Date
Dec. 9, 2024, 6:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 28.813001] ================================================================== [ 28.814322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 28.815674] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.816732] [ 28.817036] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.818540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.819056] Hardware name: linux,dummy-virt (DT) [ 28.819577] Call trace: [ 28.820125] show_stack+0x20/0x38 (C) [ 28.821000] dump_stack_lvl+0x8c/0xd0 [ 28.821560] print_report+0x118/0x5e0 [ 28.822119] kasan_report+0xc8/0x118 [ 28.822651] kasan_check_range+0x100/0x1a8 [ 28.823339] __kasan_check_write+0x20/0x30 [ 28.823934] kasan_atomics_helper+0xad4/0x4858 [ 28.824590] kasan_atomics+0x198/0x2e8 [ 28.825152] kunit_try_run_case+0x14c/0x3d0 [ 28.825770] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.826441] kthread+0x24c/0x2d0 [ 28.826978] ret_from_fork+0x10/0x20 [ 28.827560] [ 28.827902] Allocated by task 253: [ 28.828304] kasan_save_stack+0x3c/0x68 [ 28.828943] kasan_save_track+0x20/0x40 [ 28.829420] kasan_save_alloc_info+0x40/0x58 [ 28.830104] __kasan_kmalloc+0xd4/0xd8 [ 28.830618] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.831166] kasan_atomics+0xb8/0x2e8 [ 28.831795] kunit_try_run_case+0x14c/0x3d0 [ 28.832330] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.833074] kthread+0x24c/0x2d0 [ 28.833510] ret_from_fork+0x10/0x20 [ 28.834108] [ 28.834411] The buggy address belongs to the object at fff00000c12e8780 [ 28.834411] which belongs to the cache kmalloc-64 of size 64 [ 28.835720] The buggy address is located 0 bytes to the right of [ 28.835720] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.836907] [ 28.837274] The buggy address belongs to the physical page: [ 28.837955] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.838893] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.839659] page_type: f5(slab) [ 28.840144] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.840927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.841840] page dumped because: kasan: bad access detected [ 28.842519] [ 28.842864] Memory state around the buggy address: [ 28.843447] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.844164] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.845097] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.845936] ^ [ 28.846517] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.847306] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.848100] ================================================================== [ 30.103719] ================================================================== [ 30.104333] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 30.105502] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.106248] [ 30.106590] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.107833] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.108345] Hardware name: linux,dummy-virt (DT) [ 30.108962] Call trace: [ 30.109388] show_stack+0x20/0x38 (C) [ 30.109929] dump_stack_lvl+0x8c/0xd0 [ 30.110584] print_report+0x118/0x5e0 [ 30.111192] kasan_report+0xc8/0x118 [ 30.111780] __asan_report_load8_noabort+0x20/0x30 [ 30.112457] kasan_atomics_helper+0x3e10/0x4858 [ 30.113099] kasan_atomics+0x198/0x2e8 [ 30.113621] kunit_try_run_case+0x14c/0x3d0 [ 30.114235] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.114850] kthread+0x24c/0x2d0 [ 30.115355] ret_from_fork+0x10/0x20 [ 30.115894] [ 30.116201] Allocated by task 253: [ 30.116774] kasan_save_stack+0x3c/0x68 [ 30.117372] kasan_save_track+0x20/0x40 [ 30.117919] kasan_save_alloc_info+0x40/0x58 [ 30.118475] __kasan_kmalloc+0xd4/0xd8 [ 30.119026] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.119655] kasan_atomics+0xb8/0x2e8 [ 30.120200] kunit_try_run_case+0x14c/0x3d0 [ 30.120866] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.121468] kthread+0x24c/0x2d0 [ 30.122018] ret_from_fork+0x10/0x20 [ 30.122557] [ 30.122875] The buggy address belongs to the object at fff00000c12e8780 [ 30.122875] which belongs to the cache kmalloc-64 of size 64 [ 30.124121] The buggy address is located 0 bytes to the right of [ 30.124121] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.125439] [ 30.125763] The buggy address belongs to the physical page: [ 30.126446] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.127391] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.128158] page_type: f5(slab) [ 30.128651] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.129504] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.130380] page dumped because: kasan: bad access detected [ 30.131031] [ 30.131347] Memory state around the buggy address: [ 30.131914] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.132645] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.133467] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.134252] ^ [ 30.134842] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.135581] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.136424] ================================================================== [ 30.173548] ================================================================== [ 30.174322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 30.175243] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.176014] [ 30.176534] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.177783] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.178291] Hardware name: linux,dummy-virt (DT) [ 30.178916] Call trace: [ 30.179340] show_stack+0x20/0x38 (C) [ 30.179902] dump_stack_lvl+0x8c/0xd0 [ 30.180433] print_report+0x118/0x5e0 [ 30.180981] kasan_report+0xc8/0x118 [ 30.181586] __asan_report_load8_noabort+0x20/0x30 [ 30.182194] kasan_atomics_helper+0x3e20/0x4858 [ 30.182869] kasan_atomics+0x198/0x2e8 [ 30.183448] kunit_try_run_case+0x14c/0x3d0 [ 30.184038] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.184728] kthread+0x24c/0x2d0 [ 30.185264] ret_from_fork+0x10/0x20 [ 30.185796] [ 30.186141] Allocated by task 253: [ 30.186645] kasan_save_stack+0x3c/0x68 [ 30.187202] kasan_save_track+0x20/0x40 [ 30.187776] kasan_save_alloc_info+0x40/0x58 [ 30.188333] __kasan_kmalloc+0xd4/0xd8 [ 30.188878] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.189617] kasan_atomics+0xb8/0x2e8 [ 30.190155] kunit_try_run_case+0x14c/0x3d0 [ 30.190846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.191443] kthread+0x24c/0x2d0 [ 30.192026] ret_from_fork+0x10/0x20 [ 30.192549] [ 30.192892] The buggy address belongs to the object at fff00000c12e8780 [ 30.192892] which belongs to the cache kmalloc-64 of size 64 [ 30.194090] The buggy address is located 0 bytes to the right of [ 30.194090] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.195350] [ 30.195743] The buggy address belongs to the physical page: [ 30.196317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.197257] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.198071] page_type: f5(slab) [ 30.198731] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.199683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.200632] page dumped because: kasan: bad access detected [ 30.201291] [ 30.201596] Memory state around the buggy address: [ 30.202164] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.202948] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.203791] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.204554] ^ [ 30.205204] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.205992] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.206773] ================================================================== [ 29.715615] ================================================================== [ 29.716322] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 29.717188] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.718249] [ 29.718593] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.719717] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.720235] Hardware name: linux,dummy-virt (DT) [ 29.720792] Call trace: [ 29.721239] show_stack+0x20/0x38 (C) [ 29.721833] dump_stack_lvl+0x8c/0xd0 [ 29.722474] print_report+0x118/0x5e0 [ 29.723020] kasan_report+0xc8/0x118 [ 29.723587] kasan_check_range+0x100/0x1a8 [ 29.724291] __kasan_check_write+0x20/0x30 [ 29.724889] kasan_atomics_helper+0x1384/0x4858 [ 29.725452] kasan_atomics+0x198/0x2e8 [ 29.726079] kunit_try_run_case+0x14c/0x3d0 [ 29.726654] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.727421] kthread+0x24c/0x2d0 [ 29.727986] ret_from_fork+0x10/0x20 [ 29.728544] [ 29.728875] Allocated by task 253: [ 29.729366] kasan_save_stack+0x3c/0x68 [ 29.729935] kasan_save_track+0x20/0x40 [ 29.730561] kasan_save_alloc_info+0x40/0x58 [ 29.731136] __kasan_kmalloc+0xd4/0xd8 [ 29.731724] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.732378] kasan_atomics+0xb8/0x2e8 [ 29.732975] kunit_try_run_case+0x14c/0x3d0 [ 29.733532] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.734287] kthread+0x24c/0x2d0 [ 29.734832] ret_from_fork+0x10/0x20 [ 29.735364] [ 29.735713] The buggy address belongs to the object at fff00000c12e8780 [ 29.735713] which belongs to the cache kmalloc-64 of size 64 [ 29.736918] The buggy address is located 0 bytes to the right of [ 29.736918] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.738221] [ 29.738548] The buggy address belongs to the physical page: [ 29.739277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.740124] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.740887] page_type: f5(slab) [ 29.741413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.742262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.743138] page dumped because: kasan: bad access detected [ 29.743788] [ 29.744123] Memory state around the buggy address: [ 29.744739] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.745777] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.746616] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.747585] ^ [ 29.748268] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749168] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.749984] ================================================================== [ 27.888812] ================================================================== [ 27.890168] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40a8/0x4858 [ 27.891744] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 27.892639] [ 27.893110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.894235] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.894864] Hardware name: linux,dummy-virt (DT) [ 27.895386] Call trace: [ 27.895812] show_stack+0x20/0x38 (C) [ 27.896391] dump_stack_lvl+0x8c/0xd0 [ 27.897106] print_report+0x118/0x5e0 [ 27.897691] kasan_report+0xc8/0x118 [ 27.898303] __asan_report_load4_noabort+0x20/0x30 [ 27.899067] kasan_atomics_helper+0x40a8/0x4858 [ 27.899719] kasan_atomics+0x198/0x2e8 [ 27.900372] kunit_try_run_case+0x14c/0x3d0 [ 27.901011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.901783] kthread+0x24c/0x2d0 [ 27.902343] ret_from_fork+0x10/0x20 [ 27.903019] [ 27.903370] Allocated by task 253: [ 27.903873] kasan_save_stack+0x3c/0x68 [ 27.904568] kasan_save_track+0x20/0x40 [ 27.905189] kasan_save_alloc_info+0x40/0x58 [ 27.905851] __kasan_kmalloc+0xd4/0xd8 [ 27.906443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.907440] kasan_atomics+0xb8/0x2e8 [ 27.908290] kunit_try_run_case+0x14c/0x3d0 [ 27.909341] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.910290] kthread+0x24c/0x2d0 [ 27.911007] ret_from_fork+0x10/0x20 [ 27.911503] [ 27.911822] The buggy address belongs to the object at fff00000c12e8780 [ 27.911822] which belongs to the cache kmalloc-64 of size 64 [ 27.913391] The buggy address is located 0 bytes to the right of [ 27.913391] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 27.914786] [ 27.915161] The buggy address belongs to the physical page: [ 27.915942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 27.916952] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.917754] page_type: f5(slab) [ 27.918292] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.919168] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.920233] page dumped because: kasan: bad access detected [ 27.920947] [ 27.921371] Memory state around the buggy address: [ 27.922029] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.922963] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.924157] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.924820] ^ [ 27.925501] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.926421] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.927300] ================================================================== [ 27.967254] ================================================================== [ 27.968057] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ec/0x4858 [ 27.969017] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 27.969641] [ 27.969901] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.971846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.972554] Hardware name: linux,dummy-virt (DT) [ 27.973165] Call trace: [ 27.973431] show_stack+0x20/0x38 (C) [ 27.973807] dump_stack_lvl+0x8c/0xd0 [ 27.974188] print_report+0x118/0x5e0 [ 27.974595] kasan_report+0xc8/0x118 [ 27.976158] kasan_check_range+0x100/0x1a8 [ 27.976845] __kasan_check_read+0x20/0x30 [ 27.977498] kasan_atomics_helper+0x1ec/0x4858 [ 27.978058] kasan_atomics+0x198/0x2e8 [ 27.978602] kunit_try_run_case+0x14c/0x3d0 [ 27.979576] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.980322] kthread+0x24c/0x2d0 [ 27.980987] ret_from_fork+0x10/0x20 [ 27.981589] [ 27.981969] Allocated by task 253: [ 27.982552] kasan_save_stack+0x3c/0x68 [ 27.983261] kasan_save_track+0x20/0x40 [ 27.983839] kasan_save_alloc_info+0x40/0x58 [ 27.984488] __kasan_kmalloc+0xd4/0xd8 [ 27.985174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.985814] kasan_atomics+0xb8/0x2e8 [ 27.986446] kunit_try_run_case+0x14c/0x3d0 [ 27.987113] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.987999] kthread+0x24c/0x2d0 [ 27.988632] ret_from_fork+0x10/0x20 [ 27.989111] [ 27.989450] The buggy address belongs to the object at fff00000c12e8780 [ 27.989450] which belongs to the cache kmalloc-64 of size 64 [ 27.990637] The buggy address is located 0 bytes to the right of [ 27.990637] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 27.992085] [ 27.992559] The buggy address belongs to the physical page: [ 27.993199] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 27.995152] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.995808] page_type: f5(slab) [ 27.996531] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.997520] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.998352] page dumped because: kasan: bad access detected [ 27.999040] [ 27.999353] Memory state around the buggy address: [ 27.999936] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.000785] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.001865] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.002615] ^ [ 28.003333] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.004281] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.005058] ================================================================== [ 28.521162] ================================================================== [ 28.521879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x760/0x4858 [ 28.523270] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.524845] [ 28.525221] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.526149] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.526381] Hardware name: linux,dummy-virt (DT) [ 28.526623] Call trace: [ 28.526958] show_stack+0x20/0x38 (C) [ 28.527658] dump_stack_lvl+0x8c/0xd0 [ 28.528256] print_report+0x118/0x5e0 [ 28.528811] kasan_report+0xc8/0x118 [ 28.529464] kasan_check_range+0x100/0x1a8 [ 28.530219] __kasan_check_write+0x20/0x30 [ 28.530828] kasan_atomics_helper+0x760/0x4858 [ 28.531519] kasan_atomics+0x198/0x2e8 [ 28.532105] kunit_try_run_case+0x14c/0x3d0 [ 28.532762] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.533615] kthread+0x24c/0x2d0 [ 28.534143] ret_from_fork+0x10/0x20 [ 28.534604] [ 28.535003] Allocated by task 253: [ 28.535533] kasan_save_stack+0x3c/0x68 [ 28.536257] kasan_save_track+0x20/0x40 [ 28.536828] kasan_save_alloc_info+0x40/0x58 [ 28.537560] __kasan_kmalloc+0xd4/0xd8 [ 28.538179] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.538778] kasan_atomics+0xb8/0x2e8 [ 28.539411] kunit_try_run_case+0x14c/0x3d0 [ 28.540050] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.540907] kthread+0x24c/0x2d0 [ 28.541520] ret_from_fork+0x10/0x20 [ 28.542003] [ 28.542291] The buggy address belongs to the object at fff00000c12e8780 [ 28.542291] which belongs to the cache kmalloc-64 of size 64 [ 28.543499] The buggy address is located 0 bytes to the right of [ 28.543499] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.544823] [ 28.545184] The buggy address belongs to the physical page: [ 28.545830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.546743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.547451] page_type: f5(slab) [ 28.548009] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.548832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.549665] page dumped because: kasan: bad access detected [ 28.550351] [ 28.550660] Memory state around the buggy address: [ 28.551250] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.551977] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.552734] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.553576] ^ [ 28.554190] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.554986] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.555815] ================================================================== [ 29.388404] ================================================================== [ 29.389140] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 29.390059] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.390807] [ 29.391228] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.392303] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.392961] Hardware name: linux,dummy-virt (DT) [ 29.393491] Call trace: [ 29.393991] show_stack+0x20/0x38 (C) [ 29.394599] dump_stack_lvl+0x8c/0xd0 [ 29.395165] print_report+0x118/0x5e0 [ 29.395673] kasan_report+0xc8/0x118 [ 29.396280] kasan_check_range+0x100/0x1a8 [ 29.396874] __kasan_check_write+0x20/0x30 [ 29.397460] kasan_atomics_helper+0xf88/0x4858 [ 29.398139] kasan_atomics+0x198/0x2e8 [ 29.398686] kunit_try_run_case+0x14c/0x3d0 [ 29.399263] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.400038] kthread+0x24c/0x2d0 [ 29.400571] ret_from_fork+0x10/0x20 [ 29.401147] [ 29.401499] Allocated by task 253: [ 29.401973] kasan_save_stack+0x3c/0x68 [ 29.402553] kasan_save_track+0x20/0x40 [ 29.403109] kasan_save_alloc_info+0x40/0x58 [ 29.403681] __kasan_kmalloc+0xd4/0xd8 [ 29.404277] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.404884] kasan_atomics+0xb8/0x2e8 [ 29.405385] kunit_try_run_case+0x14c/0x3d0 [ 29.405934] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.406672] kthread+0x24c/0x2d0 [ 29.407181] ret_from_fork+0x10/0x20 [ 29.407718] [ 29.408020] The buggy address belongs to the object at fff00000c12e8780 [ 29.408020] which belongs to the cache kmalloc-64 of size 64 [ 29.409244] The buggy address is located 0 bytes to the right of [ 29.409244] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.410564] [ 29.410884] The buggy address belongs to the physical page: [ 29.411532] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.412361] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.413145] page_type: f5(slab) [ 29.413578] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.414497] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.415408] page dumped because: kasan: bad access detected [ 29.416042] [ 29.416345] Memory state around the buggy address: [ 29.417021] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.417790] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.418541] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.419336] ^ [ 29.419943] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.420798] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.421572] ================================================================== [ 29.529597] ================================================================== [ 29.530297] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 29.531092] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.531753] [ 29.532058] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.532554] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.533193] Hardware name: linux,dummy-virt (DT) [ 29.533970] Call trace: [ 29.534430] show_stack+0x20/0x38 (C) [ 29.535192] dump_stack_lvl+0x8c/0xd0 [ 29.535825] print_report+0x118/0x5e0 [ 29.536441] kasan_report+0xc8/0x118 [ 29.537066] kasan_check_range+0x100/0x1a8 [ 29.537712] __kasan_check_write+0x20/0x30 [ 29.538308] kasan_atomics_helper+0x1128/0x4858 [ 29.538940] kasan_atomics+0x198/0x2e8 [ 29.539574] kunit_try_run_case+0x14c/0x3d0 [ 29.540227] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.540964] kthread+0x24c/0x2d0 [ 29.541526] ret_from_fork+0x10/0x20 [ 29.542113] [ 29.542469] Allocated by task 253: [ 29.542992] kasan_save_stack+0x3c/0x68 [ 29.543641] kasan_save_track+0x20/0x40 [ 29.544230] kasan_save_alloc_info+0x40/0x58 [ 29.544936] __kasan_kmalloc+0xd4/0xd8 [ 29.545527] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.546157] kasan_atomics+0xb8/0x2e8 [ 29.546737] kunit_try_run_case+0x14c/0x3d0 [ 29.547355] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.548134] kthread+0x24c/0x2d0 [ 29.548712] ret_from_fork+0x10/0x20 [ 29.549328] [ 29.549617] The buggy address belongs to the object at fff00000c12e8780 [ 29.549617] which belongs to the cache kmalloc-64 of size 64 [ 29.551213] The buggy address is located 0 bytes to the right of [ 29.551213] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.552512] [ 29.552982] The buggy address belongs to the physical page: [ 29.553784] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.554691] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.555459] page_type: f5(slab) [ 29.555959] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.556927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.557828] page dumped because: kasan: bad access detected [ 29.558515] [ 29.558863] Memory state around the buggy address: [ 29.559535] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.560390] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.561234] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.562104] ^ [ 29.562749] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.563572] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.564354] ================================================================== [ 28.959688] ================================================================== [ 28.960343] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 28.961018] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.961859] [ 28.962111] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.962865] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.963246] Hardware name: linux,dummy-virt (DT) [ 28.963653] Call trace: [ 28.964067] show_stack+0x20/0x38 (C) [ 28.964823] dump_stack_lvl+0x8c/0xd0 [ 28.965469] print_report+0x118/0x5e0 [ 28.966155] kasan_report+0xc8/0x118 [ 28.966893] kasan_check_range+0x100/0x1a8 [ 28.967464] __kasan_check_write+0x20/0x30 [ 28.967978] kasan_atomics_helper+0xc08/0x4858 [ 28.968539] kasan_atomics+0x198/0x2e8 [ 28.969313] kunit_try_run_case+0x14c/0x3d0 [ 28.970074] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.970947] kthread+0x24c/0x2d0 [ 28.971560] ret_from_fork+0x10/0x20 [ 28.972222] [ 28.972625] Allocated by task 253: [ 28.973229] kasan_save_stack+0x3c/0x68 [ 28.973851] kasan_save_track+0x20/0x40 [ 28.974467] kasan_save_alloc_info+0x40/0x58 [ 28.975097] __kasan_kmalloc+0xd4/0xd8 [ 28.975768] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.976540] kasan_atomics+0xb8/0x2e8 [ 28.977316] kunit_try_run_case+0x14c/0x3d0 [ 28.977919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.978577] kthread+0x24c/0x2d0 [ 28.979184] ret_from_fork+0x10/0x20 [ 28.979825] [ 28.980163] The buggy address belongs to the object at fff00000c12e8780 [ 28.980163] which belongs to the cache kmalloc-64 of size 64 [ 28.981447] The buggy address is located 0 bytes to the right of [ 28.981447] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.982855] [ 28.983226] The buggy address belongs to the physical page: [ 28.983944] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.984869] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.985725] page_type: f5(slab) [ 28.986274] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.987190] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.988073] page dumped because: kasan: bad access detected [ 28.988728] [ 28.989146] Memory state around the buggy address: [ 28.989788] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.990534] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.991409] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.992218] ^ [ 28.992884] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.993625] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.994534] ================================================================== [ 29.177250] ================================================================== [ 29.177911] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 29.178672] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.179445] [ 29.179843] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.180938] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.181543] Hardware name: linux,dummy-virt (DT) [ 29.182055] Call trace: [ 29.182531] show_stack+0x20/0x38 (C) [ 29.183080] dump_stack_lvl+0x8c/0xd0 [ 29.183640] print_report+0x118/0x5e0 [ 29.184254] kasan_report+0xc8/0x118 [ 29.184816] kasan_check_range+0x100/0x1a8 [ 29.185475] __kasan_check_read+0x20/0x30 [ 29.186078] kasan_atomics_helper+0xdd4/0x4858 [ 29.186712] kasan_atomics+0x198/0x2e8 [ 29.187278] kunit_try_run_case+0x14c/0x3d0 [ 29.187929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.188663] kthread+0x24c/0x2d0 [ 29.189188] ret_from_fork+0x10/0x20 [ 29.189850] [ 29.190177] Allocated by task 253: [ 29.190741] kasan_save_stack+0x3c/0x68 [ 29.191353] kasan_save_track+0x20/0x40 [ 29.191884] kasan_save_alloc_info+0x40/0x58 [ 29.192478] __kasan_kmalloc+0xd4/0xd8 [ 29.193088] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.193715] kasan_atomics+0xb8/0x2e8 [ 29.194267] kunit_try_run_case+0x14c/0x3d0 [ 29.194845] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.195509] kthread+0x24c/0x2d0 [ 29.196013] ret_from_fork+0x10/0x20 [ 29.196521] [ 29.196849] The buggy address belongs to the object at fff00000c12e8780 [ 29.196849] which belongs to the cache kmalloc-64 of size 64 [ 29.198040] The buggy address is located 0 bytes to the right of [ 29.198040] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.199328] [ 29.199649] The buggy address belongs to the physical page: [ 29.200256] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.201121] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.201946] page_type: f5(slab) [ 29.202413] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.203233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.204021] page dumped because: kasan: bad access detected [ 29.204736] [ 29.205052] Memory state around the buggy address: [ 29.205618] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.206393] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.207171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.207962] ^ [ 29.208556] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.209358] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.210118] ================================================================== [ 29.962054] ================================================================== [ 29.963262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 29.964116] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.964932] [ 29.965291] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.966490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.967026] Hardware name: linux,dummy-virt (DT) [ 29.967278] Call trace: [ 29.967444] show_stack+0x20/0x38 (C) [ 29.967682] dump_stack_lvl+0x8c/0xd0 [ 29.968257] print_report+0x118/0x5e0 [ 29.968891] kasan_report+0xc8/0x118 [ 29.969491] __asan_report_load8_noabort+0x20/0x30 [ 29.970163] kasan_atomics_helper+0x3db0/0x4858 [ 29.970962] kasan_atomics+0x198/0x2e8 [ 29.971639] kunit_try_run_case+0x14c/0x3d0 [ 29.972344] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.973114] kthread+0x24c/0x2d0 [ 29.973673] ret_from_fork+0x10/0x20 [ 29.974261] [ 29.974603] Allocated by task 253: [ 29.975152] kasan_save_stack+0x3c/0x68 [ 29.975772] kasan_save_track+0x20/0x40 [ 29.976368] kasan_save_alloc_info+0x40/0x58 [ 29.977004] __kasan_kmalloc+0xd4/0xd8 [ 29.977582] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.978222] kasan_atomics+0xb8/0x2e8 [ 29.978808] kunit_try_run_case+0x14c/0x3d0 [ 29.979430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.980142] kthread+0x24c/0x2d0 [ 29.980677] ret_from_fork+0x10/0x20 [ 29.981281] [ 29.981625] The buggy address belongs to the object at fff00000c12e8780 [ 29.981625] which belongs to the cache kmalloc-64 of size 64 [ 29.982944] The buggy address is located 0 bytes to the right of [ 29.982944] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.984328] [ 29.984738] The buggy address belongs to the physical page: [ 29.985385] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.986397] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.987277] page_type: f5(slab) [ 29.987819] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.988744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.989606] page dumped because: kasan: bad access detected [ 29.990281] [ 29.990632] Memory state around the buggy address: [ 29.991301] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.992159] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.992983] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.993792] ^ [ 29.994403] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.995255] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.996055] ================================================================== [ 30.068427] ================================================================== [ 30.069099] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 30.069863] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.070583] [ 30.071009] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.072130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.072759] Hardware name: linux,dummy-virt (DT) [ 30.073295] Call trace: [ 30.073695] show_stack+0x20/0x38 (C) [ 30.074295] dump_stack_lvl+0x8c/0xd0 [ 30.074939] print_report+0x118/0x5e0 [ 30.075542] kasan_report+0xc8/0x118 [ 30.076104] kasan_check_range+0x100/0x1a8 [ 30.076695] __kasan_check_write+0x20/0x30 [ 30.077282] kasan_atomics_helper+0x16d0/0x4858 [ 30.077901] kasan_atomics+0x198/0x2e8 [ 30.078519] kunit_try_run_case+0x14c/0x3d0 [ 30.079147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.079825] kthread+0x24c/0x2d0 [ 30.080401] ret_from_fork+0x10/0x20 [ 30.081006] [ 30.081309] Allocated by task 253: [ 30.082098] kasan_save_stack+0x3c/0x68 [ 30.082657] kasan_save_track+0x20/0x40 [ 30.083183] kasan_save_alloc_info+0x40/0x58 [ 30.083798] __kasan_kmalloc+0xd4/0xd8 [ 30.084337] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.084988] kasan_atomics+0xb8/0x2e8 [ 30.085491] kunit_try_run_case+0x14c/0x3d0 [ 30.086123] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.086856] kthread+0x24c/0x2d0 [ 30.087389] ret_from_fork+0x10/0x20 [ 30.087905] [ 30.088220] The buggy address belongs to the object at fff00000c12e8780 [ 30.088220] which belongs to the cache kmalloc-64 of size 64 [ 30.089448] The buggy address is located 0 bytes to the right of [ 30.089448] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.090733] [ 30.091051] The buggy address belongs to the physical page: [ 30.091661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.092521] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.093262] page_type: f5(slab) [ 30.093784] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.094618] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.095509] page dumped because: kasan: bad access detected [ 30.096121] [ 30.096455] Memory state around the buggy address: [ 30.097048] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.097810] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.098625] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.099411] ^ [ 30.100018] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.100853] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.101614] ================================================================== [ 28.340078] ================================================================== [ 28.340847] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x54c/0x4858 [ 28.341518] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.342402] [ 