965783] page dumped because: kasan: bad access detected [ 35.966549] [ 35.966915] Memory state around the buggy address: [ 35.967617] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.968478] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.969312] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.970139] ^ [ 35.970864] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.971624] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.972430] ================================================================== [ 36.778529] ================================================================== [ 36.779284] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 36.780341] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.781285] [ 36.781699] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.782871] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.783416] Hardware name: linux,dummy-virt (DT) [ 36.783977] Call trace: [ 36.784441] show_stack+0x20/0x38 (C) [ 36.785081] dump_stack_lvl+0x8c/0xd0 [ 36.785777] print_report+0x118/0x5e0 [ 36.786343] kasan_report+0xc8/0x118 [ 36.787313] kasan_check_range+0x100/0x1a8 [ 36.788152] __kasan_check_write+0x20/0x30 [ 36.788989] kasan_atomics_helper+0x1058/0x4858 [ 36.789755] kasan_atomics+0x198/0x2e8 [ 36.790406] kunit_try_run_case+0x14c/0x3d0 [ 36.791207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.791989] kthread+0x24c/0x2d0 [ 36.792599] ret_from_fork+0x10/0x20 [ 36.793203] [ 36.793622] Allocated by task 254: [ 36.794231] kasan_save_stack+0x3c/0x68 [ 36.794872] kasan_save_track+0x20/0x40 [ 36.795555] kasan_save_alloc_info+0x40/0x58 [ 36.796233] __kasan_kmalloc+0xd4/0xd8 [ 36.796917] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.797583] kasan_atomics+0xb8/0x2e8 [ 36.798240] kunit_try_run_case+0x14c/0x3d0 [ 36.798838] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.799668] kthread+0x24c/0x2d0 [ 36.800245] ret_from_fork+0x10/0x20 [ 36.800885] [ 36.801303] The buggy address belongs to the object at fff00000c69ef080 [ 36.801303] which belongs to the cache kmalloc-64 of size 64 [ 36.802612] The buggy address is located 0 bytes to the right of [ 36.802612] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.803940] [ 36.804313] The buggy address belongs to the physical page: [ 36.805035] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.806086] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.807035] page_type: f5(slab) [ 36.807648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.808550] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.809581] page dumped because: kasan: bad access detected [ 36.810260] [ 36.810625] Memory state around the buggy address: [ 36.811254] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.812476] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.813500] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.814286] ^ [ 36.814974] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.815789] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.816660] ================================================================== [ 36.130276] ================================================================== [ 36.131576] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 36.132446] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.133121] [ 36.134326] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.135565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.136164] Hardware name: linux,dummy-virt (DT) [ 36.136802] Call trace: [ 36.137299] show_stack+0x20/0x38 (C) [ 36.137998] dump_stack_lvl+0x8c/0xd0 [ 36.138666] print_report+0x118/0x5e0 [ 36.139332] kasan_report+0xc8/0x118 [ 36.139988] __asan_report_load4_noabort+0x20/0x30 [ 36.140717] kasan_atomics_helper+0x3dcc/0x4858 [ 36.141438] kasan_atomics+0x198/0x2e8 [ 36.142079] kunit_try_run_case+0x14c/0x3d0 [ 36.142798] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.143604] kthread+0x24c/0x2d0 [ 36.144205] ret_from_fork+0x10/0x20 [ 36.144833] [ 36.145233] Allocated by task 254: [ 36.145763] kasan_save_stack+0x3c/0x68 [ 36.146442] kasan_save_track+0x20/0x40 [ 36.147114] kasan_save_alloc_info+0x40/0x58 [ 36.147848] __kasan_kmalloc+0xd4/0xd8 [ 36.148379] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.149194] kasan_atomics+0xb8/0x2e8 [ 36.149959] kunit_try_run_case+0x14c/0x3d0 [ 36.150760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.151585] kthread+0x24c/0x2d0 [ 36.152242] ret_from_fork+0x10/0x20 [ 36.152910] [ 36.153335] The buggy address belongs to the object at fff00000c69ef080 [ 36.153335] which belongs to the cache kmalloc-64 of size 64 [ 36.154607] The buggy address is located 0 bytes to the right of [ 36.154607] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.156047] [ 36.156479] The buggy address belongs to the physical page: [ 36.157140] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.158162] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.159097] page_type: f5(slab) [ 36.159629] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.160641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.161556] page dumped because: kasan: bad access detected [ 36.162215] [ 36.162651] Memory state around the buggy address: [ 36.163228] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.164158] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.164972] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.165898] ^ [ 36.166579] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.167448] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.168298] ================================================================== [ 36.012213] ================================================================== [ 36.013047] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 36.014675] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.015866] [ 36.016284] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.017754] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.018365] Hardware name: linux,dummy-virt (DT) [ 36.019073] Call trace: [ 36.019533] show_stack+0x20/0x38 (C) [ 36.020289] dump_stack_lvl+0x8c/0xd0 [ 36.021070] print_report+0x118/0x5e0 [ 36.021366] kasan_report+0xc8/0x118 [ 36.021804] kasan_check_range+0x100/0x1a8 [ 36.022619] __kasan_check_write+0x20/0x30 [ 36.023396] kasan_atomics_helper+0xa04/0x4858 [ 36.024252] kasan_atomics+0x198/0x2e8 [ 36.025049] kunit_try_run_case+0x14c/0x3d0 [ 36.025776] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.026803] kthread+0x24c/0x2d0 [ 36.027606] ret_from_fork+0x10/0x20 [ 36.028195] [ 36.028770] Allocated by task 254: [ 36.029254] kasan_save_stack+0x3c/0x68 [ 36.029896] kasan_save_track+0x20/0x40 [ 36.030473] kasan_save_alloc_info+0x40/0x58 [ 36.031121] __kasan_kmalloc+0xd4/0xd8 [ 36.031803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.032400] kasan_atomics+0xb8/0x2e8 [ 36.033076] kunit_try_run_case+0x14c/0x3d0 [ 36.033690] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.034488] kthread+0x24c/0x2d0 [ 36.035108] ret_from_fork+0x10/0x20 [ 36.035682] [ 36.036087] The buggy address belongs to the object at fff00000c69ef080 [ 36.036087] which belongs to the cache kmalloc-64 of size 64 [ 36.037223] The buggy address is located 0 bytes to the right of [ 36.037223] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.038623] [ 36.039018] The buggy address belongs to the physical page: [ 36.039751] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.040669] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.041587] page_type: f5(slab) [ 36.042124] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.043112] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.044049] page dumped because: kasan: bad access detected [ 36.044756] [ 36.045167] Memory state around the buggy address: [ 36.045802] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.046650] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.047581] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.048423] ^ [ 36.049078] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.050002] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.050979] ================================================================== [ 36.893684] ================================================================== [ 36.895146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 36.895969] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.896796] [ 36.897207] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.898441] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.899036] Hardware name: linux,dummy-virt (DT) [ 36.899633] Call trace: [ 36.900028] show_stack+0x20/0x38 (C) [ 36.900700] dump_stack_lvl+0x8c/0xd0 [ 36.901328] print_report+0x118/0x5e0 [ 36.901996] kasan_report+0xc8/0x118 [ 36.902581] kasan_check_range+0x100/0x1a8 [ 36.903281] __kasan_check_write+0x20/0x30 [ 36.903846] kasan_atomics_helper+0x1190/0x4858 [ 36.904498] kasan_atomics+0x198/0x2e8 [ 36.905175] kunit_try_run_case+0x14c/0x3d0 [ 36.905768] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.906604] kthread+0x24c/0x2d0 [ 36.907230] ret_from_fork+0x10/0x20 [ 36.907880] [ 36.908210] Allocated by task 254: [ 36.908798] kasan_save_stack+0x3c/0x68 [ 36.909388] kasan_save_track+0x20/0x40 [ 36.909986] kasan_save_alloc_info+0x40/0x58 [ 36.910534] __kasan_kmalloc+0xd4/0xd8 [ 36.911166] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.911841] kasan_atomics+0xb8/0x2e8 [ 36.912372] kunit_try_run_case+0x14c/0x3d0 [ 36.913045] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.913650] kthread+0x24c/0x2d0 [ 36.914229] ret_from_fork+0x10/0x20 [ 36.914855] [ 36.915227] The buggy address belongs to the object at fff00000c69ef080 [ 36.915227] which belongs to the cache kmalloc-64 of size 64 [ 36.916469] The buggy address is located 0 bytes to the right of [ 36.916469] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.917697] [ 36.918081] The buggy address belongs to the physical page: [ 36.918854] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.919742] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.920505] page_type: f5(slab) [ 36.921096] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.921988] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.922940] page dumped because: kasan: bad access detected [ 36.923700] [ 36.924018] Memory state around the buggy address: [ 36.924677] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.925450] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.926283] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.927079] ^ [ 36.927737] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.928588] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.929412] ================================================================== [ 37.317446] ================================================================== [ 37.319113] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 37.320094] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.321057] [ 37.321546] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.322885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.323592] Hardware name: linux,dummy-virt (DT) [ 37.324235] Call trace: [ 37.324790] show_stack+0x20/0x38 (C) [ 37.325525] dump_stack_lvl+0x8c/0xd0 [ 37.326185] print_report+0x118/0x5e0 [ 37.326854] kasan_report+0xc8/0x118 [ 37.327559] __asan_report_load8_noabort+0x20/0x30 [ 37.328352] kasan_atomics_helper+0x3db0/0x4858 [ 37.329210] kasan_atomics+0x198/0x2e8 [ 37.329778] kunit_try_run_case+0x14c/0x3d0 [ 37.330366] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.331249] kthread+0x24c/0x2d0 [ 37.331861] ret_from_fork+0x10/0x20 [ 37.332402] [ 37.332732] Allocated by task 254: [ 37.333268] kasan_save_stack+0x3c/0x68 [ 37.333873] kasan_save_track+0x20/0x40 [ 37.334506] kasan_save_alloc_info+0x40/0x58 [ 37.335067] __kasan_kmalloc+0xd4/0xd8 [ 37.335754] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.336342] kasan_atomics+0xb8/0x2e8 [ 37.336980] kunit_try_run_case+0x14c/0x3d0 [ 37.337578] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.338353] kthread+0x24c/0x2d0 [ 37.338963] ret_from_fork+0x10/0x20 [ 37.339478] [ 37.339875] The buggy address belongs to the object at fff00000c69ef080 [ 37.339875] which belongs to the cache kmalloc-64 of size 64 [ 37.341120] The buggy address is located 0 bytes to the right of [ 37.341120] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.342428] [ 37.342843] The buggy address belongs to the physical page: [ 37.343553] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.344499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.345396] page_type: f5(slab) [ 37.346011] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.346909] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.347887] page dumped because: kasan: bad access detected [ 37.348591] [ 37.348970] Memory state around the buggy address: [ 37.349669] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.350445] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.351303] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.352086] ^ [ 37.352723] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.353504] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.354362] ================================================================== [ 35.672403] ================================================================== [ 35.673230] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 35.674473] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.676146] [ 35.676810] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.677887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.678491] Hardware name: linux,dummy-virt (DT) [ 35.679115] Call trace: [ 35.679529] show_stack+0x20/0x38 (C) [ 35.680124] dump_stack_lvl+0x8c/0xd0 [ 35.680704] print_report+0x118/0x5e0 [ 35.681351] kasan_report+0xc8/0x118 [ 35.681972] kasan_check_range+0x100/0x1a8 [ 35.682650] __kasan_check_write+0x20/0x30 [ 35.683238] kasan_atomics_helper+0x61c/0x4858 [ 35.683922] kasan_atomics+0x198/0x2e8 [ 35.684607] kunit_try_run_case+0x14c/0x3d0 [ 35.685315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.686052] kthread+0x24c/0x2d0 [ 35.686672] ret_from_fork+0x10/0x20 [ 35.687274] [ 35.687682] Allocated by task 254: [ 35.688244] kasan_save_stack+0x3c/0x68 [ 35.688810] kasan_save_track+0x20/0x40 [ 35.689430] kasan_save_alloc_info+0x40/0x58 [ 35.690080] __kasan_kmalloc+0xd4/0xd8 [ 35.690717] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.691343] kasan_atomics+0xb8/0x2e8 [ 35.691977] kunit_try_run_case+0x14c/0x3d0 [ 35.692667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.693673] kthread+0x24c/0x2d0 [ 35.694286] ret_from_fork+0x10/0x20 [ 35.694785] [ 35.695169] The buggy address belongs to the object at fff00000c69ef080 [ 35.695169] which belongs to the cache kmalloc-64 of size 64 [ 35.696448] The buggy address is located 0 bytes to the right of [ 35.696448] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.697704] [ 35.698084] The buggy address belongs to the physical page: [ 35.698829] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.699731] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.700550] page_type: f5(slab) [ 35.701058] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.701938] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.702841] page dumped because: kasan: bad access detected [ 35.703599] [ 35.703922] Memory state around the buggy address: [ 35.704534] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.705381] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.706375] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.707253] ^ [ 35.708140] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.709161] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.710095] ================================================================== [ 35.974636] ================================================================== [ 35.975729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 35.976625] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.977420] [ 35.977831] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.979015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.979528] Hardware name: linux,dummy-virt (DT) [ 35.980204] Call trace: [ 35.980623] show_stack+0x20/0x38 (C) [ 35.981274] dump_stack_lvl+0x8c/0xd0 [ 35.981960] print_report+0x118/0x5e0 [ 35.982620] kasan_report+0xc8/0x118 [ 35.983235] kasan_check_range+0x100/0x1a8 [ 35.983868] __kasan_check_write+0x20/0x30 [ 35.984584] kasan_atomics_helper+0x99c/0x4858 [ 35.985262] kasan_atomics+0x198/0x2e8 [ 35.985896] kunit_try_run_case+0x14c/0x3d0 [ 35.986489] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.987338] kthread+0x24c/0x2d0 [ 35.987949] ret_from_fork+0x10/0x20 [ 35.988622] [ 35.988995] Allocated by task 254: [ 35.989455] kasan_save_stack+0x3c/0x68 [ 35.990101] kasan_save_track+0x20/0x40 [ 35.990638] kasan_save_alloc_info+0x40/0x58 [ 35.991312] __kasan_kmalloc+0xd4/0xd8 [ 35.991876] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.992469] kasan_atomics+0xb8/0x2e8 [ 35.993106] kunit_try_run_case+0x14c/0x3d0 [ 35.993777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.994472] kthread+0x24c/0x2d0 [ 35.994994] ret_from_fork+0x10/0x20 [ 35.995553] [ 35.995960] The buggy address belongs to the object at fff00000c69ef080 [ 35.995960] which belongs to the cache kmalloc-64 of size 64 [ 35.997150] The buggy address is located 0 bytes to the right of [ 35.997150] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.998399] [ 35.998800] The buggy address belongs to the physical page: [ 35.999575] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.000387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.001164] page_type: f5(slab) [ 36.001756] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.002604] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.003529] page dumped because: kasan: bad access detected [ 36.004217] [ 36.004560] Memory state around the buggy address: [ 36.005134] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.006062] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.006826] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.007749] ^ [ 36.008387] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.009193] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.010060] ================================================================== [ 37.083463] ================================================================== [ 37.084309] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 37.085243] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.086576] [ 37.086961] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.088094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.088664] Hardware name: linux,dummy-virt (DT) [ 37.089182] Call trace: [ 37.089675] show_stack+0x20/0x38 (C) [ 37.090318] dump_stack_lvl+0x8c/0xd0 [ 37.090954] print_report+0x118/0x5e0 [ 37.091605] kasan_report+0xc8/0x118 [ 37.092211] __asan_report_load8_noabort+0x20/0x30 [ 37.092965] kasan_atomics_helper+0x3f04/0x4858 [ 37.093693] kasan_atomics+0x198/0x2e8 [ 37.094337] kunit_try_run_case+0x14c/0x3d0 [ 37.095017] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.095775] kthread+0x24c/0x2d0 [ 37.096337] ret_from_fork+0x10/0x20 [ 37.097007] [ 37.097383] Allocated by task 254: [ 37.097880] kasan_save_stack+0x3c/0x68 [ 37.098546] kasan_save_track+0x20/0x40 [ 37.099195] kasan_save_alloc_info+0x40/0x58 [ 37.099816] __kasan_kmalloc+0xd4/0xd8 [ 37.100415] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.101044] kasan_atomics+0xb8/0x2e8 [ 37.101672] kunit_try_run_case+0x14c/0x3d0 [ 37.102379] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.103043] kthread+0x24c/0x2d0 [ 37.103650] ret_from_fork+0x10/0x20 [ 37.104251] [ 37.104632] The buggy address belongs to the object at fff00000c69ef080 [ 37.104632] which belongs to the cache kmalloc-64 of size 64 [ 37.105860] The buggy address is located 0 bytes to the right of [ 37.105860] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.107105] [ 37.107485] The buggy address belongs to the physical page: [ 37.108207] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.109133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.109978] page_type: f5(slab) [ 37.110497] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.111472] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.112231] page dumped because: kasan: bad access detected [ 37.113161] [ 37.113492] Memory state around the buggy address: [ 37.114116] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.114920] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.115857] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.116753] ^ [ 37.117458] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.118316] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.119205] ================================================================== [ 35.248841] ================================================================== [ 35.249587] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 35.250635] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.251699] [ 35.252139] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.253071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.253688] Hardware name: linux,dummy-virt (DT) [ 35.254416] Call trace: [ 35.255013] show_stack+0x20/0x38 (C) [ 35.255760] dump_stack_lvl+0x8c/0xd0 [ 35.256471] print_report+0x118/0x5e0 [ 35.257158] kasan_report+0xc8/0x118 [ 35.257818] kasan_check_range+0x100/0x1a8 [ 35.258598] __kasan_check_write+0x20/0x30 [ 35.259314] kasan_atomics_helper+0x24c/0x4858 [ 35.260136] kasan_atomics+0x198/0x2e8 [ 35.260852] kunit_try_run_case+0x14c/0x3d0 [ 35.261529] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.262351] kthread+0x24c/0x2d0 [ 35.262965] ret_from_fork+0x10/0x20 [ 35.263626] [ 35.264015] Allocated by task 254: [ 35.264652] kasan_save_stack+0x3c/0x68 [ 35.265259] kasan_save_track+0x20/0x40 [ 35.265965] kasan_save_alloc_info+0x40/0x58 [ 35.266564] __kasan_kmalloc+0xd4/0xd8 [ 35.267227] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.267876] kasan_atomics+0xb8/0x2e8 [ 35.268542] kunit_try_run_case+0x14c/0x3d0 [ 35.269156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.269961] kthread+0x24c/0x2d0 [ 35.270538] ret_from_fork+0x10/0x20 [ 35.271133] [ 35.271569] The buggy address belongs to the object at fff00000c69ef080 [ 35.271569] which belongs to the cache kmalloc-64 of size 64 [ 35.272858] The buggy address is located 0 bytes to the right of [ 35.272858] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.274193] [ 35.274622] The buggy address belongs to the physical page: [ 35.275307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.276409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.277228] page_type: f5(slab) [ 35.277842] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.278739] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.279686] page dumped because: kasan: bad access detected [ 35.280393] [ 35.280785] Memory state around the buggy address: [ 35.281379] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.282311] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.283174] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.284085] ^ [ 35.284753] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.285641] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.286499] ================================================================== [ 36.361876] ================================================================== [ 36.362733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 36.363554] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.364276] [ 36.364712] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.365929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.366570] Hardware name: linux,dummy-virt (DT) [ 36.367088] Call trace: [ 36.368045] show_stack+0x20/0x38 (C) [ 36.368652] dump_stack_lvl+0x8c/0xd0 [ 36.369248] print_report+0x118/0x5e0 [ 36.369841] kasan_report+0xc8/0x118 [ 36.370404] __asan_report_load4_noabort+0x20/0x30 [ 36.371193] kasan_atomics_helper+0x3dd8/0x4858 [ 36.371927] kasan_atomics+0x198/0x2e8 [ 36.372545] kunit_try_run_case+0x14c/0x3d0 [ 36.373176] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.374001] kthread+0x24c/0x2d0 [ 36.374559] ret_from_fork+0x10/0x20 [ 36.375132] [ 36.375487] Allocated by task 254: [ 36.376047] kasan_save_stack+0x3c/0x68 [ 36.376706] kasan_save_track+0x20/0x40 [ 36.377236] kasan_save_alloc_info+0x40/0x58 [ 36.377907] __kasan_kmalloc+0xd4/0xd8 [ 36.378448] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.379152] kasan_atomics+0xb8/0x2e8 [ 36.379781] kunit_try_run_case+0x14c/0x3d0 [ 36.380335] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.381107] kthread+0x24c/0x2d0 [ 36.381654] ret_from_fork+0x10/0x20 [ 36.382268] [ 36.382672] The buggy address belongs to the object at fff00000c69ef080 [ 36.382672] which belongs to the cache kmalloc-64 of size 64 [ 36.383894] The buggy address is located 0 bytes to the right of [ 36.383894] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.385090] [ 36.385470] The buggy address belongs to the physical page: [ 36.386216] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.387087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.387987] page_type: f5(slab) [ 36.388563] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.389361] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.390331] page dumped because: kasan: bad access detected [ 36.391034] [ 36.391376] Memory state around the buggy address: [ 36.392089] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.392933] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.393872] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.394640] ^ [ 36.395306] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.396282] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.397094] ================================================================== [ 36.171264] ================================================================== [ 36.172023] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 36.172743] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.173656] [ 36.174091] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.175583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.176266] Hardware name: linux,dummy-virt (DT) [ 36.176897] Call trace: [ 36.177381] show_stack+0x20/0x38 (C) [ 36.177988] dump_stack_lvl+0x8c/0xd0 [ 36.178692] print_report+0x118/0x5e0 [ 36.179332] kasan_report+0xc8/0x118 [ 36.179976] kasan_check_range+0x100/0x1a8 [ 36.180668] __kasan_check_write+0x20/0x30 [ 36.181359] kasan_atomics_helper+0xb70/0x4858 [ 36.182053] kasan_atomics+0x198/0x2e8 [ 36.182727] kunit_try_run_case+0x14c/0x3d0 [ 36.183424] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.184236] kthread+0x24c/0x2d0 [ 36.184849] ret_from_fork+0x10/0x20 [ 36.185444] [ 36.185877] Allocated by task 254: [ 36.186390] kasan_save_stack+0x3c/0x68 [ 36.187094] kasan_save_track+0x20/0x40 [ 36.187719] kasan_save_alloc_info+0x40/0x58 [ 36.188427] __kasan_kmalloc+0xd4/0xd8 [ 36.189008] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.189753] kasan_atomics+0xb8/0x2e8 [ 36.190338] kunit_try_run_case+0x14c/0x3d0 [ 36.191066] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.191771] kthread+0x24c/0x2d0 [ 36.192387] ret_from_fork+0x10/0x20 [ 36.192971] [ 36.193395] The buggy address belongs to the object at fff00000c69ef080 [ 36.193395] which belongs to the cache kmalloc-64 of size 64 [ 36.194729] The buggy address is located 0 bytes to the right of [ 36.194729] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.196159] [ 36.196500] The buggy address belongs to the physical page: [ 36.197259] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.198209] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.199103] page_type: f5(slab) [ 36.199620] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.200606] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.201504] page dumped because: kasan: bad access detected [ 36.202217] [ 36.202624] Memory state around the buggy address: [ 36.203224] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.204144] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.205053] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.206022] ^ [ 36.206676] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.207612] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.208388] ================================================================== [ 35.368458] ================================================================== [ 35.369246] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 35.370068] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.370933] [ 35.371310] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.372486] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.373128] Hardware name: linux,dummy-virt (DT) [ 35.373707] Call trace: [ 35.374114] show_stack+0x20/0x38 (C) [ 35.374789] dump_stack_lvl+0x8c/0xd0 [ 35.375450] print_report+0x118/0x5e0 [ 35.376067] kasan_report+0xc8/0x118 [ 35.376664] kasan_check_range+0x100/0x1a8 [ 35.377250] __kasan_check_write+0x20/0x30 [ 35.377961] kasan_atomics_helper+0x32c/0x4858 [ 35.378634] kasan_atomics+0x198/0x2e8 [ 35.379219] kunit_try_run_case+0x14c/0x3d0 [ 35.379957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.380707] kthread+0x24c/0x2d0 [ 35.381319] ret_from_fork+0x10/0x20 [ 35.381984] [ 35.382367] Allocated by task 254: [ 35.382910] kasan_save_stack+0x3c/0x68 [ 35.383567] kasan_save_track+0x20/0x40 [ 35.384095] kasan_save_alloc_info+0x40/0x58 [ 35.384771] __kasan_kmalloc+0xd4/0xd8 [ 35.385237] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.385940] kasan_atomics+0xb8/0x2e8 [ 35.386468] kunit_try_run_case+0x14c/0x3d0 [ 35.387181] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.387968] kthread+0x24c/0x2d0 [ 35.388466] ret_from_fork+0x10/0x20 [ 35.389098] [ 35.389426] The buggy address belongs to the object at fff00000c69ef080 [ 35.389426] which belongs to the cache kmalloc-64 of size 64 [ 35.390744] The buggy address is located 0 bytes to the right of [ 35.390744] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.391956] [ 35.392343] The buggy address belongs to the physical page: [ 35.393102] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.393948] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.394806] page_type: f5(slab) [ 35.395324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.396215] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.397195] page dumped because: kasan: bad access detected [ 35.397907] [ 35.398284] Memory state around the buggy address: [ 35.398993] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.399743] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.400693] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.401416] ^ [ 35.402132] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.402915] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.403789] ================================================================== [ 36.703609] ================================================================== [ 36.704399] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 36.705334] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.706203] [ 36.706628] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.708015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.708643] Hardware name: linux,dummy-virt (DT) [ 36.709254] Call trace: [ 36.709657] show_stack+0x20/0x38 (C) [ 36.710268] dump_stack_lvl+0x8c/0xd0 [ 36.710952] print_report+0x118/0x5e0 [ 36.711621] kasan_report+0xc8/0x118 [ 36.712267] kasan_check_range+0x100/0x1a8 [ 36.712960] __kasan_check_write+0x20/0x30 [ 36.713663] kasan_atomics_helper+0xf88/0x4858 [ 36.714338] kasan_atomics+0x198/0x2e8 [ 36.715023] kunit_try_run_case+0x14c/0x3d0 [ 36.715784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.716477] kthread+0x24c/0x2d0 [ 36.717113] ret_from_fork+0x10/0x20 [ 36.717733] [ 36.718079] Allocated by task 254: [ 36.718661] kasan_save_stack+0x3c/0x68 [ 36.719303] kasan_save_track+0x20/0x40 [ 36.719913] kasan_save_alloc_info+0x40/0x58 [ 36.720580] __kasan_kmalloc+0xd4/0xd8 [ 36.721201] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.721905] kasan_atomics+0xb8/0x2e8 [ 36.722391] kunit_try_run_case+0x14c/0x3d0 [ 36.723094] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.723833] kthread+0x24c/0x2d0 [ 36.724363] ret_from_fork+0x10/0x20 [ 36.724995] [ 36.725306] The buggy address belongs to the object at fff00000c69ef080 [ 36.725306] which belongs to the cache kmalloc-64 of size 64 [ 36.726642] The buggy address is located 0 bytes to the right of [ 36.726642] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.727903] [ 36.728278] The buggy address belongs to the physical page: [ 36.729036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.729857] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.730753] page_type: f5(slab) [ 36.731275] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.732200] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.733160] page dumped because: kasan: bad access detected [ 36.733782] [ 36.734152] Memory state around the buggy address: [ 36.734860] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.735736] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.736476] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.737349] ^ [ 36.737972] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.738803] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.739646] ================================================================== [ 36.968754] ================================================================== [ 36.969692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 36.970670] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.971472] [ 36.971903] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.973054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.973662] Hardware name: linux,dummy-virt (DT) [ 36.974272] Call trace: [ 36.974687] show_stack+0x20/0x38 (C) [ 36.975293] dump_stack_lvl+0x8c/0xd0 [ 36.975948] print_report+0x118/0x5e0 [ 36.976622] kasan_report+0xc8/0x118 [ 36.977274] kasan_check_range+0x100/0x1a8 [ 36.977984] __kasan_check_write+0x20/0x30 [ 36.978589] kasan_atomics_helper+0x126c/0x4858 [ 36.979324] kasan_atomics+0x198/0x2e8 [ 36.979886] kunit_try_run_case+0x14c/0x3d0 [ 36.980627] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.981361] kthread+0x24c/0x2d0 [ 36.981969] ret_from_fork+0x10/0x20 [ 36.982641] [ 36.983019] Allocated by task 254: [ 36.983611] kasan_save_stack+0x3c/0x68 [ 36.984192] kasan_save_track+0x20/0x40 [ 36.984740] kasan_save_alloc_info+0x40/0x58 [ 36.985422] __kasan_kmalloc+0xd4/0xd8 [ 36.986028] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.986738] kasan_atomics+0xb8/0x2e8 [ 36.987266] kunit_try_run_case+0x14c/0x3d0 [ 36.987957] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.988658] kthread+0x24c/0x2d0 [ 36.989195] ret_from_fork+0x10/0x20 [ 36.989807] [ 36.990180] The buggy address belongs to the object at fff00000c69ef080 [ 36.990180] which belongs to the cache kmalloc-64 of size 64 [ 36.991469] The buggy address is located 0 bytes to the right of [ 36.991469] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.992709] [ 36.993094] The buggy address belongs to the physical page: [ 36.993858] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.994693] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.995538] page_type: f5(slab) [ 36.996028] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.996981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.997839] page dumped because: kasan: bad access detected [ 36.998378] [ 36.998769] Memory state around the buggy address: [ 36.999457] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.000304] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.001219] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.002066] ^ [ 37.002783] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.003541] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.004398] ================================================================== [ 35.559076] ================================================================== [ 35.560006] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 35.561071] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.562012] [ 35.562397] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.563535] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.564154] Hardware name: linux,dummy-virt (DT) [ 35.564743] Call trace: [ 35.565214] show_stack+0x20/0x38 (C) [ 35.565888] dump_stack_lvl+0x8c/0xd0 [ 35.566485] print_report+0x118/0x5e0 [ 35.567050] kasan_report+0xc8/0x118 [ 35.567696] kasan_check_range+0x100/0x1a8 [ 35.568384] __kasan_check_write+0x20/0x30 [ 35.569017] kasan_atomics_helper+0x4e4/0x4858 [ 35.569757] kasan_atomics+0x198/0x2e8 [ 35.570355] kunit_try_run_case+0x14c/0x3d0 [ 35.570942] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.571759] kthread+0x24c/0x2d0 [ 35.572343] ret_from_fork+0x10/0x20 [ 35.573018] [ 35.573394] Allocated by task 254: [ 35.573898] kasan_save_stack+0x3c/0x68 [ 35.574556] kasan_save_track+0x20/0x40 [ 35.575119] kasan_save_alloc_info+0x40/0x58 [ 35.575728] __kasan_kmalloc+0xd4/0xd8 [ 35.576353] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.577015] kasan_atomics+0xb8/0x2e8 [ 35.577659] kunit_try_run_case+0x14c/0x3d0 [ 35.578322] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.579026] kthread+0x24c/0x2d0 [ 35.579591] ret_from_fork+0x10/0x20 [ 35.580118] [ 35.580497] The buggy address belongs to the object at fff00000c69ef080 [ 35.580497] which belongs to the cache kmalloc-64 of size 64 [ 35.581971] The buggy address is located 0 bytes to the right of [ 35.581971] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.583233] [ 35.583628] The buggy address belongs to the physical page: [ 35.584205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.585221] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.586067] page_type: f5(slab) [ 35.586647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.587547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.588299] page dumped because: kasan: bad access detected [ 35.588966] [ 35.589334] Memory state around the buggy address: [ 35.589857] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.590796] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.591665] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.592355] ^ [ 35.593073] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.593888] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.594772] ================================================================== [ 35.207633] ================================================================== [ 35.208605] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 35.209653] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.211069] [ 35.211416] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.212737] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.213377] Hardware name: linux,dummy-virt (DT) [ 35.214119] Call trace: [ 35.214717] show_stack+0x20/0x38 (C) [ 35.215354] dump_stack_lvl+0x8c/0xd0 [ 35.216110] print_report+0x118/0x5e0 [ 35.216762] kasan_report+0xc8/0x118 [ 35.217454] kasan_check_range+0x100/0x1a8 [ 35.218171] __kasan_check_read+0x20/0x30 [ 35.218891] kasan_atomics_helper+0x1ec/0x4858 [ 35.219651] kasan_atomics+0x198/0x2e8 [ 35.220298] kunit_try_run_case+0x14c/0x3d0 [ 35.221019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.221840] kthread+0x24c/0x2d0 [ 35.222494] ret_from_fork+0x10/0x20 [ 35.223151] [ 35.223525] Allocated by task 254: [ 35.224125] kasan_save_stack+0x3c/0x68 [ 35.224817] kasan_save_track+0x20/0x40 [ 35.225386] kasan_save_alloc_info+0x40/0x58 [ 35.226144] __kasan_kmalloc+0xd4/0xd8 [ 35.226694] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.227435] kasan_atomics+0xb8/0x2e8 [ 35.228038] kunit_try_run_case+0x14c/0x3d0 [ 35.228766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.229528] kthread+0x24c/0x2d0 [ 35.230086] ret_from_fork+0x10/0x20 [ 35.230754] [ 35.231154] The buggy address belongs to the object at fff00000c69ef080 [ 35.231154] which belongs to the cache kmalloc-64 of size 64 [ 35.232526] The buggy address is located 0 bytes to the right of [ 35.232526] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.233916] [ 35.234251] The buggy address belongs to the physical page: [ 35.235036] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.235999] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.236903] page_type: f5(slab) [ 35.237462] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.238415] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.239341] page dumped because: kasan: bad access detected [ 35.240028] [ 35.240414] Memory state around the buggy address: [ 35.241006] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.241962] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.242850] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.243721] ^ [ 35.244396] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.245263] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.246135] ================================================================== [ 36.741070] ================================================================== [ 36.741889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 36.742719] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.743669] [ 36.744059] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.745296] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.745868] Hardware name: linux,dummy-virt (DT) [ 36.746564] Call trace: [ 36.747034] show_stack+0x20/0x38 (C) [ 36.747709] dump_stack_lvl+0x8c/0xd0 [ 36.748312] print_report+0x118/0x5e0 [ 36.748944] kasan_report+0xc8/0x118 [ 36.749606] kasan_check_range+0x100/0x1a8 [ 36.750306] __kasan_check_write+0x20/0x30 [ 36.751030] kasan_atomics_helper+0xff0/0x4858 [ 36.751741] kasan_atomics+0x198/0x2e8 [ 36.752252] kunit_try_run_case+0x14c/0x3d0 [ 36.752987] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.753812] kthread+0x24c/0x2d0 [ 36.754408] ret_from_fork+0x10/0x20 [ 36.755089] [ 36.755424] Allocated by task 254: [ 36.755962] kasan_save_stack+0x3c/0x68 [ 36.756618] kasan_save_track+0x20/0x40 [ 36.757194] kasan_save_alloc_info+0x40/0x58 [ 36.757817] __kasan_kmalloc+0xd4/0xd8 [ 36.758306] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.759024] kasan_atomics+0xb8/0x2e8 [ 36.759656] kunit_try_run_case+0x14c/0x3d0 [ 36.760341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.761136] kthread+0x24c/0x2d0 [ 36.761654] ret_from_fork+0x10/0x20 [ 36.762259] [ 36.762653] The buggy address belongs to the object at fff00000c69ef080 [ 36.762653] which belongs to the cache kmalloc-64 of size 64 [ 36.763798] The buggy address is located 0 bytes to the right of [ 36.763798] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.765045] [ 36.765419] The buggy address belongs to the physical page: [ 36.766218] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.767134] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.767940] page_type: f5(slab) [ 36.768537] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.769409] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.770146] page dumped because: kasan: bad access detected [ 36.770931] [ 36.771302] Memory state around the buggy address: [ 36.771863] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.772773] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.773592] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.774376] ^ [ 36.775096] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.775934] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.776700] ================================================================== [ 37.397941] ================================================================== [ 37.398920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 37.399780] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.401148] [ 37.401441] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.402551] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.403102] Hardware name: linux,dummy-virt (DT) [ 37.403726] Call trace: [ 37.404090] show_stack+0x20/0x38 (C) [ 37.404750] dump_stack_lvl+0x8c/0xd0 [ 37.405331] print_report+0x118/0x5e0 [ 37.405998] kasan_report+0xc8/0x118 [ 37.406530] __asan_report_load8_noabort+0x20/0x30 [ 37.407288] kasan_atomics_helper+0x3df4/0x4858 [ 37.407999] kasan_atomics+0x198/0x2e8 [ 37.408671] kunit_try_run_case+0x14c/0x3d0 [ 37.409316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.410106] kthread+0x24c/0x2d0 [ 37.410609] ret_from_fork+0x10/0x20 [ 37.411245] [ 37.411636] Allocated by task 254: [ 37.412208] kasan_save_stack+0x3c/0x68 [ 37.412764] kasan_save_track+0x20/0x40 [ 37.413327] kasan_save_alloc_info+0x40/0x58 [ 37.414007] __kasan_kmalloc+0xd4/0xd8 [ 37.414653] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.415207] kasan_atomics+0xb8/0x2e8 [ 37.415882] kunit_try_run_case+0x14c/0x3d0 [ 37.416434] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.417247] kthread+0x24c/0x2d0 [ 37.417782] ret_from_fork+0x10/0x20 [ 37.418320] [ 37.418712] The buggy address belongs to the object at fff00000c69ef080 [ 37.418712] which belongs to the cache kmalloc-64 of size 64 [ 37.419864] The buggy address is located 0 bytes to the right of [ 37.419864] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.421150] [ 37.421821] The buggy address belongs to the physical page: [ 37.422671] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.423575] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.424357] page_type: f5(slab) [ 37.425083] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.426181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.427085] page dumped because: kasan: bad access detected [ 37.427865] [ 37.428202] Memory state around the buggy address: [ 37.428742] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.429681] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.430448] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.431283] ^ [ 37.431972] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.432794] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.433545] ================================================================== [ 37.587561] ================================================================== [ 37.588318] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 37.589324] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.590667] [ 37.591134] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.592432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.593115] Hardware name: linux,dummy-virt (DT) [ 37.593767] Call trace: [ 37.594272] show_stack+0x20/0x38 (C) [ 37.594988] dump_stack_lvl+0x8c/0xd0 [ 37.595692] print_report+0x118/0x5e0 [ 37.596373] kasan_report+0xc8/0x118 [ 37.597001] kasan_check_range+0x100/0x1a8 [ 37.597727] __kasan_check_write+0x20/0x30 [ 37.598427] kasan_atomics_helper+0x17ec/0x4858 [ 37.599155] kasan_atomics+0x198/0x2e8 [ 37.599858] kunit_try_run_case+0x14c/0x3d0 [ 37.600576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.601363] kthread+0x24c/0x2d0 [ 37.601967] ret_from_fork+0x10/0x20 [ 37.602598] [ 37.603016] Allocated by task 254: [ 37.603644] kasan_save_stack+0x3c/0x68 [ 37.604189] kasan_save_track+0x20/0x40 [ 37.604880] kasan_save_alloc_info+0x40/0x58 [ 37.605489] __kasan_kmalloc+0xd4/0xd8 [ 37.606196] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.606846] kasan_atomics+0xb8/0x2e8 [ 37.607450] kunit_try_run_case+0x14c/0x3d0 [ 37.608156] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.608953] kthread+0x24c/0x2d0 [ 37.609498] ret_from_fork+0x10/0x20 [ 37.610117] [ 37.610503] The buggy address belongs to the object at fff00000c69ef080 [ 37.610503] which belongs to the cache kmalloc-64 of size 64 [ 37.611850] The buggy address is located 0 bytes to the right of [ 37.611850] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.613394] [ 37.613745] The buggy address belongs to the physical page: [ 37.614532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.615463] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.616390] page_type: f5(slab) [ 37.617025] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.618000] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.619327] page dumped because: kasan: bad access detected [ 37.619850] [ 37.620130] Memory state around the buggy address: [ 37.620764] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.621830] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.622807] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.623779] ^ [ 37.624536] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.625565] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.626414] ================================================================== [ 35.863099] ================================================================== [ 35.863992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 35.864886] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.865828] [ 35.866257] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.867399] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.868040] Hardware name: linux,dummy-virt (DT) [ 35.868604] Call trace: [ 35.869080] show_stack+0x20/0x38 (C) [ 35.869709] dump_stack_lvl+0x8c/0xd0 [ 35.870373] print_report+0x118/0x5e0 [ 35.870956] kasan_report+0xc8/0x118 [ 35.871553] kasan_check_range+0x100/0x1a8 [ 35.872093] __kasan_check_write+0x20/0x30 [ 35.872805] kasan_atomics_helper+0x894/0x4858 [ 35.873561] kasan_atomics+0x198/0x2e8 [ 35.874218] kunit_try_run_case+0x14c/0x3d0 [ 35.874956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.875771] kthread+0x24c/0x2d0 [ 35.876366] ret_from_fork+0x10/0x20 [ 35.876974] [ 35.877302] Allocated by task 254: [ 35.877817] kasan_save_stack+0x3c/0x68 [ 35.878453] kasan_save_track+0x20/0x40 [ 35.879124] kasan_save_alloc_info+0x40/0x58 [ 35.879775] __kasan_kmalloc+0xd4/0xd8 [ 35.880374] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.881059] kasan_atomics+0xb8/0x2e8 [ 35.881696] kunit_try_run_case+0x14c/0x3d0 [ 35.882293] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.883070] kthread+0x24c/0x2d0 [ 35.883543] ret_from_fork+0x10/0x20 [ 35.884144] [ 35.884528] The buggy address belongs to the object at fff00000c69ef080 [ 35.884528] which belongs to the cache kmalloc-64 of size 64 [ 35.885839] The buggy address is located 0 bytes to the right of [ 35.885839] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.887113] [ 35.887438] The buggy address belongs to the physical page: [ 35.888215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.889076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.889911] page_type: f5(slab) [ 35.890455] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.891374] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.892314] page dumped because: kasan: bad access detected [ 35.892873] [ 35.893250] Memory state around the buggy address: [ 35.893957] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.894822] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.895805] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.896679] ^ [ 35.897374] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.898143] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.899063] ================================================================== [ 35.518719] ================================================================== [ 35.519550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 35.520466] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.521340] [ 35.521801] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.523373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.524062] Hardware name: linux,dummy-virt (DT) [ 35.524777] Call trace: [ 35.525286] show_stack+0x20/0x38 (C) [ 35.525981] dump_stack_lvl+0x8c/0xd0 [ 35.526615] print_report+0x118/0x5e0 [ 35.527323] kasan_report+0xc8/0x118 [ 35.527939] kasan_check_range+0x100/0x1a8 [ 35.528677] __kasan_check_write+0x20/0x30 [ 35.529335] kasan_atomics_helper+0x47c/0x4858 [ 35.530043] kasan_atomics+0x198/0x2e8 [ 35.530688] kunit_try_run_case+0x14c/0x3d0 [ 35.531398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.532195] kthread+0x24c/0x2d0 [ 35.532827] ret_from_fork+0x10/0x20 [ 35.533463] [ 35.533843] Allocated by task 254: [ 35.534451] kasan_save_stack+0x3c/0x68 [ 35.535087] kasan_save_track+0x20/0x40 [ 35.535823] kasan_save_alloc_info+0x40/0x58 [ 35.536711] __kasan_kmalloc+0xd4/0xd8 [ 35.537538] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.538436] kasan_atomics+0xb8/0x2e8 [ 35.539249] kunit_try_run_case+0x14c/0x3d0 [ 35.539986] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.540800] kthread+0x24c/0x2d0 [ 35.541269] ret_from_fork+0x10/0x20 [ 35.541816] [ 35.542197] The buggy address belongs to the object at fff00000c69ef080 [ 35.542197] which belongs to the cache kmalloc-64 of size 64 [ 35.543549] The buggy address is located 0 bytes to the right of [ 35.543549] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.544700] [ 35.545086] The buggy address belongs to the physical page: [ 35.545889] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.546853] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.547648] page_type: f5(slab) [ 35.548226] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.549110] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.549906] page dumped because: kasan: bad access detected [ 35.550638] [ 35.551080] Memory state around the buggy address: [ 35.551644] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.552576] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.553387] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.554149] ^ [ 35.554863] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.555610] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.556495] ================================================================== [ 35.119324] ================================================================== [ 35.120920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 35.121811] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.122693] [ 35.123076] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.124243] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.124917] Hardware name: linux,dummy-virt (DT) [ 35.125834] Call trace: [ 35.126181] show_stack+0x20/0x38 (C) [ 35.127288] dump_stack_lvl+0x8c/0xd0 [ 35.127853] print_report+0x118/0x5e0 [ 35.128495] kasan_report+0xc8/0x118 [ 35.129023] __asan_report_load4_noabort+0x20/0x30 [ 35.129799] kasan_atomics_helper+0x40a8/0x4858 [ 35.130760] kasan_atomics+0x198/0x2e8 [ 35.131336] kunit_try_run_case+0x14c/0x3d0 [ 35.132036] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.132813] kthread+0x24c/0x2d0 [ 35.133414] ret_from_fork+0x10/0x20 [ 35.134035] [ 35.134605] Allocated by task 254: [ 35.135221] kasan_save_stack+0x3c/0x68 [ 35.136077] kasan_save_track+0x20/0x40 [ 35.137110] kasan_save_alloc_info+0x40/0x58 [ 35.137772] __kasan_kmalloc+0xd4/0xd8 [ 35.139610] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.140649] kasan_atomics+0xb8/0x2e8 [ 35.141529] kunit_try_run_case+0x14c/0x3d0 [ 35.142039] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.143258] kthread+0x24c/0x2d0 [ 35.143821] ret_from_fork+0x10/0x20 [ 35.144497] [ 35.144912] The buggy address belongs to the object at fff00000c69ef080 [ 35.144912] which belongs to the cache kmalloc-64 of size 64 [ 35.146225] The buggy address is located 0 bytes to the right of [ 35.146225] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.147450] [ 35.148166] The buggy address belongs to the physical page: [ 35.149142] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.150025] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.150859] page_type: f5(slab) [ 35.151556] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.152568] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.153601] page dumped because: kasan: bad access detected [ 35.154395] [ 35.154877] Memory state around the buggy address: [ 35.155662] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.156649] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.157360] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.158238] ^ [ 35.158896] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.159673] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.160610] ================================================================== [ 36.513252] ================================================================== [ 36.514038] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 36.515042] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.515864] [ 36.516266] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.517427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.518014] Hardware name: linux,dummy-virt (DT) [ 36.518899] Call trace: [ 36.519859] show_stack+0x20/0x38 (C) [ 36.520844] dump_stack_lvl+0x8c/0xd0 [ 36.521493] print_report+0x118/0x5e0 [ 36.522151] kasan_report+0xc8/0x118 [ 36.522732] __asan_report_load8_noabort+0x20/0x30 [ 36.523419] kasan_atomics_helper+0x3f58/0x4858 [ 36.524146] kasan_atomics+0x198/0x2e8 [ 36.524819] kunit_try_run_case+0x14c/0x3d0 [ 36.525454] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.526331] kthread+0x24c/0x2d0 [ 36.526901] ret_from_fork+0x10/0x20 [ 36.527471] [ 36.527806] Allocated by task 254: [ 36.528370] kasan_save_stack+0x3c/0x68 [ 36.528883] kasan_save_track+0x20/0x40 [ 36.529541] kasan_save_alloc_info+0x40/0x58 [ 36.530168] __kasan_kmalloc+0xd4/0xd8 [ 36.530759] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.531460] kasan_atomics+0xb8/0x2e8 [ 36.531992] kunit_try_run_case+0x14c/0x3d0 [ 36.532697] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.533487] kthread+0x24c/0x2d0 [ 36.534026] ret_from_fork+0x10/0x20 [ 36.534619] [ 36.534999] The buggy address belongs to the object at fff00000c69ef080 [ 36.534999] which belongs to the cache kmalloc-64 of size 64 [ 36.536195] The buggy address is located 0 bytes to the right of [ 36.536195] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.537438] [ 36.537839] The buggy address belongs to the physical page: [ 36.538926] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.539936] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.540791] page_type: f5(slab) [ 36.541324] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.542265] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.543193] page dumped because: kasan: bad access detected [ 36.543822] [ 36.544201] Memory state around the buggy address: [ 36.544899] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.545874] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.546609] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.547490] ^ [ 36.548137] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.548987] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.549724] ================================================================== [ 37.434975] ================================================================== [ 37.435770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 37.436741] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.437670] [ 37.438007] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.439352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.439944] Hardware name: linux,dummy-virt (DT) [ 37.440621] Call trace: [ 37.441088] show_stack+0x20/0x38 (C) [ 37.441759] dump_stack_lvl+0x8c/0xd0 [ 37.442287] print_report+0x118/0x5e0 [ 37.442964] kasan_report+0xc8/0x118 [ 37.443643] kasan_check_range+0x100/0x1a8 [ 37.444227] __kasan_check_write+0x20/0x30 [ 37.444927] kasan_atomics_helper+0x16d0/0x4858 [ 37.445596] kasan_atomics+0x198/0x2e8 [ 37.446247] kunit_try_run_case+0x14c/0x3d0 [ 37.446843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.447687] kthread+0x24c/0x2d0 [ 37.448212] ret_from_fork+0x10/0x20 [ 37.448880] [ 37.449250] Allocated by task 254: [ 37.449821] kasan_save_stack+0x3c/0x68 [ 37.450311] kasan_save_track+0x20/0x40 [ 37.450963] kasan_save_alloc_info+0x40/0x58 [ 37.451541] __kasan_kmalloc+0xd4/0xd8 [ 37.452181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.452824] kasan_atomics+0xb8/0x2e8 [ 37.453435] kunit_try_run_case+0x14c/0x3d0 [ 37.454037] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.454780] kthread+0x24c/0x2d0 [ 37.455384] ret_from_fork+0x10/0x20 [ 37.455942] [ 37.456313] The buggy address belongs to the object at fff00000c69ef080 [ 37.456313] which belongs to the cache kmalloc-64 of size 64 [ 37.457584] The buggy address is located 0 bytes to the right of [ 37.457584] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.458780] [ 37.459170] The buggy address belongs to the physical page: [ 37.459938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.460819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.461597] page_type: f5(slab) [ 37.462150] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.463180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.463967] page dumped because: kasan: bad access detected [ 37.464698] [ 37.465050] Memory state around the buggy address: [ 37.465619] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.466452] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.467390] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.468266] ^ [ 37.468950] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.469841] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.470721] ================================================================== [ 36.474964] ================================================================== [ 36.475900] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 36.476281] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.477149] [ 36.477758] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.479191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.479592] Hardware name: linux,dummy-virt (DT) [ 36.480568] Call trace: [ 36.481036] show_stack+0x20/0x38 (C) [ 36.481672] dump_stack_lvl+0x8c/0xd0 [ 36.482229] print_report+0x118/0x5e0 [ 36.482912] kasan_report+0xc8/0x118 [ 36.483557] kasan_check_range+0x100/0x1a8 [ 36.484256] __kasan_check_read+0x20/0x30 [ 36.484970] kasan_atomics_helper+0xdd4/0x4858 [ 36.485748] kasan_atomics+0x198/0x2e8 [ 36.486426] kunit_try_run_case+0x14c/0x3d0 [ 36.487267] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.488133] kthread+0x24c/0x2d0 [ 36.488724] ret_from_fork+0x10/0x20 [ 36.489258] [ 36.489661] Allocated by task 254: [ 36.490159] kasan_save_stack+0x3c/0x68 [ 36.490796] kasan_save_track+0x20/0x40 [ 36.491446] kasan_save_alloc_info+0x40/0x58 [ 36.492123] __kasan_kmalloc+0xd4/0xd8 [ 36.492644] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.493339] kasan_atomics+0xb8/0x2e8 [ 36.493904] kunit_try_run_case+0x14c/0x3d0 [ 36.494606] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.495394] kthread+0x24c/0x2d0 [ 36.495945] ret_from_fork+0x10/0x20 [ 36.496556] [ 36.496939] The buggy address belongs to the object at fff00000c69ef080 [ 36.496939] which belongs to the cache kmalloc-64 of size 64 [ 36.498176] The buggy address is located 0 bytes to the right of [ 36.498176] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.499597] [ 36.499979] The buggy address belongs to the physical page: [ 36.500585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.501612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.502303] page_type: f5(slab) [ 36.502910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.503736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.504646] page dumped because: kasan: bad access detected [ 36.505304] [ 36.505681] Memory state around the buggy address: [ 36.506400] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.507276] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.508123] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.508859] ^ [ 36.509579] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.510356] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.511232] ================================================================== [ 37.355866] ================================================================== [ 37.356812] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 37.357750] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.358783] [ 37.359220] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.360584] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.361251] Hardware name: linux,dummy-virt (DT) [ 37.362003] Call trace: [ 37.362480] show_stack+0x20/0x38 (C) [ 37.363291] dump_stack_lvl+0x8c/0xd0 [ 37.364037] print_report+0x118/0x5e0 [ 37.364808] kasan_report+0xc8/0x118 [ 37.365491] kasan_check_range+0x100/0x1a8 [ 37.366275] __kasan_check_write+0x20/0x30 [ 37.367090] kasan_atomics_helper+0x1644/0x4858 [ 37.367865] kasan_atomics+0x198/0x2e8 [ 37.368578] kunit_try_run_case+0x14c/0x3d0 [ 37.369370] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.370206] kthread+0x24c/0x2d0 [ 37.370740] ret_from_fork+0x10/0x20 [ 37.371388] [ 37.371769] Allocated by task 254: [ 37.372282] kasan_save_stack+0x3c/0x68 [ 37.372950] kasan_save_track+0x20/0x40 [ 37.373636] kasan_save_alloc_info+0x40/0x58 [ 37.374269] __kasan_kmalloc+0xd4/0xd8 [ 37.374942] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.375569] kasan_atomics+0xb8/0x2e8 [ 37.376253] kunit_try_run_case+0x14c/0x3d0 [ 37.376923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.377708] kthread+0x24c/0x2d0 [ 37.378275] ret_from_fork+0x10/0x20 [ 37.378940] [ 37.379303] The buggy address belongs to the object at fff00000c69ef080 [ 37.379303] which belongs to the cache kmalloc-64 of size 64 [ 37.380568] The buggy address is located 0 bytes to the right of [ 37.380568] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.381902] [ 37.382267] The buggy address belongs to the physical page: [ 37.382978] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.384021] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.384873] page_type: f5(slab) [ 37.385480] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.386444] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.387384] page dumped because: kasan: bad access detected [ 37.388086] [ 37.388479] Memory state around the buggy address: [ 37.389103] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.390088] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.391163] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.392189] ^ [ 37.393005] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.394021] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.395029] ================================================================== [ 37.198504] ================================================================== [ 37.199269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 37.200098] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.201037] [ 37.201376] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.202475] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.203361] Hardware name: linux,dummy-virt (DT) [ 37.204058] Call trace: [ 37.204544] show_stack+0x20/0x38 (C) [ 37.205155] dump_stack_lvl+0x8c/0xd0 [ 37.205702] print_report+0x118/0x5e0 [ 37.206347] kasan_report+0xc8/0x118 [ 37.207024] kasan_check_range+0x100/0x1a8 [ 37.207661] __kasan_check_write+0x20/0x30 [ 37.208307] kasan_atomics_helper+0x14e4/0x4858 [ 37.208914] kasan_atomics+0x198/0x2e8 [ 37.209576] kunit_try_run_case+0x14c/0x3d0 [ 37.210288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.211120] kthread+0x24c/0x2d0 [ 37.211777] ret_from_fork+0x10/0x20 [ 37.212323] [ 37.213048] Allocated by task 254: [ 37.213713] kasan_save_stack+0x3c/0x68 [ 37.214335] kasan_save_track+0x20/0x40 [ 37.215050] kasan_save_alloc_info+0x40/0x58 [ 37.215802] __kasan_kmalloc+0xd4/0xd8 [ 37.216526] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.217145] kasan_atomics+0xb8/0x2e8 [ 37.217819] kunit_try_run_case+0x14c/0x3d0 [ 37.218455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.219247] kthread+0x24c/0x2d0 [ 37.219823] ret_from_fork+0x10/0x20 [ 37.220442] [ 37.220880] The buggy address belongs to the object at fff00000c69ef080 [ 37.220880] which belongs to the cache kmalloc-64 of size 64 [ 37.222180] The buggy address is located 0 bytes to the right of [ 37.222180] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.223574] [ 37.223975] The buggy address belongs to the physical page: [ 37.224742] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.225784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.226679] page_type: f5(slab) [ 37.227172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.228121] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.229068] page dumped because: kasan: bad access detected [ 37.229764] [ 37.230161] Memory state around the buggy address: [ 37.230894] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.231812] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.232663] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.233557] ^ [ 37.234251] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.235140] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.236017] ================================================================== [ 37.279206] ================================================================== [ 37.280009] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 37.281773] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.282980] [ 37.283365] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.284492] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.285096] Hardware name: linux,dummy-virt (DT) [ 37.285678] Call trace: [ 37.286181] show_stack+0x20/0x38 (C) [ 37.286785] dump_stack_lvl+0x8c/0xd0 [ 37.287452] print_report+0x118/0x5e0 [ 37.288103] kasan_report+0xc8/0x118 [ 37.288701] kasan_check_range+0x100/0x1a8 [ 37.289284] __kasan_check_write+0x20/0x30 [ 37.289994] kasan_atomics_helper+0x15b4/0x4858 [ 37.290655] kasan_atomics+0x198/0x2e8 [ 37.291326] kunit_try_run_case+0x14c/0x3d0 [ 37.291961] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.292778] kthread+0x24c/0x2d0 [ 37.293398] ret_from_fork+0x10/0x20 [ 37.294010] [ 37.294339] Allocated by task 254: [ 37.294845] kasan_save_stack+0x3c/0x68 [ 37.295486] kasan_save_track+0x20/0x40 [ 37.296104] kasan_save_alloc_info+0x40/0x58 [ 37.296938] __kasan_kmalloc+0xd4/0xd8 [ 37.297440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.298160] kasan_atomics+0xb8/0x2e8 [ 37.298791] kunit_try_run_case+0x14c/0x3d0 [ 37.299450] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.300093] kthread+0x24c/0x2d0 [ 37.300685] ret_from_fork+0x10/0x20 [ 37.301294] [ 37.301689] The buggy address belongs to the object at fff00000c69ef080 [ 37.301689] which belongs to the cache kmalloc-64 of size 64 [ 37.302898] The buggy address is located 0 bytes to the right of [ 37.302898] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.304256] [ 37.304605] The buggy address belongs to the physical page: [ 37.305317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.306285] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.307133] page_type: f5(slab) [ 37.307688] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.308612] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.309525] page dumped because: kasan: bad access detected [ 37.310131] [ 37.310498] Memory state around the buggy address: [ 37.311110] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.312014] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.312725] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.313642] ^ [ 37.314253] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.315066] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.316020] ================================================================== [ 36.248123] ================================================================== [ 36.248771] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 36.249685] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.250559] [ 36.250977] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.251993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.252630] Hardware name: linux,dummy-virt (DT) [ 36.253308] Call trace: [ 36.253806] show_stack+0x20/0x38 (C) [ 36.254356] dump_stack_lvl+0x8c/0xd0 [ 36.255021] print_report+0x118/0x5e0 [ 36.255602] kasan_report+0xc8/0x118 [ 36.256269] kasan_check_range+0x100/0x1a8 [ 36.256824] __kasan_check_write+0x20/0x30 [ 36.257537] kasan_atomics_helper+0xc08/0x4858 [ 36.258264] kasan_atomics+0x198/0x2e8 [ 36.258909] kunit_try_run_case+0x14c/0x3d0 [ 36.259647] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.260471] kthread+0x24c/0x2d0 [ 36.261054] ret_from_fork+0x10/0x20 [ 36.261621] [ 36.262003] Allocated by task 254: [ 36.262489] kasan_save_stack+0x3c/0x68 [ 36.263156] kasan_save_track+0x20/0x40 [ 36.263736] kasan_save_alloc_info+0x40/0x58 [ 36.264360] __kasan_kmalloc+0xd4/0xd8 [ 36.264922] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.265641] kasan_atomics+0xb8/0x2e8 [ 36.266165] kunit_try_run_case+0x14c/0x3d0 [ 36.266860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.267638] kthread+0x24c/0x2d0 [ 36.268219] ret_from_fork+0x10/0x20 [ 36.268793] [ 36.269110] The buggy address belongs to the object at fff00000c69ef080 [ 36.269110] which belongs to the cache kmalloc-64 of size 64 [ 36.270412] The buggy address is located 0 bytes to the right of [ 36.270412] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.271721] [ 36.272104] The buggy address belongs to the physical page: [ 36.272822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.273689] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.274419] page_type: f5(slab) [ 36.275027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.275954] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.276925] page dumped because: kasan: bad access detected [ 36.277592] [ 36.277965] Memory state around the buggy address: [ 36.278674] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.279504] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.280302] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.281065] ^ [ 36.281770] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.282548] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.283315] ================================================================== [ 37.006006] ================================================================== [ 37.006956] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 37.007679] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.008658] [ 37.009063] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.010136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.010718] Hardware name: linux,dummy-virt (DT) [ 37.011398] Call trace: [ 37.011888] show_stack+0x20/0x38 (C) [ 37.012501] dump_stack_lvl+0x8c/0xd0 [ 37.013124] print_report+0x118/0x5e0 [ 37.013802] kasan_report+0xc8/0x118 [ 37.014351] kasan_check_range+0x100/0x1a8 [ 37.015085] __kasan_check_write+0x20/0x30 [ 37.015784] kasan_atomics_helper+0x12d8/0x4858 [ 37.016377] kasan_atomics+0x198/0x2e8 [ 37.017050] kunit_try_run_case+0x14c/0x3d0 [ 37.017753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.018589] kthread+0x24c/0x2d0 [ 37.019086] ret_from_fork+0x10/0x20 [ 37.019765] [ 37.020144] Allocated by task 254: [ 37.020719] kasan_save_stack+0x3c/0x68 [ 37.021214] kasan_save_track+0x20/0x40 [ 37.021852] kasan_save_alloc_info+0x40/0x58 [ 37.022553] __kasan_kmalloc+0xd4/0xd8 [ 37.023188] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.023861] kasan_atomics+0xb8/0x2e8 [ 37.024407] kunit_try_run_case+0x14c/0x3d0 [ 37.025102] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.025894] kthread+0x24c/0x2d0 [ 37.026427] ret_from_fork+0x10/0x20 [ 37.026981] [ 37.027347] The buggy address belongs to the object at fff00000c69ef080 [ 37.027347] which belongs to the cache kmalloc-64 of size 64 [ 37.028587] The buggy address is located 0 bytes to the right of [ 37.028587] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.029957] [ 37.030283] The buggy address belongs to the physical page: [ 37.031001] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.031849] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.032732] page_type: f5(slab) [ 37.033273] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.034155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.035032] page dumped because: kasan: bad access detected [ 37.035886] [ 37.036547] Memory state around the buggy address: [ 37.037183] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.038068] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.038979] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.039996] ^ [ 37.040594] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.041473] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.042465] ================================================================== [ 36.284721] ================================================================== [ 36.285454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 36.286422] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.287422] [ 36.287853] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.288968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.289566] Hardware name: linux,dummy-virt (DT) [ 36.290094] Call trace: [ 36.290576] show_stack+0x20/0x38 (C) [ 36.291234] dump_stack_lvl+0x8c/0xd0 [ 36.291870] print_report+0x118/0x5e0 [ 36.292381] kasan_report+0xc8/0x118 [ 36.293037] __asan_report_load4_noabort+0x20/0x30 [ 36.293794] kasan_atomics_helper+0x3de4/0x4858 [ 36.294349] kasan_atomics+0x198/0x2e8 [ 36.295014] kunit_try_run_case+0x14c/0x3d0 [ 36.295763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.296482] kthread+0x24c/0x2d0 [ 36.297112] ret_from_fork+0x10/0x20 [ 36.297746] [ 36.298132] Allocated by task 254: [ 36.298714] kasan_save_stack+0x3c/0x68 [ 36.299271] kasan_save_track+0x20/0x40 [ 36.299931] kasan_save_alloc_info+0x40/0x58 [ 36.300568] __kasan_kmalloc+0xd4/0xd8 [ 36.301147] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.301847] kasan_atomics+0xb8/0x2e8 [ 36.302458] kunit_try_run_case+0x14c/0x3d0 [ 36.303046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.303810] kthread+0x24c/0x2d0 [ 36.304355] ret_from_fork+0x10/0x20 [ 36.304894] [ 36.305274] The buggy address belongs to the object at fff00000c69ef080 [ 36.305274] which belongs to the cache kmalloc-64 of size 64 [ 36.307013] The buggy address is located 0 bytes to the right of [ 36.307013] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.308313] [ 36.309089] The buggy address belongs to the physical page: [ 36.309861] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.310572] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.311463] page_type: f5(slab) [ 36.312044] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.313025] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.314046] page dumped because: kasan: bad access detected [ 36.314677] [ 36.315005] Memory state around the buggy address: [ 36.315751] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.316558] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.317486] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.318211] ^ [ 36.318926] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.319709] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.320456] ================================================================== [ 35.788143] ================================================================== [ 35.788981] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 35.789724] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.791016] [ 35.791421] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.792543] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.793173] Hardware name: linux,dummy-virt (DT) [ 35.793878] Call trace: [ 35.794398] show_stack+0x20/0x38 (C) [ 35.795004] dump_stack_lvl+0x8c/0xd0 [ 35.795674] print_report+0x118/0x5e0 [ 35.796360] kasan_report+0xc8/0x118 [ 35.796933] kasan_check_range+0x100/0x1a8 [ 35.797633] __kasan_check_write+0x20/0x30 [ 35.798213] kasan_atomics_helper+0x760/0x4858 [ 35.798998] kasan_atomics+0x198/0x2e8 [ 35.799955] kunit_try_run_case+0x14c/0x3d0 [ 35.800575] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.801243] kthread+0x24c/0x2d0 [ 35.801807] ret_from_fork+0x10/0x20 [ 35.802387] [ 35.802785] Allocated by task 254: [ 35.803333] kasan_save_stack+0x3c/0x68 [ 35.803990] kasan_save_track+0x20/0x40 [ 35.804642] kasan_save_alloc_info+0x40/0x58 [ 35.805166] __kasan_kmalloc+0xd4/0xd8 [ 35.805841] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.806416] kasan_atomics+0xb8/0x2e8 [ 35.807062] kunit_try_run_case+0x14c/0x3d0 [ 35.807669] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.808305] kthread+0x24c/0x2d0 [ 35.808912] ret_from_fork+0x10/0x20 [ 35.809468] [ 35.809811] The buggy address belongs to the object at fff00000c69ef080 [ 35.809811] which belongs to the cache kmalloc-64 of size 64 [ 35.811008] The buggy address is located 0 bytes to the right of [ 35.811008] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.812339] [ 35.812743] The buggy address belongs to the physical page: [ 35.813319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.814243] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.815063] page_type: f5(slab) [ 35.815573] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.816616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.817386] page dumped because: kasan: bad access detected [ 35.818154] [ 35.818468] Memory state around the buggy address: [ 35.819084] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.819961] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.820722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.821476] ^ [ 35.822198] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.822973] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.823905] ================================================================== [ 35.900810] ================================================================== [ 35.901645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 35.902424] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.903316] [ 35.903703] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.904830] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.905320] Hardware name: linux,dummy-virt (DT) [ 35.906020] Call trace: [ 35.906488] show_stack+0x20/0x38 (C) [ 35.907161] dump_stack_lvl+0x8c/0xd0 [ 35.907739] print_report+0x118/0x5e0 [ 35.908385] kasan_report+0xc8/0x118 [ 35.908951] __asan_report_load4_noabort+0x20/0x30 [ 35.909704] kasan_atomics_helper+0x42d8/0x4858 [ 35.910268] kasan_atomics+0x198/0x2e8 [ 35.910941] kunit_try_run_case+0x14c/0x3d0 [ 35.911538] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.912316] kthread+0x24c/0x2d0 [ 35.912861] ret_from_fork+0x10/0x20 [ 35.913526] [ 35.913897] Allocated by task 254: [ 35.914455] kasan_save_stack+0x3c/0x68 [ 35.915041] kasan_save_track+0x20/0x40 [ 35.915715] kasan_save_alloc_info+0x40/0x58 [ 35.916245] __kasan_kmalloc+0xd4/0xd8 [ 35.916893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.917548] kasan_atomics+0xb8/0x2e8 [ 35.918168] kunit_try_run_case+0x14c/0x3d0 [ 35.918753] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.919585] kthread+0x24c/0x2d0 [ 35.920131] ret_from_fork+0x10/0x20 [ 35.920629] [ 35.921008] The buggy address belongs to the object at fff00000c69ef080 [ 35.921008] which belongs to the cache kmalloc-64 of size 64 [ 35.922312] The buggy address is located 0 bytes to the right of [ 35.922312] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.923739] [ 35.924094] The buggy address belongs to the physical page: [ 35.924855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.925737] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.926623] page_type: f5(slab) [ 35.927171] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.928013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.928861] page dumped because: kasan: bad access detected [ 35.929628] [ 35.929951] Memory state around the buggy address: [ 35.930530] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.931375] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.932203] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.933023] ^ [ 35.933661] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.934606] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.935292] ================================================================== [ 37.120741] ================================================================== [ 37.121485] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 37.122501] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.123492] [ 37.123956] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.125113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.125797] Hardware name: linux,dummy-virt (DT) [ 37.126359] Call trace: [ 37.126881] show_stack+0x20/0x38 (C) [ 37.127529] dump_stack_lvl+0x8c/0xd0 [ 37.128203] print_report+0x118/0x5e0 [ 37.128892] kasan_report+0xc8/0x118 [ 37.129569] kasan_check_range+0x100/0x1a8 [ 37.130330] __kasan_check_write+0x20/0x30 [ 37.130959] kasan_atomics_helper+0x1414/0x4858 [ 37.131795] kasan_atomics+0x198/0x2e8 [ 37.132430] kunit_try_run_case+0x14c/0x3d0 [ 37.133198] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.133969] kthread+0x24c/0x2d0 [ 37.134643] ret_from_fork+0x10/0x20 [ 37.135279] [ 37.135672] Allocated by task 254: [ 37.136276] kasan_save_stack+0x3c/0x68 [ 37.136890] kasan_save_track+0x20/0x40 [ 37.137582] kasan_save_alloc_info+0x40/0x58 [ 37.138202] __kasan_kmalloc+0xd4/0xd8 [ 37.138893] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.139559] kasan_atomics+0xb8/0x2e8 [ 37.140211] kunit_try_run_case+0x14c/0x3d0 [ 37.140799] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.141601] kthread+0x24c/0x2d0 [ 37.142196] ret_from_fork+0x10/0x20 [ 37.142798] [ 37.143220] The buggy address belongs to the object at fff00000c69ef080 [ 37.143220] which belongs to the cache kmalloc-64 of size 64 [ 37.144487] The buggy address is located 0 bytes to the right of [ 37.144487] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.145847] [ 37.146220] The buggy address belongs to the physical page: [ 37.146883] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.147851] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.148745] page_type: f5(slab) [ 37.149280] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.150251] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.151200] page dumped because: kasan: bad access detected [ 37.151899] [ 37.152298] Memory state around the buggy address: [ 37.152940] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.153864] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.154736] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.155616] ^ [ 37.156228] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.157107] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.157996] ================================================================== [ 35.481423] ================================================================== [ 35.482566] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 35.483611] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.484503] [ 35.484865] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.486008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.486617] Hardware name: linux,dummy-virt (DT) [ 35.487130] Call trace: [ 35.487620] show_stack+0x20/0x38 (C) [ 35.488279] dump_stack_lvl+0x8c/0xd0 [ 35.488905] print_report+0x118/0x5e0 [ 35.489421] kasan_report+0xc8/0x118 [ 35.490077] kasan_check_range+0x100/0x1a8 [ 35.490791] __kasan_check_write+0x20/0x30 [ 35.491363] kasan_atomics_helper+0x414/0x4858 [ 35.492095] kasan_atomics+0x198/0x2e8 [ 35.492707] kunit_try_run_case+0x14c/0x3d0 [ 35.493417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.494156] kthread+0x24c/0x2d0 [ 35.494731] ret_from_fork+0x10/0x20 [ 35.495305] [ 35.495706] Allocated by task 254: [ 35.496171] kasan_save_stack+0x3c/0x68 [ 35.496823] kasan_save_track+0x20/0x40 [ 35.497398] kasan_save_alloc_info+0x40/0x58 [ 35.498069] __kasan_kmalloc+0xd4/0xd8 [ 35.498576] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.499280] kasan_atomics+0xb8/0x2e8 [ 35.499786] kunit_try_run_case+0x14c/0x3d0 [ 35.500455] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.501101] kthread+0x24c/0x2d0 [ 35.501642] ret_from_fork+0x10/0x20 [ 35.502245] [ 35.502646] The buggy address belongs to the object at fff00000c69ef080 [ 35.502646] which belongs to the cache kmalloc-64 of size 64 [ 35.503918] The buggy address is located 0 bytes to the right of [ 35.503918] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.505027] [ 35.505443] The buggy address belongs to the physical page: [ 35.506219] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.507196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.507939] page_type: f5(slab) [ 35.508567] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.509484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.510396] page dumped because: kasan: bad access detected [ 35.511114] [ 35.511491] Memory state around the buggy address: [ 35.512205] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.513048] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.513951] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.514818] ^ [ 35.515436] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.516340] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.517201] ================================================================== [ 35.405667] ================================================================== [ 35.406736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 35.407801] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.408477] [ 35.408913] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.410100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.410597] Hardware name: linux,dummy-virt (DT) [ 35.411282] Call trace: [ 35.411777] show_stack+0x20/0x38 (C) [ 35.412429] dump_stack_lvl+0x8c/0xd0 [ 35.413109] print_report+0x118/0x5e0 [ 35.413750] kasan_report+0xc8/0x118 [ 35.414260] __asan_report_store4_noabort+0x20/0x30 [ 35.415046] kasan_atomics_helper+0x3f94/0x4858 [ 35.415807] kasan_atomics+0x198/0x2e8 [ 35.416457] kunit_try_run_case+0x14c/0x3d0 [ 35.417175] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.418004] kthread+0x24c/0x2d0 [ 35.418572] ret_from_fork+0x10/0x20 [ 35.419159] [ 35.419542] Allocated by task 254: [ 35.420085] kasan_save_stack+0x3c/0x68 [ 35.420756] kasan_save_track+0x20/0x40 [ 35.421376] kasan_save_alloc_info+0x40/0x58 [ 35.422025] __kasan_kmalloc+0xd4/0xd8 [ 35.422671] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.423376] kasan_atomics+0xb8/0x2e8 [ 35.423961] kunit_try_run_case+0x14c/0x3d0 [ 35.424619] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.425413] kthread+0x24c/0x2d0 [ 35.425978] ret_from_fork+0x10/0x20 [ 35.426607] [ 35.426966] The buggy address belongs to the object at fff00000c69ef080 [ 35.426966] which belongs to the cache kmalloc-64 of size 64 [ 35.428243] The buggy address is located 0 bytes to the right of [ 35.428243] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.429545] [ 35.429928] The buggy address belongs to the physical page: [ 35.430632] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.431473] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.432345] page_type: f5(slab) [ 35.432896] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.433780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.434647] page dumped because: kasan: bad access detected [ 35.435307] [ 35.435691] Memory state around the buggy address: [ 35.436389] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.437138] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.438046] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.438877] ^ [ 