28.342763] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.343851] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.344330] Hardware name: linux,dummy-virt (DT) [ 28.345025] Call trace: [ 28.345418] show_stack+0x20/0x38 (C) [ 28.346005] dump_stack_lvl+0x8c/0xd0 [ 28.346502] print_report+0x118/0x5e0 [ 28.347113] kasan_report+0xc8/0x118 [ 28.347800] kasan_check_range+0x100/0x1a8 [ 28.348391] __kasan_check_write+0x20/0x30 [ 28.348991] kasan_atomics_helper+0x54c/0x4858 [ 28.349561] kasan_atomics+0x198/0x2e8 [ 28.350250] kunit_try_run_case+0x14c/0x3d0 [ 28.350882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.351655] kthread+0x24c/0x2d0 [ 28.352219] ret_from_fork+0x10/0x20 [ 28.352838] [ 28.353163] Allocated by task 253: [ 28.353684] kasan_save_stack+0x3c/0x68 [ 28.354293] kasan_save_track+0x20/0x40 [ 28.354813] kasan_save_alloc_info+0x40/0x58 [ 28.355410] __kasan_kmalloc+0xd4/0xd8 [ 28.355994] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.356600] kasan_atomics+0xb8/0x2e8 [ 28.357199] kunit_try_run_case+0x14c/0x3d0 [ 28.357795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.358524] kthread+0x24c/0x2d0 [ 28.359066] ret_from_fork+0x10/0x20 [ 28.359608] [ 28.359959] The buggy address belongs to the object at fff00000c12e8780 [ 28.359959] which belongs to the cache kmalloc-64 of size 64 [ 28.361233] The buggy address is located 0 bytes to the right of [ 28.361233] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.362469] [ 28.362809] The buggy address belongs to the physical page: [ 28.363466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.364299] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.365047] page_type: f5(slab) [ 28.365588] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.366405] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.367252] page dumped because: kasan: bad access detected [ 28.367930] [ 28.368242] Memory state around the buggy address: [ 28.368841] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.369574] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.370344] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.371115] ^ [ 28.371742] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.372526] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.373332] ================================================================== [ 28.672354] ================================================================== [ 28.673129] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x934/0x4858 [ 28.673937] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.674732] [ 28.675078] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.676192] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.676789] Hardware name: linux,dummy-virt (DT) [ 28.677333] Call trace: [ 28.677767] show_stack+0x20/0x38 (C) [ 28.678342] dump_stack_lvl+0x8c/0xd0 [ 28.678940] print_report+0x118/0x5e0 [ 28.679444] kasan_report+0xc8/0x118 [ 28.680059] kasan_check_range+0x100/0x1a8 [ 28.680643] __kasan_check_write+0x20/0x30 [ 28.681249] kasan_atomics_helper+0x934/0x4858 [ 28.681843] kasan_atomics+0x198/0x2e8 [ 28.682470] kunit_try_run_case+0x14c/0x3d0 [ 28.683026] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.683827] kthread+0x24c/0x2d0 [ 28.684393] ret_from_fork+0x10/0x20 [ 28.684944] [ 28.685260] Allocated by task 253: [ 28.685678] kasan_save_stack+0x3c/0x68 [ 28.686258] kasan_save_track+0x20/0x40 [ 28.686833] kasan_save_alloc_info+0x40/0x58 [ 28.687389] __kasan_kmalloc+0xd4/0xd8 [ 28.688011] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.688581] kasan_atomics+0xb8/0x2e8 [ 28.689160] kunit_try_run_case+0x14c/0x3d0 [ 28.689750] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.690406] kthread+0x24c/0x2d0 [ 28.690948] ret_from_fork+0x10/0x20 [ 28.691462] [ 28.691773] The buggy address belongs to the object at fff00000c12e8780 [ 28.691773] which belongs to the cache kmalloc-64 of size 64 [ 28.693005] The buggy address is located 0 bytes to the right of [ 28.693005] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.694294] [ 28.694654] The buggy address belongs to the physical page: [ 28.695277] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.696196] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.696938] page_type: f5(slab) [ 28.697524] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.698307] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.699140] page dumped because: kasan: bad access detected [ 28.699819] [ 28.700163] Memory state around the buggy address: [ 28.700782] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.701537] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.702345] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.703161] ^ [ 28.703795] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.704596] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.705414] ================================================================== [ 28.196141] ================================================================== [ 28.196770] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3ac/0x4858 [ 28.197658] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.198485] [ 28.198844] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.199963] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.200500] Hardware name: linux,dummy-virt (DT) [ 28.201197] Call trace: [ 28.201582] show_stack+0x20/0x38 (C) [ 28.202205] dump_stack_lvl+0x8c/0xd0 [ 28.202820] print_report+0x118/0x5e0 [ 28.203373] kasan_report+0xc8/0x118 [ 28.204035] kasan_check_range+0x100/0x1a8 [ 28.204683] __kasan_check_write+0x20/0x30 [ 28.205291] kasan_atomics_helper+0x3ac/0x4858 [ 28.205907] kasan_atomics+0x198/0x2e8 [ 28.206509] kunit_try_run_case+0x14c/0x3d0 [ 28.207142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.207893] kthread+0x24c/0x2d0 [ 28.208457] ret_from_fork+0x10/0x20 [ 28.209017] [ 28.209327] Allocated by task 253: [ 28.209880] kasan_save_stack+0x3c/0x68 [ 28.210417] kasan_save_track+0x20/0x40 [ 28.211002] kasan_save_alloc_info+0x40/0x58 [ 28.211583] __kasan_kmalloc+0xd4/0xd8 [ 28.212102] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.212764] kasan_atomics+0xb8/0x2e8 [ 28.213276] kunit_try_run_case+0x14c/0x3d0 [ 28.213881] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.214537] kthread+0x24c/0x2d0 [ 28.215040] ret_from_fork+0x10/0x20 [ 28.215536] [ 28.215928] The buggy address belongs to the object at fff00000c12e8780 [ 28.215928] which belongs to the cache kmalloc-64 of size 64 [ 28.217133] The buggy address is located 0 bytes to the right of [ 28.217133] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.218427] [ 28.218766] The buggy address belongs to the physical page: [ 28.219372] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.220323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.221070] page_type: f5(slab) [ 28.221580] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.222419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.223329] page dumped because: kasan: bad access detected [ 28.223946] [ 28.224302] Memory state around the buggy address: [ 28.224924] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.225824] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.226535] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.227384] ^ [ 28.227993] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.228818] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.229592] ================================================================== [ 28.230928] ================================================================== [ 28.231800] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x414/0x4858 [ 28.232596] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.233388] [ 28.233761] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.234771] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.235271] Hardware name: linux,dummy-virt (DT) [ 28.235861] Call trace: [ 28.236339] show_stack+0x20/0x38 (C) [ 28.236970] dump_stack_lvl+0x8c/0xd0 [ 28.237482] print_report+0x118/0x5e0 [ 28.238130] kasan_report+0xc8/0x118 [ 28.238658] kasan_check_range+0x100/0x1a8 [ 28.239329] __kasan_check_write+0x20/0x30 [ 28.239923] kasan_atomics_helper+0x414/0x4858 [ 28.240558] kasan_atomics+0x198/0x2e8 [ 28.241117] kunit_try_run_case+0x14c/0x3d0 [ 28.241795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.242530] kthread+0x24c/0x2d0 [ 28.243120] ret_from_fork+0x10/0x20 [ 28.243688] [ 