35.439428] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.440378] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.441152] ================================================================== [ 36.819357] ================================================================== [ 36.820413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 36.821240] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.822203] [ 36.822660] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.823960] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.824609] Hardware name: linux,dummy-virt (DT) [ 36.825302] Call trace: [ 36.825747] show_stack+0x20/0x38 (C) [ 36.826404] dump_stack_lvl+0x8c/0xd0 [ 36.827007] print_report+0x118/0x5e0 [ 36.827594] kasan_report+0xc8/0x118 [ 36.828248] kasan_check_range+0x100/0x1a8 [ 36.828964] __kasan_check_write+0x20/0x30 [ 36.829672] kasan_atomics_helper+0x10c0/0x4858 [ 36.830288] kasan_atomics+0x198/0x2e8 [ 36.830968] kunit_try_run_case+0x14c/0x3d0 [ 36.831629] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.832436] kthread+0x24c/0x2d0 [ 36.833067] ret_from_fork+0x10/0x20 [ 36.833694] [ 36.834040] Allocated by task 254: [ 36.834620] kasan_save_stack+0x3c/0x68 [ 36.835197] kasan_save_track+0x20/0x40 [ 36.835796] kasan_save_alloc_info+0x40/0x58 [ 36.836367] __kasan_kmalloc+0xd4/0xd8 [ 36.836971] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.837558] kasan_atomics+0xb8/0x2e8 [ 36.838191] kunit_try_run_case+0x14c/0x3d0 [ 36.838882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.839657] kthread+0x24c/0x2d0 [ 36.840245] ret_from_fork+0x10/0x20 [ 36.840878] [ 36.841264] The buggy address belongs to the object at fff00000c69ef080 [ 36.841264] which belongs to the cache kmalloc-64 of size 64 [ 36.842348] The buggy address is located 0 bytes to the right of [ 36.842348] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.843718] [ 36.844090] The buggy address belongs to the physical page: [ 36.844853] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.845707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.846530] page_type: f5(slab) [ 36.847066] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.848071] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.848883] page dumped because: kasan: bad access detected [ 36.849708] [ 36.850005] Memory state around the buggy address: [ 36.850710] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.851560] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.852338] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.853163] ^ [ 36.853746] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.854681] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.855491] ================================================================== [ 36.551253] ================================================================== [ 36.552086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 36.552820] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.553766] [ 36.554210] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.555277] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.555941] Hardware name: linux,dummy-virt (DT) [ 36.556571] Call trace: [ 36.557037] show_stack+0x20/0x38 (C) [ 36.557662] dump_stack_lvl+0x8c/0xd0 [ 36.558319] print_report+0x118/0x5e0 [ 36.559003] kasan_report+0xc8/0x118 [ 36.559643] kasan_check_range+0x100/0x1a8 [ 36.560167] __kasan_check_write+0x20/0x30 [ 36.560881] kasan_atomics_helper+0xe44/0x4858 [ 36.561620] kasan_atomics+0x198/0x2e8 [ 36.562215] kunit_try_run_case+0x14c/0x3d0 [ 36.562884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.563637] kthread+0x24c/0x2d0 [ 36.564262] ret_from_fork+0x10/0x20 [ 36.564837] [ 36.565220] Allocated by task 254: [ 36.565814] kasan_save_stack+0x3c/0x68 [ 36.566444] kasan_save_track+0x20/0x40 [ 36.566973] kasan_save_alloc_info+0x40/0x58 [ 36.567671] __kasan_kmalloc+0xd4/0xd8 [ 36.568304] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.568888] kasan_atomics+0xb8/0x2e8 [ 36.569776] kunit_try_run_case+0x14c/0x3d0 [ 36.570406] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.571131] kthread+0x24c/0x2d0 [ 36.571729] ret_from_fork+0x10/0x20 [ 36.572268] [ 36.572661] The buggy address belongs to the object at fff00000c69ef080 [ 36.572661] which belongs to the cache kmalloc-64 of size 64 [ 36.573848] The buggy address is located 0 bytes to the right of [ 36.573848] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.575113] [ 36.575483] The buggy address belongs to the physical page: [ 36.576278] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.577105] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.577955] page_type: f5(slab) [ 36.578550] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.579388] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.580362] page dumped because: kasan: bad access detected [ 36.581082] [ 36.581456] Memory state around the buggy address: [ 36.582097] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.582943] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.583785] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.584544] ^ [ 36.585232] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.586080] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.586928] ================================================================== [ 37.548824] ================================================================== [ 37.549767] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 37.550857] Read of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.552051] [ 37.552782] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.554207] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.554670] Hardware name: linux,dummy-virt (DT) [ 37.555143] Call trace: [ 37.555591] show_stack+0x20/0x38 (C) [ 37.556111] dump_stack_lvl+0x8c/0xd0 [ 37.556405] print_report+0x118/0x5e0 [ 37.557178] kasan_report+0xc8/0x118 [ 37.557875] __asan_report_load8_noabort+0x20/0x30 [ 37.558724] kasan_atomics_helper+0x3e20/0x4858 [ 37.559529] kasan_atomics+0x198/0x2e8 [ 37.560104] kunit_try_run_case+0x14c/0x3d0 [ 37.560823] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.561637] kthread+0x24c/0x2d0 [ 37.562246] ret_from_fork+0x10/0x20 [ 37.562827] [ 37.563203] Allocated by task 254: [ 37.563691] kasan_save_stack+0x3c/0x68 [ 37.564331] kasan_save_track+0x20/0x40 [ 37.565032] kasan_save_alloc_info+0x40/0x58 [ 37.565797] __kasan_kmalloc+0xd4/0xd8 [ 37.566335] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.567092] kasan_atomics+0xb8/0x2e8 [ 37.567681] kunit_try_run_case+0x14c/0x3d0 [ 37.568398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.569158] kthread+0x24c/0x2d0 [ 37.569806] ret_from_fork+0x10/0x20 [ 37.570374] [ 37.570811] The buggy address belongs to the object at fff00000c69ef080 [ 37.570811] which belongs to the cache kmalloc-64 of size 64 [ 37.572127] The buggy address is located 0 bytes to the right of [ 37.572127] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.573485] [ 37.573927] The buggy address belongs to the physical page: [ 37.574638] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.575640] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.576603] page_type: f5(slab) [ 37.577126] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.578098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.579008] page dumped because: kasan: bad access detected [ 37.579748] [ 37.580159] Memory state around the buggy address: [ 37.580860] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.581777] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.582642] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.583542] ^ [ 37.584158] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.585083] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.585997] ================================================================== [ 36.588661] ================================================================== [ 36.589716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 36.590910] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.591702] [ 36.592108] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.593407] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.593934] Hardware name: linux,dummy-virt (DT) [ 36.594631] Call trace: [ 36.595104] show_stack+0x20/0x38 (C) [ 36.595796] dump_stack_lvl+0x8c/0xd0 [ 36.596351] print_report+0x118/0x5e0 [ 36.597004] kasan_report+0xc8/0x118 [ 36.597566] __asan_report_store8_noabort+0x20/0x30 [ 36.598326] kasan_atomics_helper+0x3e5c/0x4858 [ 36.598940] kasan_atomics+0x198/0x2e8 [ 36.599604] kunit_try_run_case+0x14c/0x3d0 [ 36.600316] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.601783] kthread+0x24c/0x2d0 [ 36.602339] ret_from_fork+0x10/0x20 [ 36.602885] [ 36.603265] Allocated by task 254: [ 36.603840] kasan_save_stack+0x3c/0x68 [ 36.604453] kasan_save_track+0x20/0x40 [ 36.605106] kasan_save_alloc_info+0x40/0x58 [ 36.605846] __kasan_kmalloc+0xd4/0xd8 [ 36.606469] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.607097] kasan_atomics+0xb8/0x2e8 [ 36.607714] kunit_try_run_case+0x14c/0x3d0 [ 36.608399] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.609191] kthread+0x24c/0x2d0 [ 36.609719] ret_from_fork+0x10/0x20 [ 36.610302] [ 36.610693] The buggy address belongs to the object at fff00000c69ef080 [ 36.610693] which belongs to the cache kmalloc-64 of size 64 [ 36.611897] The buggy address is located 0 bytes to the right of [ 36.611897] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.613247] [ 36.613649] The buggy address belongs to the physical page: [ 36.614301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.615333] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.616141] page_type: f5(slab) [ 36.616671] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.617601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.618371] page dumped because: kasan: bad access detected [ 36.619140] [ 36.619535] Memory state around the buggy address: [ 36.620180] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.621126] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.621887] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.622771] ^ [ 36.623429] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.624315] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.625171] ================================================================== [ 37.045413] ================================================================== [ 37.046393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 37.047404] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 37.048446] [ 37.048944] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 37.049775] Tainted: [B]=BAD_PAGE, [N]=TEST [ 37.050396] Hardware name: linux,dummy-virt (DT) [ 37.051112] Call trace: [ 37.051584] show_stack+0x20/0x38 (C) [ 37.052247] dump_stack_lvl+0x8c/0xd0 [ 37.052827] print_report+0x118/0x5e0 [ 37.053729] kasan_report+0xc8/0x118 [ 37.054271] kasan_check_range+0x100/0x1a8 [ 37.054928] __kasan_check_write+0x20/0x30 [ 37.055619] kasan_atomics_helper+0x1384/0x4858 [ 37.056281] kasan_atomics+0x198/0x2e8 [ 37.056950] kunit_try_run_case+0x14c/0x3d0 [ 37.057567] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.058357] kthread+0x24c/0x2d0 [ 37.058918] ret_from_fork+0x10/0x20 [ 37.059584] [ 37.059953] Allocated by task 254: [ 37.060449] kasan_save_stack+0x3c/0x68 [ 37.061114] kasan_save_track+0x20/0x40 [ 37.061734] kasan_save_alloc_info+0x40/0x58 [ 37.062419] __kasan_kmalloc+0xd4/0xd8 [ 37.063074] __kmalloc_cache_noprof+0x15c/0x3c0 [ 37.063685] kasan_atomics+0xb8/0x2e8 [ 37.064263] kunit_try_run_case+0x14c/0x3d0 [ 37.064956] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 37.065751] kthread+0x24c/0x2d0 [ 37.066276] ret_from_fork+0x10/0x20 [ 37.066864] [ 37.067248] The buggy address belongs to the object at fff00000c69ef080 [ 37.067248] which belongs to the cache kmalloc-64 of size 64 [ 37.068426] The buggy address is located 0 bytes to the right of [ 37.068426] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 37.069870] [ 37.070253] The buggy address belongs to the physical page: [ 37.071041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 37.071868] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 37.072727] page_type: f5(slab) [ 37.073307] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 37.074292] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 37.075150] page dumped because: kasan: bad access detected [ 37.075905] [ 37.076282] Memory state around the buggy address: [ 37.076939] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 37.077879] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 37.078780] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 37.079638] ^ [ 37.080326] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.081114] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 37.081904] ================================================================== [ 35.596223] ================================================================== [ 35.597234] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 35.598425] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.599456] [ 35.599918] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.601185] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.601741] Hardware name: linux,dummy-virt (DT) [ 35.602416] Call trace: [ 35.602943] show_stack+0x20/0x38 (C) [ 35.603565] dump_stack_lvl+0x8c/0xd0 [ 35.604261] print_report+0x118/0x5e0 [ 35.604893] kasan_report+0xc8/0x118 [ 35.605472] kasan_check_range+0x100/0x1a8 [ 35.606167] __kasan_check_write+0x20/0x30 [ 35.606821] kasan_atomics_helper+0x54c/0x4858 [ 35.607558] kasan_atomics+0x198/0x2e8 [ 35.608221] kunit_try_run_case+0x14c/0x3d0 [ 35.608955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.609652] kthread+0x24c/0x2d0 [ 35.610257] ret_from_fork+0x10/0x20 [ 35.610927] [ 35.611280] Allocated by task 254: [ 35.611831] kasan_save_stack+0x3c/0x68 [ 35.612462] kasan_save_track+0x20/0x40 [ 35.613184] kasan_save_alloc_info+0x40/0x58 [ 35.613855] __kasan_kmalloc+0xd4/0xd8 [ 35.614413] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.615066] kasan_atomics+0xb8/0x2e8 [ 35.615584] kunit_try_run_case+0x14c/0x3d0 [ 35.616302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.617098] kthread+0x24c/0x2d0 [ 35.617699] ret_from_fork+0x10/0x20 [ 35.618177] [ 35.618577] The buggy address belongs to the object at fff00000c69ef080 [ 35.618577] which belongs to the cache kmalloc-64 of size 64 [ 35.619686] The buggy address is located 0 bytes to the right of [ 35.619686] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.621141] [ 35.621541] The buggy address belongs to the physical page: [ 35.622138] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.623153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.624054] page_type: f5(slab) [ 35.624536] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.625437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.626311] page dumped because: kasan: bad access detected [ 35.627087] [ 35.627395] Memory state around the buggy address: [ 35.628013] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.628858] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.629722] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.630468] ^ [ 35.631161] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.631955] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.632818] ================================================================== [ 35.635238] ================================================================== [ 35.636199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 35.637054] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.637905] [ 35.638340] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.639286] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.639920] Hardware name: linux,dummy-virt (DT) [ 35.640614] Call trace: [ 35.641084] show_stack+0x20/0x38 (C) [ 35.641765] dump_stack_lvl+0x8c/0xd0 [ 35.642317] print_report+0x118/0x5e0 [ 35.642989] kasan_report+0xc8/0x118 [ 35.643622] kasan_check_range+0x100/0x1a8 [ 35.644251] __kasan_check_write+0x20/0x30 [ 35.644859] kasan_atomics_helper+0x5b4/0x4858 [ 35.645506] kasan_atomics+0x198/0x2e8 [ 35.646161] kunit_try_run_case+0x14c/0x3d0 [ 35.646786] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.647638] kthread+0x24c/0x2d0 [ 35.648227] ret_from_fork+0x10/0x20 [ 35.648814] [ 35.649181] Allocated by task 254: [ 35.649720] kasan_save_stack+0x3c/0x68 [ 35.650357] kasan_save_track+0x20/0x40 [ 35.650923] kasan_save_alloc_info+0x40/0x58 [ 35.651627] __kasan_kmalloc+0xd4/0xd8 [ 35.652252] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.652808] kasan_atomics+0xb8/0x2e8 [ 35.653435] kunit_try_run_case+0x14c/0x3d0 [ 35.654125] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.654880] kthread+0x24c/0x2d0 [ 35.655467] ret_from_fork+0x10/0x20 [ 35.656122] [ 35.656503] The buggy address belongs to the object at fff00000c69ef080 [ 35.656503] which belongs to the cache kmalloc-64 of size 64 [ 35.657644] The buggy address is located 0 bytes to the right of [ 35.657644] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.658844] [ 35.659221] The buggy address belongs to the physical page: [ 35.659965] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.660929] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.661676] page_type: f5(slab) [ 35.662212] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.663226] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.663990] page dumped because: kasan: bad access detected [ 35.664752] [ 35.665132] Memory state around the buggy address: [ 35.665718] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.666615] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.667571] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.668265] ^ [ 35.668976] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.669772] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.670558] ================================================================== [ 36.091041] ================================================================== [ 36.091874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 36.092788] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.093462] [ 36.093893] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.095101] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.095752] Hardware name: linux,dummy-virt (DT) [ 36.096287] Call trace: [ 36.096765] show_stack+0x20/0x38 (C) [ 36.097399] dump_stack_lvl+0x8c/0xd0 [ 36.098078] print_report+0x118/0x5e0 [ 36.098682] kasan_report+0xc8/0x118 [ 36.099343] kasan_check_range+0x100/0x1a8 [ 36.100035] __kasan_check_write+0x20/0x30 [ 36.100750] kasan_atomics_helper+0xad4/0x4858 [ 36.101408] kasan_atomics+0x198/0x2e8 [ 36.102016] kunit_try_run_case+0x14c/0x3d0 [ 36.102704] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.103555] kthread+0x24c/0x2d0 [ 36.104136] ret_from_fork+0x10/0x20 [ 36.104732] [ 36.105162] Allocated by task 254: [ 36.105629] kasan_save_stack+0x3c/0x68 [ 36.106217] kasan_save_track+0x20/0x40 [ 36.106829] kasan_save_alloc_info+0x40/0x58 [ 36.107458] __kasan_kmalloc+0xd4/0xd8 [ 36.108068] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.109150] kasan_atomics+0xb8/0x2e8 [ 36.109674] kunit_try_run_case+0x14c/0x3d0 [ 36.110255] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.111032] kthread+0x24c/0x2d0 [ 36.111620] ret_from_fork+0x10/0x20 [ 36.112267] [ 36.112664] The buggy address belongs to the object at fff00000c69ef080 [ 36.112664] which belongs to the cache kmalloc-64 of size 64 [ 36.113919] The buggy address is located 0 bytes to the right of [ 36.113919] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.115249] [ 36.115675] The buggy address belongs to the physical page: [ 36.116431] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.117447] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.118320] page_type: f5(slab) [ 36.118924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.119953] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.120982] page dumped because: kasan: bad access detected [ 36.121772] [ 36.122201] Memory state around the buggy address: [ 36.122864] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.123869] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.124800] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.125776] ^ [ 36.126345] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.127318] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.128300] ================================================================== [ 36.210102] ================================================================== [ 36.210797] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 36.211792] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.212692] [ 36.213081] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.214146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.214796] Hardware name: linux,dummy-virt (DT) [ 36.215489] Call trace: [ 36.215986] show_stack+0x20/0x38 (C) [ 36.216649] dump_stack_lvl+0x8c/0xd0 [ 36.217264] print_report+0x118/0x5e0 [ 36.217787] kasan_report+0xc8/0x118 [ 36.218420] __asan_report_load4_noabort+0x20/0x30 [ 36.219133] kasan_atomics_helper+0x3dbc/0x4858 [ 36.219869] kasan_atomics+0x198/0x2e8 [ 36.220438] kunit_try_run_case+0x14c/0x3d0 [ 36.221075] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.221851] kthread+0x24c/0x2d0 [ 36.222457] ret_from_fork+0x10/0x20 [ 36.223126] [ 36.223440] Allocated by task 254: [ 36.224026] kasan_save_stack+0x3c/0x68 [ 36.224628] kasan_save_track+0x20/0x40 [ 36.225158] kasan_save_alloc_info+0x40/0x58 [ 36.225874] __kasan_kmalloc+0xd4/0xd8 [ 36.226496] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.227128] kasan_atomics+0xb8/0x2e8 [ 36.227775] kunit_try_run_case+0x14c/0x3d0 [ 36.228444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.229202] kthread+0x24c/0x2d0 [ 36.229772] ret_from_fork+0x10/0x20 [ 36.230381] [ 36.230758] The buggy address belongs to the object at fff00000c69ef080 [ 36.230758] which belongs to the cache kmalloc-64 of size 64 [ 36.231956] The buggy address is located 0 bytes to the right of [ 36.231956] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.233185] [ 36.233592] The buggy address belongs to the physical page: [ 36.234331] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.235183] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.236010] page_type: f5(slab) [ 36.236584] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.237466] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.238317] page dumped because: kasan: bad access detected [ 36.238962] [ 36.239338] Memory state around the buggy address: [ 36.240041] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.240847] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.241626] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.242427] ^ [ 36.243151] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.243916] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.244569] ================================================================== [ 36.398494] ================================================================== [ 36.399859] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 36.400841] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.401704] [ 36.402098] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.403363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.403863] Hardware name: linux,dummy-virt (DT) [ 36.404551] Call trace: [ 36.404947] show_stack+0x20/0x38 (C) [ 36.405622] dump_stack_lvl+0x8c/0xd0 [ 36.406225] print_report+0x118/0x5e0 [ 36.406828] kasan_report+0xc8/0x118 [ 36.407483] kasan_check_range+0x100/0x1a8 [ 36.408196] __kasan_check_write+0x20/0x30 [ 36.408836] kasan_atomics_helper+0xd3c/0x4858 [ 36.409586] kasan_atomics+0x198/0x2e8 [ 36.410243] kunit_try_run_case+0x14c/0x3d0 [ 36.410984] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.411741] kthread+0x24c/0x2d0 [ 36.412245] ret_from_fork+0x10/0x20 [ 36.412914] [ 36.413285] Allocated by task 254: [ 36.413836] kasan_save_stack+0x3c/0x68 [ 36.414468] kasan_save_track+0x20/0x40 [ 36.415048] kasan_save_alloc_info+0x40/0x58 [ 36.415668] __kasan_kmalloc+0xd4/0xd8 [ 36.416330] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.416909] kasan_atomics+0xb8/0x2e8 [ 36.417538] kunit_try_run_case+0x14c/0x3d0 [ 36.418115] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.418874] kthread+0x24c/0x2d0 [ 36.419452] ret_from_fork+0x10/0x20 [ 36.420017] [ 36.420346] The buggy address belongs to the object at fff00000c69ef080 [ 36.420346] which belongs to the cache kmalloc-64 of size 64 [ 36.421640] The buggy address is located 0 bytes to the right of [ 36.421640] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.422871] [ 36.423252] The buggy address belongs to the physical page: [ 36.423953] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.424903] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.425775] page_type: f5(slab) [ 36.426317] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.427244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.428015] page dumped because: kasan: bad access detected [ 36.428772] [ 36.429147] Memory state around the buggy address: [ 36.430110] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.430965] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.431786] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.432603] ^ [ 36.433239] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.434089] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.434915] ================================================================== [ 35.443206] ================================================================== [ 35.443876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 35.444500] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.445319] [ 35.445750] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.447927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.448493] Hardware name: linux,dummy-virt (DT) [ 35.449200] Call trace: [ 35.449673] show_stack+0x20/0x38 (C) [ 35.450219] dump_stack_lvl+0x8c/0xd0 [ 35.450912] print_report+0x118/0x5e0 [ 35.451585] kasan_report+0xc8/0x118 [ 35.452205] kasan_check_range+0x100/0x1a8 [ 35.452848] __kasan_check_write+0x20/0x30 [ 35.453481] kasan_atomics_helper+0x3ac/0x4858 [ 35.454123] kasan_atomics+0x198/0x2e8 [ 35.454737] kunit_try_run_case+0x14c/0x3d0 [ 35.455400] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.456103] kthread+0x24c/0x2d0 [ 35.456732] ret_from_fork+0x10/0x20 [ 35.457373] [ 35.457734] Allocated by task 254: [ 35.458243] kasan_save_stack+0x3c/0x68 [ 35.458868] kasan_save_track+0x20/0x40 [ 35.459488] kasan_save_alloc_info+0x40/0x58 [ 35.460178] __kasan_kmalloc+0xd4/0xd8 [ 35.460822] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.461533] kasan_atomics+0xb8/0x2e8 [ 35.462055] kunit_try_run_case+0x14c/0x3d0 [ 35.463208] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.464075] kthread+0x24c/0x2d0 [ 35.464551] ret_from_fork+0x10/0x20 [ 35.465150] [ 35.465557] The buggy address belongs to the object at fff00000c69ef080 [ 35.465557] which belongs to the cache kmalloc-64 of size 64 [ 35.466771] The buggy address is located 0 bytes to the right of [ 35.466771] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.468029] [ 35.468412] The buggy address belongs to the physical page: [ 35.469180] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.470076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.470779] page_type: f5(slab) [ 35.471359] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.472241] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.473092] page dumped because: kasan: bad access detected [ 35.473883] [ 35.474287] Memory state around the buggy address: [ 35.474997] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.475977] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.476848] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.477574] ^ [ 35.478271] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.479051] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.479845] ================================================================== [ 36.664179] ================================================================== [ 36.665139] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 36.665840] Write of size 8 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.666927] [ 36.667338] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.668702] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.669343] Hardware name: linux,dummy-virt (DT) [ 36.670072] Call trace: [ 36.670595] show_stack+0x20/0x38 (C) [ 36.671280] dump_stack_lvl+0x8c/0xd0 [ 36.671888] print_report+0x118/0x5e0 [ 36.672577] kasan_report+0xc8/0x118 [ 36.673120] kasan_check_range+0x100/0x1a8 [ 36.673834] __kasan_check_write+0x20/0x30 [ 36.674452] kasan_atomics_helper+0xf20/0x4858 [ 36.675101] kasan_atomics+0x198/0x2e8 [ 36.675746] kunit_try_run_case+0x14c/0x3d0 [ 36.676460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.677281] kthread+0x24c/0x2d0 [ 36.677926] ret_from_fork+0x10/0x20 [ 36.678594] [ 36.678990] Allocated by task 254: [ 36.679426] kasan_save_stack+0x3c/0x68 [ 36.680270] kasan_save_track+0x20/0x40 [ 36.680868] kasan_save_alloc_info+0x40/0x58 [ 36.681418] __kasan_kmalloc+0xd4/0xd8 [ 36.681906] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.682408] kasan_atomics+0xb8/0x2e8 [ 36.682885] kunit_try_run_case+0x14c/0x3d0 [ 36.683572] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.684336] kthread+0x24c/0x2d0 [ 36.684870] ret_from_fork+0x10/0x20 [ 36.685472] [ 36.685865] The buggy address belongs to the object at fff00000c69ef080 [ 36.685865] which belongs to the cache kmalloc-64 of size 64 [ 36.686855] The buggy address is located 0 bytes to the right of [ 36.686855] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.687820] [ 36.688092] The buggy address belongs to the physical page: [ 36.688593] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.689633] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.690539] page_type: f5(slab) [ 36.691118] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.692142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.693108] page dumped because: kasan: bad access detected [ 36.693823] [ 36.694191] Memory state around the buggy address: [ 36.694903] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.696734] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.698015] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.698834] ^ [ 36.699437] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.700249] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.701080] ================================================================== [ 36.322177] ================================================================== [ 36.323053] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 36.324003] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.324792] [ 36.325137] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.326453] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.327095] Hardware name: linux,dummy-virt (DT) [ 36.327788] Call trace: [ 36.328212] show_stack+0x20/0x38 (C) [ 36.328890] dump_stack_lvl+0x8c/0xd0 [ 36.329573] print_report+0x118/0x5e0 [ 36.330179] kasan_report+0xc8/0x118 [ 36.330809] kasan_check_range+0x100/0x1a8 [ 36.331526] __kasan_check_write+0x20/0x30 [ 36.332219] kasan_atomics_helper+0xca0/0x4858 [ 36.332915] kasan_atomics+0x198/0x2e8 [ 36.333561] kunit_try_run_case+0x14c/0x3d0 [ 36.334280] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.335143] kthread+0x24c/0x2d0 [ 36.335722] ret_from_fork+0x10/0x20 [ 36.336348] [ 36.336939] Allocated by task 254: [ 36.337495] kasan_save_stack+0x3c/0x68 [ 36.338155] kasan_save_track+0x20/0x40 [ 36.338758] kasan_save_alloc_info+0x40/0x58 [ 36.339482] __kasan_kmalloc+0xd4/0xd8 [ 36.340075] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.340795] kasan_atomics+0xb8/0x2e8 [ 36.341457] kunit_try_run_case+0x14c/0x3d0 [ 36.342160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.343019] kthread+0x24c/0x2d0 [ 36.343571] ret_from_fork+0x10/0x20 [ 36.344139] [ 36.344458] The buggy address belongs to the object at fff00000c69ef080 [ 36.344458] which belongs to the cache kmalloc-64 of size 64 [ 36.345688] The buggy address is located 0 bytes to the right of [ 36.345688] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.347030] [ 36.347410] The buggy address belongs to the physical page: [ 36.348117] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.348981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.349815] page_type: f5(slab) [ 36.350313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.351195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.352066] page dumped because: kasan: bad access detected [ 36.352743] [ 36.353111] Memory state around the buggy address: [ 36.353647] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.354539] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.355273] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.356183] ^ [ 36.356806] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.357692] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.358532] ================================================================== [ 36.436231] ================================================================== [ 36.437054] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 36.438436] Read of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 36.439289] [ 36.439711] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 36.440856] Tainted: [B]=BAD_PAGE, [N]=TEST [ 36.441392] Hardware name: linux,dummy-virt (DT) [ 36.442089] Call trace: [ 36.442563] show_stack+0x20/0x38 (C) [ 36.443121] dump_stack_lvl+0x8c/0xd0 [ 36.443750] print_report+0x118/0x5e0 [ 36.444284] kasan_report+0xc8/0x118 [ 36.444937] __asan_report_load4_noabort+0x20/0x30 [ 36.445732] kasan_atomics_helper+0x3e04/0x4858 [ 36.446471] kasan_atomics+0x198/0x2e8 [ 36.447127] kunit_try_run_case+0x14c/0x3d0 [ 36.447766] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.448502] kthread+0x24c/0x2d0 [ 36.449014] ret_from_fork+0x10/0x20 [ 36.449677] [ 36.450018] Allocated by task 254: [ 36.450599] kasan_save_stack+0x3c/0x68 [ 36.451225] kasan_save_track+0x20/0x40 [ 36.451824] kasan_save_alloc_info+0x40/0x58 [ 36.452416] __kasan_kmalloc+0xd4/0xd8 [ 36.453063] __kmalloc_cache_noprof+0x15c/0x3c0 [ 36.453695] kasan_atomics+0xb8/0x2e8 [ 36.454249] kunit_try_run_case+0x14c/0x3d0 [ 36.454952] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 36.455721] kthread+0x24c/0x2d0 [ 36.456240] ret_from_fork+0x10/0x20 [ 36.456876] [ 36.457251] The buggy address belongs to the object at fff00000c69ef080 [ 36.457251] which belongs to the cache kmalloc-64 of size 64 [ 36.458441] The buggy address is located 0 bytes to the right of [ 36.458441] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 36.459857] [ 36.460219] The buggy address belongs to the physical page: [ 36.460993] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 36.461921] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 36.462793] page_type: f5(slab) [ 36.463376] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 36.464221] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 36.465189] page dumped because: kasan: bad access detected [ 36.465936] [ 36.466317] Memory state around the buggy address: [ 36.466958] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 36.467793] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 36.468625] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 36.469403] ^ [ 36.470108] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.470939] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 36.471861] ================================================================== [ 35.162576] ================================================================== [ 35.163669] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 35.164545] Write of size 4 at addr fff00000c69ef0b0 by task kunit_try_catch/254 [ 35.165654] [ 35.166200] CPU: 0 UID: 0 PID: 254 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 35.167768] Tainted: [B]=BAD_PAGE, [N]=TEST [ 35.168213] Hardware name: linux,dummy-virt (DT) [ 35.168754] Call trace: [ 35.169295] show_stack+0x20/0x38 (C) [ 35.170001] dump_stack_lvl+0x8c/0xd0 [ 35.170692] print_report+0x118/0x5e0 [ 35.171826] kasan_report+0xc8/0x118 [ 35.172482] __asan_report_store4_noabort+0x20/0x30 [ 35.173379] kasan_atomics_helper+0x3f7c/0x4858 [ 35.174133] kasan_atomics+0x198/0x2e8 [ 35.174833] kunit_try_run_case+0x14c/0x3d0 [ 35.175808] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.176600] kthread+0x24c/0x2d0 [ 35.177204] ret_from_fork+0x10/0x20 [ 35.177910] [ 35.178204] Allocated by task 254: [ 35.179175] kasan_save_stack+0x3c/0x68 [ 35.179828] kasan_save_track+0x20/0x40 [ 35.180373] kasan_save_alloc_info+0x40/0x58 [ 35.181634] __kasan_kmalloc+0xd4/0xd8 [ 35.182435] __kmalloc_cache_noprof+0x15c/0x3c0 [ 35.183307] kasan_atomics+0xb8/0x2e8 [ 35.183907] kunit_try_run_case+0x14c/0x3d0 [ 35.184215] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 35.184571] kthread+0x24c/0x2d0 [ 35.185072] ret_from_fork+0x10/0x20 [ 35.185824] [ 35.186248] The buggy address belongs to the object at fff00000c69ef080 [ 35.186248] which belongs to the cache kmalloc-64 of size 64 [ 35.187645] The buggy address is located 0 bytes to the right of [ 35.187645] allocated 48-byte region [fff00000c69ef080, fff00000c69ef0b0) [ 35.189100] [ 35.189419] The buggy address belongs to the physical page: [ 35.190304] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1069ef [ 35.191270] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 35.192113] page_type: f5(slab) [ 35.192739] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 35.193546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 35.194617] page dumped because: kasan: bad access detected [ 35.195271] [ 35.195729] Memory state around the buggy address: [ 35.196467] fff00000c69eef80: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff [ 35.197326] fff00000c69ef000: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 35.198750] >fff00000c69ef080: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 35.199652] ^ [ 35.200129] fff00000c69ef100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.201778] fff00000c69ef180: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.202769] ==================================================================
[ 28.862205] ================================================================== [ 28.864294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 28.864984] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.865841] [ 28.866344] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.867318] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.867819] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.869784] Call Trace: [ 28.870124] <TASK> [ 28.870402] dump_stack_lvl+0x73/0xb0 [ 28.870828] print_report+0xd1/0x640 [ 28.871127] ? __virt_addr_valid+0x1db/0x2d0 [ 28.871958] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.873205] kasan_report+0x102/0x140 [ 28.873732] ? kasan_atomics_helper+0x730/0x5450 [ 28.874489] ? kasan_atomics_helper+0x730/0x5450 [ 28.875138] kasan_check_range+0x10c/0x1c0 [ 28.875483] __kasan_check_write+0x18/0x20 [ 28.875794] kasan_atomics_helper+0x730/0x5450 [ 28.876482] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.877512] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.877987] ? trace_hardirqs_on+0x37/0xe0 [ 28.879066] ? kasan_atomics+0x153/0x310 [ 28.879441] kasan_atomics+0x1dd/0x310 [ 28.879823] ? __pfx_kasan_atomics+0x10/0x10 [ 28.880231] ? __pfx_kasan_atomics+0x10/0x10 [ 28.880694] kunit_try_run_case+0x1b3/0x490 [ 28.882623] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.883328] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.883825] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.884674] ? __kthread_parkme+0x82/0x160 [ 28.885324] ? preempt_count_sub+0x50/0x80 [ 28.885751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.886686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.887221] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.888226] kthread+0x257/0x310 [ 28.888617] ? __pfx_kthread+0x10/0x10 [ 28.889419] ret_from_fork+0x41/0x80 [ 28.889728] ? __pfx_kthread+0x10/0x10 [ 28.890654] ret_from_fork_asm+0x1a/0x30 [ 28.891127] </TASK> [ 28.891348] [ 28.891612] Allocated by task 273: [ 28.891885] kasan_save_stack+0x3d/0x60 [ 28.893012] kasan_save_track+0x18/0x40 [ 28.893435] kasan_save_alloc_info+0x3b/0x50 [ 28.893876] __kasan_kmalloc+0xb7/0xc0 [ 28.894249] __kmalloc_cache_noprof+0x184/0x410 [ 28.894675] kasan_atomics+0x96/0x310 [ 28.895646] kunit_try_run_case+0x1b3/0x490 [ 28.895975] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.897385] kthread+0x257/0x310 [ 28.897800] ret_from_fork+0x41/0x80 [ 28.898297] ret_from_fork_asm+0x1a/0x30 [ 28.899090] [ 28.899613] The buggy address belongs to the object at ffff888102486200 [ 28.899613] which belongs to the cache kmalloc-64 of size 64 [ 28.900761] The buggy address is located 0 bytes to the right of [ 28.900761] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.902363] [ 28.902806] The buggy address belongs to the physical page: [ 28.903629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.904511] flags: 0x200000000000000(node=0|zone=2) [ 28.904744] page_type: f5(slab) [ 28.904912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.905429] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.906767] page dumped because: kasan: bad access detected [ 28.907165] [ 28.907431] Memory state around the buggy address: [ 28.908141] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.909549] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.910136] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.911120] ^ [ 28.911738] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.912994] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.913647] ================================================================== [ 30.462356] ================================================================== [ 30.463920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 30.465346] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.466148] [ 30.466459] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.467427] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.467977] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.469020] Call Trace: [ 30.469501] <TASK> [ 30.469891] dump_stack_lvl+0x73/0xb0 [ 30.470303] print_report+0xd1/0x640 [ 30.470802] ? __virt_addr_valid+0x1db/0x2d0 [ 30.471388] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.472103] kasan_report+0x102/0x140 [ 30.472591] ? kasan_atomics_helper+0x1819/0x5450 [ 30.473330] ? kasan_atomics_helper+0x1819/0x5450 [ 30.473786] kasan_check_range+0x10c/0x1c0 [ 30.474208] __kasan_check_write+0x18/0x20 [ 30.474795] kasan_atomics_helper+0x1819/0x5450 [ 30.475434] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.475837] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.476500] ? trace_hardirqs_on+0x37/0xe0 [ 30.477247] ? kasan_atomics+0x153/0x310 [ 30.477677] kasan_atomics+0x1dd/0x310 [ 30.478041] ? __pfx_kasan_atomics+0x10/0x10 [ 30.478646] ? __pfx_kasan_atomics+0x10/0x10 [ 30.479292] kunit_try_run_case+0x1b3/0x490 [ 30.479636] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.479982] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.480682] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.481646] ? __kthread_parkme+0x82/0x160 [ 30.482032] ? preempt_count_sub+0x50/0x80 [ 30.482738] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.483231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.483747] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.484762] kthread+0x257/0x310 [ 30.485104] ? __pfx_kthread+0x10/0x10 [ 30.485343] ret_from_fork+0x41/0x80 [ 30.485525] ? __pfx_kthread+0x10/0x10 [ 30.485709] ret_from_fork_asm+0x1a/0x30 [ 30.485926] </TASK> [ 30.486304] [ 30.486682] Allocated by task 273: [ 30.486996] kasan_save_stack+0x3d/0x60 [ 30.487727] kasan_save_track+0x18/0x40 [ 30.488642] kasan_save_alloc_info+0x3b/0x50 [ 30.489536] __kasan_kmalloc+0xb7/0xc0 [ 30.490157] __kmalloc_cache_noprof+0x184/0x410 [ 30.490894] kasan_atomics+0x96/0x310 [ 30.491505] kunit_try_run_case+0x1b3/0x490 [ 30.492007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.492593] kthread+0x257/0x310 [ 30.493037] ret_from_fork+0x41/0x80 [ 30.493483] ret_from_fork_asm+0x1a/0x30 [ 30.493996] [ 30.494381] The buggy address belongs to the object at ffff888102486200 [ 30.494381] which belongs to the cache kmalloc-64 of size 64 [ 30.495647] The buggy address is located 0 bytes to the right of [ 30.495647] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.496962] [ 30.497281] The buggy address belongs to the physical page: [ 30.497757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.498620] flags: 0x200000000000000(node=0|zone=2) [ 30.499308] page_type: f5(slab) [ 30.499775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.500663] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.501585] page dumped because: kasan: bad access detected [ 30.502231] [ 30.502513] Memory state around the buggy address: [ 30.503050] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.503838] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.504688] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.505391] ^ [ 30.506164] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.506859] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.507686] ================================================================== [ 28.623333] ================================================================== [ 28.624122] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 28.625033] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.625767] [ 