28.244040] Allocated by task 253: [ 28.244487] kasan_save_stack+0x3c/0x68 [ 28.245062] kasan_save_track+0x20/0x40 [ 28.245626] kasan_save_alloc_info+0x40/0x58 [ 28.246203] __kasan_kmalloc+0xd4/0xd8 [ 28.246750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.247342] kasan_atomics+0xb8/0x2e8 [ 28.247875] kunit_try_run_case+0x14c/0x3d0 [ 28.248435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.249140] kthread+0x24c/0x2d0 [ 28.249628] ret_from_fork+0x10/0x20 [ 28.250138] [ 28.250448] The buggy address belongs to the object at fff00000c12e8780 [ 28.250448] which belongs to the cache kmalloc-64 of size 64 [ 28.251695] The buggy address is located 0 bytes to the right of [ 28.251695] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.252974] [ 28.253326] The buggy address belongs to the physical page: [ 28.253936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.254780] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.255488] page_type: f5(slab) [ 28.255997] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.256821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.257643] page dumped because: kasan: bad access detected [ 28.258328] [ 28.258652] Memory state around the buggy address: [ 28.259237] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.260006] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.260824] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.261647] ^ [ 28.262279] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.263035] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.263833] ================================================================== [ 29.352046] ================================================================== [ 29.353552] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 29.354390] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.355666] [ 29.356151] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.357332] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.357993] Hardware name: linux,dummy-virt (DT) [ 29.358568] Call trace: [ 29.359131] show_stack+0x20/0x38 (C) [ 29.359608] dump_stack_lvl+0x8c/0xd0 [ 29.360152] print_report+0x118/0x5e0 [ 29.360785] kasan_report+0xc8/0x118 [ 29.361403] kasan_check_range+0x100/0x1a8 [ 29.362037] __kasan_check_write+0x20/0x30 [ 29.362621] kasan_atomics_helper+0xf20/0x4858 [ 29.363276] kasan_atomics+0x198/0x2e8 [ 29.363890] kunit_try_run_case+0x14c/0x3d0 [ 29.364442] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.365241] kthread+0x24c/0x2d0 [ 29.365759] ret_from_fork+0x10/0x20 [ 29.366368] [ 29.366721] Allocated by task 253: [ 29.367164] kasan_save_stack+0x3c/0x68 [ 29.367744] kasan_save_track+0x20/0x40 [ 29.368300] kasan_save_alloc_info+0x40/0x58 [ 29.368874] __kasan_kmalloc+0xd4/0xd8 [ 29.369399] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.369986] kasan_atomics+0xb8/0x2e8 [ 29.370516] kunit_try_run_case+0x14c/0x3d0 [ 29.371112] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.371791] kthread+0x24c/0x2d0 [ 29.372257] ret_from_fork+0x10/0x20 [ 29.372819] [ 29.373146] The buggy address belongs to the object at fff00000c12e8780 [ 29.373146] which belongs to the cache kmalloc-64 of size 64 [ 29.374403] The buggy address is located 0 bytes to the right of [ 29.374403] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.375623] [ 29.375970] The buggy address belongs to the physical page: [ 29.376655] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.377458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.378288] page_type: f5(slab) [ 29.378812] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.379639] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.380555] page dumped because: kasan: bad access detected [ 29.381232] [ 29.381539] Memory state around the buggy address: [ 29.382054] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.382865] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.383659] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.384503] ^ [ 29.385106] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.385916] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.386689] ================================================================== [ 29.565902] ================================================================== [ 29.566539] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 29.567547] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.568600] [ 29.568945] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.570574] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.571319] Hardware name: linux,dummy-virt (DT) [ 29.571888] Call trace: [ 29.572352] show_stack+0x20/0x38 (C) [ 29.573044] dump_stack_lvl+0x8c/0xd0 [ 29.573712] print_report+0x118/0x5e0 [ 29.574277] kasan_report+0xc8/0x118 [ 29.574936] kasan_check_range+0x100/0x1a8 [ 29.575589] __kasan_check_write+0x20/0x30 [ 29.576224] kasan_atomics_helper+0x1190/0x4858 [ 29.576898] kasan_atomics+0x198/0x2e8 [ 29.577484] kunit_try_run_case+0x14c/0x3d0 [ 29.578143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.578979] kthread+0x24c/0x2d0 [ 29.579565] ret_from_fork+0x10/0x20 [ 29.580185] [ 29.580565] Allocated by task 253: [ 29.581131] kasan_save_stack+0x3c/0x68 [ 29.581836] kasan_save_track+0x20/0x40 [ 29.582384] kasan_save_alloc_info+0x40/0x58 [ 29.583059] __kasan_kmalloc+0xd4/0xd8 [ 29.583625] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.584272] kasan_atomics+0xb8/0x2e8 [ 29.584870] kunit_try_run_case+0x14c/0x3d0 [ 29.585485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.586207] kthread+0x24c/0x2d0 [ 29.586753] ret_from_fork+0x10/0x20 [ 29.587310] [ 29.587638] The buggy address belongs to the object at fff00000c12e8780 [ 29.587638] which belongs to the cache kmalloc-64 of size 64 [ 29.589003] The buggy address is located 0 bytes to the right of [ 29.589003] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.590345] [ 29.590659] The buggy address belongs to the physical page: [ 29.591318] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.592290] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.593097] page_type: f5(slab) [ 29.593631] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.594512] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.595407] page dumped because: kasan: bad access detected [ 29.596144] [ 29.596505] Memory state around the buggy address: [ 29.597152] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598061] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.598903] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.599723] ^ [ 29.600329] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.601183] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.601995] ================================================================== [ 29.105885] ================================================================== [ 29.106612] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 29.107547] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.108327] [ 29.108732] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.109880] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.110440] Hardware name: linux,dummy-virt (DT) [ 29.111089] Call trace: [ 29.111481] show_stack+0x20/0x38 (C) [ 29.112110] dump_stack_lvl+0x8c/0xd0 [ 29.112663] print_report+0x118/0x5e0 [ 29.113225] kasan_report+0xc8/0x118 [ 29.113804] kasan_check_range+0x100/0x1a8 [ 29.114443] __kasan_check_write+0x20/0x30 [ 29.115077] kasan_atomics_helper+0xd3c/0x4858 [ 29.115743] kasan_atomics+0x198/0x2e8 [ 29.116280] kunit_try_run_case+0x14c/0x3d0 [ 29.116927] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.117586] kthread+0x24c/0x2d0 [ 29.118215] ret_from_fork+0x10/0x20 [ 29.118778] [ 29.119143] Allocated by task 253: [ 29.119642] kasan_save_stack+0x3c/0x68 [ 29.120494] kasan_save_track+0x20/0x40 [ 29.121017] kasan_save_alloc_info+0x40/0x58 [ 29.121598] __kasan_kmalloc+0xd4/0xd8 [ 29.122294] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.122862] kasan_atomics+0xb8/0x2e8 [ 29.123384] kunit_try_run_case+0x14c/0x3d0 [ 29.123949] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.124658] kthread+0x24c/0x2d0 [ 29.125224] ret_from_fork+0x10/0x20 [ 29.125760] [ 29.126141] The buggy address belongs to the object at fff00000c12e8780 [ 29.126141] which belongs to the cache kmalloc-64 of size 64 [ 29.127368] The buggy address is located 0 bytes to the right of [ 