28.626097] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.627725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.628323] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.629256] Call Trace: [ 28.629519] <TASK> [ 28.630182] dump_stack_lvl+0x73/0xb0 [ 28.630566] print_report+0xd1/0x640 [ 28.630959] ? __virt_addr_valid+0x1db/0x2d0 [ 28.631713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.632157] kasan_report+0x102/0x140 [ 28.632981] ? kasan_atomics_helper+0x4a1/0x5450 [ 28.633738] ? kasan_atomics_helper+0x4a1/0x5450 [ 28.634601] kasan_check_range+0x10c/0x1c0 [ 28.635014] __kasan_check_write+0x18/0x20 [ 28.635814] kasan_atomics_helper+0x4a1/0x5450 [ 28.636288] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.636913] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.637447] ? trace_hardirqs_on+0x37/0xe0 [ 28.637884] ? kasan_atomics+0x153/0x310 [ 28.638282] kasan_atomics+0x1dd/0x310 [ 28.639177] ? __pfx_kasan_atomics+0x10/0x10 [ 28.639729] ? __pfx_kasan_atomics+0x10/0x10 [ 28.640153] kunit_try_run_case+0x1b3/0x490 [ 28.640994] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.641619] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.642074] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.642959] ? __kthread_parkme+0x82/0x160 [ 28.643527] ? preempt_count_sub+0x50/0x80 [ 28.643949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.644781] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.645374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.646050] kthread+0x257/0x310 [ 28.646545] ? __pfx_kthread+0x10/0x10 [ 28.646985] ret_from_fork+0x41/0x80 [ 28.647872] ? __pfx_kthread+0x10/0x10 [ 28.648280] ret_from_fork_asm+0x1a/0x30 [ 28.648745] </TASK> [ 28.649360] [ 28.649561] Allocated by task 273: [ 28.649891] kasan_save_stack+0x3d/0x60 [ 28.650629] kasan_save_track+0x18/0x40 [ 28.651281] kasan_save_alloc_info+0x3b/0x50 [ 28.651714] __kasan_kmalloc+0xb7/0xc0 [ 28.652096] __kmalloc_cache_noprof+0x184/0x410 [ 28.653096] kasan_atomics+0x96/0x310 [ 28.653361] kunit_try_run_case+0x1b3/0x490 [ 28.654275] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.655005] kthread+0x257/0x310 [ 28.655422] ret_from_fork+0x41/0x80 [ 28.656025] ret_from_fork_asm+0x1a/0x30 [ 28.656646] [ 28.656901] The buggy address belongs to the object at ffff888102486200 [ 28.656901] which belongs to the cache kmalloc-64 of size 64 [ 28.658221] The buggy address is located 0 bytes to the right of [ 28.658221] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.659136] [ 28.659353] The buggy address belongs to the physical page: [ 28.659757] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.661287] flags: 0x200000000000000(node=0|zone=2) [ 28.661877] page_type: f5(slab) [ 28.662291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.663169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.664067] page dumped because: kasan: bad access detected [ 28.664867] [ 28.665240] Memory state around the buggy address: [ 28.666040] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.666726] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.667487] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.668256] ^ [ 28.668739] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.669572] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.670585] ================================================================== [ 30.316221] ================================================================== [ 30.317662] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 30.318181] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.320698] [ 30.320967] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.321983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.322428] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.323496] Call Trace: [ 30.323828] <TASK> [ 30.324215] dump_stack_lvl+0x73/0xb0 [ 30.324649] print_report+0xd1/0x640 [ 30.325167] ? __virt_addr_valid+0x1db/0x2d0 [ 30.325539] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.326306] kasan_report+0x102/0x140 [ 30.326888] ? kasan_atomics_helper+0x1650/0x5450 [ 30.327486] ? kasan_atomics_helper+0x1650/0x5450 [ 30.327882] kasan_check_range+0x10c/0x1c0 [ 30.328477] __kasan_check_write+0x18/0x20 [ 30.329100] kasan_atomics_helper+0x1650/0x5450 [ 30.329858] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.330420] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.330989] ? trace_hardirqs_on+0x37/0xe0 [ 30.331569] ? kasan_atomics+0x153/0x310 [ 30.331989] kasan_atomics+0x1dd/0x310 [ 30.332441] ? __pfx_kasan_atomics+0x10/0x10 [ 30.332977] ? __pfx_kasan_atomics+0x10/0x10 [ 30.333299] kunit_try_run_case+0x1b3/0x490 [ 30.333910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.334652] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.335156] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.335624] ? __kthread_parkme+0x82/0x160 [ 30.336055] ? preempt_count_sub+0x50/0x80 [ 30.336680] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.337222] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.337988] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.338492] kthread+0x257/0x310 [ 30.338893] ? __pfx_kthread+0x10/0x10 [ 30.339396] ret_from_fork+0x41/0x80 [ 30.339852] ? __pfx_kthread+0x10/0x10 [ 30.340388] ret_from_fork_asm+0x1a/0x30 [ 30.341458] </TASK> [ 30.342271] [ 30.342531] Allocated by task 273: [ 30.343610] kasan_save_stack+0x3d/0x60 [ 30.344137] kasan_save_track+0x18/0x40 [ 30.344481] kasan_save_alloc_info+0x3b/0x50 [ 30.345027] __kasan_kmalloc+0xb7/0xc0 [ 30.345604] __kmalloc_cache_noprof+0x184/0x410 [ 30.346174] kasan_atomics+0x96/0x310 [ 30.346591] kunit_try_run_case+0x1b3/0x490 [ 30.347130] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.347637] kthread+0x257/0x310 [ 30.348158] ret_from_fork+0x41/0x80 [ 30.348488] ret_from_fork_asm+0x1a/0x30 [ 30.349107] [ 30.349317] The buggy address belongs to the object at ffff888102486200 [ 30.349317] which belongs to the cache kmalloc-64 of size 64 [ 30.350473] The buggy address is located 0 bytes to the right of [ 30.350473] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.351641] [ 30.351925] The buggy address belongs to the physical page: [ 30.352449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.353370] flags: 0x200000000000000(node=0|zone=2) [ 30.353897] page_type: f5(slab) [ 30.354437] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.354989] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.355781] page dumped because: kasan: bad access detected [ 30.356197] [ 30.356452] Memory state around the buggy address: [ 30.357126] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.358069] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.358531] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.359094] ^ [ 30.359766] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.360890] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.361553] ================================================================== [ 30.707293] ================================================================== [ 30.708632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 30.709575] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.710517] [ 30.711434] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.712968] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.713434] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.714320] Call Trace: [ 30.714685] <TASK> [ 30.714995] dump_stack_lvl+0x73/0xb0 [ 30.715479] print_report+0xd1/0x640 [ 30.715795] ? __virt_addr_valid+0x1db/0x2d0 [ 30.716448] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.717054] kasan_report+0x102/0x140 [ 30.717611] ? kasan_atomics_helper+0x1b23/0x5450 [ 30.718420] ? kasan_atomics_helper+0x1b23/0x5450 [ 30.718800] kasan_check_range+0x10c/0x1c0 [ 30.719497] __kasan_check_write+0x18/0x20 [ 30.719862] kasan_atomics_helper+0x1b23/0x5450 [ 30.720710] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.721206] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.721865] ? trace_hardirqs_on+0x37/0xe0 [ 30.722546] ? kasan_atomics+0x153/0x310 [ 30.723049] kasan_atomics+0x1dd/0x310 [ 30.723487] ? __pfx_kasan_atomics+0x10/0x10 [ 30.724548] ? __pfx_kasan_atomics+0x10/0x10 [ 30.725011] kunit_try_run_case+0x1b3/0x490 [ 30.725899] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.726532] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.727635] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.727995] ? __kthread_parkme+0x82/0x160 [ 30.728676] ? preempt_count_sub+0x50/0x80 [ 30.729023] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.729758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.730705] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.731207] kthread+0x257/0x310 [ 30.731896] ? __pfx_kthread+0x10/0x10 [ 30.732397] ret_from_fork+0x41/0x80 [ 30.732908] ? __pfx_kthread+0x10/0x10 [ 30.733385] ret_from_fork_asm+0x1a/0x30 [ 30.733891] </TASK> [ 30.734337] [ 30.734512] Allocated by task 273: [ 30.734851] kasan_save_stack+0x3d/0x60 [ 30.735535] kasan_save_track+0x18/0x40 [ 30.735864] kasan_save_alloc_info+0x3b/0x50 [ 30.736198] __kasan_kmalloc+0xb7/0xc0 [ 30.736793] __kmalloc_cache_noprof+0x184/0x410 [ 30.737681] kasan_atomics+0x96/0x310 [ 30.738181] kunit_try_run_case+0x1b3/0x490 [ 30.738636] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.739023] kthread+0x257/0x310 [ 30.739771] ret_from_fork+0x41/0x80 [ 30.740368] ret_from_fork_asm+0x1a/0x30 [ 30.740968] [ 30.741258] The buggy address belongs to the object at ffff888102486200 [ 30.741258] which belongs to the cache kmalloc-64 of size 64 [ 30.742067] The buggy address is located 0 bytes to the right of [ 30.742067] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.743438] [ 30.743752] The buggy address belongs to the physical page: [ 30.744832] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.745653] flags: 0x200000000000000(node=0|zone=2) [ 30.746096] page_type: f5(slab) [ 30.746540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.747475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.747999] page dumped because: kasan: bad access detected [ 30.749041] [ 30.749337] Memory state around the buggy address: [ 30.750080] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.750597] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.751308] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.752073] ^ [ 30.752330] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.752610] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.752882] ================================================================== [ 29.253513] ================================================================== [ 29.255260] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 29.256102] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.257622] [ 29.257928] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.259128] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.259509] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.260248] Call Trace: [ 29.261070] <TASK> [ 29.261299] dump_stack_lvl+0x73/0xb0 [ 29.262183] print_report+0xd1/0x640 [ 29.262758] ? __virt_addr_valid+0x1db/0x2d0 [ 29.263488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.264021] kasan_report+0x102/0x140 [ 29.264764] ? kasan_atomics_helper+0xc71/0x5450 [ 29.265215] ? kasan_atomics_helper+0xc71/0x5450 [ 29.266053] kasan_check_range+0x10c/0x1c0 [ 29.266464] __kasan_check_write+0x18/0x20 [ 29.266870] kasan_atomics_helper+0xc71/0x5450 [ 29.267862] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.268384] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.269092] ? trace_hardirqs_on+0x37/0xe0 [ 29.269709] ? kasan_atomics+0x153/0x310 [ 29.270452] kasan_atomics+0x1dd/0x310 [ 29.270842] ? __pfx_kasan_atomics+0x10/0x10 [ 29.271525] ? __pfx_kasan_atomics+0x10/0x10 [ 29.272014] kunit_try_run_case+0x1b3/0x490 [ 29.272820] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.273192] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.273851] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.274605] ? __kthread_parkme+0x82/0x160 [ 29.275397] ? preempt_count_sub+0x50/0x80 [ 29.275979] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.276692] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.277245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.278351] kthread+0x257/0x310 [ 29.278946] ? __pfx_kthread+0x10/0x10 [ 29.279395] ret_from_fork+0x41/0x80 [ 29.280139] ? __pfx_kthread+0x10/0x10 [ 29.280794] ret_from_fork_asm+0x1a/0x30 [ 29.281559] </TASK> [ 29.281979] [ 29.282640] Allocated by task 273: [ 29.283243] kasan_save_stack+0x3d/0x60 [ 29.283871] kasan_save_track+0x18/0x40 [ 29.284386] kasan_save_alloc_info+0x3b/0x50 [ 29.284764] __kasan_kmalloc+0xb7/0xc0 [ 29.285225] __kmalloc_cache_noprof+0x184/0x410 [ 29.285919] kasan_atomics+0x96/0x310 [ 29.286278] kunit_try_run_case+0x1b3/0x490 [ 29.286706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.287234] kthread+0x257/0x310 [ 29.287714] ret_from_fork+0x41/0x80 [ 29.288146] ret_from_fork_asm+0x1a/0x30 [ 29.288632] [ 29.288803] The buggy address belongs to the object at ffff888102486200 [ 29.288803] which belongs to the cache kmalloc-64 of size 64 [ 29.290347] The buggy address is located 0 bytes to the right of [ 29.290347] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.291490] [ 29.291674] The buggy address belongs to the physical page: [ 29.292037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.293248] flags: 0x200000000000000(node=0|zone=2) [ 29.293841] page_type: f5(slab) [ 29.294249] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.295029] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.295504] page dumped because: kasan: bad access detected [ 29.296165] [ 29.296461] Memory state around the buggy address: [ 29.296974] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.297701] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.298529] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.298990] ^ [ 29.299342] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300242] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.300883] ================================================================== [ 31.429096] ================================================================== [ 31.429734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 31.430406] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.431062] [ 31.431432] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.432180] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.432521] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.433889] Call Trace: [ 31.434160] <TASK> [ 31.434364] dump_stack_lvl+0x73/0xb0 [ 31.435121] print_report+0xd1/0x640 [ 31.435708] ? __virt_addr_valid+0x1db/0x2d0 [ 31.436488] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.437065] kasan_report+0x102/0x140 [ 31.437491] ? kasan_atomics_helper+0x4fa7/0x5450 [ 31.438030] ? kasan_atomics_helper+0x4fa7/0x5450 [ 31.440393] __asan_report_load8_noabort+0x18/0x20 [ 31.440645] kasan_atomics_helper+0x4fa7/0x5450 [ 31.440860] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.441829] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.442337] ? trace_hardirqs_on+0x37/0xe0 [ 31.442952] ? kasan_atomics+0x153/0x310 [ 31.443399] kasan_atomics+0x1dd/0x310 [ 31.443893] ? __pfx_kasan_atomics+0x10/0x10 [ 31.444332] ? __pfx_kasan_atomics+0x10/0x10 [ 31.444693] kunit_try_run_case+0x1b3/0x490 [ 31.445372] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.445973] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.446440] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.447151] ? __kthread_parkme+0x82/0x160 [ 31.447583] ? preempt_count_sub+0x50/0x80 [ 31.448188] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.448738] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.449378] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.450068] kthread+0x257/0x310 [ 31.450478] ? __pfx_kthread+0x10/0x10 [ 31.450983] ret_from_fork+0x41/0x80 [ 31.451474] ? __pfx_kthread+0x10/0x10 [ 31.451967] ret_from_fork_asm+0x1a/0x30 [ 31.452576] </TASK> [ 31.452925] [ 31.453242] Allocated by task 273: [ 31.453628] kasan_save_stack+0x3d/0x60 [ 31.454202] kasan_save_track+0x18/0x40 [ 31.454746] kasan_save_alloc_info+0x3b/0x50 [ 31.455236] __kasan_kmalloc+0xb7/0xc0 [ 31.455741] __kmalloc_cache_noprof+0x184/0x410 [ 31.456165] kasan_atomics+0x96/0x310 [ 31.456655] kunit_try_run_case+0x1b3/0x490 [ 31.457355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.457804] kthread+0x257/0x310 [ 31.458256] ret_from_fork+0x41/0x80 [ 31.458596] ret_from_fork_asm+0x1a/0x30 [ 31.459221] [ 31.459474] The buggy address belongs to the object at ffff888102486200 [ 31.459474] which belongs to the cache kmalloc-64 of size 64 [ 31.460600] The buggy address is located 0 bytes to the right of [ 31.460600] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.461870] [ 31.462168] The buggy address belongs to the physical page: [ 31.462736] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.463583] flags: 0x200000000000000(node=0|zone=2) [ 31.464145] page_type: f5(slab) [ 31.464590] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.465233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.466047] page dumped because: kasan: bad access detected [ 31.466790] [ 31.467022] Memory state around the buggy address: [ 31.467585] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.468399] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.469131] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.469726] ^ [ 31.470412] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.471153] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.471819] ================================================================== [ 30.041814] ================================================================== [ 30.043419] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 30.044178] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.045810] [ 30.046071] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.047984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.048413] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.049184] Call Trace: [ 30.050111] <TASK> [ 30.050382] dump_stack_lvl+0x73/0xb0 [ 30.050978] print_report+0xd1/0x640 [ 30.051605] ? __virt_addr_valid+0x1db/0x2d0 [ 30.052231] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.052916] kasan_report+0x102/0x140 [ 30.053407] ? kasan_atomics_helper+0x13b6/0x5450 [ 30.053901] ? kasan_atomics_helper+0x13b6/0x5450 [ 30.054254] kasan_check_range+0x10c/0x1c0 [ 30.054795] __kasan_check_read+0x15/0x20 [ 30.056031] kasan_atomics_helper+0x13b6/0x5450 [ 30.056676] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.057504] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.058214] ? trace_hardirqs_on+0x37/0xe0 [ 30.058832] ? kasan_atomics+0x153/0x310 [ 30.059740] kasan_atomics+0x1dd/0x310 [ 30.060149] ? __pfx_kasan_atomics+0x10/0x10 [ 30.060871] ? __pfx_kasan_atomics+0x10/0x10 [ 30.061346] kunit_try_run_case+0x1b3/0x490 [ 30.062020] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.062807] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.063677] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.064465] ? __kthread_parkme+0x82/0x160 [ 30.065177] ? preempt_count_sub+0x50/0x80 [ 30.065835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.066611] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.067558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.068142] kthread+0x257/0x310 [ 30.068646] ? __pfx_kthread+0x10/0x10 [ 30.069086] ret_from_fork+0x41/0x80 [ 30.070044] ? __pfx_kthread+0x10/0x10 [ 30.070691] ret_from_fork_asm+0x1a/0x30 [ 30.071367] </TASK> [ 30.071875] [ 30.072094] Allocated by task 273: [ 30.072547] kasan_save_stack+0x3d/0x60 [ 30.073037] kasan_save_track+0x18/0x40 [ 30.073472] kasan_save_alloc_info+0x3b/0x50 [ 30.073980] __kasan_kmalloc+0xb7/0xc0 [ 30.074426] __kmalloc_cache_noprof+0x184/0x410 [ 30.074822] kasan_atomics+0x96/0x310 [ 30.075219] kunit_try_run_case+0x1b3/0x490 [ 30.075919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.076296] kthread+0x257/0x310 [ 30.076808] ret_from_fork+0x41/0x80 [ 30.077409] ret_from_fork_asm+0x1a/0x30 [ 30.077872] [ 30.078067] The buggy address belongs to the object at ffff888102486200 [ 30.078067] which belongs to the cache kmalloc-64 of size 64 [ 30.079269] The buggy address is located 0 bytes to the right of [ 30.079269] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.080641] [ 30.080917] The buggy address belongs to the physical page: [ 30.081561] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.082208] flags: 0x200000000000000(node=0|zone=2) [ 30.082999] page_type: f5(slab) [ 30.083376] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.084307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.084727] page dumped because: kasan: bad access detected [ 30.085651] [ 30.085987] Memory state around the buggy address: [ 30.086428] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.087120] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.087600] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.088373] ^ [ 30.088688] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.089643] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.090441] ================================================================== [ 30.411115] ================================================================== [ 30.412064] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 30.413495] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.415156] [ 30.415353] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.416541] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.416946] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.417872] Call Trace: [ 30.418238] <TASK> [ 30.418547] dump_stack_lvl+0x73/0xb0 [ 30.419074] print_report+0xd1/0x640 [ 30.419565] ? __virt_addr_valid+0x1db/0x2d0 [ 30.420052] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.420598] kasan_report+0x102/0x140 [ 30.421094] ? kasan_atomics_helper+0x1780/0x5450 [ 30.421739] ? kasan_atomics_helper+0x1780/0x5450 [ 30.422159] kasan_check_range+0x10c/0x1c0 [ 30.422745] __kasan_check_write+0x18/0x20 [ 30.423229] kasan_atomics_helper+0x1780/0x5450 [ 30.423589] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.424241] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.424776] ? trace_hardirqs_on+0x37/0xe0 [ 30.425263] ? kasan_atomics+0x153/0x310 [ 30.425878] kasan_atomics+0x1dd/0x310 [ 30.426406] ? __pfx_kasan_atomics+0x10/0x10 [ 30.426749] ? __pfx_kasan_atomics+0x10/0x10 [ 30.427568] kunit_try_run_case+0x1b3/0x490 [ 30.428688] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.429481] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.430275] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.431082] ? __kthread_parkme+0x82/0x160 [ 30.431668] ? preempt_count_sub+0x50/0x80 [ 30.432518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.433285] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.433878] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.434763] kthread+0x257/0x310 [ 30.435432] ? __pfx_kthread+0x10/0x10 [ 30.435867] ret_from_fork+0x41/0x80 [ 30.436817] ? __pfx_kthread+0x10/0x10 [ 30.437551] ret_from_fork_asm+0x1a/0x30 [ 30.438078] </TASK> [ 30.438713] [ 30.438909] Allocated by task 273: [ 30.439531] kasan_save_stack+0x3d/0x60 [ 30.439852] kasan_save_track+0x18/0x40 [ 30.440599] kasan_save_alloc_info+0x3b/0x50 [ 30.441320] __kasan_kmalloc+0xb7/0xc0 [ 30.442014] __kmalloc_cache_noprof+0x184/0x410 [ 30.442498] kasan_atomics+0x96/0x310 [ 30.443337] kunit_try_run_case+0x1b3/0x490 [ 30.443787] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.444762] kthread+0x257/0x310 [ 30.445500] ret_from_fork+0x41/0x80 [ 30.445885] ret_from_fork_asm+0x1a/0x30 [ 30.446858] [ 30.447335] The buggy address belongs to the object at ffff888102486200 [ 30.447335] which belongs to the cache kmalloc-64 of size 64 [ 30.448414] The buggy address is located 0 bytes to the right of [ 30.448414] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.450223] [ 30.450569] The buggy address belongs to the physical page: [ 30.451660] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.452470] flags: 0x200000000000000(node=0|zone=2) [ 30.453334] page_type: f5(slab) [ 30.453742] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.454517] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.455312] page dumped because: kasan: bad access detected [ 30.455833] [ 30.456104] Memory state around the buggy address: [ 30.456854] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.457406] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.458151] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.458817] ^ [ 30.459363] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.460086] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.460784] ================================================================== [ 30.851018] ================================================================== [ 30.851500] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 30.853140] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.853859] [ 30.854069] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.856408] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.857028] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.858208] Call Trace: [ 30.858587] <TASK> [ 30.859266] dump_stack_lvl+0x73/0xb0 [ 30.859665] print_report+0xd1/0x640 [ 30.860380] ? __virt_addr_valid+0x1db/0x2d0 [ 30.860830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.861453] kasan_report+0x102/0x140 [ 30.861958] ? kasan_atomics_helper+0x1ce2/0x5450 [ 30.862432] ? kasan_atomics_helper+0x1ce2/0x5450 [ 30.863044] kasan_check_range+0x10c/0x1c0 [ 30.863870] __kasan_check_write+0x18/0x20 [ 30.864233] kasan_atomics_helper+0x1ce2/0x5450 [ 30.864848] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.865853] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.866509] ? trace_hardirqs_on+0x37/0xe0 [ 30.867397] ? kasan_atomics+0x153/0x310 [ 30.867863] kasan_atomics+0x1dd/0x310 [ 30.868382] ? __pfx_kasan_atomics+0x10/0x10 [ 30.868838] ? __pfx_kasan_atomics+0x10/0x10 [ 30.870449] kunit_try_run_case+0x1b3/0x490 [ 30.871130] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.871739] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.872675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.873245] ? __kthread_parkme+0x82/0x160 [ 30.873688] ? preempt_count_sub+0x50/0x80 [ 30.874121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.874478] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.875742] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.876985] kthread+0x257/0x310 [ 30.877543] ? __pfx_kthread+0x10/0x10 [ 30.878040] ret_from_fork+0x41/0x80 [ 30.878425] ? __pfx_kthread+0x10/0x10 [ 30.878810] ret_from_fork_asm+0x1a/0x30 [ 30.879889] </TASK> [ 30.880091] [ 30.880279] Allocated by task 273: [ 30.881316] kasan_save_stack+0x3d/0x60 [ 30.881898] kasan_save_track+0x18/0x40 [ 30.882310] kasan_save_alloc_info+0x3b/0x50 [ 30.882984] __kasan_kmalloc+0xb7/0xc0 [ 30.883658] __kmalloc_cache_noprof+0x184/0x410 [ 30.884439] kasan_atomics+0x96/0x310 [ 30.884839] kunit_try_run_case+0x1b3/0x490 [ 30.885429] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.886966] kthread+0x257/0x310 [ 30.887600] ret_from_fork+0x41/0x80 [ 30.888083] ret_from_fork_asm+0x1a/0x30 [ 30.888831] [ 30.889134] The buggy address belongs to the object at ffff888102486200 [ 30.889134] which belongs to the cache kmalloc-64 of size 64 [ 30.890022] The buggy address is located 0 bytes to the right of [ 30.890022] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.892099] [ 30.892596] The buggy address belongs to the physical page: [ 30.892969] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.893712] flags: 0x200000000000000(node=0|zone=2) [ 30.894627] page_type: f5(slab) [ 30.895078] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.896442] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.897130] page dumped because: kasan: bad access detected [ 30.897859] [ 30.898126] Memory state around the buggy address: [ 30.899036] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.899874] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.900682] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.901969] ^ [ 30.902639] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.904066] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.904750] ================================================================== [ 29.051311] ================================================================== [ 29.052324] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 29.053428] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.053763] [ 29.053897] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.055902] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.056289] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.057098] Call Trace: [ 29.057464] <TASK> [ 29.057915] dump_stack_lvl+0x73/0xb0 [ 29.058312] print_report+0xd1/0x640 [ 29.058866] ? __virt_addr_valid+0x1db/0x2d0 [ 29.059527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.060062] kasan_report+0x102/0x140 [ 29.060579] ? kasan_atomics_helper+0x993/0x5450 [ 29.061128] ? kasan_atomics_helper+0x993/0x5450 [ 29.061645] kasan_check_range+0x10c/0x1c0 [ 29.062024] __kasan_check_write+0x18/0x20 [ 29.062579] kasan_atomics_helper+0x993/0x5450 [ 29.062987] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.063882] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.064344] ? trace_hardirqs_on+0x37/0xe0 [ 29.065143] ? kasan_atomics+0x153/0x310 [ 29.065752] kasan_atomics+0x1dd/0x310 [ 29.066757] ? __pfx_kasan_atomics+0x10/0x10 [ 29.067275] ? __pfx_kasan_atomics+0x10/0x10 [ 29.067735] kunit_try_run_case+0x1b3/0x490 [ 29.068925] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.069681] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.070543] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.071450] ? __kthread_parkme+0x82/0x160 [ 29.071793] ? preempt_count_sub+0x50/0x80 [ 29.072774] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.073978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.074663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.076012] kthread+0x257/0x310 [ 29.076467] ? __pfx_kthread+0x10/0x10 [ 29.077107] ret_from_fork+0x41/0x80 [ 29.077685] ? __pfx_kthread+0x10/0x10 [ 29.078366] ret_from_fork_asm+0x1a/0x30 [ 29.078973] </TASK> [ 29.079559] [ 29.079803] Allocated by task 273: [ 29.080172] kasan_save_stack+0x3d/0x60 [ 29.080669] kasan_save_track+0x18/0x40 [ 29.081100] kasan_save_alloc_info+0x3b/0x50 [ 29.081832] __kasan_kmalloc+0xb7/0xc0 [ 29.082894] __kmalloc_cache_noprof+0x184/0x410 [ 29.083688] kasan_atomics+0x96/0x310 [ 29.084056] kunit_try_run_case+0x1b3/0x490 [ 29.084853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.085489] kthread+0x257/0x310 [ 29.085737] ret_from_fork+0x41/0x80 [ 29.086655] ret_from_fork_asm+0x1a/0x30 [ 29.087436] [ 29.087628] The buggy address belongs to the object at ffff888102486200 [ 29.087628] which belongs to the cache kmalloc-64 of size 64 [ 29.088701] The buggy address is located 0 bytes to the right of [ 29.088701] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.089357] [ 29.089627] The buggy address belongs to the physical page: [ 29.091108] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.091811] flags: 0x200000000000000(node=0|zone=2) [ 29.092551] page_type: f5(slab) [ 29.093248] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.094009] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.094901] page dumped because: kasan: bad access detected [ 29.095593] [ 29.095699] Memory state around the buggy address: [ 29.095903] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.096314] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.097417] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.097836] ^ [ 29.098699] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.099458] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.100334] ================================================================== [ 28.573373] ================================================================== [ 28.574511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 28.575728] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.576555] [ 28.576745] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.578966] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.579591] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.580748] Call Trace: [ 28.581262] <TASK> [ 28.581822] dump_stack_lvl+0x73/0xb0 [ 28.582647] print_report+0xd1/0x640 [ 28.583064] ? __virt_addr_valid+0x1db/0x2d0 [ 28.583521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.584055] kasan_report+0x102/0x140 [ 28.584334] ? kasan_atomics_helper+0x4b56/0x5450 [ 28.585537] ? kasan_atomics_helper+0x4b56/0x5450 [ 28.586284] __asan_report_load4_noabort+0x18/0x20 [ 28.586858] kasan_atomics_helper+0x4b56/0x5450 [ 28.587985] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.588556] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.589034] ? trace_hardirqs_on+0x37/0xe0 [ 28.590049] ? kasan_atomics+0x153/0x310 [ 28.590467] kasan_atomics+0x1dd/0x310 [ 28.591046] ? __pfx_kasan_atomics+0x10/0x10 [ 28.591487] ? __pfx_kasan_atomics+0x10/0x10 [ 28.591952] kunit_try_run_case+0x1b3/0x490 [ 28.592503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.593398] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.594246] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.594727] ? __kthread_parkme+0x82/0x160 [ 28.595361] ? preempt_count_sub+0x50/0x80 [ 28.595830] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.597105] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.597739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.598190] kthread+0x257/0x310 [ 28.598867] ? __pfx_kthread+0x10/0x10 [ 28.599610] ret_from_fork+0x41/0x80 [ 28.599838] ? __pfx_kthread+0x10/0x10 [ 28.600099] ret_from_fork_asm+0x1a/0x30 [ 28.600416] </TASK> [ 28.600563] [ 28.600660] Allocated by task 273: [ 28.600823] kasan_save_stack+0x3d/0x60 [ 28.601045] kasan_save_track+0x18/0x40 [ 28.601960] kasan_save_alloc_info+0x3b/0x50 [ 28.602681] __kasan_kmalloc+0xb7/0xc0 [ 28.603406] __kmalloc_cache_noprof+0x184/0x410 [ 28.604175] kasan_atomics+0x96/0x310 [ 28.604459] kunit_try_run_case+0x1b3/0x490 [ 28.605247] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.605717] kthread+0x257/0x310 [ 28.606335] ret_from_fork+0x41/0x80 [ 28.606714] ret_from_fork_asm+0x1a/0x30 [ 28.607302] [ 28.607554] The buggy address belongs to the object at ffff888102486200 [ 28.607554] which belongs to the cache kmalloc-64 of size 64 [ 28.608738] The buggy address is located 0 bytes to the right of [ 28.608738] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.609823] [ 28.610095] The buggy address belongs to the physical page: [ 28.610569] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.611309] flags: 0x200000000000000(node=0|zone=2) [ 28.611640] page_type: f5(slab) [ 28.612166] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.613072] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.613624] page dumped because: kasan: bad access detected [ 28.614408] [ 28.614640] Memory state around the buggy address: [ 28.615365] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.616294] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.617216] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.617783] ^ [ 28.618669] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.619725] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.620155] ================================================================== [ 29.886452] ================================================================== [ 29.887178] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 29.887865] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.888455] [ 29.888635] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.889753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.890305] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.890819] Call Trace: [ 29.891060] <TASK> [ 29.891270] dump_stack_lvl+0x73/0xb0 [ 29.891751] print_report+0xd1/0x640 [ 29.892281] ? __virt_addr_valid+0x1db/0x2d0 [ 29.892798] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.893427] kasan_report+0x102/0x140 [ 29.893886] ? kasan_atomics_helper+0x49ea/0x5450 [ 29.894244] ? kasan_atomics_helper+0x49ea/0x5450 [ 29.894588] __asan_report_load4_noabort+0x18/0x20 [ 29.895478] kasan_atomics_helper+0x49ea/0x5450 [ 29.896156] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.896826] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.897621] ? trace_hardirqs_on+0x37/0xe0 [ 29.898011] ? kasan_atomics+0x153/0x310 [ 29.898535] kasan_atomics+0x1dd/0x310 [ 29.898994] ? __pfx_kasan_atomics+0x10/0x10 [ 29.899629] ? __pfx_kasan_atomics+0x10/0x10 [ 29.899990] kunit_try_run_case+0x1b3/0x490 [ 29.900301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.900624] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.901333] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.902036] ? __kthread_parkme+0x82/0x160 [ 29.902825] ? preempt_count_sub+0x50/0x80 [ 29.903561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.904092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.904563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.904965] kthread+0x257/0x310 [ 29.905236] ? __pfx_kthread+0x10/0x10 [ 29.905761] ret_from_fork+0x41/0x80 [ 29.906348] ? __pfx_kthread+0x10/0x10 [ 29.907178] ret_from_fork_asm+0x1a/0x30 [ 29.907651] </TASK> [ 29.907969] [ 29.908163] Allocated by task 273: [ 29.908618] kasan_save_stack+0x3d/0x60 [ 29.909133] kasan_save_track+0x18/0x40 [ 29.909473] kasan_save_alloc_info+0x3b/0x50 [ 29.909811] __kasan_kmalloc+0xb7/0xc0 [ 29.910120] __kmalloc_cache_noprof+0x184/0x410 [ 29.910440] kasan_atomics+0x96/0x310 [ 29.910707] kunit_try_run_case+0x1b3/0x490 [ 29.911279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.912021] kthread+0x257/0x310 [ 29.912623] ret_from_fork+0x41/0x80 [ 29.913208] ret_from_fork_asm+0x1a/0x30 [ 29.913727] [ 29.914018] The buggy address belongs to the object at ffff888102486200 [ 29.914018] which belongs to the cache kmalloc-64 of size 64 [ 29.916109] The buggy address is located 0 bytes to the right of [ 29.916109] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.917541] [ 29.917749] The buggy address belongs to the physical page: [ 29.918344] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.919573] flags: 0x200000000000000(node=0|zone=2) [ 29.920714] page_type: f5(slab) [ 29.921510] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.922620] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.923654] page dumped because: kasan: bad access detected [ 29.924248] [ 29.924457] Memory state around the buggy address: [ 29.924975] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.925417] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.926053] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.926922] ^ [ 29.927733] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.928492] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.929374] ================================================================== [ 28.720475] ================================================================== [ 28.721266] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 28.723239] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.723901] [ 28.724146] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.726713] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.727405] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.728399] Call Trace: [ 28.728690] <TASK> [ 28.729334] dump_stack_lvl+0x73/0xb0 [ 28.729644] print_report+0xd1/0x640 [ 28.731765] ? __virt_addr_valid+0x1db/0x2d0 [ 28.732152] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.732493] kasan_report+0x102/0x140 [ 28.732766] ? kasan_atomics_helper+0x566/0x5450 [ 28.733242] ? kasan_atomics_helper+0x566/0x5450 [ 28.733574] kasan_check_range+0x10c/0x1c0 [ 28.733894] __kasan_check_write+0x18/0x20 [ 28.735492] kasan_atomics_helper+0x566/0x5450 [ 28.735842] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.737020] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.738048] ? trace_hardirqs_on+0x37/0xe0 [ 28.738648] ? kasan_atomics+0x153/0x310 [ 28.739148] kasan_atomics+0x1dd/0x310 [ 28.739590] ? __pfx_kasan_atomics+0x10/0x10 [ 28.740089] ? __pfx_kasan_atomics+0x10/0x10 [ 28.740853] kunit_try_run_case+0x1b3/0x490 [ 28.741262] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.741761] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.742239] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.742824] ? __kthread_parkme+0x82/0x160 [ 28.743194] ? preempt_count_sub+0x50/0x80 [ 28.743689] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.744520] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.745095] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.745925] kthread+0x257/0x310 [ 28.746531] ? __pfx_kthread+0x10/0x10 [ 28.746972] ret_from_fork+0x41/0x80 [ 28.747263] ? __pfx_kthread+0x10/0x10 [ 28.747773] ret_from_fork_asm+0x1a/0x30 [ 28.748578] </TASK> [ 28.749137] [ 28.749538] Allocated by task 273: [ 28.750230] kasan_save_stack+0x3d/0x60 [ 28.750635] kasan_save_track+0x18/0x40 [ 28.750832] kasan_save_alloc_info+0x3b/0x50 [ 28.751105] __kasan_kmalloc+0xb7/0xc0 [ 28.751759] __kmalloc_cache_noprof+0x184/0x410 [ 28.752315] kasan_atomics+0x96/0x310 [ 28.752678] kunit_try_run_case+0x1b3/0x490 [ 28.753447] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.753887] kthread+0x257/0x310 [ 28.754590] ret_from_fork+0x41/0x80 [ 28.755026] ret_from_fork_asm+0x1a/0x30 [ 28.755980] [ 28.756387] The buggy address belongs to the object at ffff888102486200 [ 28.756387] which belongs to the cache kmalloc-64 of size 64 [ 28.757368] The buggy address is located 0 bytes to the right of [ 28.757368] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.758461] [ 28.759336] The buggy address belongs to the physical page: [ 28.759916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.760688] flags: 0x200000000000000(node=0|zone=2) [ 28.761130] page_type: f5(slab) [ 28.761644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.762414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.762966] page dumped because: kasan: bad access detected [ 28.763835] [ 28.764050] Memory state around the buggy address: [ 28.764658] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.765372] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.765840] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.766839] ^ [ 28.767369] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.767902] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.768817] ================================================================== [ 29.930842] ================================================================== [ 29.931845] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 29.933040] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.934100] [ 29.934768] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.936094] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.936757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.937905] Call Trace: [ 29.938276] <TASK> [ 29.938552] dump_stack_lvl+0x73/0xb0 [ 29.939006] print_report+0xd1/0x640 [ 29.940438] ? __virt_addr_valid+0x1db/0x2d0 [ 29.941113] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.941697] kasan_report+0x102/0x140 [ 29.942146] ? kasan_atomics_helper+0x12e7/0x5450 [ 29.942644] ? kasan_atomics_helper+0x12e7/0x5450 [ 29.943722] kasan_check_range+0x10c/0x1c0 [ 29.944099] __kasan_check_write+0x18/0x20 [ 29.945109] kasan_atomics_helper+0x12e7/0x5450 [ 29.946241] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.946970] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.947532] ? trace_hardirqs_on+0x37/0xe0 [ 29.948017] ? kasan_atomics+0x153/0x310 [ 29.949069] kasan_atomics+0x1dd/0x310 [ 29.949727] ? __pfx_kasan_atomics+0x10/0x10 [ 29.950185] ? __pfx_kasan_atomics+0x10/0x10 [ 29.950978] kunit_try_run_case+0x1b3/0x490 [ 29.951669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.952249] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.953024] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.953843] ? __kthread_parkme+0x82/0x160 [ 29.954491] ? preempt_count_sub+0x50/0x80 [ 29.955325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.955740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.956639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.957553] kthread+0x257/0x310 [ 29.957953] ? __pfx_kthread+0x10/0x10 [ 29.958580] ret_from_fork+0x41/0x80 [ 29.959175] ? __pfx_kthread+0x10/0x10 [ 29.959686] ret_from_fork_asm+0x1a/0x30 [ 29.960736] </TASK> [ 29.961327] [ 29.961730] Allocated by task 273: [ 29.962087] kasan_save_stack+0x3d/0x60 [ 29.962533] kasan_save_track+0x18/0x40 [ 29.962973] kasan_save_alloc_info+0x3b/0x50 [ 29.963293] __kasan_kmalloc+0xb7/0xc0 [ 29.963644] __kmalloc_cache_noprof+0x184/0x410 [ 29.964785] kasan_atomics+0x96/0x310 [ 29.965493] kunit_try_run_case+0x1b3/0x490 [ 29.965802] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.966801] kthread+0x257/0x310 [ 29.967342] ret_from_fork+0x41/0x80 [ 29.967720] ret_from_fork_asm+0x1a/0x30 [ 29.968500] [ 29.969200] The buggy address belongs to the object at ffff888102486200 [ 29.969200] which belongs to the cache kmalloc-64 of size 64 [ 29.971198] The buggy address is located 0 bytes to the right of [ 29.971198] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.973569] [ 29.973956] The buggy address belongs to the physical page: [ 29.974862] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.976227] flags: 0x200000000000000(node=0|zone=2) [ 29.976978] page_type: f5(slab) [ 29.977477] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.978535] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.979547] page dumped because: kasan: bad access detected [ 29.980119] [ 29.980332] Memory state around the buggy address: [ 29.980871] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.981499] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.982047] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.983186] ^ [ 29.983695] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.985345] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.986186] ================================================================== [ 30.177886] ================================================================== [ 30.178387] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 30.179409] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.180138] [ 30.180326] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.181133] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.181677] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.182586] Call Trace: [ 30.183004] <TASK> [ 30.183302] dump_stack_lvl+0x73/0xb0 [ 30.183592] print_report+0xd1/0x640 [ 30.183881] ? __virt_addr_valid+0x1db/0x2d0 [ 30.184545] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.185185] kasan_report+0x102/0x140 [ 30.185541] ? kasan_atomics_helper+0x50d6/0x5450 [ 30.186279] ? kasan_atomics_helper+0x50d6/0x5450 [ 30.186908] __asan_report_store8_noabort+0x1b/0x30 [ 30.187457] kasan_atomics_helper+0x50d6/0x5450 [ 30.187822] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.188492] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.188898] ? trace_hardirqs_on+0x37/0xe0 [ 30.189561] ? kasan_atomics+0x153/0x310 [ 30.190183] kasan_atomics+0x1dd/0x310 [ 30.190700] ? __pfx_kasan_atomics+0x10/0x10 [ 30.191190] ? __pfx_kasan_atomics+0x10/0x10 [ 30.191558] kunit_try_run_case+0x1b3/0x490 [ 30.191907] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.192578] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.193212] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.193590] ? __kthread_parkme+0x82/0x160 [ 30.194232] ? preempt_count_sub+0x50/0x80 [ 30.194762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.195238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.195800] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.196381] kthread+0x257/0x310 [ 30.196709] ? __pfx_kthread+0x10/0x10 [ 30.197283] ret_from_fork+0x41/0x80 [ 30.197565] ? __pfx_kthread+0x10/0x10 [ 30.197871] ret_from_fork_asm+0x1a/0x30 [ 30.198487] </TASK> [ 30.198829] [ 30.199263] Allocated by task 273: [ 30.199713] kasan_save_stack+0x3d/0x60 [ 30.200276] kasan_save_track+0x18/0x40 [ 30.200673] kasan_save_alloc_info+0x3b/0x50 [ 30.201202] __kasan_kmalloc+0xb7/0xc0 [ 30.202316] __kmalloc_cache_noprof+0x184/0x410 [ 30.202727] kasan_atomics+0x96/0x310 [ 30.203303] kunit_try_run_case+0x1b3/0x490 [ 30.203640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.204333] kthread+0x257/0x310 [ 30.204692] ret_from_fork+0x41/0x80 [ 30.205213] ret_from_fork_asm+0x1a/0x30 [ 30.205785] [ 30.206000] The buggy address belongs to the object at ffff888102486200 [ 30.206000] which belongs to the cache kmalloc-64 of size 64 [ 30.207272] The buggy address is located 0 bytes to the right of [ 30.207272] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.208347] [ 30.208615] The buggy address belongs to the physical page: [ 30.209243] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.210159] flags: 0x200000000000000(node=0|zone=2) [ 30.210581] page_type: f5(slab) [ 30.210972] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.211852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.212657] page dumped because: kasan: bad access detected [ 30.213202] [ 30.213458] Memory state around the buggy address: [ 30.213999] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.214858] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.215544] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.216278] ^ [ 30.216778] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.217508] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.218221] ================================================================== [ 30.508982] ================================================================== [ 30.509853] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 30.511202] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.511952] [ 30.512173] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.513251] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.513735] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.514741] Call Trace: [ 30.515155] <TASK> [ 30.515427] dump_stack_lvl+0x73/0xb0 [ 30.515974] print_report+0xd1/0x640 [ 30.516482] ? __virt_addr_valid+0x1db/0x2d0 [ 30.516912] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.517553] kasan_report+0x102/0x140 [ 30.518038] ? kasan_atomics_helper+0x18b2/0x5450 [ 30.518713] ? kasan_atomics_helper+0x18b2/0x5450 [ 30.519380] kasan_check_range+0x10c/0x1c0 [ 30.519866] __kasan_check_write+0x18/0x20 [ 30.520458] kasan_atomics_helper+0x18b2/0x5450 [ 30.521224] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.521707] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.522302] ? trace_hardirqs_on+0x37/0xe0 [ 30.522780] ? kasan_atomics+0x153/0x310 [ 30.523331] kasan_atomics+0x1dd/0x310 [ 30.523856] ? __pfx_kasan_atomics+0x10/0x10 [ 30.524476] ? __pfx_kasan_atomics+0x10/0x10 [ 30.524987] kunit_try_run_case+0x1b3/0x490 [ 30.525536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.526073] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.526475] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.527222] ? __kthread_parkme+0x82/0x160 [ 30.527853] ? preempt_count_sub+0x50/0x80 [ 30.528377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.528708] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.529613] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.530432] kthread+0x257/0x310 [ 30.530922] ? __pfx_kthread+0x10/0x10 [ 30.531389] ret_from_fork+0x41/0x80 [ 30.531801] ? __pfx_kthread+0x10/0x10 [ 30.532299] ret_from_fork_asm+0x1a/0x30 [ 30.532759] </TASK> [ 30.533152] [ 30.533435] Allocated by task 273: [ 30.533971] kasan_save_stack+0x3d/0x60 [ 30.534409] kasan_save_track+0x18/0x40 [ 30.535005] kasan_save_alloc_info+0x3b/0x50 [ 30.535468] __kasan_kmalloc+0xb7/0xc0 [ 30.535851] __kmalloc_cache_noprof+0x184/0x410 [ 30.536321] kasan_atomics+0x96/0x310 [ 30.536796] kunit_try_run_case+0x1b3/0x490 [ 30.537438] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.537820] kthread+0x257/0x310 [ 30.538447] ret_from_fork+0x41/0x80 [ 30.538998] ret_from_fork_asm+0x1a/0x30 [ 30.539516] [ 30.539755] The buggy address belongs to the object at ffff888102486200 [ 30.539755] which belongs to the cache kmalloc-64 of size 64 [ 30.541047] The buggy address is located 0 bytes to the right of [ 30.541047] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.542378] [ 30.542651] The buggy address belongs to the physical page: [ 30.543368] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.543904] flags: 0x200000000000000(node=0|zone=2) [ 30.544542] page_type: f5(slab) [ 30.545066] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.545852] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.546673] page dumped because: kasan: bad access detected [ 30.547251] [ 30.547494] Memory state around the buggy address: [ 30.547979] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.548777] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.549605] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.550337] ^ [ 30.550843] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.551582] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.552277] ================================================================== [ 31.017441] ================================================================== [ 31.019336] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 31.020080] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.021474] [ 31.021999] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.022877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.023629] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.024699] Call Trace: [ 31.025075] <TASK> [ 31.025835] dump_stack_lvl+0x73/0xb0 [ 31.026676] print_report+0xd1/0x640 [ 31.027387] ? __virt_addr_valid+0x1db/0x2d0 [ 31.027852] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.028828] kasan_report+0x102/0x140 [ 31.029600] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.030528] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.031024] kasan_check_range+0x10c/0x1c0 [ 31.031545] __kasan_check_write+0x18/0x20 [ 31.032456] kasan_atomics_helper+0x1eab/0x5450 [ 31.032685] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.032905] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.033276] ? trace_hardirqs_on+0x37/0xe0 [ 31.033698] ? kasan_atomics+0x153/0x310 [ 31.034279] kasan_atomics+0x1dd/0x310 [ 31.034583] ? __pfx_kasan_atomics+0x10/0x10 [ 31.035252] ? __pfx_kasan_atomics+0x10/0x10 [ 31.035839] kunit_try_run_case+0x1b3/0x490 [ 31.036520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.036863] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.037579] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.038140] ? __kthread_parkme+0x82/0x160 [ 31.038674] ? preempt_count_sub+0x50/0x80 [ 31.039019] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.039701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.040630] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.041080] kthread+0x257/0x310 [ 31.041534] ? __pfx_kthread+0x10/0x10 [ 31.042147] ret_from_fork+0x41/0x80 [ 31.042476] ? __pfx_kthread+0x10/0x10 [ 31.043110] ret_from_fork_asm+0x1a/0x30 [ 31.043711] </TASK> [ 31.044072] [ 31.044294] Allocated by task 273: [ 31.044758] kasan_save_stack+0x3d/0x60 [ 31.045384] kasan_save_track+0x18/0x40 [ 31.045753] kasan_save_alloc_info+0x3b/0x50 [ 31.046428] __kasan_kmalloc+0xb7/0xc0 [ 31.046926] __kmalloc_cache_noprof+0x184/0x410 [ 31.047716] kasan_atomics+0x96/0x310 [ 31.048019] kunit_try_run_case+0x1b3/0x490 [ 31.048318] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.049149] kthread+0x257/0x310 [ 31.049740] ret_from_fork+0x41/0x80 [ 31.050251] ret_from_fork_asm+0x1a/0x30 [ 31.050914] [ 31.051271] The buggy address belongs to the object at ffff888102486200 [ 31.051271] which belongs to the cache kmalloc-64 of size 64 [ 31.051989] The buggy address is located 0 bytes to the right of [ 31.051989] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.053172] [ 31.053465] The buggy address belongs to the physical page: [ 31.054420] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.055218] flags: 0x200000000000000(node=0|zone=2) [ 31.055686] page_type: f5(slab) [ 31.055997] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.056819] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.058065] page dumped because: kasan: bad access detected [ 31.058637] [ 31.059091] Memory state around the buggy address: [ 31.059632] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.060186] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.061350] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.061977] ^ [ 31.062685] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.063695] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.064654] ================================================================== [ 29.631814] ================================================================== [ 29.632585] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 29.633467] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.634197] [ 29.634507] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.635488] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.635965] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.636784] Call Trace: [ 29.637250] <TASK> [ 29.637566] dump_stack_lvl+0x73/0xb0 [ 29.638073] print_report+0xd1/0x640 [ 29.638542] ? __virt_addr_valid+0x1db/0x2d0 [ 29.639000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.639675] kasan_report+0x102/0x140 [ 29.640164] ? kasan_atomics_helper+0x107a/0x5450 [ 29.640806] ? kasan_atomics_helper+0x107a/0x5450 [ 29.641424] kasan_check_range+0x10c/0x1c0 [ 29.641876] __kasan_check_write+0x18/0x20 [ 29.642478] kasan_atomics_helper+0x107a/0x5450 [ 29.643036] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.643532] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.644180] ? trace_hardirqs_on+0x37/0xe0 [ 29.644571] ? kasan_atomics+0x153/0x310 [ 29.645056] kasan_atomics+0x1dd/0x310 [ 29.645647] ? __pfx_kasan_atomics+0x10/0x10 [ 29.646153] ? __pfx_kasan_atomics+0x10/0x10 [ 29.646657] kunit_try_run_case+0x1b3/0x490 [ 29.647248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.647814] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.648356] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.649032] ? __kthread_parkme+0x82/0x160 [ 29.649521] ? preempt_count_sub+0x50/0x80 [ 29.649983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.650663] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.651361] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.652016] kthread+0x257/0x310 [ 29.652429] ? __pfx_kthread+0x10/0x10 [ 29.653041] ret_from_fork+0x41/0x80 [ 29.653496] ? __pfx_kthread+0x10/0x10 [ 29.653975] ret_from_fork_asm+0x1a/0x30 [ 29.654589] </TASK> [ 29.654856] [ 29.655162] Allocated by task 273: [ 29.655498] kasan_save_stack+0x3d/0x60 [ 29.655861] kasan_save_track+0x18/0x40 [ 29.656409] kasan_save_alloc_info+0x3b/0x50 [ 29.656832] __kasan_kmalloc+0xb7/0xc0 [ 29.657295] __kmalloc_cache_noprof+0x184/0x410 [ 29.657611] kasan_atomics+0x96/0x310 [ 29.658034] kunit_try_run_case+0x1b3/0x490 [ 29.658716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.659466] kthread+0x257/0x310 [ 29.659858] ret_from_fork+0x41/0x80 [ 29.660365] ret_from_fork_asm+0x1a/0x30 [ 29.660802] [ 29.661000] The buggy address belongs to the object at ffff888102486200 [ 29.661000] which belongs to the cache kmalloc-64 of size 64 [ 29.662335] The buggy address is located 0 bytes to the right of [ 29.662335] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.663795] [ 29.664351] The buggy address belongs to the physical page: [ 29.665689] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.666252] flags: 0x200000000000000(node=0|zone=2) [ 29.666976] page_type: f5(slab) [ 29.667650] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.669012] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.669687] page dumped because: kasan: bad access detected [ 29.670278] [ 29.670486] Memory state around the buggy address: [ 29.670985] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.671485] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.672402] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.672999] ^ [ 29.673482] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.674496] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.675122] ================================================================== [ 30.606411] ================================================================== [ 30.607339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 30.609140] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.610676] [ 30.611020] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.612214] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.612638] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.614004] Call Trace: [ 30.614619] <TASK> [ 30.614888] dump_stack_lvl+0x73/0xb0 [ 30.615347] print_report+0xd1/0x640 [ 30.615775] ? __virt_addr_valid+0x1db/0x2d0 [ 30.616235] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.616762] kasan_report+0x102/0x140 [ 30.618060] ? kasan_atomics_helper+0x19e4/0x5450 [ 30.618554] ? kasan_atomics_helper+0x19e4/0x5450 [ 30.618989] kasan_check_range+0x10c/0x1c0 [ 30.619333] __kasan_check_write+0x18/0x20 [ 30.620018] kasan_atomics_helper+0x19e4/0x5450 [ 30.620877] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.621764] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.622187] ? trace_hardirqs_on+0x37/0xe0 [ 30.622717] ? kasan_atomics+0x153/0x310 [ 30.623223] kasan_atomics+0x1dd/0x310 [ 30.623674] ? __pfx_kasan_atomics+0x10/0x10 [ 30.624142] ? __pfx_kasan_atomics+0x10/0x10 [ 30.624597] kunit_try_run_case+0x1b3/0x490 [ 30.625202] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.625884] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.626783] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.627578] ? __kthread_parkme+0x82/0x160 [ 30.628101] ? preempt_count_sub+0x50/0x80 [ 30.628588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.629169] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.629635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.630519] kthread+0x257/0x310 [ 30.630974] ? __pfx_kthread+0x10/0x10 [ 30.631620] ret_from_fork+0x41/0x80 [ 30.631964] ? __pfx_kthread+0x10/0x10 [ 30.632407] ret_from_fork_asm+0x1a/0x30 [ 30.633033] </TASK> [ 30.633241] [ 30.633407] Allocated by task 273: [ 30.634019] kasan_save_stack+0x3d/0x60 [ 30.634531] kasan_save_track+0x18/0x40 [ 30.634861] kasan_save_alloc_info+0x3b/0x50 [ 30.635637] __kasan_kmalloc+0xb7/0xc0 [ 30.636101] __kmalloc_cache_noprof+0x184/0x410 [ 30.636633] kasan_atomics+0x96/0x310 [ 30.636951] kunit_try_run_case+0x1b3/0x490 [ 30.637257] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.638200] kthread+0x257/0x310 [ 30.638684] ret_from_fork+0x41/0x80 [ 30.639343] ret_from_fork_asm+0x1a/0x30 [ 30.639812] [ 30.640097] The buggy address belongs to the object at ffff888102486200 [ 30.640097] which belongs to the cache kmalloc-64 of size 64 [ 30.641158] The buggy address is located 0 bytes to the right of [ 30.641158] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.642082] [ 30.642346] The buggy address belongs to the physical page: [ 30.643073] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.643850] flags: 0x200000000000000(node=0|zone=2) [ 30.644376] page_type: f5(slab) [ 30.644637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.645190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.646172] page dumped because: kasan: bad access detected [ 30.646893] [ 30.647253] Memory state around the buggy address: [ 30.647815] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.648570] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.650561] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.652186] ^ [ 30.652798] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.653202] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.654247] ================================================================== [ 31.161391] ================================================================== [ 31.161881] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 31.162801] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.164187] [ 31.164390] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.165014] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.165998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.167325] Call Trace: [ 31.167640] <TASK> [ 31.167910] dump_stack_lvl+0x73/0xb0 [ 31.168225] print_report+0xd1/0x640 [ 31.169386] ? __virt_addr_valid+0x1db/0x2d0 [ 31.170171] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.170918] kasan_report+0x102/0x140 [ 31.171603] ? kasan_atomics_helper+0x2007/0x5450 [ 31.172510] ? kasan_atomics_helper+0x2007/0x5450 [ 31.173210] kasan_check_range+0x10c/0x1c0 [ 31.173956] __kasan_check_write+0x18/0x20 [ 31.174622] kasan_atomics_helper+0x2007/0x5450 [ 31.175164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.176283] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.176988] ? trace_hardirqs_on+0x37/0xe0 [ 31.177566] ? kasan_atomics+0x153/0x310 [ 31.178036] kasan_atomics+0x1dd/0x310 [ 31.179228] ? __pfx_kasan_atomics+0x10/0x10 [ 31.179855] ? __pfx_kasan_atomics+0x10/0x10 [ 31.180567] kunit_try_run_case+0x1b3/0x490 [ 31.181008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.181859] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.182379] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.183186] ? __kthread_parkme+0x82/0x160 [ 31.183653] ? preempt_count_sub+0x50/0x80 [ 31.184109] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.184557] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.185602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.186115] kthread+0x257/0x310 [ 31.186828] ? __pfx_kthread+0x10/0x10 [ 31.187495] ret_from_fork+0x41/0x80 [ 31.188047] ? __pfx_kthread+0x10/0x10 [ 31.188796] ret_from_fork_asm+0x1a/0x30 [ 31.189470] </TASK> [ 31.189802] [ 31.190309] Allocated by task 273: [ 31.190670] kasan_save_stack+0x3d/0x60 [ 31.191090] kasan_save_track+0x18/0x40 [ 31.192078] kasan_save_alloc_info+0x3b/0x50 [ 31.192533] __kasan_kmalloc+0xb7/0xc0 [ 31.192911] __kmalloc_cache_noprof+0x184/0x410 [ 31.193407] kasan_atomics+0x96/0x310 [ 31.194374] kunit_try_run_case+0x1b3/0x490 [ 31.194662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.195539] kthread+0x257/0x310 [ 31.195878] ret_from_fork+0x41/0x80 [ 31.196663] ret_from_fork_asm+0x1a/0x30 [ 31.197526] [ 31.197704] The buggy address belongs to the object at ffff888102486200 [ 31.197704] which belongs to the cache kmalloc-64 of size 64 [ 31.199520] The buggy address is located 0 bytes to the right of [ 31.199520] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.201143] [ 31.201320] The buggy address belongs to the physical page: [ 31.201850] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.203318] flags: 0x200000000000000(node=0|zone=2) [ 31.204052] page_type: f5(slab) [ 31.204483] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.205134] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.205748] page dumped because: kasan: bad access detected [ 31.206917] [ 31.207218] Memory state around the buggy address: [ 31.207960] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.208812] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.209824] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.210697] ^ [ 31.211423] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.212190] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.212856] ================================================================== [ 31.268264] ================================================================== [ 31.269913] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 31.270866] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.272344] [ 31.272619] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.273762] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.274175] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.275465] Call Trace: [ 31.275772] <TASK> [ 31.276458] dump_stack_lvl+0x73/0xb0 [ 31.276905] print_report+0xd1/0x640 [ 31.277625] ? __virt_addr_valid+0x1db/0x2d0 [ 31.277988] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.279134] kasan_report+0x102/0x140 [ 31.279918] ? kasan_atomics_helper+0x20c9/0x5450 [ 31.280496] ? kasan_atomics_helper+0x20c9/0x5450 [ 31.281074] kasan_check_range+0x10c/0x1c0 [ 31.281962] __kasan_check_write+0x18/0x20 [ 31.282668] kasan_atomics_helper+0x20c9/0x5450 [ 31.283392] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.284021] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.284780] ? trace_hardirqs_on+0x37/0xe0 [ 31.285211] ? kasan_atomics+0x153/0x310 [ 31.285922] kasan_atomics+0x1dd/0x310 [ 31.286598] ? __pfx_kasan_atomics+0x10/0x10 [ 31.287179] ? __pfx_kasan_atomics+0x10/0x10 [ 31.287640] kunit_try_run_case+0x1b3/0x490 [ 31.288066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.288495] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.289514] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.290036] ? __kthread_parkme+0x82/0x160 [ 31.290760] ? preempt_count_sub+0x50/0x80 [ 31.291235] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.292175] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.292815] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.293716] kthread+0x257/0x310 [ 31.294412] ? __pfx_kthread+0x10/0x10 [ 31.295113] ret_from_fork+0x41/0x80 [ 31.295506] ? __pfx_kthread+0x10/0x10 [ 31.295882] ret_from_fork_asm+0x1a/0x30 [ 31.296666] </TASK> [ 31.296895] [ 31.297165] Allocated by task 273: [ 31.298142] kasan_save_stack+0x3d/0x60 [ 31.298520] kasan_save_track+0x18/0x40 [ 31.298950] kasan_save_alloc_info+0x3b/0x50 [ 31.299224] __kasan_kmalloc+0xb7/0xc0 [ 31.299408] __kmalloc_cache_noprof+0x184/0x410 [ 31.299610] kasan_atomics+0x96/0x310 [ 31.299784] kunit_try_run_case+0x1b3/0x490 [ 31.301028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.301532] kthread+0x257/0x310 [ 31.302964] ret_from_fork+0x41/0x80 [ 31.303243] ret_from_fork_asm+0x1a/0x30 [ 31.304061] [ 31.304691] The buggy address belongs to the object at ffff888102486200 [ 31.304691] which belongs to the cache kmalloc-64 of size 64 [ 31.306727] The buggy address is located 0 bytes to the right of [ 31.306727] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.308434] [ 31.308724] The buggy address belongs to the physical page: [ 31.309231] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.310108] flags: 0x200000000000000(node=0|zone=2) [ 31.310667] page_type: f5(slab) [ 31.310969] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.311837] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.313035] page dumped because: kasan: bad access detected [ 31.313839] [ 31.314069] Memory state around the buggy address: [ 31.315330] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.316162] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.317286] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.318260] ^ [ 31.318755] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.319710] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.320497] ================================================================== [ 30.267250] ================================================================== [ 30.268714] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 30.269727] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.270612] [ 30.270857] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.272106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.272690] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.273988] Call Trace: [ 30.274683] <TASK> [ 30.274958] dump_stack_lvl+0x73/0xb0 [ 30.275405] print_report+0xd1/0x640 [ 30.275813] ? __virt_addr_valid+0x1db/0x2d0 [ 30.276261] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.276763] kasan_report+0x102/0x140 [ 30.277856] ? kasan_atomics_helper+0x15b7/0x5450 [ 30.279075] ? kasan_atomics_helper+0x15b7/0x5450 [ 30.279580] kasan_check_range+0x10c/0x1c0 [ 30.280203] __kasan_check_write+0x18/0x20 [ 30.280808] kasan_atomics_helper+0x15b7/0x5450 [ 30.281657] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.282478] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.283146] ? trace_hardirqs_on+0x37/0xe0 [ 30.283666] ? kasan_atomics+0x153/0x310 [ 30.284147] kasan_atomics+0x1dd/0x310 [ 30.284596] ? __pfx_kasan_atomics+0x10/0x10 [ 30.285070] ? __pfx_kasan_atomics+0x10/0x10 [ 30.285741] kunit_try_run_case+0x1b3/0x490 [ 30.286165] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.286926] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.287368] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.288534] ? __kthread_parkme+0x82/0x160 [ 30.289587] ? preempt_count_sub+0x50/0x80 [ 30.290139] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.291022] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.292042] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.293058] kthread+0x257/0x310 [ 30.293505] ? __pfx_kthread+0x10/0x10 [ 30.294139] ret_from_fork+0x41/0x80 [ 30.294717] ? __pfx_kthread+0x10/0x10 [ 30.295398] ret_from_fork_asm+0x1a/0x30 [ 30.295854] </TASK> [ 30.296081] [ 30.296335] Allocated by task 273: [ 30.296850] kasan_save_stack+0x3d/0x60 [ 30.297486] kasan_save_track+0x18/0x40 [ 30.297801] kasan_save_alloc_info+0x3b/0x50 [ 30.298455] __kasan_kmalloc+0xb7/0xc0 [ 30.299064] __kmalloc_cache_noprof+0x184/0x410 [ 30.299470] kasan_atomics+0x96/0x310 [ 30.299923] kunit_try_run_case+0x1b3/0x490 [ 30.300704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.301115] kthread+0x257/0x310 [ 30.301674] ret_from_fork+0x41/0x80 [ 30.302226] ret_from_fork_asm+0x1a/0x30 [ 30.302524] [ 30.302868] The buggy address belongs to the object at ffff888102486200 [ 30.302868] which belongs to the cache kmalloc-64 of size 64 [ 30.303897] The buggy address is located 0 bytes to the right of [ 30.303897] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.305145] [ 30.305324] The buggy address belongs to the physical page: [ 30.305714] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.306587] flags: 0x200000000000000(node=0|zone=2) [ 30.307094] page_type: f5(slab) [ 30.307558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.308089] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.308524] page dumped because: kasan: bad access detected [ 30.309213] [ 30.309481] Memory state around the buggy address: [ 30.310208] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.311048] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.311789] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.312576] ^ [ 30.312907] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.314094] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.314727] ================================================================== [ 28.522846] ================================================================== [ 28.523562] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 28.524422] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.524872] [ 28.525091] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.525992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.526503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.527606] Call Trace: [ 28.527849] <TASK> [ 28.528215] dump_stack_lvl+0x73/0xb0 [ 28.528605] print_report+0xd1/0x640 [ 28.528962] ? __virt_addr_valid+0x1db/0x2d0 [ 28.529511] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.530103] kasan_report+0x102/0x140 [ 28.530414] ? kasan_atomics_helper+0x3e0/0x5450 [ 28.530949] ? kasan_atomics_helper+0x3e0/0x5450 [ 28.532771] kasan_check_range+0x10c/0x1c0 [ 28.533896] __kasan_check_read+0x15/0x20 [ 28.534535] kasan_atomics_helper+0x3e0/0x5450 [ 28.535268] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.535912] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.536823] ? trace_hardirqs_on+0x37/0xe0 [ 28.537586] ? kasan_atomics+0x153/0x310 [ 28.538279] kasan_atomics+0x1dd/0x310 [ 28.538843] ? __pfx_kasan_atomics+0x10/0x10 [ 28.539665] ? __pfx_kasan_atomics+0x10/0x10 [ 28.540287] kunit_try_run_case+0x1b3/0x490 [ 28.540873] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.541597] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.542100] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.542627] ? __kthread_parkme+0x82/0x160 [ 28.543491] ? preempt_count_sub+0x50/0x80 [ 28.543780] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.544891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.545645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.546438] kthread+0x257/0x310 [ 28.546834] ? __pfx_kthread+0x10/0x10 [ 28.547612] ret_from_fork+0x41/0x80 [ 28.547927] ? __pfx_kthread+0x10/0x10 [ 28.548869] ret_from_fork_asm+0x1a/0x30 [ 28.549570] </TASK> [ 28.549994] [ 28.550243] Allocated by task 273: [ 28.550805] kasan_save_stack+0x3d/0x60 [ 28.551283] kasan_save_track+0x18/0x40 [ 28.551654] kasan_save_alloc_info+0x3b/0x50 [ 28.552596] __kasan_kmalloc+0xb7/0xc0 [ 28.552856] __kmalloc_cache_noprof+0x184/0x410 [ 28.553885] kasan_atomics+0x96/0x310 [ 28.554531] kunit_try_run_case+0x1b3/0x490 [ 28.555136] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.555950] kthread+0x257/0x310 [ 28.556548] ret_from_fork+0x41/0x80 [ 28.556913] ret_from_fork_asm+0x1a/0x30 [ 28.557642] [ 28.557960] The buggy address belongs to the object at ffff888102486200 [ 28.557960] which belongs to the cache kmalloc-64 of size 64 [ 28.559728] The buggy address is located 0 bytes to the right of [ 28.559728] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.561446] [ 28.561664] The buggy address belongs to the physical page: [ 28.562752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.563473] flags: 0x200000000000000(node=0|zone=2) [ 28.563883] page_type: f5(slab) [ 28.564299] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.565586] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.566177] page dumped because: kasan: bad access detected [ 28.566965] [ 28.567232] Memory state around the buggy address: [ 28.568096] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.568951] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.569987] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.571171] ^ [ 28.571416] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.571688] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.571998] ================================================================== [ 28.480756] ================================================================== [ 28.481345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 28.482999] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.483722] [ 28.484035] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.485010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.485385] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.486499] Call Trace: [ 28.486922] <TASK> [ 28.487352] dump_stack_lvl+0x73/0xb0 [ 28.487799] print_report+0xd1/0x640 [ 28.488369] ? __virt_addr_valid+0x1db/0x2d0 [ 28.488763] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.489154] kasan_report+0x102/0x140 [ 28.489701] ? kasan_atomics_helper+0x4b70/0x5450 [ 28.490477] ? kasan_atomics_helper+0x4b70/0x5450 [ 28.490967] __asan_report_store4_noabort+0x1b/0x30 [ 28.491464] kasan_atomics_helper+0x4b70/0x5450 [ 28.491784] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.492235] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.492972] ? trace_hardirqs_on+0x37/0xe0 [ 28.493557] ? kasan_atomics+0x153/0x310 [ 28.494373] kasan_atomics+0x1dd/0x310 [ 28.494668] ? __pfx_kasan_atomics+0x10/0x10 [ 28.495185] ? __pfx_kasan_atomics+0x10/0x10 [ 28.495825] kunit_try_run_case+0x1b3/0x490 [ 28.496429] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.496831] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.497722] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.498358] ? __kthread_parkme+0x82/0x160 [ 28.498726] ? preempt_count_sub+0x50/0x80 [ 28.499332] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.499837] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.501024] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.502007] kthread+0x257/0x310 [ 28.502717] ? __pfx_kthread+0x10/0x10 [ 28.503111] ret_from_fork+0x41/0x80 [ 28.503514] ? __pfx_kthread+0x10/0x10 [ 28.503906] ret_from_fork_asm+0x1a/0x30 [ 28.504226] </TASK> [ 28.504455] [ 28.504695] Allocated by task 273: [ 28.505160] kasan_save_stack+0x3d/0x60 [ 28.505660] kasan_save_track+0x18/0x40 [ 28.506082] kasan_save_alloc_info+0x3b/0x50 [ 28.506399] __kasan_kmalloc+0xb7/0xc0 [ 28.506859] __kmalloc_cache_noprof+0x184/0x410 [ 28.507300] kasan_atomics+0x96/0x310 [ 28.507579] kunit_try_run_case+0x1b3/0x490 [ 28.508176] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.508834] kthread+0x257/0x310 [ 28.509123] ret_from_fork+0x41/0x80 [ 28.509594] ret_from_fork_asm+0x1a/0x30 [ 28.510073] [ 28.510332] The buggy address belongs to the object at ffff888102486200 [ 28.510332] which belongs to the cache kmalloc-64 of size 64 [ 28.511129] The buggy address is located 0 bytes to the right of [ 28.511129] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.512321] [ 28.512490] The buggy address belongs to the physical page: [ 28.512822] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.513616] flags: 0x200000000000000(node=0|zone=2) [ 28.514219] page_type: f5(slab) [ 28.514667] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.515501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.516185] page dumped because: kasan: bad access detected [ 28.516737] [ 28.516888] Memory state around the buggy address: [ 28.517232] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.517653] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.518110] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.519084] ^ [ 28.519647] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.520503] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.520926] ================================================================== [ 29.483799] ================================================================== [ 29.484952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 29.485613] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.486333] [ 29.486517] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.487889] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.488363] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.489180] Call Trace: [ 29.489598] <TASK> [ 29.489900] dump_stack_lvl+0x73/0xb0 [ 29.490268] print_report+0xd1/0x640 [ 29.490756] ? __virt_addr_valid+0x1db/0x2d0 [ 29.491319] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.491708] kasan_report+0x102/0x140 [ 29.492079] ? kasan_atomics_helper+0xf11/0x5450 [ 29.492865] ? kasan_atomics_helper+0xf11/0x5450 [ 29.493587] kasan_check_range+0x10c/0x1c0 [ 29.494249] __kasan_check_write+0x18/0x20 [ 29.494560] kasan_atomics_helper+0xf11/0x5450 [ 29.495220] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.495822] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.496361] ? trace_hardirqs_on+0x37/0xe0 [ 29.496683] ? kasan_atomics+0x153/0x310 [ 29.497256] kasan_atomics+0x1dd/0x310 [ 29.498017] ? __pfx_kasan_atomics+0x10/0x10 [ 29.498412] ? __pfx_kasan_atomics+0x10/0x10 [ 29.499014] kunit_try_run_case+0x1b3/0x490 [ 29.499534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.500332] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.500719] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.501432] ? __kthread_parkme+0x82/0x160 [ 29.501748] ? preempt_count_sub+0x50/0x80 [ 29.502151] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.502798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.503740] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.504334] kthread+0x257/0x310 [ 29.504620] ? __pfx_kthread+0x10/0x10 [ 29.504919] ret_from_fork+0x41/0x80 [ 29.505400] ? __pfx_kthread+0x10/0x10 [ 29.505914] ret_from_fork_asm+0x1a/0x30 [ 29.506578] </TASK> [ 29.506917] [ 29.508287] Allocated by task 273: [ 29.508668] kasan_save_stack+0x3d/0x60 [ 29.509429] kasan_save_track+0x18/0x40 [ 29.509654] kasan_save_alloc_info+0x3b/0x50 [ 29.509873] __kasan_kmalloc+0xb7/0xc0 [ 29.510173] __kmalloc_cache_noprof+0x184/0x410 [ 29.510669] kasan_atomics+0x96/0x310 [ 29.511025] kunit_try_run_case+0x1b3/0x490 [ 29.511453] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.512211] kthread+0x257/0x310 [ 29.512528] ret_from_fork+0x41/0x80 [ 29.512885] ret_from_fork_asm+0x1a/0x30 [ 29.513326] [ 29.513621] The buggy address belongs to the object at ffff888102486200 [ 29.513621] which belongs to the cache kmalloc-64 of size 64 [ 29.516029] The buggy address is located 0 bytes to the right of [ 29.516029] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.517523] [ 29.517700] The buggy address belongs to the physical page: [ 29.518812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.519583] flags: 0x200000000000000(node=0|zone=2) [ 29.520294] page_type: f5(slab) [ 29.520694] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.521804] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.522494] page dumped because: kasan: bad access detected [ 29.523561] [ 29.523764] Memory state around the buggy address: [ 29.524352] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.525859] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.526302] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.527081] ^ [ 29.527495] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.528540] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.529301] ================================================================== [ 30.132996] ================================================================== [ 30.133958] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 30.134728] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.135511] [ 30.135696] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.136925] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.137458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.138067] Call Trace: [ 30.138495] <TASK> [ 30.138843] dump_stack_lvl+0x73/0xb0 [ 30.139297] print_report+0xd1/0x640 [ 30.139926] ? __virt_addr_valid+0x1db/0x2d0 [ 30.140482] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.141208] kasan_report+0x102/0x140 [ 30.141909] ? kasan_atomics_helper+0x1468/0x5450 [ 30.142468] ? kasan_atomics_helper+0x1468/0x5450 [ 30.143052] kasan_check_range+0x10c/0x1c0 [ 30.143618] __kasan_check_write+0x18/0x20 [ 30.144042] kasan_atomics_helper+0x1468/0x5450 [ 30.144693] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.145298] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.145876] ? trace_hardirqs_on+0x37/0xe0 [ 30.146377] ? kasan_atomics+0x153/0x310 [ 30.146886] kasan_atomics+0x1dd/0x310 [ 30.147521] ? __pfx_kasan_atomics+0x10/0x10 [ 30.147860] ? __pfx_kasan_atomics+0x10/0x10 [ 30.148520] kunit_try_run_case+0x1b3/0x490 [ 30.148881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.149595] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.150033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.150724] ? __kthread_parkme+0x82/0x160 [ 30.151232] ? preempt_count_sub+0x50/0x80 [ 30.151750] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.152101] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.152491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.153129] kthread+0x257/0x310 [ 30.153597] ? __pfx_kthread+0x10/0x10 [ 30.154129] ret_from_fork+0x41/0x80 [ 30.154594] ? __pfx_kthread+0x10/0x10 [ 30.154885] ret_from_fork_asm+0x1a/0x30 [ 30.155665] </TASK> [ 30.155966] [ 30.156314] Allocated by task 273: [ 30.156677] kasan_save_stack+0x3d/0x60 [ 30.157152] kasan_save_track+0x18/0x40 [ 30.157662] kasan_save_alloc_info+0x3b/0x50 [ 30.158179] __kasan_kmalloc+0xb7/0xc0 [ 30.158521] __kmalloc_cache_noprof+0x184/0x410 [ 30.159012] kasan_atomics+0x96/0x310 [ 30.159770] kunit_try_run_case+0x1b3/0x490 [ 30.160097] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.160768] kthread+0x257/0x310 [ 30.161282] ret_from_fork+0x41/0x80 [ 30.161678] ret_from_fork_asm+0x1a/0x30 [ 30.162143] [ 30.162354] The buggy address belongs to the object at ffff888102486200 [ 30.162354] which belongs to the cache kmalloc-64 of size 64 [ 30.164818] The buggy address is located 0 bytes to the right of [ 30.164818] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.165550] [ 30.165729] The buggy address belongs to the physical page: [ 30.167449] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.168448] flags: 0x200000000000000(node=0|zone=2) [ 30.168992] page_type: f5(slab) [ 30.169262] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.169637] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.170090] page dumped because: kasan: bad access detected [ 30.171206] [ 30.171381] Memory state around the buggy address: [ 30.171760] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.173315] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.174130] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.174754] ^ [ 30.175362] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.175964] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.176663] ================================================================== [ 30.755103] ================================================================== [ 30.755869] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 30.756623] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.758059] [ 30.758262] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.759322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.759721] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.760882] Call Trace: [ 30.761264] <TASK> [ 30.761673] dump_stack_lvl+0x73/0xb0 [ 30.762624] print_report+0xd1/0x640 [ 30.763118] ? __virt_addr_valid+0x1db/0x2d0 [ 30.763878] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.764355] kasan_report+0x102/0x140 [ 30.764699] ? kasan_atomics_helper+0x1c19/0x5450 [ 30.765383] ? kasan_atomics_helper+0x1c19/0x5450 [ 30.765850] kasan_check_range+0x10c/0x1c0 [ 30.766439] __kasan_check_write+0x18/0x20 [ 30.766978] kasan_atomics_helper+0x1c19/0x5450 [ 30.767580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.767972] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.768474] ? trace_hardirqs_on+0x37/0xe0 [ 30.768974] ? kasan_atomics+0x153/0x310 [ 30.769478] kasan_atomics+0x1dd/0x310 [ 30.770024] ? __pfx_kasan_atomics+0x10/0x10 [ 30.770566] ? __pfx_kasan_atomics+0x10/0x10 [ 30.770927] kunit_try_run_case+0x1b3/0x490 [ 30.771700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.772100] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.772649] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.773140] ? __kthread_parkme+0x82/0x160 [ 30.773481] ? preempt_count_sub+0x50/0x80 [ 30.773881] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.775353] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.776034] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.776696] kthread+0x257/0x310 [ 30.777337] ? __pfx_kthread+0x10/0x10 [ 30.777714] ret_from_fork+0x41/0x80 [ 30.778076] ? __pfx_kthread+0x10/0x10 [ 30.778641] ret_from_fork_asm+0x1a/0x30 [ 30.779537] </TASK> [ 30.779746] [ 30.779905] Allocated by task 273: [ 30.780826] kasan_save_stack+0x3d/0x60 [ 30.781645] kasan_save_track+0x18/0x40 [ 30.781985] kasan_save_alloc_info+0x3b/0x50 [ 30.782637] __kasan_kmalloc+0xb7/0xc0 [ 30.782956] __kmalloc_cache_noprof+0x184/0x410 [ 30.783648] kasan_atomics+0x96/0x310 [ 30.784062] kunit_try_run_case+0x1b3/0x490 [ 