29.127368] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.128629] [ 29.128987] The buggy address belongs to the physical page: [ 29.129664] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.130544] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.131311] page_type: f5(slab) [ 29.131834] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.132648] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.133515] page dumped because: kasan: bad access detected [ 29.134146] [ 29.134477] Memory state around the buggy address: [ 29.135139] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.135931] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.136785] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.137554] ^ [ 29.138182] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.138964] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.139738] ================================================================== [ 29.142365] ================================================================== [ 29.143180] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 29.143857] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.144508] [ 29.145160] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.146886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.147554] Hardware name: linux,dummy-virt (DT) [ 29.148374] Call trace: [ 29.148910] show_stack+0x20/0x38 (C) [ 29.149409] dump_stack_lvl+0x8c/0xd0 [ 29.149912] print_report+0x118/0x5e0 [ 29.150389] kasan_report+0xc8/0x118 [ 29.150998] __asan_report_load4_noabort+0x20/0x30 [ 29.151659] kasan_atomics_helper+0x3e04/0x4858 [ 29.152377] kasan_atomics+0x198/0x2e8 [ 29.152990] kunit_try_run_case+0x14c/0x3d0 [ 29.153613] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.154264] kthread+0x24c/0x2d0 [ 29.154864] ret_from_fork+0x10/0x20 [ 29.155419] [ 29.155788] Allocated by task 253: [ 29.156253] kasan_save_stack+0x3c/0x68 [ 29.156846] kasan_save_track+0x20/0x40 [ 29.157419] kasan_save_alloc_info+0x40/0x58 [ 29.157982] __kasan_kmalloc+0xd4/0xd8 [ 29.158592] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.159177] kasan_atomics+0xb8/0x2e8 [ 29.159807] kunit_try_run_case+0x14c/0x3d0 [ 29.160376] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.161085] kthread+0x24c/0x2d0 [ 29.161573] ret_from_fork+0x10/0x20 [ 29.162048] [ 29.162406] The buggy address belongs to the object at fff00000c12e8780 [ 29.162406] which belongs to the cache kmalloc-64 of size 64 [ 29.163634] The buggy address is located 0 bytes to the right of [ 29.163634] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.164916] [ 29.165240] The buggy address belongs to the physical page: [ 29.165930] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.166805] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.167555] page_type: f5(slab) [ 29.168016] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.168904] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.169741] page dumped because: kasan: bad access detected [ 29.170357] [ 29.170708] Memory state around the buggy address: [ 29.171289] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.172029] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.172796] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.173647] ^ [ 29.174253] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175057] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.175840] ================================================================== [ 29.493352] ================================================================== [ 29.494326] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 29.496002] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.496937] [ 29.497361] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.498372] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.499099] Hardware name: linux,dummy-virt (DT) [ 29.499802] Call trace: [ 29.500295] show_stack+0x20/0x38 (C) [ 29.500956] dump_stack_lvl+0x8c/0xd0 [ 29.501607] print_report+0x118/0x5e0 [ 29.502186] kasan_report+0xc8/0x118 [ 29.502740] kasan_check_range+0x100/0x1a8 [ 29.503325] __kasan_check_write+0x20/0x30 [ 29.503882] kasan_atomics_helper+0x10c0/0x4858 [ 29.504568] kasan_atomics+0x198/0x2e8 [ 29.505161] kunit_try_run_case+0x14c/0x3d0 [ 29.505846] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.506546] kthread+0x24c/0x2d0 [ 29.507105] ret_from_fork+0x10/0x20 [ 29.507723] [ 29.508038] Allocated by task 253: [ 29.508513] kasan_save_stack+0x3c/0x68 [ 29.509075] kasan_save_track+0x20/0x40 [ 29.509578] kasan_save_alloc_info+0x40/0x58 [ 29.510248] __kasan_kmalloc+0xd4/0xd8 [ 29.510833] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.511426] kasan_atomics+0xb8/0x2e8 [ 29.511975] kunit_try_run_case+0x14c/0x3d0 [ 29.512535] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.513146] kthread+0x24c/0x2d0 [ 29.513680] ret_from_fork+0x10/0x20 [ 29.514377] [ 29.514676] The buggy address belongs to the object at fff00000c12e8780 [ 29.514676] which belongs to the cache kmalloc-64 of size 64 [ 29.515937] The buggy address is located 0 bytes to the right of [ 29.515937] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.517241] [ 29.517580] The buggy address belongs to the physical page: [ 29.518154] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.518981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.519788] page_type: f5(slab) [ 29.520259] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.521184] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.521974] page dumped because: kasan: bad access detected [ 29.522618] [ 29.522962] Memory state around the buggy address: [ 29.523559] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.524305] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.525115] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.525917] ^ [ 29.526559] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.527325] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.528103] ================================================================== [ 29.317335] ================================================================== [ 29.317959] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 29.318960] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.319765] [ 29.320110] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.321197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.321673] Hardware name: linux,dummy-virt (DT) [ 29.322361] Call trace: [ 29.322757] show_stack+0x20/0x38 (C) [ 29.323279] dump_stack_lvl+0x8c/0xd0 [ 29.323876] print_report+0x118/0x5e0 [ 29.324524] kasan_report+0xc8/0x118 [ 29.325058] kasan_check_range+0x100/0x1a8 [ 29.325664] __kasan_check_write+0x20/0x30 [ 29.326362] kasan_atomics_helper+0xeb8/0x4858 [ 29.327018] kasan_atomics+0x198/0x2e8 [ 29.327563] kunit_try_run_case+0x14c/0x3d0 [ 29.328155] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.328847] kthread+0x24c/0x2d0 [ 29.329438] ret_from_fork+0x10/0x20 [ 29.330039] [ 29.330327] Allocated by task 253: [ 29.330840] kasan_save_stack+0x3c/0x68 [ 29.331440] kasan_save_track+0x20/0x40 [ 29.332024] kasan_save_alloc_info+0x40/0x58 [ 29.332584] __kasan_kmalloc+0xd4/0xd8 [ 29.333174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.333694] kasan_atomics+0xb8/0x2e8 [ 29.334329] kunit_try_run_case+0x14c/0x3d0 [ 29.334923] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.335515] kthread+0x24c/0x2d0 [ 29.336077] ret_from_fork+0x10/0x20 [ 29.336629] [ 29.336947] The buggy address belongs to the object at fff00000c12e8780 [ 29.336947] which belongs to the cache kmalloc-64 of size 64 [ 29.338237] The buggy address is located 0 bytes to the right of [ 29.338237] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.339491] [ 29.339848] The buggy address belongs to the physical page: [ 29.340468] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.341241] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.342147] page_type: f5(slab) [ 29.342606] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.343542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.344364] page dumped because: kasan: bad access detected [ 29.345029] [ 29.345348] Memory state around the buggy address: [ 29.345924] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.346733] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.347543] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.348283] ^ [ 