30.784587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.785190] kthread+0x257/0x310 [ 30.785535] ret_from_fork+0x41/0x80 [ 30.785993] ret_from_fork_asm+0x1a/0x30 [ 30.786580] [ 30.786772] The buggy address belongs to the object at ffff888102486200 [ 30.786772] which belongs to the cache kmalloc-64 of size 64 [ 30.787763] The buggy address is located 0 bytes to the right of [ 30.787763] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.789137] [ 30.789480] The buggy address belongs to the physical page: [ 30.790027] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.790751] flags: 0x200000000000000(node=0|zone=2) [ 30.791470] page_type: f5(slab) [ 30.791897] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.792778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.793462] page dumped because: kasan: bad access detected [ 30.793963] [ 30.794222] Memory state around the buggy address: [ 30.794718] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.795402] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.795826] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.796729] ^ [ 30.797352] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.798065] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.798832] ================================================================== [ 30.363206] ================================================================== [ 30.364765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 30.366642] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.367585] [ 30.367814] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.368585] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.369073] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.369805] Call Trace: [ 30.370222] <TASK> [ 30.370481] dump_stack_lvl+0x73/0xb0 [ 30.371057] print_report+0xd1/0x640 [ 30.371520] ? __virt_addr_valid+0x1db/0x2d0 [ 30.372012] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.372726] kasan_report+0x102/0x140 [ 30.373363] ? kasan_atomics_helper+0x16e8/0x5450 [ 30.373747] ? kasan_atomics_helper+0x16e8/0x5450 [ 30.374566] kasan_check_range+0x10c/0x1c0 [ 30.375089] __kasan_check_write+0x18/0x20 [ 30.375600] kasan_atomics_helper+0x16e8/0x5450 [ 30.376278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.376693] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.377472] ? trace_hardirqs_on+0x37/0xe0 [ 30.377902] ? kasan_atomics+0x153/0x310 [ 30.378450] kasan_atomics+0x1dd/0x310 [ 30.378832] ? __pfx_kasan_atomics+0x10/0x10 [ 30.379168] ? __pfx_kasan_atomics+0x10/0x10 [ 30.379826] kunit_try_run_case+0x1b3/0x490 [ 30.380584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.381001] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.381596] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.382185] ? __kthread_parkme+0x82/0x160 [ 30.382589] ? preempt_count_sub+0x50/0x80 [ 30.382897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.383798] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.384308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.385024] kthread+0x257/0x310 [ 30.385320] ? __pfx_kthread+0x10/0x10 [ 30.385913] ret_from_fork+0x41/0x80 [ 30.386501] ? __pfx_kthread+0x10/0x10 [ 30.387110] ret_from_fork_asm+0x1a/0x30 [ 30.387429] </TASK> [ 30.387626] [ 30.387890] Allocated by task 273: [ 30.388462] kasan_save_stack+0x3d/0x60 [ 30.388849] kasan_save_track+0x18/0x40 [ 30.389154] kasan_save_alloc_info+0x3b/0x50 [ 30.389682] __kasan_kmalloc+0xb7/0xc0 [ 30.390305] __kmalloc_cache_noprof+0x184/0x410 [ 30.390855] kasan_atomics+0x96/0x310 [ 30.391437] kunit_try_run_case+0x1b3/0x490 [ 30.391970] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.392783] kthread+0x257/0x310 [ 30.393305] ret_from_fork+0x41/0x80 [ 30.393683] ret_from_fork_asm+0x1a/0x30 [ 30.394255] [ 30.394465] The buggy address belongs to the object at ffff888102486200 [ 30.394465] which belongs to the cache kmalloc-64 of size 64 [ 30.395255] The buggy address is located 0 bytes to the right of [ 30.395255] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.396430] [ 30.396607] The buggy address belongs to the physical page: [ 30.397137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.398085] flags: 0x200000000000000(node=0|zone=2) [ 30.398540] page_type: f5(slab) [ 30.398974] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.400616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.401597] page dumped because: kasan: bad access detected [ 30.402578] [ 30.402989] Memory state around the buggy address: [ 30.403961] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.405305] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.406431] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.406961] ^ [ 30.407263] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.408528] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.409619] ================================================================== [ 29.732139] ================================================================== [ 29.733158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 29.733605] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.734651] [ 29.734878] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.736607] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.737024] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.738153] Call Trace: [ 29.738527] <TASK> [ 29.738799] dump_stack_lvl+0x73/0xb0 [ 29.739903] print_report+0xd1/0x640 [ 29.740534] ? __virt_addr_valid+0x1db/0x2d0 [ 29.741191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.741702] kasan_report+0x102/0x140 [ 29.742454] ? kasan_atomics_helper+0x1149/0x5450 [ 29.743243] ? kasan_atomics_helper+0x1149/0x5450 [ 29.743705] kasan_check_range+0x10c/0x1c0 [ 29.744388] __kasan_check_write+0x18/0x20 [ 29.744702] kasan_atomics_helper+0x1149/0x5450 [ 29.745227] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.745711] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.746731] ? trace_hardirqs_on+0x37/0xe0 [ 29.747637] ? kasan_atomics+0x153/0x310 [ 29.748385] kasan_atomics+0x1dd/0x310 [ 29.748682] ? __pfx_kasan_atomics+0x10/0x10 [ 29.749157] ? __pfx_kasan_atomics+0x10/0x10 [ 29.750445] kunit_try_run_case+0x1b3/0x490 [ 29.750863] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.751453] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.752009] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.752898] ? __kthread_parkme+0x82/0x160 [ 29.753682] ? preempt_count_sub+0x50/0x80 [ 29.754131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.754857] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.755913] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.756568] kthread+0x257/0x310 [ 29.757327] ? __pfx_kthread+0x10/0x10 [ 29.757863] ret_from_fork+0x41/0x80 [ 29.758641] ? __pfx_kthread+0x10/0x10 [ 29.759070] ret_from_fork_asm+0x1a/0x30 [ 29.759847] </TASK> [ 29.760175] [ 29.760796] Allocated by task 273: [ 29.761189] kasan_save_stack+0x3d/0x60 [ 29.761917] kasan_save_track+0x18/0x40 [ 29.762426] kasan_save_alloc_info+0x3b/0x50 [ 29.762870] __kasan_kmalloc+0xb7/0xc0 [ 29.763729] __kmalloc_cache_noprof+0x184/0x410 [ 29.764194] kasan_atomics+0x96/0x310 [ 29.764788] kunit_try_run_case+0x1b3/0x490 [ 29.765565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.766752] kthread+0x257/0x310 [ 29.767126] ret_from_fork+0x41/0x80 [ 29.767646] ret_from_fork_asm+0x1a/0x30 [ 29.768395] [ 29.768609] The buggy address belongs to the object at ffff888102486200 [ 29.768609] which belongs to the cache kmalloc-64 of size 64 [ 29.769987] The buggy address is located 0 bytes to the right of [ 29.769987] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.771414] [ 29.771612] The buggy address belongs to the physical page: [ 29.772404] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.773660] flags: 0x200000000000000(node=0|zone=2) [ 29.774135] page_type: f5(slab) [ 29.774913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.776003] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.777094] page dumped because: kasan: bad access detected [ 29.777653] [ 29.778322] Memory state around the buggy address: [ 29.779028] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.779732] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.780893] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.781497] ^ [ 29.782199] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783141] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783704] ================================================================== [ 31.377052] ================================================================== [ 31.378524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 31.379887] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.380359] [ 31.380511] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.380908] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.381277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.382652] Call Trace: [ 31.383176] <TASK> [ 31.383765] dump_stack_lvl+0x73/0xb0 [ 31.384562] print_report+0xd1/0x640 [ 31.385315] ? __virt_addr_valid+0x1db/0x2d0 [ 31.385698] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.386237] kasan_report+0x102/0x140 [ 31.386872] ? kasan_atomics_helper+0x218b/0x5450 [ 31.387689] ? kasan_atomics_helper+0x218b/0x5450 [ 31.388360] kasan_check_range+0x10c/0x1c0 [ 31.389007] __kasan_check_write+0x18/0x20 [ 31.389539] kasan_atomics_helper+0x218b/0x5450 [ 31.390085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.391029] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.391977] ? trace_hardirqs_on+0x37/0xe0 [ 31.392546] ? kasan_atomics+0x153/0x310 [ 31.393010] kasan_atomics+0x1dd/0x310 [ 31.393554] ? __pfx_kasan_atomics+0x10/0x10 [ 31.394051] ? __pfx_kasan_atomics+0x10/0x10 [ 31.395071] kunit_try_run_case+0x1b3/0x490 [ 31.395683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.396449] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.397406] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.398272] ? __kthread_parkme+0x82/0x160 [ 31.398655] ? preempt_count_sub+0x50/0x80 [ 31.399121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.399679] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.400863] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.401631] kthread+0x257/0x310 [ 31.402140] ? __pfx_kthread+0x10/0x10 [ 31.403136] ret_from_fork+0x41/0x80 [ 31.403491] ? __pfx_kthread+0x10/0x10 [ 31.404144] ret_from_fork_asm+0x1a/0x30 [ 31.404839] </TASK> [ 31.405132] [ 31.405333] Allocated by task 273: [ 31.405714] kasan_save_stack+0x3d/0x60 [ 31.407304] kasan_save_track+0x18/0x40 [ 31.407691] kasan_save_alloc_info+0x3b/0x50 [ 31.408162] __kasan_kmalloc+0xb7/0xc0 [ 31.408855] __kmalloc_cache_noprof+0x184/0x410 [ 31.409260] kasan_atomics+0x96/0x310 [ 31.409671] kunit_try_run_case+0x1b3/0x490 [ 31.410534] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.411201] kthread+0x257/0x310 [ 31.411674] ret_from_fork+0x41/0x80 [ 31.412127] ret_from_fork_asm+0x1a/0x30 [ 31.412757] [ 31.412970] The buggy address belongs to the object at ffff888102486200 [ 31.412970] which belongs to the cache kmalloc-64 of size 64 [ 31.414192] The buggy address is located 0 bytes to the right of [ 31.414192] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.416334] [ 31.416738] The buggy address belongs to the physical page: [ 31.417487] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.418683] flags: 0x200000000000000(node=0|zone=2) [ 31.419425] page_type: f5(slab) [ 31.420004] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.420857] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.421732] page dumped because: kasan: bad access detected [ 31.422705] [ 31.422922] Memory state around the buggy address: [ 31.423648] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.424504] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.425206] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.425821] ^ [ 31.426497] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.427130] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.427649] ================================================================== [ 31.518486] ================================================================== [ 31.519393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 31.520161] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.520906] [ 31.521509] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.523313] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.523788] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.525028] Call Trace: [ 31.525312] <TASK> [ 31.525740] dump_stack_lvl+0x73/0xb0 [ 31.526296] print_report+0xd1/0x640 [ 31.526839] ? __virt_addr_valid+0x1db/0x2d0 [ 31.527347] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.527895] kasan_report+0x102/0x140 [ 31.528430] ? kasan_atomics_helper+0x5117/0x5450 [ 31.528981] ? kasan_atomics_helper+0x5117/0x5450 [ 31.529502] __asan_report_load8_noabort+0x18/0x20 [ 31.530031] kasan_atomics_helper+0x5117/0x5450 [ 31.530606] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.531359] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.532001] ? trace_hardirqs_on+0x37/0xe0 [ 31.532462] ? kasan_atomics+0x153/0x310 [ 31.532885] kasan_atomics+0x1dd/0x310 [ 31.533313] ? __pfx_kasan_atomics+0x10/0x10 [ 31.533785] ? __pfx_kasan_atomics+0x10/0x10 [ 31.535228] kunit_try_run_case+0x1b3/0x490 [ 31.535867] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.536389] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.536847] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.537541] ? __kthread_parkme+0x82/0x160 [ 31.537970] ? preempt_count_sub+0x50/0x80 [ 31.538525] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.539046] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.539709] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.540393] kthread+0x257/0x310 [ 31.540795] ? __pfx_kthread+0x10/0x10 [ 31.541324] ret_from_fork+0x41/0x80 [ 31.541670] ? __pfx_kthread+0x10/0x10 [ 31.542184] ret_from_fork_asm+0x1a/0x30 [ 31.542651] </TASK> [ 31.543051] [ 31.543297] Allocated by task 273: [ 31.543723] kasan_save_stack+0x3d/0x60 [ 31.544071] kasan_save_track+0x18/0x40 [ 31.544653] kasan_save_alloc_info+0x3b/0x50 [ 31.545120] __kasan_kmalloc+0xb7/0xc0 [ 31.545703] __kmalloc_cache_noprof+0x184/0x410 [ 31.546077] kasan_atomics+0x96/0x310 [ 31.546663] kunit_try_run_case+0x1b3/0x490 [ 31.547249] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.547805] kthread+0x257/0x310 [ 31.548258] ret_from_fork+0x41/0x80 [ 31.548698] ret_from_fork_asm+0x1a/0x30 [ 31.549277] [ 31.549483] The buggy address belongs to the object at ffff888102486200 [ 31.549483] which belongs to the cache kmalloc-64 of size 64 [ 31.550619] The buggy address is located 0 bytes to the right of [ 31.550619] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.551688] [ 31.552013] The buggy address belongs to the physical page: [ 31.552586] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.553567] flags: 0x200000000000000(node=0|zone=2) [ 31.554058] page_type: f5(slab) [ 31.554562] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.555333] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.556067] page dumped because: kasan: bad access detected [ 31.556708] [ 31.556908] Memory state around the buggy address: [ 31.557483] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.558186] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.558883] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.559718] ^ [ 31.560262] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.560916] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.561613] ================================================================== [ 29.007002] ================================================================== [ 29.007972] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 29.008724] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.009334] [ 29.009679] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.010568] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.011253] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.012014] Call Trace: [ 29.012548] <TASK> [ 29.012926] dump_stack_lvl+0x73/0xb0 [ 29.013504] print_report+0xd1/0x640 [ 29.014174] ? __virt_addr_valid+0x1db/0x2d0 [ 29.014493] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.015199] kasan_report+0x102/0x140 [ 29.015520] ? kasan_atomics_helper+0x8fa/0x5450 [ 29.016108] ? kasan_atomics_helper+0x8fa/0x5450 [ 29.016654] kasan_check_range+0x10c/0x1c0 [ 29.017243] __kasan_check_write+0x18/0x20 [ 29.017701] kasan_atomics_helper+0x8fa/0x5450 [ 29.018385] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.018777] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.019268] ? trace_hardirqs_on+0x37/0xe0 [ 29.019681] ? kasan_atomics+0x153/0x310 [ 29.020423] kasan_atomics+0x1dd/0x310 [ 29.021330] ? __pfx_kasan_atomics+0x10/0x10 [ 29.022131] ? __pfx_kasan_atomics+0x10/0x10 [ 29.022588] kunit_try_run_case+0x1b3/0x490 [ 29.023145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.023634] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.024214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.024833] ? __kthread_parkme+0x82/0x160 [ 29.025356] ? preempt_count_sub+0x50/0x80 [ 29.025856] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.026514] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.027025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.027660] kthread+0x257/0x310 [ 29.028141] ? __pfx_kthread+0x10/0x10 [ 29.028553] ret_from_fork+0x41/0x80 [ 29.029227] ? __pfx_kthread+0x10/0x10 [ 29.029619] ret_from_fork_asm+0x1a/0x30 [ 29.030177] </TASK> [ 29.030640] [ 29.030906] Allocated by task 273: [ 29.031413] kasan_save_stack+0x3d/0x60 [ 29.031973] kasan_save_track+0x18/0x40 [ 29.032461] kasan_save_alloc_info+0x3b/0x50 [ 29.032873] __kasan_kmalloc+0xb7/0xc0 [ 29.033405] __kmalloc_cache_noprof+0x184/0x410 [ 29.034168] kasan_atomics+0x96/0x310 [ 29.034533] kunit_try_run_case+0x1b3/0x490 [ 29.035147] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.035690] kthread+0x257/0x310 [ 29.036149] ret_from_fork+0x41/0x80 [ 29.036715] ret_from_fork_asm+0x1a/0x30 [ 29.037040] [ 29.037206] The buggy address belongs to the object at ffff888102486200 [ 29.037206] which belongs to the cache kmalloc-64 of size 64 [ 29.038529] The buggy address is located 0 bytes to the right of [ 29.038529] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.040103] [ 29.040274] The buggy address belongs to the physical page: [ 29.040610] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.041817] flags: 0x200000000000000(node=0|zone=2) [ 29.042469] page_type: f5(slab) [ 29.042853] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.043738] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.044524] page dumped because: kasan: bad access detected [ 29.045158] [ 29.045355] Memory state around the buggy address: [ 29.045671] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.046229] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.047174] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.048287] ^ [ 29.048635] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.049070] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.049896] ================================================================== [ 29.677910] ================================================================== [ 29.678692] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 29.679538] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.680862] [ 29.681072] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.682054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.683380] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.684086] Call Trace: [ 29.684323] <TASK> [ 29.684633] dump_stack_lvl+0x73/0xb0 [ 29.685539] print_report+0xd1/0x640 [ 29.685853] ? __virt_addr_valid+0x1db/0x2d0 [ 29.686762] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.687650] kasan_report+0x102/0x140 [ 29.688084] ? kasan_atomics_helper+0x4a1e/0x5450 [ 29.688590] ? kasan_atomics_helper+0x4a1e/0x5450 [ 29.689845] __asan_report_load4_noabort+0x18/0x20 [ 29.690174] kasan_atomics_helper+0x4a1e/0x5450 [ 29.690984] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.691437] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.692286] ? trace_hardirqs_on+0x37/0xe0 [ 29.692729] ? kasan_atomics+0x153/0x310 [ 29.693162] kasan_atomics+0x1dd/0x310 [ 29.693569] ? __pfx_kasan_atomics+0x10/0x10 [ 29.695074] ? __pfx_kasan_atomics+0x10/0x10 [ 29.695642] kunit_try_run_case+0x1b3/0x490 [ 29.696218] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.696689] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.697288] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.697734] ? __kthread_parkme+0x82/0x160 [ 29.698376] ? preempt_count_sub+0x50/0x80 [ 29.698855] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.699772] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.700710] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.701387] kthread+0x257/0x310 [ 29.701757] ? __pfx_kthread+0x10/0x10 [ 29.703047] ret_from_fork+0x41/0x80 [ 29.703637] ? __pfx_kthread+0x10/0x10 [ 29.704069] ret_from_fork_asm+0x1a/0x30 [ 29.704806] </TASK> [ 29.705336] [ 29.705596] Allocated by task 273: [ 29.706344] kasan_save_stack+0x3d/0x60 [ 29.706720] kasan_save_track+0x18/0x40 [ 29.707089] kasan_save_alloc_info+0x3b/0x50 [ 29.707460] __kasan_kmalloc+0xb7/0xc0 [ 29.707856] __kmalloc_cache_noprof+0x184/0x410 [ 29.708840] kasan_atomics+0x96/0x310 [ 29.709386] kunit_try_run_case+0x1b3/0x490 [ 29.709822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.710510] kthread+0x257/0x310 [ 29.711387] ret_from_fork+0x41/0x80 [ 29.711886] ret_from_fork_asm+0x1a/0x30 [ 29.712750] [ 29.713165] The buggy address belongs to the object at ffff888102486200 [ 29.713165] which belongs to the cache kmalloc-64 of size 64 [ 29.714966] The buggy address is located 0 bytes to the right of [ 29.714966] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.716435] [ 29.716805] The buggy address belongs to the physical page: [ 29.717375] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.718494] flags: 0x200000000000000(node=0|zone=2) [ 29.719019] page_type: f5(slab) [ 29.719539] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.720425] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.721701] page dumped because: kasan: bad access detected [ 29.723108] [ 29.723763] Memory state around the buggy address: [ 29.725413] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.726648] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.727269] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.727851] ^ [ 29.728853] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.729805] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.731107] ================================================================== [ 29.786566] ================================================================== [ 29.787967] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 29.788906] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.790076] [ 29.790315] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.791163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.791570] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.793068] Call Trace: [ 29.793480] <TASK> [ 29.794094] dump_stack_lvl+0x73/0xb0 [ 29.794715] print_report+0xd1/0x640 [ 29.795414] ? __virt_addr_valid+0x1db/0x2d0 [ 29.796030] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.796822] kasan_report+0x102/0x140 [ 29.797564] ? kasan_atomics_helper+0x4a04/0x5450 [ 29.798328] ? kasan_atomics_helper+0x4a04/0x5450 [ 29.799027] __asan_report_load4_noabort+0x18/0x20 [ 29.799709] kasan_atomics_helper+0x4a04/0x5450 [ 29.800478] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.801197] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.801864] ? trace_hardirqs_on+0x37/0xe0 [ 29.802480] ? kasan_atomics+0x153/0x310 [ 29.802889] kasan_atomics+0x1dd/0x310 [ 29.803746] ? __pfx_kasan_atomics+0x10/0x10 [ 29.804248] ? __pfx_kasan_atomics+0x10/0x10 [ 29.805211] kunit_try_run_case+0x1b3/0x490 [ 29.805970] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.806717] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.807422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.807887] ? __kthread_parkme+0x82/0x160 [ 29.808347] ? preempt_count_sub+0x50/0x80 [ 29.808788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.809925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.810901] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.811701] kthread+0x257/0x310 [ 29.812300] ? __pfx_kthread+0x10/0x10 [ 29.812898] ret_from_fork+0x41/0x80 [ 29.813399] ? __pfx_kthread+0x10/0x10 [ 29.814122] ret_from_fork_asm+0x1a/0x30 [ 29.814861] </TASK> [ 29.815170] [ 29.815399] Allocated by task 273: [ 29.816283] kasan_save_stack+0x3d/0x60 [ 29.816756] kasan_save_track+0x18/0x40 [ 29.817188] kasan_save_alloc_info+0x3b/0x50 [ 29.817618] __kasan_kmalloc+0xb7/0xc0 [ 29.818170] __kmalloc_cache_noprof+0x184/0x410 [ 29.818492] kasan_atomics+0x96/0x310 [ 29.819017] kunit_try_run_case+0x1b3/0x490 [ 29.819744] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.820331] kthread+0x257/0x310 [ 29.820743] ret_from_fork+0x41/0x80 [ 29.821465] ret_from_fork_asm+0x1a/0x30 [ 29.821926] [ 29.822335] The buggy address belongs to the object at ffff888102486200 [ 29.822335] which belongs to the cache kmalloc-64 of size 64 [ 29.823674] The buggy address is located 0 bytes to the right of [ 29.823674] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.825006] [ 29.825272] The buggy address belongs to the physical page: [ 29.825803] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.826728] flags: 0x200000000000000(node=0|zone=2) [ 29.827337] page_type: f5(slab) [ 29.827856] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.828672] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.829419] page dumped because: kasan: bad access detected [ 29.830014] [ 29.830336] Memory state around the buggy address: [ 29.830793] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.831516] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.832194] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.832844] ^ [ 29.833490] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.834340] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.835017] ================================================================== [ 28.374727] ================================================================== [ 28.375177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 28.375620] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.376321] [ 28.376660] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.378238] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.379131] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.380441] Call Trace: [ 28.381062] <TASK> [ 28.382154] dump_stack_lvl+0x73/0xb0 [ 28.382767] print_report+0xd1/0x640 [ 28.383420] ? __virt_addr_valid+0x1db/0x2d0 [ 28.384359] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.385093] kasan_report+0x102/0x140 [ 28.386287] ? kasan_atomics_helper+0x4ba4/0x5450 [ 28.386753] ? kasan_atomics_helper+0x4ba4/0x5450 [ 28.388026] __asan_report_store4_noabort+0x1b/0x30 [ 28.388693] kasan_atomics_helper+0x4ba4/0x5450 [ 28.389185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.390254] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.391183] ? trace_hardirqs_on+0x37/0xe0 [ 28.392076] ? kasan_atomics+0x153/0x310 [ 28.392382] kasan_atomics+0x1dd/0x310 [ 28.393247] ? __pfx_kasan_atomics+0x10/0x10 [ 28.394163] ? __pfx_kasan_atomics+0x10/0x10 [ 28.394659] kunit_try_run_case+0x1b3/0x490 [ 28.395119] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.395597] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.397080] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.398253] ? __kthread_parkme+0x82/0x160 [ 28.398774] ? preempt_count_sub+0x50/0x80 [ 28.399281] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.400381] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.401021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.402715] kthread+0x257/0x310 [ 28.403023] ? __pfx_kthread+0x10/0x10 [ 28.403488] ret_from_fork+0x41/0x80 [ 28.403849] ? __pfx_kthread+0x10/0x10 [ 28.404449] ret_from_fork_asm+0x1a/0x30 [ 28.404794] </TASK> [ 28.405309] [ 28.406262] Allocated by task 273: [ 28.406593] kasan_save_stack+0x3d/0x60 [ 28.407033] kasan_save_track+0x18/0x40 [ 28.407813] kasan_save_alloc_info+0x3b/0x50 [ 28.408385] __kasan_kmalloc+0xb7/0xc0 [ 28.408721] __kmalloc_cache_noprof+0x184/0x410 [ 28.409311] kasan_atomics+0x96/0x310 [ 28.409921] kunit_try_run_case+0x1b3/0x490 [ 28.410712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.411107] kthread+0x257/0x310 [ 28.411687] ret_from_fork+0x41/0x80 [ 28.412478] ret_from_fork_asm+0x1a/0x30 [ 28.413174] [ 28.413438] The buggy address belongs to the object at ffff888102486200 [ 28.413438] which belongs to the cache kmalloc-64 of size 64 [ 28.414761] The buggy address is located 0 bytes to the right of [ 28.414761] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.416166] [ 28.416926] The buggy address belongs to the physical page: [ 28.417576] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.418471] flags: 0x200000000000000(node=0|zone=2) [ 28.419003] page_type: f5(slab) [ 28.419399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.420351] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.421200] page dumped because: kasan: bad access detected [ 28.422285] [ 28.422567] Memory state around the buggy address: [ 28.423022] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.424015] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.424743] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.426209] ^ [ 28.426791] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.427810] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.428958] ================================================================== [ 31.321999] ================================================================== [ 31.324256] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 31.325557] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.327195] [ 31.327498] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.328370] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.328749] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.330498] Call Trace: [ 31.330832] <TASK> [ 31.331630] dump_stack_lvl+0x73/0xb0 [ 31.332115] print_report+0xd1/0x640 [ 31.332810] ? __virt_addr_valid+0x1db/0x2d0 [ 31.333183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.334112] kasan_report+0x102/0x140 [ 31.334514] ? kasan_atomics_helper+0x4fb4/0x5450 [ 31.335423] ? kasan_atomics_helper+0x4fb4/0x5450 [ 31.335972] __asan_report_load8_noabort+0x18/0x20 [ 31.336783] kasan_atomics_helper+0x4fb4/0x5450 [ 31.337807] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.338238] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.338463] ? trace_hardirqs_on+0x37/0xe0 [ 31.338660] ? kasan_atomics+0x153/0x310 [ 31.338850] kasan_atomics+0x1dd/0x310 [ 31.339120] ? __pfx_kasan_atomics+0x10/0x10 [ 31.339752] ? __pfx_kasan_atomics+0x10/0x10 [ 31.340539] kunit_try_run_case+0x1b3/0x490 [ 31.341060] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.341655] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.343469] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.343979] ? __kthread_parkme+0x82/0x160 [ 31.344604] ? preempt_count_sub+0x50/0x80 [ 31.345047] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.345719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.346637] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.347671] kthread+0x257/0x310 [ 31.348069] ? __pfx_kthread+0x10/0x10 [ 31.348493] ret_from_fork+0x41/0x80 [ 31.348886] ? __pfx_kthread+0x10/0x10 [ 31.349199] ret_from_fork_asm+0x1a/0x30 [ 31.349532] </TASK> [ 31.349887] [ 31.350165] Allocated by task 273: [ 31.351007] kasan_save_stack+0x3d/0x60 [ 31.351843] kasan_save_track+0x18/0x40 [ 31.352495] kasan_save_alloc_info+0x3b/0x50 [ 31.353491] __kasan_kmalloc+0xb7/0xc0 [ 31.353952] __kmalloc_cache_noprof+0x184/0x410 [ 31.354523] kasan_atomics+0x96/0x310 [ 31.355393] kunit_try_run_case+0x1b3/0x490 [ 31.356055] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.356966] kthread+0x257/0x310 [ 31.357672] ret_from_fork+0x41/0x80 [ 31.358360] ret_from_fork_asm+0x1a/0x30 [ 31.359064] [ 31.359704] The buggy address belongs to the object at ffff888102486200 [ 31.359704] which belongs to the cache kmalloc-64 of size 64 [ 31.361202] The buggy address is located 0 bytes to the right of [ 31.361202] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.362175] [ 31.362452] The buggy address belongs to the physical page: [ 31.363562] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.364582] flags: 0x200000000000000(node=0|zone=2) [ 31.365464] page_type: f5(slab) [ 31.365850] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.367474] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.368445] page dumped because: kasan: bad access detected [ 31.369252] [ 31.369809] Memory state around the buggy address: [ 31.370434] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.370979] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.371724] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.372423] ^ [ 31.372898] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.374229] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.374869] ================================================================== [ 30.091552] ================================================================== [ 30.092437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 30.092947] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.094061] [ 30.094229] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.095294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.095572] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.096637] Call Trace: [ 30.097012] <TASK> [ 30.097360] dump_stack_lvl+0x73/0xb0 [ 30.097697] print_report+0xd1/0x640 [ 30.098060] ? __virt_addr_valid+0x1db/0x2d0 [ 30.098628] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.099393] kasan_report+0x102/0x140 [ 30.099703] ? kasan_atomics_helper+0x4eb0/0x5450 [ 30.100068] ? kasan_atomics_helper+0x4eb0/0x5450 [ 30.100633] __asan_report_load8_noabort+0x18/0x20 [ 30.101320] kasan_atomics_helper+0x4eb0/0x5450 [ 30.102019] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.102500] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.103067] ? trace_hardirqs_on+0x37/0xe0 [ 30.103488] ? kasan_atomics+0x153/0x310 [ 30.103799] kasan_atomics+0x1dd/0x310 [ 30.104246] ? __pfx_kasan_atomics+0x10/0x10 [ 30.104913] ? __pfx_kasan_atomics+0x10/0x10 [ 30.105622] kunit_try_run_case+0x1b3/0x490 [ 30.106059] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.106497] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.106835] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.107641] ? __kthread_parkme+0x82/0x160 [ 30.108134] ? preempt_count_sub+0x50/0x80 [ 30.108602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.108953] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.109350] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.110073] kthread+0x257/0x310 [ 30.110775] ? __pfx_kthread+0x10/0x10 [ 30.111253] ret_from_fork+0x41/0x80 [ 30.111519] ? __pfx_kthread+0x10/0x10 [ 30.112354] ret_from_fork_asm+0x1a/0x30 [ 30.112818] </TASK> [ 30.113040] [ 30.113200] Allocated by task 273: [ 30.113457] kasan_save_stack+0x3d/0x60 [ 30.114016] kasan_save_track+0x18/0x40 [ 30.114537] kasan_save_alloc_info+0x3b/0x50 [ 30.115419] __kasan_kmalloc+0xb7/0xc0 [ 30.115831] __kmalloc_cache_noprof+0x184/0x410 [ 30.116170] kasan_atomics+0x96/0x310 [ 30.116718] kunit_try_run_case+0x1b3/0x490 [ 30.117531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.117965] kthread+0x257/0x310 [ 30.118554] ret_from_fork+0x41/0x80 [ 30.118857] ret_from_fork_asm+0x1a/0x30 [ 30.119174] [ 30.119336] The buggy address belongs to the object at ffff888102486200 [ 30.119336] which belongs to the cache kmalloc-64 of size 64 [ 30.120650] The buggy address is located 0 bytes to the right of [ 30.120650] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.122027] [ 30.122429] The buggy address belongs to the physical page: [ 30.122844] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.123328] flags: 0x200000000000000(node=0|zone=2) [ 30.123988] page_type: f5(slab) [ 30.124624] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.125462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.126135] page dumped because: kasan: bad access detected [ 30.126540] [ 30.126700] Memory state around the buggy address: [ 30.127215] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.128333] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.128777] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.129480] ^ [ 30.129978] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.130845] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.131960] ================================================================== [ 29.434643] ================================================================== [ 29.437035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 29.437979] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.438647] [ 29.438978] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.439860] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.440483] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.441426] Call Trace: [ 29.441873] <TASK> [ 29.442162] dump_stack_lvl+0x73/0xb0 [ 29.442751] print_report+0xd1/0x640 [ 29.443309] ? __virt_addr_valid+0x1db/0x2d0 [ 29.443874] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.444397] kasan_report+0x102/0x140 [ 29.445505] ? kasan_atomics_helper+0xe79/0x5450 [ 29.446091] ? kasan_atomics_helper+0xe79/0x5450 [ 29.447645] kasan_check_range+0x10c/0x1c0 [ 29.448132] __kasan_check_write+0x18/0x20 [ 29.448581] kasan_atomics_helper+0xe79/0x5450 [ 29.449857] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.450626] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.451089] ? trace_hardirqs_on+0x37/0xe0 [ 29.451701] ? kasan_atomics+0x153/0x310 [ 29.452085] kasan_atomics+0x1dd/0x310 [ 29.452558] ? __pfx_kasan_atomics+0x10/0x10 [ 29.453033] ? __pfx_kasan_atomics+0x10/0x10 [ 29.453717] kunit_try_run_case+0x1b3/0x490 [ 29.454203] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.454825] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.455486] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.456123] ? __kthread_parkme+0x82/0x160 [ 29.456653] ? preempt_count_sub+0x50/0x80 [ 29.457134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.457682] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.458108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.458780] kthread+0x257/0x310 [ 29.459312] ? __pfx_kthread+0x10/0x10 [ 29.459678] ret_from_fork+0x41/0x80 [ 29.459997] ? __pfx_kthread+0x10/0x10 [ 29.460466] ret_from_fork_asm+0x1a/0x30 [ 29.461103] </TASK> [ 29.461603] [ 29.461887] Allocated by task 273: [ 29.462358] kasan_save_stack+0x3d/0x60 [ 29.462683] kasan_save_track+0x18/0x40 [ 29.463296] kasan_save_alloc_info+0x3b/0x50 [ 29.463780] __kasan_kmalloc+0xb7/0xc0 [ 29.464090] __kmalloc_cache_noprof+0x184/0x410 [ 29.464404] kasan_atomics+0x96/0x310 [ 29.464957] kunit_try_run_case+0x1b3/0x490 [ 29.465764] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.466496] kthread+0x257/0x310 [ 29.466755] ret_from_fork+0x41/0x80 [ 29.467053] ret_from_fork_asm+0x1a/0x30 [ 29.467520] [ 29.467799] The buggy address belongs to the object at ffff888102486200 [ 29.467799] which belongs to the cache kmalloc-64 of size 64 [ 29.469656] The buggy address is located 0 bytes to the right of [ 29.469656] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.470836] [ 29.471211] The buggy address belongs to the physical page: [ 29.471623] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.472426] flags: 0x200000000000000(node=0|zone=2) [ 29.472775] page_type: f5(slab) [ 29.473068] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.473928] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.474991] page dumped because: kasan: bad access detected [ 29.475546] [ 29.475788] Memory state around the buggy address: [ 29.476893] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.478130] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.478836] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.480279] ^ [ 29.480849] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.481692] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.482394] ================================================================== [ 31.473268] ================================================================== [ 31.473810] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 31.474907] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.475813] [ 31.476185] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.477232] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.477747] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.478627] Call Trace: [ 31.479000] <TASK> [ 31.479309] dump_stack_lvl+0x73/0xb0 [ 31.479728] print_report+0xd1/0x640 [ 31.480142] ? __virt_addr_valid+0x1db/0x2d0 [ 31.480636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.481273] kasan_report+0x102/0x140 [ 31.481759] ? kasan_atomics_helper+0x224d/0x5450 [ 31.482481] ? kasan_atomics_helper+0x224d/0x5450 [ 31.483044] kasan_check_range+0x10c/0x1c0 [ 31.483656] __kasan_check_write+0x18/0x20 [ 31.484192] kasan_atomics_helper+0x224d/0x5450 [ 31.484734] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.485346] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.485947] ? trace_hardirqs_on+0x37/0xe0 [ 31.486466] ? kasan_atomics+0x153/0x310 [ 31.486989] kasan_atomics+0x1dd/0x310 [ 31.487622] ? __pfx_kasan_atomics+0x10/0x10 [ 31.488309] ? __pfx_kasan_atomics+0x10/0x10 [ 31.488854] kunit_try_run_case+0x1b3/0x490 [ 31.489427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.490041] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.490564] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.491282] ? __kthread_parkme+0x82/0x160 [ 31.491845] ? preempt_count_sub+0x50/0x80 [ 31.492518] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.493053] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.493614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.494417] kthread+0x257/0x310 [ 31.494759] ? __pfx_kthread+0x10/0x10 [ 31.495348] ret_from_fork+0x41/0x80 [ 31.495876] ? __pfx_kthread+0x10/0x10 [ 31.496347] ret_from_fork_asm+0x1a/0x30 [ 31.497004] </TASK> [ 31.497447] [ 31.497723] Allocated by task 273: [ 31.498321] kasan_save_stack+0x3d/0x60 [ 31.498849] kasan_save_track+0x18/0x40 [ 31.499338] kasan_save_alloc_info+0x3b/0x50 [ 31.499872] __kasan_kmalloc+0xb7/0xc0 [ 31.500461] __kmalloc_cache_noprof+0x184/0x410 [ 31.501576] kasan_atomics+0x96/0x310 [ 31.502081] kunit_try_run_case+0x1b3/0x490 [ 31.502662] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.503412] kthread+0x257/0x310 [ 31.503820] ret_from_fork+0x41/0x80 [ 31.504371] ret_from_fork_asm+0x1a/0x30 [ 31.504789] [ 31.505224] The buggy address belongs to the object at ffff888102486200 [ 31.505224] which belongs to the cache kmalloc-64 of size 64 [ 31.506500] The buggy address is located 0 bytes to the right of [ 31.506500] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.507900] [ 31.508234] The buggy address belongs to the physical page: [ 31.508963] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.509850] flags: 0x200000000000000(node=0|zone=2) [ 31.510468] page_type: f5(slab) [ 31.510801] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.511662] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.512538] page dumped because: kasan: bad access detected [ 31.513204] [ 31.513353] Memory state around the buggy address: [ 31.514055] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.514911] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.515629] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.516449] ^ [ 31.517066] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.517403] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.517677] ================================================================== [ 29.530721] ================================================================== [ 29.532171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 29.532828] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.533400] [ 29.534404] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.535292] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.535849] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.536914] Call Trace: [ 29.537219] <TASK> [ 29.537837] dump_stack_lvl+0x73/0xb0 [ 29.538678] print_report+0xd1/0x640 [ 29.539036] ? __virt_addr_valid+0x1db/0x2d0 [ 29.539579] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.540113] kasan_report+0x102/0x140 [ 29.540509] ? kasan_atomics_helper+0xfaa/0x5450 [ 29.541569] ? kasan_atomics_helper+0xfaa/0x5450 [ 29.542027] kasan_check_range+0x10c/0x1c0 [ 29.542803] __kasan_check_write+0x18/0x20 [ 29.543549] kasan_atomics_helper+0xfaa/0x5450 [ 29.544214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.544896] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.545468] ? trace_hardirqs_on+0x37/0xe0 [ 29.546271] ? kasan_atomics+0x153/0x310 [ 29.546958] kasan_atomics+0x1dd/0x310 [ 29.547652] ? __pfx_kasan_atomics+0x10/0x10 [ 29.548152] ? __pfx_kasan_atomics+0x10/0x10 [ 29.548883] kunit_try_run_case+0x1b3/0x490 [ 29.549597] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.550081] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.550862] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.551703] ? __kthread_parkme+0x82/0x160 [ 29.552545] ? preempt_count_sub+0x50/0x80 [ 29.552989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.554043] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.554877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.555725] kthread+0x257/0x310 [ 29.556401] ? __pfx_kthread+0x10/0x10 [ 29.556882] ret_from_fork+0x41/0x80 [ 29.557610] ? __pfx_kthread+0x10/0x10 [ 29.558112] ret_from_fork_asm+0x1a/0x30 [ 29.559108] </TASK> [ 29.559408] [ 29.560186] Allocated by task 273: [ 29.560552] kasan_save_stack+0x3d/0x60 [ 29.561085] kasan_save_track+0x18/0x40 [ 29.561762] kasan_save_alloc_info+0x3b/0x50 [ 29.562192] __kasan_kmalloc+0xb7/0xc0 [ 29.562680] __kmalloc_cache_noprof+0x184/0x410 [ 29.563122] kasan_atomics+0x96/0x310 [ 29.564135] kunit_try_run_case+0x1b3/0x490 [ 29.564838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.565644] kthread+0x257/0x310 [ 29.566087] ret_from_fork+0x41/0x80 [ 29.566744] ret_from_fork_asm+0x1a/0x30 [ 29.567035] [ 29.567560] The buggy address belongs to the object at ffff888102486200 [ 29.567560] which belongs to the cache kmalloc-64 of size 64 [ 29.569197] The buggy address is located 0 bytes to the right of [ 29.569197] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.570975] [ 29.571524] The buggy address belongs to the physical page: [ 29.572041] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.573088] flags: 0x200000000000000(node=0|zone=2) [ 29.573765] page_type: f5(slab) [ 29.574481] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.575490] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.576363] page dumped because: kasan: bad access detected [ 29.576987] [ 29.577328] Memory state around the buggy address: [ 29.578006] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.578793] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.579600] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.580310] ^ [ 29.580775] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.582030] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.582903] ================================================================== [ 29.585716] ================================================================== [ 29.586474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 29.587204] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.588480] [ 29.588804] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.589913] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.590722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.592175] Call Trace: [ 29.592736] <TASK> [ 29.592977] dump_stack_lvl+0x73/0xb0 [ 29.593524] print_report+0xd1/0x640 [ 29.594173] ? __virt_addr_valid+0x1db/0x2d0 [ 29.594567] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.595150] kasan_report+0x102/0x140 [ 29.595843] ? kasan_atomics_helper+0x4a38/0x5450 [ 29.596982] ? kasan_atomics_helper+0x4a38/0x5450 [ 29.597598] __asan_report_load4_noabort+0x18/0x20 [ 29.598520] kasan_atomics_helper+0x4a38/0x5450 [ 29.599175] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.599669] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.600280] ? trace_hardirqs_on+0x37/0xe0 [ 29.600705] ? kasan_atomics+0x153/0x310 [ 29.601280] kasan_atomics+0x1dd/0x310 [ 29.601582] ? __pfx_kasan_atomics+0x10/0x10 [ 29.602456] ? __pfx_kasan_atomics+0x10/0x10 [ 29.603230] kunit_try_run_case+0x1b3/0x490 [ 29.603913] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.604391] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.605078] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.605732] ? __kthread_parkme+0x82/0x160 [ 29.606273] ? preempt_count_sub+0x50/0x80 [ 29.606657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.607258] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.607922] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.608502] kthread+0x257/0x310 [ 29.608993] ? __pfx_kthread+0x10/0x10 [ 29.609546] ret_from_fork+0x41/0x80 [ 29.609920] ? __pfx_kthread+0x10/0x10 [ 29.610540] ret_from_fork_asm+0x1a/0x30 [ 29.610990] </TASK> [ 29.611410] [ 29.611596] Allocated by task 273: [ 29.612037] kasan_save_stack+0x3d/0x60 [ 29.612504] kasan_save_track+0x18/0x40 [ 29.613032] kasan_save_alloc_info+0x3b/0x50 [ 29.613499] __kasan_kmalloc+0xb7/0xc0 [ 29.614035] __kmalloc_cache_noprof+0x184/0x410 [ 29.614703] kasan_atomics+0x96/0x310 [ 29.615194] kunit_try_run_case+0x1b3/0x490 [ 29.615690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.616465] kthread+0x257/0x310 [ 29.616793] ret_from_fork+0x41/0x80 [ 29.617404] ret_from_fork_asm+0x1a/0x30 [ 29.617817] [ 29.618202] The buggy address belongs to the object at ffff888102486200 [ 29.618202] which belongs to the cache kmalloc-64 of size 64 [ 29.619177] The buggy address is located 0 bytes to the right of [ 29.619177] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.620446] [ 29.620714] The buggy address belongs to the physical page: [ 29.621170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.622056] flags: 0x200000000000000(node=0|zone=2) [ 29.622618] page_type: f5(slab) [ 29.622993] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.623747] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.624548] page dumped because: kasan: bad access detected [ 29.625003] [ 29.625301] Memory state around the buggy address: [ 29.625882] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.626552] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.627023] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.627913] ^ [ 29.628559] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.629192] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.629859] ================================================================== [ 29.837143] ================================================================== [ 29.838511] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 29.838898] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.840883] [ 29.841165] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.842077] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.842922] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.844095] Call Trace: [ 29.844866] <TASK> [ 29.845193] dump_stack_lvl+0x73/0xb0 [ 29.845812] print_report+0xd1/0x640 [ 29.846570] ? __virt_addr_valid+0x1db/0x2d0 [ 29.847564] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.848137] kasan_report+0x102/0x140 [ 29.848873] ? kasan_atomics_helper+0x1218/0x5450 [ 29.849423] ? kasan_atomics_helper+0x1218/0x5450 [ 29.849915] kasan_check_range+0x10c/0x1c0 [ 29.850425] __kasan_check_write+0x18/0x20 [ 29.850850] kasan_atomics_helper+0x1218/0x5450 [ 29.852490] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.853109] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.854014] ? trace_hardirqs_on+0x37/0xe0 [ 29.854662] ? kasan_atomics+0x153/0x310 [ 29.855352] kasan_atomics+0x1dd/0x310 [ 29.855749] ? __pfx_kasan_atomics+0x10/0x10 [ 29.856188] ? __pfx_kasan_atomics+0x10/0x10 [ 29.856592] kunit_try_run_case+0x1b3/0x490 [ 29.857682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.858541] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.859359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.859919] ? __kthread_parkme+0x82/0x160 [ 29.860750] ? preempt_count_sub+0x50/0x80 [ 29.861456] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.862143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.862711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.863708] kthread+0x257/0x310 [ 29.864111] ? __pfx_kthread+0x10/0x10 [ 29.864788] ret_from_fork+0x41/0x80 [ 29.865253] ? __pfx_kthread+0x10/0x10 [ 29.865798] ret_from_fork_asm+0x1a/0x30 [ 29.866400] </TASK> [ 29.866624] [ 29.866950] Allocated by task 273: [ 29.867278] kasan_save_stack+0x3d/0x60 [ 29.868063] kasan_save_track+0x18/0x40 [ 29.868363] kasan_save_alloc_info+0x3b/0x50 [ 29.868913] __kasan_kmalloc+0xb7/0xc0 [ 29.869466] __kmalloc_cache_noprof+0x184/0x410 [ 29.870039] kasan_atomics+0x96/0x310 [ 29.870550] kunit_try_run_case+0x1b3/0x490 [ 29.871111] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.871662] kthread+0x257/0x310 [ 29.872057] ret_from_fork+0x41/0x80 [ 29.872461] ret_from_fork_asm+0x1a/0x30 [ 29.872964] [ 29.873122] The buggy address belongs to the object at ffff888102486200 [ 29.873122] which belongs to the cache kmalloc-64 of size 64 [ 29.874263] The buggy address is located 0 bytes to the right of [ 29.874263] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.875406] [ 29.875727] The buggy address belongs to the physical page: [ 29.876270] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.876996] flags: 0x200000000000000(node=0|zone=2) [ 29.877334] page_type: f5(slab) [ 29.877595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.878838] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.879525] page dumped because: kasan: bad access detected [ 29.880058] [ 29.880345] Memory state around the buggy address: [ 29.880872] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.881737] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.882234] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.882870] ^ [ 29.883480] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.884414] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.884861] ================================================================== [ 29.153959] ================================================================== [ 29.155149] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 29.155838] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.156417] [ 29.157469] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.158520] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.159475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.160435] Call Trace: [ 29.160751] <TASK> [ 29.161045] dump_stack_lvl+0x73/0xb0 [ 29.162108] print_report+0xd1/0x640 [ 29.162732] ? __virt_addr_valid+0x1db/0x2d0 [ 29.163471] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.163990] kasan_report+0x102/0x140 [ 29.164403] ? kasan_atomics_helper+0xac8/0x5450 [ 29.164872] ? kasan_atomics_helper+0xac8/0x5450 [ 29.165880] kasan_check_range+0x10c/0x1c0 [ 29.166637] __kasan_check_write+0x18/0x20 [ 29.167305] kasan_atomics_helper+0xac8/0x5450 [ 29.167982] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.168637] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.169150] ? trace_hardirqs_on+0x37/0xe0 [ 29.170057] ? kasan_atomics+0x153/0x310 [ 29.170724] kasan_atomics+0x1dd/0x310 [ 29.171442] ? __pfx_kasan_atomics+0x10/0x10 [ 29.172136] ? __pfx_kasan_atomics+0x10/0x10 [ 29.172647] kunit_try_run_case+0x1b3/0x490 [ 29.173511] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.174028] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.175075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.175465] ? __kthread_parkme+0x82/0x160 [ 29.176479] ? preempt_count_sub+0x50/0x80 [ 29.177248] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.177593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.178321] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.178831] kthread+0x257/0x310 [ 29.179346] ? __pfx_kthread+0x10/0x10 [ 29.179712] ret_from_fork+0x41/0x80 [ 29.180289] ? __pfx_kthread+0x10/0x10 [ 29.180776] ret_from_fork_asm+0x1a/0x30 [ 29.181172] </TASK> [ 29.181564] [ 29.181855] Allocated by task 273: [ 29.182409] kasan_save_stack+0x3d/0x60 [ 29.182887] kasan_save_track+0x18/0x40 [ 29.183272] kasan_save_alloc_info+0x3b/0x50 [ 29.183620] __kasan_kmalloc+0xb7/0xc0 [ 29.184240] __kmalloc_cache_noprof+0x184/0x410 [ 29.184890] kasan_atomics+0x96/0x310 [ 29.185498] kunit_try_run_case+0x1b3/0x490 [ 29.185862] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.186396] kthread+0x257/0x310 [ 29.186911] ret_from_fork+0x41/0x80 [ 29.187504] ret_from_fork_asm+0x1a/0x30 [ 29.188140] [ 29.188431] The buggy address belongs to the object at ffff888102486200 [ 29.188431] which belongs to the cache kmalloc-64 of size 64 [ 29.189272] The buggy address is located 0 bytes to the right of [ 29.189272] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.190560] [ 29.190843] The buggy address belongs to the physical page: [ 29.191447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.192199] flags: 0x200000000000000(node=0|zone=2) [ 29.192727] page_type: f5(slab) [ 29.193148] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.193598] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.194448] page dumped because: kasan: bad access detected [ 29.195207] [ 29.195442] Memory state around the buggy address: [ 29.196059] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.196759] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.197550] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.198262] ^ [ 29.198581] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.199486] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.200027] ================================================================== [ 28.770005] ================================================================== [ 28.770863] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 28.773381] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.773864] [ 28.774336] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.775106] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.775311] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.775646] Call Trace: [ 28.775781] <TASK> [ 28.775909] dump_stack_lvl+0x73/0xb0 [ 28.776304] print_report+0xd1/0x640 [ 28.776969] ? __virt_addr_valid+0x1db/0x2d0 [ 28.777670] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.778263] kasan_report+0x102/0x140 [ 28.778793] ? kasan_atomics_helper+0x5ff/0x5450 [ 28.779413] ? kasan_atomics_helper+0x5ff/0x5450 [ 28.779815] kasan_check_range+0x10c/0x1c0 [ 28.780506] __kasan_check_write+0x18/0x20 [ 28.781837] kasan_atomics_helper+0x5ff/0x5450 [ 28.782355] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.782818] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.783628] ? trace_hardirqs_on+0x37/0xe0 [ 28.784418] ? kasan_atomics+0x153/0x310 [ 28.784769] kasan_atomics+0x1dd/0x310 [ 28.785121] ? __pfx_kasan_atomics+0x10/0x10 [ 28.785983] ? __pfx_kasan_atomics+0x10/0x10 [ 28.786883] kunit_try_run_case+0x1b3/0x490 [ 28.787609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.788130] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.788778] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.789397] ? __kthread_parkme+0x82/0x160 [ 28.789823] ? preempt_count_sub+0x50/0x80 [ 28.790377] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.790924] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.791612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.792202] kthread+0x257/0x310 [ 28.792728] ? __pfx_kthread+0x10/0x10 [ 28.793304] ret_from_fork+0x41/0x80 [ 28.793696] ? __pfx_kthread+0x10/0x10 [ 28.794176] ret_from_fork_asm+0x1a/0x30 [ 28.794754] </TASK> [ 28.795223] [ 28.795462] Allocated by task 273: [ 28.795899] kasan_save_stack+0x3d/0x60 [ 28.796454] kasan_save_track+0x18/0x40 [ 28.796908] kasan_save_alloc_info+0x3b/0x50 [ 28.797438] __kasan_kmalloc+0xb7/0xc0 [ 28.797983] __kmalloc_cache_noprof+0x184/0x410 [ 28.798513] kasan_atomics+0x96/0x310 [ 28.798873] kunit_try_run_case+0x1b3/0x490 [ 28.799580] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.799981] kthread+0x257/0x310 [ 28.800491] ret_from_fork+0x41/0x80 [ 28.801019] ret_from_fork_asm+0x1a/0x30 [ 28.801381] [ 28.801641] The buggy address belongs to the object at ffff888102486200 [ 28.801641] which belongs to the cache kmalloc-64 of size 64 [ 28.802671] The buggy address is located 0 bytes to the right of [ 28.802671] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.803665] [ 28.803869] The buggy address belongs to the physical page: [ 28.804416] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.804869] flags: 0x200000000000000(node=0|zone=2) [ 28.805398] page_type: f5(slab) [ 28.805905] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.806829] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.807622] page dumped because: kasan: bad access detected [ 28.808824] [ 28.809222] Memory state around the buggy address: [ 28.810119] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.810810] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.811293] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.811909] ^ [ 28.812419] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.813308] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.813967] ================================================================== [ 31.214885] ================================================================== [ 31.216769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 31.217947] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.219093] [ 31.219975] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.221036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.221475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.222712] Call Trace: [ 31.223257] <TASK> [ 31.223606] dump_stack_lvl+0x73/0xb0 [ 31.224090] print_report+0xd1/0x640 [ 31.224992] ? __virt_addr_valid+0x1db/0x2d0 [ 31.225700] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.226666] kasan_report+0x102/0x140 [ 31.227081] ? kasan_atomics_helper+0x4f9a/0x5450 [ 31.227856] ? kasan_atomics_helper+0x4f9a/0x5450 [ 31.228757] __asan_report_load8_noabort+0x18/0x20 [ 31.229258] kasan_atomics_helper+0x4f9a/0x5450 [ 31.229747] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.230617] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.231271] ? trace_hardirqs_on+0x37/0xe0 [ 31.231711] ? kasan_atomics+0x153/0x310 [ 31.232110] kasan_atomics+0x1dd/0x310 [ 31.232953] ? __pfx_kasan_atomics+0x10/0x10 [ 31.233503] ? __pfx_kasan_atomics+0x10/0x10 [ 31.234433] kunit_try_run_case+0x1b3/0x490 [ 31.235065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.235819] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.236292] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.236845] ? __kthread_parkme+0x82/0x160 [ 31.237666] ? preempt_count_sub+0x50/0x80 [ 31.238008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.238999] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.239906] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.240675] kthread+0x257/0x310 [ 31.241277] ? __pfx_kthread+0x10/0x10 [ 31.241882] ret_from_fork+0x41/0x80 [ 31.242329] ? __pfx_kthread+0x10/0x10 [ 31.243131] ret_from_fork_asm+0x1a/0x30 [ 31.243634] </TASK> [ 31.243901] [ 31.244113] Allocated by task 273: [ 31.244426] kasan_save_stack+0x3d/0x60 [ 31.244877] kasan_save_track+0x18/0x40 [ 31.245970] kasan_save_alloc_info+0x3b/0x50 [ 31.246725] __kasan_kmalloc+0xb7/0xc0 [ 31.247325] __kmalloc_cache_noprof+0x184/0x410 [ 31.248047] kasan_atomics+0x96/0x310 [ 31.248597] kunit_try_run_case+0x1b3/0x490 [ 31.249049] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.249615] kthread+0x257/0x310 [ 31.249983] ret_from_fork+0x41/0x80 [ 31.250843] ret_from_fork_asm+0x1a/0x30 [ 31.251154] [ 31.251406] The buggy address belongs to the object at ffff888102486200 [ 31.251406] which belongs to the cache kmalloc-64 of size 64 [ 31.253115] The buggy address is located 0 bytes to the right of [ 31.253115] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.254513] [ 31.254797] The buggy address belongs to the physical page: [ 31.255366] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.256850] flags: 0x200000000000000(node=0|zone=2) [ 31.257655] page_type: f5(slab) [ 31.258323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.259423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.260074] page dumped because: kasan: bad access detected [ 31.260548] [ 31.260747] Memory state around the buggy address: [ 31.261872] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.262796] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.263535] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.264141] ^ [ 31.264998] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.265868] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.266926] ================================================================== [ 30.906262] ================================================================== [ 30.908111] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 30.908768] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.909426] [ 30.910417] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.911300] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.911626] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.912734] Call Trace: [ 30.913288] <TASK> [ 30.913735] dump_stack_lvl+0x73/0xb0 [ 30.914440] print_report+0xd1/0x640 [ 30.915105] ? __virt_addr_valid+0x1db/0x2d0 [ 30.915572] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.916107] kasan_report+0x102/0x140 [ 30.917038] ? kasan_atomics_helper+0x1d7b/0x5450 [ 30.917672] ? kasan_atomics_helper+0x1d7b/0x5450 [ 30.918251] kasan_check_range+0x10c/0x1c0 [ 30.919179] __kasan_check_write+0x18/0x20 [ 30.919798] kasan_atomics_helper+0x1d7b/0x5450 [ 30.920541] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.921258] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.922009] ? trace_hardirqs_on+0x37/0xe0 [ 30.922763] ? kasan_atomics+0x153/0x310 [ 30.923254] kasan_atomics+0x1dd/0x310 [ 30.923652] ? __pfx_kasan_atomics+0x10/0x10 [ 30.924090] ? __pfx_kasan_atomics+0x10/0x10 [ 30.925082] kunit_try_run_case+0x1b3/0x490 [ 30.925683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.926528] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.927174] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.927866] ? __kthread_parkme+0x82/0x160 [ 30.928762] ? preempt_count_sub+0x50/0x80 [ 30.929624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.930231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.931137] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.932021] kthread+0x257/0x310 [ 30.932688] ? __pfx_kthread+0x10/0x10 [ 30.933154] ret_from_fork+0x41/0x80 [ 30.934003] ? __pfx_kthread+0x10/0x10 [ 30.934651] ret_from_fork_asm+0x1a/0x30 [ 30.935357] </TASK> [ 30.935637] [ 30.935857] Allocated by task 273: [ 30.936754] kasan_save_stack+0x3d/0x60 [ 30.937172] kasan_save_track+0x18/0x40 [ 30.937830] kasan_save_alloc_info+0x3b/0x50 [ 30.938630] __kasan_kmalloc+0xb7/0xc0 [ 30.939318] __kmalloc_cache_noprof+0x184/0x410 [ 30.939948] kasan_atomics+0x96/0x310 [ 30.940688] kunit_try_run_case+0x1b3/0x490 [ 30.941448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.942576] kthread+0x257/0x310 [ 30.942956] ret_from_fork+0x41/0x80 [ 30.943503] ret_from_fork_asm+0x1a/0x30 [ 30.943919] [ 30.944814] The buggy address belongs to the object at ffff888102486200 [ 30.944814] which belongs to the cache kmalloc-64 of size 64 [ 30.945994] The buggy address is located 0 bytes to the right of [ 30.945994] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.947849] [ 30.948576] The buggy address belongs to the physical page: [ 30.949126] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.950208] flags: 0x200000000000000(node=0|zone=2) [ 30.950641] page_type: f5(slab) [ 30.952052] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.952759] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.954122] page dumped because: kasan: bad access detected [ 30.955049] [ 30.955316] Memory state around the buggy address: [ 30.956107] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.957087] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.957917] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.958995] ^ [ 30.959736] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.960510] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.961493] ================================================================== [ 30.219224] ================================================================== [ 30.220448] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 30.221925] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.223301] [ 30.223656] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.225820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.226577] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.226926] Call Trace: [ 30.227276] <TASK> [ 30.227613] dump_stack_lvl+0x73/0xb0 [ 30.227995] print_report+0xd1/0x640 [ 30.228625] ? __virt_addr_valid+0x1db/0x2d0 [ 30.229066] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.229690] kasan_report+0x102/0x140 [ 30.230283] ? kasan_atomics_helper+0x151e/0x5450 [ 30.230810] ? kasan_atomics_helper+0x151e/0x5450 [ 30.231534] kasan_check_range+0x10c/0x1c0 [ 30.232034] __kasan_check_write+0x18/0x20 [ 30.232831] kasan_atomics_helper+0x151e/0x5450 [ 30.233677] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.234577] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.235067] ? trace_hardirqs_on+0x37/0xe0 [ 30.235517] ? kasan_atomics+0x153/0x310 [ 30.235959] kasan_atomics+0x1dd/0x310 [ 30.236242] ? __pfx_kasan_atomics+0x10/0x10 [ 30.237186] ? __pfx_kasan_atomics+0x10/0x10 [ 30.237655] kunit_try_run_case+0x1b3/0x490 [ 30.238116] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.238606] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.240106] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.240850] ? __kthread_parkme+0x82/0x160 [ 30.241482] ? preempt_count_sub+0x50/0x80 [ 30.241990] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.242458] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.243135] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.243710] kthread+0x257/0x310 [ 30.244256] ? __pfx_kthread+0x10/0x10 [ 30.244742] ret_from_fork+0x41/0x80 [ 30.245171] ? __pfx_kthread+0x10/0x10 [ 30.245737] ret_from_fork_asm+0x1a/0x30 [ 30.246307] </TASK> [ 30.246583] [ 30.246888] Allocated by task 273: [ 30.247344] kasan_save_stack+0x3d/0x60 [ 30.247767] kasan_save_track+0x18/0x40 [ 30.248307] kasan_save_alloc_info+0x3b/0x50 [ 30.248856] __kasan_kmalloc+0xb7/0xc0 [ 30.249404] __kmalloc_cache_noprof+0x184/0x410 [ 30.249859] kasan_atomics+0x96/0x310 [ 30.250427] kunit_try_run_case+0x1b3/0x490 [ 30.250822] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.251494] kthread+0x257/0x310 [ 30.251770] ret_from_fork+0x41/0x80 [ 30.252263] ret_from_fork_asm+0x1a/0x30 [ 30.252661] [ 30.252859] The buggy address belongs to the object at ffff888102486200 [ 30.252859] which belongs to the cache kmalloc-64 of size 64 [ 30.253804] The buggy address is located 0 bytes to the right of [ 30.253804] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.255171] [ 30.255436] The buggy address belongs to the physical page: [ 30.255947] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.256669] flags: 0x200000000000000(node=0|zone=2) [ 30.257031] page_type: f5(slab) [ 30.257420] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.258368] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.259295] page dumped because: kasan: bad access detected [ 30.259780] [ 30.260027] Memory state around the buggy address: [ 30.260383] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.261162] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.261952] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.262683] ^ [ 30.263343] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.264564] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.265637] ================================================================== [ 29.102876] ================================================================== [ 29.103609] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 29.104694] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.105900] [ 29.106259] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.107216] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.107630] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.109143] Call Trace: [ 29.109441] <TASK> [ 29.110043] dump_stack_lvl+0x73/0xb0 [ 29.110697] print_report+0xd1/0x640 [ 29.111304] ? __virt_addr_valid+0x1db/0x2d0 [ 29.111515] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.111751] kasan_report+0x102/0x140 [ 29.111958] ? kasan_atomics_helper+0xa2c/0x5450 [ 29.112409] ? kasan_atomics_helper+0xa2c/0x5450 [ 29.113582] kasan_check_range+0x10c/0x1c0 [ 29.114115] __kasan_check_write+0x18/0x20 [ 29.114836] kasan_atomics_helper+0xa2c/0x5450 [ 29.115537] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.116102] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.116885] ? trace_hardirqs_on+0x37/0xe0 [ 29.117766] ? kasan_atomics+0x153/0x310 [ 29.118373] kasan_atomics+0x1dd/0x310 [ 29.118948] ? __pfx_kasan_atomics+0x10/0x10 [ 29.119579] ? __pfx_kasan_atomics+0x10/0x10 [ 29.120054] kunit_try_run_case+0x1b3/0x490 [ 29.120453] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.120874] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.121796] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.122489] ? __kthread_parkme+0x82/0x160 [ 29.123086] ? preempt_count_sub+0x50/0x80 [ 29.123821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.124633] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.125129] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.126114] kthread+0x257/0x310 [ 29.126474] ? __pfx_kthread+0x10/0x10 [ 29.126845] ret_from_fork+0x41/0x80 [ 29.127242] ? __pfx_kthread+0x10/0x10 [ 29.127634] ret_from_fork_asm+0x1a/0x30 [ 29.128596] </TASK> [ 29.128804] [ 29.128985] Allocated by task 273: [ 29.130008] kasan_save_stack+0x3d/0x60 [ 29.130781] kasan_save_track+0x18/0x40 [ 29.131180] kasan_save_alloc_info+0x3b/0x50 [ 29.131967] __kasan_kmalloc+0xb7/0xc0 [ 29.132510] __kmalloc_cache_noprof+0x184/0x410 [ 29.132991] kasan_atomics+0x96/0x310 [ 29.133914] kunit_try_run_case+0x1b3/0x490 [ 29.134346] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.135078] kthread+0x257/0x310 [ 29.135586] ret_from_fork+0x41/0x80 [ 29.135923] ret_from_fork_asm+0x1a/0x30 [ 29.136398] [ 29.136592] The buggy address belongs to the object at ffff888102486200 [ 29.136592] which belongs to the cache kmalloc-64 of size 64 [ 29.138299] The buggy address is located 0 bytes to the right of [ 29.138299] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.139267] [ 29.140091] The buggy address belongs to the physical page: [ 29.140641] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.141585] flags: 0x200000000000000(node=0|zone=2) [ 29.142014] page_type: f5(slab) [ 29.142791] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.143512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.144334] page dumped because: kasan: bad access detected [ 29.144858] [ 29.145875] Memory state around the buggy address: [ 29.146198] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.147132] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.147796] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.148765] ^ [ 29.149507] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.150536] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.151149] ================================================================== [ 29.201981] ================================================================== [ 29.202708] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 29.203669] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.204384] [ 29.204676] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.205712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.206140] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.207044] Call Trace: [ 29.207332] <TASK> [ 29.207696] dump_stack_lvl+0x73/0xb0 [ 29.208678] print_report+0xd1/0x640 [ 29.208988] ? __virt_addr_valid+0x1db/0x2d0 [ 29.209838] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.210808] kasan_report+0x102/0x140 [ 29.211500] ? kasan_atomics_helper+0xb6b/0x5450 [ 29.212187] ? kasan_atomics_helper+0xb6b/0x5450 [ 29.212874] kasan_check_range+0x10c/0x1c0 [ 29.213541] __kasan_check_write+0x18/0x20 [ 29.214543] kasan_atomics_helper+0xb6b/0x5450 [ 29.215000] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.215589] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.216558] ? trace_hardirqs_on+0x37/0xe0 [ 29.217180] ? kasan_atomics+0x153/0x310 [ 29.218086] kasan_atomics+0x1dd/0x310 [ 29.218560] ? __pfx_kasan_atomics+0x10/0x10 [ 29.219006] ? __pfx_kasan_atomics+0x10/0x10 [ 29.219962] kunit_try_run_case+0x1b3/0x490 [ 29.220266] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.221017] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.221644] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.222491] ? __kthread_parkme+0x82/0x160 [ 29.223135] ? preempt_count_sub+0x50/0x80 [ 29.223585] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.224091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.225565] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.226100] kthread+0x257/0x310 [ 29.226461] ? __pfx_kthread+0x10/0x10 [ 29.226910] ret_from_fork+0x41/0x80 [ 29.227445] ? __pfx_kthread+0x10/0x10 [ 29.227892] ret_from_fork_asm+0x1a/0x30 [ 29.228395] </TASK> [ 29.228620] [ 29.228785] Allocated by task 273: [ 29.229353] kasan_save_stack+0x3d/0x60 [ 29.229890] kasan_save_track+0x18/0x40 [ 29.230445] kasan_save_alloc_info+0x3b/0x50 [ 29.230916] __kasan_kmalloc+0xb7/0xc0 [ 29.231387] __kmalloc_cache_noprof+0x184/0x410 [ 29.231723] kasan_atomics+0x96/0x310 [ 29.232187] kunit_try_run_case+0x1b3/0x490 [ 29.232809] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.233359] kthread+0x257/0x310 [ 29.233642] ret_from_fork+0x41/0x80 [ 29.233971] ret_from_fork_asm+0x1a/0x30 [ 29.234415] [ 29.234659] The buggy address belongs to the object at ffff888102486200 [ 29.234659] which belongs to the cache kmalloc-64 of size 64 [ 29.236816] The buggy address is located 0 bytes to the right of [ 29.236816] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.239212] [ 29.239665] The buggy address belongs to the physical page: [ 29.240859] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.241697] flags: 0x200000000000000(node=0|zone=2) [ 29.242069] page_type: f5(slab) [ 29.242807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.244032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.244682] page dumped because: kasan: bad access detected [ 29.245426] [ 29.245698] Memory state around the buggy address: [ 29.246605] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.247226] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.247898] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.248927] ^ [ 29.249303] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.250579] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.251142] ================================================================== [ 31.115231] ================================================================== [ 31.115985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 31.117508] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.118003] [ 31.118206] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.119758] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.120574] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.121897] Call Trace: [ 31.122147] <TASK> [ 31.122509] dump_stack_lvl+0x73/0xb0 [ 31.123552] print_report+0xd1/0x640 [ 31.124359] ? __virt_addr_valid+0x1db/0x2d0 [ 31.124836] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.125660] kasan_report+0x102/0x140 [ 31.126165] ? kasan_atomics_helper+0x4f73/0x5450 [ 31.126615] ? kasan_atomics_helper+0x4f73/0x5450 [ 31.127222] __asan_report_load8_noabort+0x18/0x20 [ 31.127564] kasan_atomics_helper+0x4f73/0x5450 [ 31.128263] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.128746] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.129208] ? trace_hardirqs_on+0x37/0xe0 [ 31.129827] ? kasan_atomics+0x153/0x310 [ 31.130479] kasan_atomics+0x1dd/0x310 [ 31.131004] ? __pfx_kasan_atomics+0x10/0x10 [ 31.131562] ? __pfx_kasan_atomics+0x10/0x10 [ 31.132206] kunit_try_run_case+0x1b3/0x490 [ 31.132713] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.133376] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.134061] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.134581] ? __kthread_parkme+0x82/0x160 [ 31.135060] ? preempt_count_sub+0x50/0x80 [ 31.135588] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.136037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.136738] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.137355] kthread+0x257/0x310 [ 31.137752] ? __pfx_kthread+0x10/0x10 [ 31.138310] ret_from_fork+0x41/0x80 [ 31.138676] ? __pfx_kthread+0x10/0x10 [ 31.139161] ret_from_fork_asm+0x1a/0x30 [ 31.139567] </TASK> [ 31.139965] [ 31.140371] Allocated by task 273: [ 31.140698] kasan_save_stack+0x3d/0x60 [ 31.141045] kasan_save_track+0x18/0x40 [ 31.141685] kasan_save_alloc_info+0x3b/0x50 [ 31.142424] __kasan_kmalloc+0xb7/0xc0 [ 31.142920] __kmalloc_cache_noprof+0x184/0x410 [ 31.143326] kasan_atomics+0x96/0x310 [ 31.143777] kunit_try_run_case+0x1b3/0x490 [ 31.144487] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.145206] kthread+0x257/0x310 [ 31.145643] ret_from_fork+0x41/0x80 [ 31.145997] ret_from_fork_asm+0x1a/0x30 [ 31.146472] [ 31.146736] The buggy address belongs to the object at ffff888102486200 [ 31.146736] which belongs to the cache kmalloc-64 of size 64 [ 31.147779] The buggy address is located 0 bytes to the right of [ 31.147779] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.149354] [ 31.149631] The buggy address belongs to the physical page: [ 31.150022] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.151055] flags: 0x200000000000000(node=0|zone=2) [ 31.151745] page_type: f5(slab) [ 31.152285] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.153183] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.153625] page dumped because: kasan: bad access detected [ 31.154205] [ 31.154414] Memory state around the buggy address: [ 31.154829] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.156336] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.157357] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.157888] ^ [ 31.158368] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.159392] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.160084] ================================================================== [ 31.066101] ================================================================== [ 31.067297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 31.067955] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 31.068777] [ 31.069184] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 31.072366] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.072861] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.074286] Call Trace: [ 31.074589] <TASK> [ 31.074861] dump_stack_lvl+0x73/0xb0 [ 31.076180] print_report+0xd1/0x640 [ 31.076531] ? __virt_addr_valid+0x1db/0x2d0 [ 31.077223] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.077754] kasan_report+0x102/0x140 [ 31.078379] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.078755] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.079342] kasan_check_range+0x10c/0x1c0 [ 31.079797] __kasan_check_write+0x18/0x20 [ 31.080304] kasan_atomics_helper+0x1f44/0x5450 [ 31.080983] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.081576] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.082279] ? trace_hardirqs_on+0x37/0xe0 [ 31.082617] ? kasan_atomics+0x153/0x310 [ 31.083090] kasan_atomics+0x1dd/0x310 [ 31.083630] ? __pfx_kasan_atomics+0x10/0x10 [ 31.084128] ? __pfx_kasan_atomics+0x10/0x10 [ 31.084819] kunit_try_run_case+0x1b3/0x490 [ 31.085161] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.085879] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.086458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.087023] ? __kthread_parkme+0x82/0x160 [ 31.087582] ? preempt_count_sub+0x50/0x80 [ 31.087973] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.088511] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.089007] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.089759] kthread+0x257/0x310 [ 31.090446] ? __pfx_kthread+0x10/0x10 [ 31.090906] ret_from_fork+0x41/0x80 [ 31.091672] ? __pfx_kthread+0x10/0x10 [ 31.092300] ret_from_fork_asm+0x1a/0x30 [ 31.092820] </TASK> [ 31.093305] [ 31.093702] Allocated by task 273: [ 31.094027] kasan_save_stack+0x3d/0x60 [ 31.094560] kasan_save_track+0x18/0x40 [ 31.095101] kasan_save_alloc_info+0x3b/0x50 [ 31.095972] __kasan_kmalloc+0xb7/0xc0 [ 31.096333] __kmalloc_cache_noprof+0x184/0x410 [ 31.096664] kasan_atomics+0x96/0x310 [ 31.096971] kunit_try_run_case+0x1b3/0x490 [ 31.097861] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.098786] kthread+0x257/0x310 [ 31.099412] ret_from_fork+0x41/0x80 [ 31.099797] ret_from_fork_asm+0x1a/0x30 [ 31.100287] [ 31.100717] The buggy address belongs to the object at ffff888102486200 [ 31.100717] which belongs to the cache kmalloc-64 of size 64 [ 31.101852] The buggy address is located 0 bytes to the right of [ 31.101852] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.102650] [ 31.103067] The buggy address belongs to the physical page: [ 31.103843] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.104766] flags: 0x200000000000000(node=0|zone=2) [ 31.105364] page_type: f5(slab) [ 31.105815] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.106735] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.107971] page dumped because: kasan: bad access detected [ 31.109133] [ 31.109314] Memory state around the buggy address: [ 31.109601] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.109910] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.111163] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.112206] ^ [ 31.112918] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.114153] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.114508] ================================================================== [ 30.799980] ================================================================== [ 30.800664] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 30.801202] Read of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.802165] [ 30.802454] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.803558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.804155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.805029] Call Trace: [ 30.805387] <TASK> [ 30.805727] dump_stack_lvl+0x73/0xb0 [ 30.806236] print_report+0xd1/0x640 [ 30.806726] ? __virt_addr_valid+0x1db/0x2d0 [ 30.807301] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.807974] kasan_report+0x102/0x140 [ 30.808506] ? kasan_atomics_helper+0x4f32/0x5450 [ 30.809131] ? kasan_atomics_helper+0x4f32/0x5450 [ 30.809797] __asan_report_load8_noabort+0x18/0x20 [ 30.810493] kasan_atomics_helper+0x4f32/0x5450 [ 30.810846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.811559] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.811961] ? trace_hardirqs_on+0x37/0xe0 [ 30.812632] ? kasan_atomics+0x153/0x310 [ 30.813071] kasan_atomics+0x1dd/0x310 [ 30.813611] ? __pfx_kasan_atomics+0x10/0x10 [ 30.814171] ? __pfx_kasan_atomics+0x10/0x10 [ 30.814636] kunit_try_run_case+0x1b3/0x490 [ 30.815160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.815775] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.816347] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.817014] ? __kthread_parkme+0x82/0x160 [ 30.817821] ? preempt_count_sub+0x50/0x80 [ 30.818753] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.819489] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.820355] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.821135] kthread+0x257/0x310 [ 30.821854] ? __pfx_kthread+0x10/0x10 [ 30.822479] ret_from_fork+0x41/0x80 [ 30.822890] ? __pfx_kthread+0x10/0x10 [ 30.823182] ret_from_fork_asm+0x1a/0x30 [ 30.824325] </TASK> [ 30.824537] [ 30.825011] Allocated by task 273: [ 30.825647] kasan_save_stack+0x3d/0x60 [ 30.826189] kasan_save_track+0x18/0x40 [ 30.826560] kasan_save_alloc_info+0x3b/0x50 [ 30.826995] __kasan_kmalloc+0xb7/0xc0 [ 30.827926] __kmalloc_cache_noprof+0x184/0x410 [ 30.828351] kasan_atomics+0x96/0x310 [ 30.829058] kunit_try_run_case+0x1b3/0x490 [ 30.829516] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.830198] kthread+0x257/0x310 [ 30.830696] ret_from_fork+0x41/0x80 [ 30.831597] ret_from_fork_asm+0x1a/0x30 [ 30.832047] [ 30.832277] The buggy address belongs to the object at ffff888102486200 [ 30.832277] which belongs to the cache kmalloc-64 of size 64 [ 30.834175] The buggy address is located 0 bytes to the right of [ 30.834175] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.836457] [ 30.836694] The buggy address belongs to the physical page: [ 30.837324] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.839030] flags: 0x200000000000000(node=0|zone=2) [ 30.839906] page_type: f5(slab) [ 30.840304] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.841217] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.842362] page dumped because: kasan: bad access detected [ 30.842705] [ 30.843285] Memory state around the buggy address: [ 30.843993] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.845218] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.845911] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.846313] ^ [ 30.847009] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.847688] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.849159] ================================================================== [ 28.914736] ================================================================== [ 28.915716] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 28.916692] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.917546] [ 28.917893] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.918499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.919138] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.920215] Call Trace: [ 28.920555] <TASK> [ 28.920769] dump_stack_lvl+0x73/0xb0 [ 28.921292] print_report+0xd1/0x640 [ 28.921803] ? __virt_addr_valid+0x1db/0x2d0 [ 28.922688] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.923565] kasan_report+0x102/0x140 [ 28.923862] ? kasan_atomics_helper+0x7c8/0x5450 [ 28.924215] ? kasan_atomics_helper+0x7c8/0x5450 [ 28.924730] kasan_check_range+0x10c/0x1c0 [ 28.925380] __kasan_check_write+0x18/0x20 [ 28.925958] kasan_atomics_helper+0x7c8/0x5450 [ 28.926659] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.927358] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.927824] ? trace_hardirqs_on+0x37/0xe0 [ 28.928159] ? kasan_atomics+0x153/0x310 [ 28.928508] kasan_atomics+0x1dd/0x310 [ 28.929055] ? __pfx_kasan_atomics+0x10/0x10 [ 28.929617] ? __pfx_kasan_atomics+0x10/0x10 [ 28.930671] kunit_try_run_case+0x1b3/0x490 [ 28.931387] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.931878] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.932535] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.933305] ? __kthread_parkme+0x82/0x160 [ 28.933623] ? preempt_count_sub+0x50/0x80 [ 28.934088] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.934818] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.935582] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.936117] kthread+0x257/0x310 [ 28.936707] ? __pfx_kthread+0x10/0x10 [ 28.937278] ret_from_fork+0x41/0x80 [ 28.937652] ? __pfx_kthread+0x10/0x10 [ 28.938183] ret_from_fork_asm+0x1a/0x30 [ 28.938883] </TASK> [ 28.939259] [ 28.939472] Allocated by task 273: [ 28.940004] kasan_save_stack+0x3d/0x60 [ 28.940576] kasan_save_track+0x18/0x40 [ 28.940875] kasan_save_alloc_info+0x3b/0x50 [ 28.941621] __kasan_kmalloc+0xb7/0xc0 [ 28.942062] __kmalloc_cache_noprof+0x184/0x410 [ 28.942466] kasan_atomics+0x96/0x310 [ 28.942894] kunit_try_run_case+0x1b3/0x490 [ 28.943393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.943861] kthread+0x257/0x310 [ 28.944649] ret_from_fork+0x41/0x80 [ 28.944913] ret_from_fork_asm+0x1a/0x30 [ 28.945156] [ 28.945258] The buggy address belongs to the object at ffff888102486200 [ 28.945258] which belongs to the cache kmalloc-64 of size 64 [ 28.945695] The buggy address is located 0 bytes to the right of [ 28.945695] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.947197] [ 28.947391] The buggy address belongs to the physical page: [ 28.947894] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.949137] flags: 0x200000000000000(node=0|zone=2) [ 28.950071] page_type: f5(slab) [ 28.950665] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.951254] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.952187] page dumped because: kasan: bad access detected [ 28.952724] [ 28.952916] Memory state around the buggy address: [ 28.953232] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.954148] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.954651] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.955575] ^ [ 28.956488] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.958074] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.958734] ================================================================== [ 29.988421] ================================================================== [ 29.989672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 29.990522] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.992136] [ 29.992336] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.993848] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.994375] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.996019] Call Trace: [ 29.996285] <TASK> [ 29.996988] dump_stack_lvl+0x73/0xb0 [ 29.997574] print_report+0xd1/0x640 [ 29.998232] ? __virt_addr_valid+0x1db/0x2d0 [ 29.998847] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.999628] kasan_report+0x102/0x140 [ 30.000045] ? kasan_atomics_helper+0x49d0/0x5450 [ 30.000545] ? kasan_atomics_helper+0x49d0/0x5450 [ 30.001534] __asan_report_load4_noabort+0x18/0x20 [ 30.001882] kasan_atomics_helper+0x49d0/0x5450 [ 30.002516] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.003552] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.004184] ? trace_hardirqs_on+0x37/0xe0 [ 30.004631] ? kasan_atomics+0x153/0x310 [ 30.005066] kasan_atomics+0x1dd/0x310 [ 30.005484] ? __pfx_kasan_atomics+0x10/0x10 [ 30.005969] ? __pfx_kasan_atomics+0x10/0x10 [ 30.006282] kunit_try_run_case+0x1b3/0x490 [ 30.006600] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.007284] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.007791] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.008614] ? __kthread_parkme+0x82/0x160 [ 30.009114] ? preempt_count_sub+0x50/0x80 [ 30.009564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.011033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.011898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.012680] kthread+0x257/0x310 [ 30.012876] ? __pfx_kthread+0x10/0x10 [ 30.013094] ret_from_fork+0x41/0x80 [ 30.013475] ? __pfx_kthread+0x10/0x10 [ 30.014046] ret_from_fork_asm+0x1a/0x30 [ 30.014417] </TASK> [ 30.014773] [ 30.015464] Allocated by task 273: [ 30.015893] kasan_save_stack+0x3d/0x60 [ 30.016360] kasan_save_track+0x18/0x40 [ 30.016909] kasan_save_alloc_info+0x3b/0x50 [ 30.017669] __kasan_kmalloc+0xb7/0xc0 [ 30.018884] __kmalloc_cache_noprof+0x184/0x410 [ 30.019334] kasan_atomics+0x96/0x310 [ 30.019981] kunit_try_run_case+0x1b3/0x490 [ 30.020773] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.021521] kthread+0x257/0x310 [ 30.022213] ret_from_fork+0x41/0x80 [ 30.022838] ret_from_fork_asm+0x1a/0x30 [ 30.023455] [ 30.023760] The buggy address belongs to the object at ffff888102486200 [ 30.023760] which belongs to the cache kmalloc-64 of size 64 [ 30.024860] The buggy address is located 0 bytes to the right of [ 30.024860] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.026975] [ 30.027245] The buggy address belongs to the physical page: [ 30.027608] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.028753] flags: 0x200000000000000(node=0|zone=2) [ 30.029596] page_type: f5(slab) [ 30.029994] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.031274] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.032160] page dumped because: kasan: bad access detected [ 30.033144] [ 30.033387] Memory state around the buggy address: [ 30.033999] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.035413] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.036049] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.036728] ^ [ 30.037829] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.038956] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.039833] ================================================================== [ 28.960201] ================================================================== [ 28.961568] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 28.962557] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.963748] [ 28.964161] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.965341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.965795] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.966755] Call Trace: [ 28.967128] <TASK> [ 28.967542] dump_stack_lvl+0x73/0xb0 [ 28.967991] print_report+0xd1/0x640 [ 28.968746] ? __virt_addr_valid+0x1db/0x2d0 [ 28.969202] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.969792] kasan_report+0x102/0x140 [ 28.970350] ? kasan_atomics_helper+0x861/0x5450 [ 28.971052] ? kasan_atomics_helper+0x861/0x5450 [ 28.971613] kasan_check_range+0x10c/0x1c0 [ 28.972225] __kasan_check_write+0x18/0x20 [ 28.972660] kasan_atomics_helper+0x861/0x5450 [ 28.973370] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.973991] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.974539] ? trace_hardirqs_on+0x37/0xe0 [ 28.975101] ? kasan_atomics+0x153/0x310 [ 28.975541] kasan_atomics+0x1dd/0x310 [ 28.976035] ? __pfx_kasan_atomics+0x10/0x10 [ 28.976532] ? __pfx_kasan_atomics+0x10/0x10 [ 28.976949] kunit_try_run_case+0x1b3/0x490 [ 28.977734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.978232] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.979005] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.979687] ? __kthread_parkme+0x82/0x160 [ 28.980259] ? preempt_count_sub+0x50/0x80 [ 28.980999] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.981701] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.982532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.983203] kthread+0x257/0x310 [ 28.983535] ? __pfx_kthread+0x10/0x10 [ 28.983990] ret_from_fork+0x41/0x80 [ 28.984477] ? __pfx_kthread+0x10/0x10 [ 28.984952] ret_from_fork_asm+0x1a/0x30 [ 28.985368] </TASK> [ 28.985707] [ 28.986051] Allocated by task 273: [ 28.986307] kasan_save_stack+0x3d/0x60 [ 28.986777] kasan_save_track+0x18/0x40 [ 28.987502] kasan_save_alloc_info+0x3b/0x50 [ 28.988054] __kasan_kmalloc+0xb7/0xc0 [ 28.988538] __kmalloc_cache_noprof+0x184/0x410 [ 28.988858] kasan_atomics+0x96/0x310 [ 28.989877] kunit_try_run_case+0x1b3/0x490 [ 28.990359] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.990982] kthread+0x257/0x310 [ 28.991328] ret_from_fork+0x41/0x80 [ 28.991690] ret_from_fork_asm+0x1a/0x30 [ 28.992286] [ 28.992522] The buggy address belongs to the object at ffff888102486200 [ 28.992522] which belongs to the cache kmalloc-64 of size 64 [ 28.993560] The buggy address is located 0 bytes to the right of [ 28.993560] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.994744] [ 28.994920] The buggy address belongs to the physical page: [ 28.995781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.996716] flags: 0x200000000000000(node=0|zone=2) [ 28.997159] page_type: f5(slab) [ 28.997609] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.998418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.999192] page dumped because: kasan: bad access detected [ 28.999740] [ 29.000044] Memory state around the buggy address: [ 29.000556] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.001376] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.001962] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.002666] ^ [ 29.003202] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.003763] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.004731] ================================================================== [ 28.815205] ================================================================== [ 28.816126] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 28.816762] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.817367] [ 28.817575] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.818554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.818981] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.819742] Call Trace: [ 28.820070] <TASK> [ 28.820412] dump_stack_lvl+0x73/0xb0 [ 28.820796] print_report+0xd1/0x640 [ 28.821332] ? __virt_addr_valid+0x1db/0x2d0 [ 28.822015] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.822526] kasan_report+0x102/0x140 [ 28.823017] ? kasan_atomics_helper+0x698/0x5450 [ 28.823405] ? kasan_atomics_helper+0x698/0x5450 [ 28.823996] kasan_check_range+0x10c/0x1c0 [ 28.824449] __kasan_check_write+0x18/0x20 [ 28.824820] kasan_atomics_helper+0x698/0x5450 [ 28.825347] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.825977] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.826408] ? trace_hardirqs_on+0x37/0xe0 [ 28.826880] ? kasan_atomics+0x153/0x310 [ 28.827346] kasan_atomics+0x1dd/0x310 [ 28.827685] ? __pfx_kasan_atomics+0x10/0x10 [ 28.828273] ? __pfx_kasan_atomics+0x10/0x10 [ 28.828756] kunit_try_run_case+0x1b3/0x490 [ 28.829238] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.829839] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.830337] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.830701] ? __kthread_parkme+0x82/0x160 [ 28.831282] ? preempt_count_sub+0x50/0x80 [ 28.831807] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.832319] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.832918] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.833583] kthread+0x257/0x310 [ 28.833989] ? __pfx_kthread+0x10/0x10 [ 28.834333] ret_from_fork+0x41/0x80 [ 28.834740] ? __pfx_kthread+0x10/0x10 [ 28.835308] ret_from_fork_asm+0x1a/0x30 [ 28.835800] </TASK> [ 28.836302] [ 28.836665] Allocated by task 273: [ 28.837573] kasan_save_stack+0x3d/0x60 [ 28.838119] kasan_save_track+0x18/0x40 [ 28.838450] kasan_save_alloc_info+0x3b/0x50 [ 28.838750] __kasan_kmalloc+0xb7/0xc0 [ 28.839720] __kmalloc_cache_noprof+0x184/0x410 [ 28.840467] kasan_atomics+0x96/0x310 [ 28.840984] kunit_try_run_case+0x1b3/0x490 [ 28.841647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.842146] kthread+0x257/0x310 [ 28.842432] ret_from_fork+0x41/0x80 [ 28.843108] ret_from_fork_asm+0x1a/0x30 [ 28.843843] [ 28.844033] The buggy address belongs to the object at ffff888102486200 [ 28.844033] which belongs to the cache kmalloc-64 of size 64 [ 28.845427] The buggy address is located 0 bytes to the right of [ 28.845427] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.847178] [ 28.847625] The buggy address belongs to the physical page: [ 28.848472] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.849232] flags: 0x200000000000000(node=0|zone=2) [ 28.849831] page_type: f5(slab) [ 28.850558] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.851423] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.852427] page dumped because: kasan: bad access detected [ 28.853065] [ 28.853662] Memory state around the buggy address: [ 28.854053] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.855181] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.856159] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.856802] ^ [ 28.857716] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.858873] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.859966] ================================================================== [ 28.431269] ================================================================== [ 28.432372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 28.433994] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.435082] [ 28.435355] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.436267] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.437644] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.438561] Call Trace: [ 28.439085] <TASK> [ 28.439333] dump_stack_lvl+0x73/0xb0 [ 28.440050] print_report+0xd1/0x640 [ 28.440505] ? __virt_addr_valid+0x1db/0x2d0 [ 28.441160] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.441539] kasan_report+0x102/0x140 [ 28.442077] ? kasan_atomics_helper+0x4b8a/0x5450 [ 28.442515] ? kasan_atomics_helper+0x4b8a/0x5450 [ 28.443172] __asan_report_load4_noabort+0x18/0x20 [ 28.443719] kasan_atomics_helper+0x4b8a/0x5450 [ 28.444177] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.444603] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.445252] ? trace_hardirqs_on+0x37/0xe0 [ 28.445829] ? kasan_atomics+0x153/0x310 [ 28.446400] kasan_atomics+0x1dd/0x310 [ 28.446835] ? __pfx_kasan_atomics+0x10/0x10 [ 28.447512] ? __pfx_kasan_atomics+0x10/0x10 [ 28.447897] kunit_try_run_case+0x1b3/0x490 [ 28.448468] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.448994] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.449422] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.450137] ? __kthread_parkme+0x82/0x160 [ 28.450595] ? preempt_count_sub+0x50/0x80 [ 28.451089] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.451795] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.452439] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.452920] kthread+0x257/0x310 [ 28.453535] ? __pfx_kthread+0x10/0x10 [ 28.453973] ret_from_fork+0x41/0x80 [ 28.454252] ? __pfx_kthread+0x10/0x10 [ 28.454904] ret_from_fork_asm+0x1a/0x30 [ 28.455595] </TASK> [ 28.456014] [ 28.456292] Allocated by task 273: [ 28.456669] kasan_save_stack+0x3d/0x60 [ 28.457188] kasan_save_track+0x18/0x40 [ 28.457800] kasan_save_alloc_info+0x3b/0x50 [ 28.458123] __kasan_kmalloc+0xb7/0xc0 [ 28.458659] __kmalloc_cache_noprof+0x184/0x410 [ 28.459352] kasan_atomics+0x96/0x310 [ 28.459727] kunit_try_run_case+0x1b3/0x490 [ 28.460308] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.460981] kthread+0x257/0x310 [ 28.461251] ret_from_fork+0x41/0x80 [ 28.461593] ret_from_fork_asm+0x1a/0x30 [ 28.462212] [ 28.462607] The buggy address belongs to the object at ffff888102486200 [ 28.462607] which belongs to the cache kmalloc-64 of size 64 [ 28.463739] The buggy address is located 0 bytes to the right of [ 28.463739] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.465435] [ 28.465883] The buggy address belongs to the physical page: [ 28.466746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.467732] flags: 0x200000000000000(node=0|zone=2) [ 28.469253] page_type: f5(slab) [ 28.469659] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.471167] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.471778] page dumped because: kasan: bad access detected [ 28.472689] [ 28.472992] Memory state around the buggy address: [ 28.473849] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.474597] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.475553] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.476129] ^ [ 28.476908] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.477757] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.478843] ================================================================== [ 29.302207] ================================================================== [ 29.302772] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 29.303476] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.304583] [ 29.304743] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.305923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.306225] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.307483] Call Trace: [ 29.307730] <TASK> [ 29.308282] dump_stack_lvl+0x73/0xb0 [ 29.308713] print_report+0xd1/0x640 [ 29.309130] ? __virt_addr_valid+0x1db/0x2d0 [ 29.309534] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.309916] kasan_report+0x102/0x140 [ 29.310636] ? kasan_atomics_helper+0x4a86/0x5450 [ 29.311288] ? kasan_atomics_helper+0x4a86/0x5450 [ 29.311655] __asan_report_load4_noabort+0x18/0x20 [ 29.312085] kasan_atomics_helper+0x4a86/0x5450 [ 29.312667] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.313339] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.313833] ? trace_hardirqs_on+0x37/0xe0 [ 29.314500] ? kasan_atomics+0x153/0x310 [ 29.314825] kasan_atomics+0x1dd/0x310 [ 29.315429] ? __pfx_kasan_atomics+0x10/0x10 [ 29.315876] ? __pfx_kasan_atomics+0x10/0x10 [ 29.316226] kunit_try_run_case+0x1b3/0x490 [ 29.316766] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.317405] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.318148] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.318708] ? __kthread_parkme+0x82/0x160 [ 29.319046] ? preempt_count_sub+0x50/0x80 [ 29.319596] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.320223] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.320644] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.321067] kthread+0x257/0x310 [ 29.321380] ? __pfx_kthread+0x10/0x10 [ 29.321960] ret_from_fork+0x41/0x80 [ 29.322578] ? __pfx_kthread+0x10/0x10 [ 29.323129] ret_from_fork_asm+0x1a/0x30 [ 29.323725] </TASK> [ 29.324015] [ 29.324343] Allocated by task 273: [ 29.324809] kasan_save_stack+0x3d/0x60 [ 29.325284] kasan_save_track+0x18/0x40 [ 29.325599] kasan_save_alloc_info+0x3b/0x50 [ 29.325947] __kasan_kmalloc+0xb7/0xc0 [ 29.326421] __kmalloc_cache_noprof+0x184/0x410 [ 29.327102] kasan_atomics+0x96/0x310 [ 29.327494] kunit_try_run_case+0x1b3/0x490 [ 29.328005] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.328470] kthread+0x257/0x310 [ 29.328731] ret_from_fork+0x41/0x80 [ 29.329078] ret_from_fork_asm+0x1a/0x30 [ 29.329601] [ 29.329908] The buggy address belongs to the object at ffff888102486200 [ 29.329908] which belongs to the cache kmalloc-64 of size 64 [ 29.331496] The buggy address is located 0 bytes to the right of [ 29.331496] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.332684] [ 29.332852] The buggy address belongs to the physical page: [ 29.333370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.334289] flags: 0x200000000000000(node=0|zone=2) [ 29.334645] page_type: f5(slab) [ 29.334907] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.335732] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.336669] page dumped because: kasan: bad access detected [ 29.337207] [ 29.337381] Memory state around the buggy address: [ 29.337692] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.338371] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.339271] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.340237] ^ [ 29.340692] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.341319] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.342214] ================================================================== [ 28.314248] ================================================================== [ 28.315741] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 28.316823] Read of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.318322] [ 28.318622] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.320113] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.320866] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.322429] Call Trace: [ 28.322688] <TASK> [ 28.323192] dump_stack_lvl+0x73/0xb0 [ 28.323660] print_report+0xd1/0x640 [ 28.324350] ? __virt_addr_valid+0x1db/0x2d0 [ 28.325016] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.325726] kasan_report+0x102/0x140 [ 28.326210] ? kasan_atomics_helper+0x4bbe/0x5450 [ 28.326969] ? kasan_atomics_helper+0x4bbe/0x5450 [ 28.327663] __asan_report_load4_noabort+0x18/0x20 [ 28.328144] kasan_atomics_helper+0x4bbe/0x5450 [ 28.328647] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.329826] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.330459] ? trace_hardirqs_on+0x37/0xe0 [ 28.330778] ? kasan_atomics+0x153/0x310 [ 28.331830] kasan_atomics+0x1dd/0x310 [ 28.332683] ? __pfx_kasan_atomics+0x10/0x10 [ 28.333082] ? __pfx_kasan_atomics+0x10/0x10 [ 28.334122] kunit_try_run_case+0x1b3/0x490 [ 28.335256] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.336217] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.336751] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.337457] ? __kthread_parkme+0x82/0x160 [ 28.338295] ? preempt_count_sub+0x50/0x80 [ 28.338724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.339405] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.340513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.341343] kthread+0x257/0x310 [ 28.341710] ? __pfx_kthread+0x10/0x10 [ 28.342191] ret_from_fork+0x41/0x80 [ 28.343294] ? __pfx_kthread+0x10/0x10 [ 28.343883] ret_from_fork_asm+0x1a/0x30 [ 28.344816] </TASK> [ 28.345425] [ 28.345914] Allocated by task 273: [ 28.346281] kasan_save_stack+0x3d/0x60 [ 28.346967] kasan_save_track+0x18/0x40 [ 28.348121] kasan_save_alloc_info+0x3b/0x50 [ 28.348483] __kasan_kmalloc+0xb7/0xc0 [ 28.348898] __kmalloc_cache_noprof+0x184/0x410 [ 28.350265] kasan_atomics+0x96/0x310 [ 28.351025] kunit_try_run_case+0x1b3/0x490 [ 28.351951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.352609] kthread+0x257/0x310 [ 28.353257] ret_from_fork+0x41/0x80 [ 28.353701] ret_from_fork_asm+0x1a/0x30 [ 28.354611] [ 28.354842] The buggy address belongs to the object at ffff888102486200 [ 28.354842] which belongs to the cache kmalloc-64 of size 64 [ 28.357500] The buggy address is located 0 bytes to the right of [ 28.357500] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.359353] [ 28.359603] The buggy address belongs to the physical page: [ 28.360059] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.361144] flags: 0x200000000000000(node=0|zone=2) [ 28.361727] page_type: f5(slab) [ 28.362127] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.363181] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.364554] page dumped because: kasan: bad access detected [ 28.365506] [ 28.365817] Memory state around the buggy address: [ 28.367198] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.368100] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.368563] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.369673] ^ [ 28.370329] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.371789] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373011] ================================================================== [ 29.388782] ================================================================== [ 29.389872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 29.390626] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.391340] [ 29.391528] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.392804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.393414] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.394278] Call Trace: [ 29.394526] <TASK> [ 29.394774] dump_stack_lvl+0x73/0xb0 [ 29.395551] print_report+0xd1/0x640 [ 29.396202] ? __virt_addr_valid+0x1db/0x2d0 [ 29.396691] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.397158] kasan_report+0x102/0x140 [ 29.397963] ? kasan_atomics_helper+0xde1/0x5450 [ 29.398660] ? kasan_atomics_helper+0xde1/0x5450 [ 29.399034] kasan_check_range+0x10c/0x1c0 [ 29.399423] __kasan_check_write+0x18/0x20 [ 29.400093] kasan_atomics_helper+0xde1/0x5450 [ 29.400775] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.401580] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.402148] ? trace_hardirqs_on+0x37/0xe0 [ 29.403057] ? kasan_atomics+0x153/0x310 [ 29.403390] kasan_atomics+0x1dd/0x310 [ 29.404119] ? __pfx_kasan_atomics+0x10/0x10 [ 29.404756] ? __pfx_kasan_atomics+0x10/0x10 [ 29.405325] kunit_try_run_case+0x1b3/0x490 [ 29.405992] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.406440] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.407130] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.407668] ? __kthread_parkme+0x82/0x160 [ 29.408198] ? preempt_count_sub+0x50/0x80 [ 29.408641] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.409341] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.410153] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.410678] kthread+0x257/0x310 [ 29.411066] ? __pfx_kthread+0x10/0x10 [ 29.411606] ret_from_fork+0x41/0x80 [ 29.412108] ? __pfx_kthread+0x10/0x10 [ 29.412481] ret_from_fork_asm+0x1a/0x30 [ 29.412999] </TASK> [ 29.413206] [ 29.413369] Allocated by task 273: [ 29.413841] kasan_save_stack+0x3d/0x60 [ 29.414519] kasan_save_track+0x18/0x40 [ 29.415146] kasan_save_alloc_info+0x3b/0x50 [ 29.415632] __kasan_kmalloc+0xb7/0xc0 [ 29.415910] __kmalloc_cache_noprof+0x184/0x410 [ 29.416258] kasan_atomics+0x96/0x310 [ 29.416923] kunit_try_run_case+0x1b3/0x490 [ 29.417609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.418374] kthread+0x257/0x310 [ 29.418851] ret_from_fork+0x41/0x80 [ 29.419199] ret_from_fork_asm+0x1a/0x30 [ 29.419754] [ 29.420070] The buggy address belongs to the object at ffff888102486200 [ 29.420070] which belongs to the cache kmalloc-64 of size 64 [ 29.421199] The buggy address is located 0 bytes to the right of [ 29.421199] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.422551] [ 29.422972] The buggy address belongs to the physical page: [ 29.423573] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.424473] flags: 0x200000000000000(node=0|zone=2) [ 29.424834] page_type: f5(slab) [ 29.425178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.426195] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.427228] page dumped because: kasan: bad access detected [ 29.427884] [ 29.428105] Memory state around the buggy address: [ 29.428631] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.429155] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.430040] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.430791] ^ [ 29.431149] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.431884] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.432805] ================================================================== [ 30.963448] ================================================================== [ 30.964042] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 30.965749] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.966561] [ 30.967462] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.968421] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.969191] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.970249] Call Trace: [ 30.970637] <TASK> [ 30.971419] dump_stack_lvl+0x73/0xb0 [ 30.971872] print_report+0xd1/0x640 [ 30.972807] ? __virt_addr_valid+0x1db/0x2d0 [ 30.973254] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.973846] kasan_report+0x102/0x140 [ 30.974582] ? kasan_atomics_helper+0x1e13/0x5450 [ 30.975300] ? kasan_atomics_helper+0x1e13/0x5450 [ 30.975817] kasan_check_range+0x10c/0x1c0 [ 30.976579] __kasan_check_write+0x18/0x20 [ 30.977385] kasan_atomics_helper+0x1e13/0x5450 [ 30.977867] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.978671] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.979506] ? trace_hardirqs_on+0x37/0xe0 [ 30.980178] ? kasan_atomics+0x153/0x310 [ 30.980875] kasan_atomics+0x1dd/0x310 [ 30.981741] ? __pfx_kasan_atomics+0x10/0x10 [ 30.982238] ? __pfx_kasan_atomics+0x10/0x10 [ 30.982734] kunit_try_run_case+0x1b3/0x490 [ 30.983431] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.984196] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.984675] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.985495] ? __kthread_parkme+0x82/0x160 [ 30.986028] ? preempt_count_sub+0x50/0x80 [ 30.986858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.987629] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.988214] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.988727] kthread+0x257/0x310 [ 30.989254] ? __pfx_kthread+0x10/0x10 [ 30.989660] ret_from_fork+0x41/0x80 [ 30.990158] ? __pfx_kthread+0x10/0x10 [ 30.990597] ret_from_fork_asm+0x1a/0x30 [ 30.991284] </TASK> [ 30.991491] [ 30.991774] Allocated by task 273: [ 30.992291] kasan_save_stack+0x3d/0x60 [ 30.993461] kasan_save_track+0x18/0x40 [ 30.993895] kasan_save_alloc_info+0x3b/0x50 [ 30.994447] __kasan_kmalloc+0xb7/0xc0 [ 30.994926] __kmalloc_cache_noprof+0x184/0x410 [ 30.995667] kasan_atomics+0x96/0x310 [ 30.995999] kunit_try_run_case+0x1b3/0x490 [ 30.997210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.997825] kthread+0x257/0x310 [ 30.998724] ret_from_fork+0x41/0x80 [ 30.999292] ret_from_fork_asm+0x1a/0x30 [ 31.000020] [ 31.000278] The buggy address belongs to the object at ffff888102486200 [ 31.000278] which belongs to the cache kmalloc-64 of size 64 [ 31.001886] The buggy address is located 0 bytes to the right of [ 31.001886] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 31.003339] [ 31.003883] The buggy address belongs to the physical page: [ 31.004490] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 31.005575] flags: 0x200000000000000(node=0|zone=2) [ 31.006357] page_type: f5(slab) [ 31.006775] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.007773] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.008564] page dumped because: kasan: bad access detected [ 31.009562] [ 31.009718] Memory state around the buggy address: [ 31.010307] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.011652] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.012322] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.013518] ^ [ 31.014128] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.015478] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.016311] ================================================================== [ 28.671833] ================================================================== [ 28.673217] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 28.673869] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 28.675184] [ 28.675562] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 28.676645] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.677263] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.678194] Call Trace: [ 28.678407] <TASK> [ 28.678719] dump_stack_lvl+0x73/0xb0 [ 28.679123] print_report+0xd1/0x640 [ 28.680194] ? __virt_addr_valid+0x1db/0x2d0 [ 28.680601] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.681254] kasan_report+0x102/0x140 [ 28.681891] ? kasan_atomics_helper+0x4b3c/0x5450 [ 28.682692] ? kasan_atomics_helper+0x4b3c/0x5450 [ 28.683379] __asan_report_store4_noabort+0x1b/0x30 [ 28.683816] kasan_atomics_helper+0x4b3c/0x5450 [ 28.684696] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.685286] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.685766] ? trace_hardirqs_on+0x37/0xe0 [ 28.687004] ? kasan_atomics+0x153/0x310 [ 28.687624] kasan_atomics+0x1dd/0x310 [ 28.688260] ? __pfx_kasan_atomics+0x10/0x10 [ 28.688671] ? __pfx_kasan_atomics+0x10/0x10 [ 28.689560] kunit_try_run_case+0x1b3/0x490 [ 28.690018] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.690560] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.691058] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.691972] ? __kthread_parkme+0x82/0x160 [ 28.692643] ? preempt_count_sub+0x50/0x80 [ 28.693245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.693732] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.694612] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.695038] kthread+0x257/0x310 [ 28.695831] ? __pfx_kthread+0x10/0x10 [ 28.696436] ret_from_fork+0x41/0x80 [ 28.696777] ? __pfx_kthread+0x10/0x10 [ 28.697203] ret_from_fork_asm+0x1a/0x30 [ 28.698046] </TASK> [ 28.698505] [ 28.698673] Allocated by task 273: [ 28.699457] kasan_save_stack+0x3d/0x60 [ 28.700009] kasan_save_track+0x18/0x40 [ 28.700438] kasan_save_alloc_info+0x3b/0x50 [ 28.701233] __kasan_kmalloc+0xb7/0xc0 [ 28.701608] __kmalloc_cache_noprof+0x184/0x410 [ 28.702058] kasan_atomics+0x96/0x310 [ 28.702407] kunit_try_run_case+0x1b3/0x490 [ 28.702785] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.704023] kthread+0x257/0x310 [ 28.704425] ret_from_fork+0x41/0x80 [ 28.705025] ret_from_fork_asm+0x1a/0x30 [ 28.705660] [ 28.705985] The buggy address belongs to the object at ffff888102486200 [ 28.705985] which belongs to the cache kmalloc-64 of size 64 [ 28.707242] The buggy address is located 0 bytes to the right of [ 28.707242] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 28.708581] [ 28.709009] The buggy address belongs to the physical page: [ 28.709647] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 28.710543] flags: 0x200000000000000(node=0|zone=2) [ 28.711243] page_type: f5(slab) [ 28.711779] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.712689] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.713552] page dumped because: kasan: bad access detected [ 28.714090] [ 28.714448] Memory state around the buggy address: [ 28.715136] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.715774] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.716540] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.717621] ^ [ 28.717848] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.718241] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.719249] ================================================================== [ 30.553642] ================================================================== [ 30.554155] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 30.555540] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.556494] [ 30.556696] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.557360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.558374] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.559570] Call Trace: [ 30.560139] <TASK> [ 30.560549] dump_stack_lvl+0x73/0xb0 [ 30.561245] print_report+0xd1/0x640 [ 30.561711] ? __virt_addr_valid+0x1db/0x2d0 [ 30.562192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.563157] kasan_report+0x102/0x140 [ 30.563791] ? kasan_atomics_helper+0x194b/0x5450 [ 30.564512] ? kasan_atomics_helper+0x194b/0x5450 [ 30.565235] kasan_check_range+0x10c/0x1c0 [ 30.565704] __kasan_check_write+0x18/0x20 [ 30.566177] kasan_atomics_helper+0x194b/0x5450 [ 30.566846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.567496] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.568138] ? trace_hardirqs_on+0x37/0xe0 [ 30.568565] ? kasan_atomics+0x153/0x310 [ 30.569063] kasan_atomics+0x1dd/0x310 [ 30.569539] ? __pfx_kasan_atomics+0x10/0x10 [ 30.570255] ? __pfx_kasan_atomics+0x10/0x10 [ 30.570888] kunit_try_run_case+0x1b3/0x490 [ 30.571393] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.572057] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.572798] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.573478] ? __kthread_parkme+0x82/0x160 [ 30.574153] ? preempt_count_sub+0x50/0x80 [ 30.574669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.575278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.575966] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.576696] kthread+0x257/0x310 [ 30.577152] ? __pfx_kthread+0x10/0x10 [ 30.577677] ret_from_fork+0x41/0x80 [ 30.578044] ? __pfx_kthread+0x10/0x10 [ 30.578686] ret_from_fork_asm+0x1a/0x30 [ 30.579251] </TASK> [ 30.579563] [ 30.579963] Allocated by task 273: [ 30.580420] kasan_save_stack+0x3d/0x60 [ 30.581076] kasan_save_track+0x18/0x40 [ 30.581565] kasan_save_alloc_info+0x3b/0x50 [ 30.582765] __kasan_kmalloc+0xb7/0xc0 [ 30.583544] __kmalloc_cache_noprof+0x184/0x410 [ 30.584261] kasan_atomics+0x96/0x310 [ 30.584841] kunit_try_run_case+0x1b3/0x490 [ 30.585475] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.586337] kthread+0x257/0x310 [ 30.586786] ret_from_fork+0x41/0x80 [ 30.587703] ret_from_fork_asm+0x1a/0x30 [ 30.588098] [ 30.588331] The buggy address belongs to the object at ffff888102486200 [ 30.588331] which belongs to the cache kmalloc-64 of size 64 [ 30.590060] The buggy address is located 0 bytes to the right of [ 30.590060] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.592092] [ 30.592661] The buggy address belongs to the physical page: [ 30.593240] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.594053] flags: 0x200000000000000(node=0|zone=2) [ 30.594970] page_type: f5(slab) [ 30.595807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.596671] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.597607] page dumped because: kasan: bad access detected [ 30.598410] [ 30.598570] Memory state around the buggy address: [ 30.599141] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.600796] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.601573] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.602680] ^ [ 30.603137] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.603774] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.604736] ================================================================== [ 29.343410] ================================================================== [ 29.344696] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 29.345552] Write of size 4 at addr ffff888102486230 by task kunit_try_catch/273 [ 29.346413] [ 29.346656] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 29.347498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.348052] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.348579] Call Trace: [ 29.348800] <TASK> [ 29.349031] dump_stack_lvl+0x73/0xb0 [ 29.349555] print_report+0xd1/0x640 [ 29.350135] ? __virt_addr_valid+0x1db/0x2d0 [ 29.350732] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.351260] kasan_report+0x102/0x140 [ 29.351555] ? kasan_atomics_helper+0xd48/0x5450 [ 29.351885] ? kasan_atomics_helper+0xd48/0x5450 [ 29.352745] kasan_check_range+0x10c/0x1c0 [ 29.353325] __kasan_check_write+0x18/0x20 [ 29.353901] kasan_atomics_helper+0xd48/0x5450 [ 29.354278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.354965] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.355470] ? trace_hardirqs_on+0x37/0xe0 [ 29.355797] ? kasan_atomics+0x153/0x310 [ 29.356129] kasan_atomics+0x1dd/0x310 [ 29.356642] ? __pfx_kasan_atomics+0x10/0x10 [ 29.357216] ? __pfx_kasan_atomics+0x10/0x10 [ 29.358147] kunit_try_run_case+0x1b3/0x490 [ 29.358604] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.358988] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.359906] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.360436] ? __kthread_parkme+0x82/0x160 [ 29.360751] ? preempt_count_sub+0x50/0x80 [ 29.361204] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.361848] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.362701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.363412] kthread+0x257/0x310 [ 29.363831] ? __pfx_kthread+0x10/0x10 [ 29.364831] ret_from_fork+0x41/0x80 [ 29.365253] ? __pfx_kthread+0x10/0x10 [ 29.365607] ret_from_fork_asm+0x1a/0x30 [ 29.366662] </TASK> [ 29.367623] [ 29.368413] Allocated by task 273: [ 29.368798] kasan_save_stack+0x3d/0x60 [ 29.369236] kasan_save_track+0x18/0x40 [ 29.369648] kasan_save_alloc_info+0x3b/0x50 [ 29.370026] __kasan_kmalloc+0xb7/0xc0 [ 29.370301] __kmalloc_cache_noprof+0x184/0x410 [ 29.371018] kasan_atomics+0x96/0x310 [ 29.371567] kunit_try_run_case+0x1b3/0x490 [ 29.371877] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.372603] kthread+0x257/0x310 [ 29.373160] ret_from_fork+0x41/0x80 [ 29.373639] ret_from_fork_asm+0x1a/0x30 [ 29.373981] [ 29.374150] The buggy address belongs to the object at ffff888102486200 [ 29.374150] which belongs to the cache kmalloc-64 of size 64 [ 29.375653] The buggy address is located 0 bytes to the right of [ 29.375653] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 29.376536] [ 29.376741] The buggy address belongs to the physical page: [ 29.377542] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 29.378397] flags: 0x200000000000000(node=0|zone=2) [ 29.378889] page_type: f5(slab) [ 29.379556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.380458] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.381180] page dumped because: kasan: bad access detected [ 29.381570] [ 29.381730] Memory state around the buggy address: [ 29.382124] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.383129] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.383863] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.384911] ^ [ 29.385550] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386351] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386912] ================================================================== [ 30.655377] ================================================================== [ 30.656200] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 30.657164] Write of size 8 at addr ffff888102486230 by task kunit_try_catch/273 [ 30.658121] [ 30.658316] CPU: 1 UID: 0 PID: 273 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc1-next-20241206 #1 [ 30.659519] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.659823] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.661127] Call Trace: [ 30.661561] <TASK> [ 30.661798] dump_stack_lvl+0x73/0xb0 [ 30.662446] print_report+0xd1/0x640 [ 30.663196] ? __virt_addr_valid+0x1db/0x2d0 [ 30.663724] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.664485] kasan_report+0x102/0x140 [ 30.665246] ? kasan_atomics_helper+0x1a80/0x5450 [ 30.665920] ? kasan_atomics_helper+0x1a80/0x5450 [ 30.666707] kasan_check_range+0x10c/0x1c0 [ 30.667070] __kasan_check_write+0x18/0x20 [ 30.667534] kasan_atomics_helper+0x1a80/0x5450 [ 30.668010] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.668880] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.669245] ? trace_hardirqs_on+0x37/0xe0 [ 30.669730] ? kasan_atomics+0x153/0x310 [ 30.670380] kasan_atomics+0x1dd/0x310 [ 30.670993] ? __pfx_kasan_atomics+0x10/0x10 [ 30.671585] ? __pfx_kasan_atomics+0x10/0x10 [ 30.672088] kunit_try_run_case+0x1b3/0x490 [ 30.672503] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.673096] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.673714] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.674369] ? __kthread_parkme+0x82/0x160 [ 30.674979] ? preempt_count_sub+0x50/0x80 [ 30.675403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.675740] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.676606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.677321] kthread+0x257/0x310 [ 30.677643] ? __pfx_kthread+0x10/0x10 [ 30.678328] ret_from_fork+0x41/0x80 [ 30.679026] ? __pfx_kthread+0x10/0x10 [ 30.679469] ret_from_fork_asm+0x1a/0x30 [ 30.679989] </TASK> [ 30.680307] [ 30.680624] Allocated by task 273: [ 30.681997] kasan_save_stack+0x3d/0x60 [ 30.682578] kasan_save_track+0x18/0x40 [ 30.683004] kasan_save_alloc_info+0x3b/0x50 [ 30.684021] __kasan_kmalloc+0xb7/0xc0 [ 30.684453] __kmalloc_cache_noprof+0x184/0x410 [ 30.684855] kasan_atomics+0x96/0x310 [ 30.686019] kunit_try_run_case+0x1b3/0x490 [ 30.686664] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.687699] kthread+0x257/0x310 [ 30.688049] ret_from_fork+0x41/0x80 [ 30.688568] ret_from_fork_asm+0x1a/0x30 [ 30.689064] [ 30.689549] The buggy address belongs to the object at ffff888102486200 [ 30.689549] which belongs to the cache kmalloc-64 of size 64 [ 30.690900] The buggy address is located 0 bytes to the right of [ 30.690900] allocated 48-byte region [ffff888102486200, ffff888102486230) [ 30.692378] [ 30.693068] The buggy address belongs to the physical page: [ 30.693459] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102486 [ 30.694387] flags: 0x200000000000000(node=0|zone=2) [ 30.694859] page_type: f5(slab) [ 30.695805] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.696863] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.697864] page dumped because: kasan: bad access detected [ 30.698757] [ 30.699015] Memory state around the buggy address: [ 30.699424] ffff888102486100: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.700956] ffff888102486180: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.701676] >ffff888102486200: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.702921] ^ [ 30.703607] ffff888102486280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.704359] ffff888102486300: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.705465] ==================================================================