29.348870] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.349725] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.350523] ================================================================== [ 29.603921] ================================================================== [ 29.604454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 29.605440] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.606258] [ 29.606637] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.607903] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.608517] Hardware name: linux,dummy-virt (DT) [ 29.609188] Call trace: [ 29.609635] show_stack+0x20/0x38 (C) [ 29.610197] dump_stack_lvl+0x8c/0xd0 [ 29.610932] print_report+0x118/0x5e0 [ 29.611499] kasan_report+0xc8/0x118 [ 29.612173] kasan_check_range+0x100/0x1a8 [ 29.612877] __kasan_check_write+0x20/0x30 [ 29.613514] kasan_atomics_helper+0x11f8/0x4858 [ 29.614199] kasan_atomics+0x198/0x2e8 [ 29.614803] kunit_try_run_case+0x14c/0x3d0 [ 29.615449] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.616188] kthread+0x24c/0x2d0 [ 29.616766] ret_from_fork+0x10/0x20 [ 29.617364] [ 29.617653] Allocated by task 253: [ 29.618189] kasan_save_stack+0x3c/0x68 [ 29.618809] kasan_save_track+0x20/0x40 [ 29.619433] kasan_save_alloc_info+0x40/0x58 [ 29.620088] __kasan_kmalloc+0xd4/0xd8 [ 29.620721] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.621634] kasan_atomics+0xb8/0x2e8 [ 29.622050] kunit_try_run_case+0x14c/0x3d0 [ 29.622839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.624111] kthread+0x24c/0x2d0 [ 29.624780] ret_from_fork+0x10/0x20 [ 29.625493] [ 29.626493] The buggy address belongs to the object at fff00000c12e8780 [ 29.626493] which belongs to the cache kmalloc-64 of size 64 [ 29.628547] The buggy address is located 0 bytes to the right of [ 29.628547] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.629843] [ 29.630227] The buggy address belongs to the physical page: [ 29.630868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.631902] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.632679] page_type: f5(slab) [ 29.633223] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.634152] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.635015] page dumped because: kasan: bad access detected [ 29.635713] [ 29.636097] Memory state around the buggy address: [ 29.636746] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.637501] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.638397] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.639218] ^ [ 29.639856] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.640695] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.641496] ================================================================== [ 28.557256] ================================================================== [ 28.557985] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7cc/0x4858 [ 28.559014] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.559778] [ 28.560152] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.561204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.561861] Hardware name: linux,dummy-virt (DT) [ 28.562727] Call trace: [ 28.563202] show_stack+0x20/0x38 (C) [ 28.563947] dump_stack_lvl+0x8c/0xd0 [ 28.564623] print_report+0x118/0x5e0 [ 28.565317] kasan_report+0xc8/0x118 [ 28.565970] kasan_check_range+0x100/0x1a8 [ 28.566635] __kasan_check_write+0x20/0x30 [ 28.567332] kasan_atomics_helper+0x7cc/0x4858 [ 28.568042] kasan_atomics+0x198/0x2e8 [ 28.568723] kunit_try_run_case+0x14c/0x3d0 [ 28.569485] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.570292] kthread+0x24c/0x2d0 [ 28.570889] ret_from_fork+0x10/0x20 [ 28.571525] [ 28.571956] Allocated by task 253: [ 28.572512] kasan_save_stack+0x3c/0x68 [ 28.573173] kasan_save_track+0x20/0x40 [ 28.573835] kasan_save_alloc_info+0x40/0x58 [ 28.574519] __kasan_kmalloc+0xd4/0xd8 [ 28.575131] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.575813] kasan_atomics+0xb8/0x2e8 [ 28.576501] kunit_try_run_case+0x14c/0x3d0 [ 28.577194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.577947] kthread+0x24c/0x2d0 [ 28.578528] ret_from_fork+0x10/0x20 [ 28.579139] [ 28.579516] The buggy address belongs to the object at fff00000c12e8780 [ 28.579516] which belongs to the cache kmalloc-64 of size 64 [ 28.580940] The buggy address is located 0 bytes to the right of [ 28.580940] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.582447] [ 28.582905] The buggy address belongs to the physical page: [ 28.583582] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.584577] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.585411] page_type: f5(slab) [ 28.586010] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.587158] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.588061] page dumped because: kasan: bad access detected [ 28.588828] [ 28.589265] Memory state around the buggy address: [ 28.589968] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.590902] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.591780] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.592589] ^ [ 28.593283] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.594152] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.594981] ================================================================== [ 29.643185] ================================================================== [ 29.644062] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 29.644795] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.645643] [ 29.645971] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.647496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.648129] Hardware name: linux,dummy-virt (DT) [ 29.648580] Call trace: [ 29.649024] show_stack+0x20/0x38 (C) [ 29.649660] dump_stack_lvl+0x8c/0xd0 [ 29.650208] print_report+0x118/0x5e0 [ 29.650820] kasan_report+0xc8/0x118 [ 29.651386] kasan_check_range+0x100/0x1a8 [ 29.652025] __kasan_check_write+0x20/0x30 [ 29.652684] kasan_atomics_helper+0x126c/0x4858 [ 29.653393] kasan_atomics+0x198/0x2e8 [ 29.653932] kunit_try_run_case+0x14c/0x3d0 [ 29.654505] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.655245] kthread+0x24c/0x2d0 [ 29.655843] ret_from_fork+0x10/0x20 [ 29.656398] [ 29.656783] Allocated by task 253: [ 29.657217] kasan_save_stack+0x3c/0x68 [ 29.657822] kasan_save_track+0x20/0x40 [ 29.658483] kasan_save_alloc_info+0x40/0x58 [ 29.659015] __kasan_kmalloc+0xd4/0xd8 [ 29.659630] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.660237] kasan_atomics+0xb8/0x2e8 [ 29.660778] kunit_try_run_case+0x14c/0x3d0 [ 29.661345] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.662022] kthread+0x24c/0x2d0 [ 29.662491] ret_from_fork+0x10/0x20 [ 29.663066] [ 29.663370] The buggy address belongs to the object at fff00000c12e8780 [ 29.663370] which belongs to the cache kmalloc-64 of size 64 [ 29.664528] The buggy address is located 0 bytes to the right of [ 29.664528] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.666212] [ 29.666467] The buggy address belongs to the physical page: [ 29.666970] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.667612] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.668346] page_type: f5(slab) [ 29.669282] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.670283] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.670981] page dumped because: kasan: bad access detected [ 29.671634] [ 29.672089] Memory state around the buggy address: [ 29.672783] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.673725] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.674471] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.675396] ^ [ 29.675940] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.677090] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.678034] ================================================================== [ 28.046793] ================================================================== [ 28.047786] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2b0/0x4858 [ 28.048862] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.049859] [ 28.050170] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.051558] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.052406] Hardware name: linux,dummy-virt (DT) [ 28.053088] Call trace: [ 28.053621] show_stack+0x20/0x38 (C) [ 28.054328] dump_stack_lvl+0x8c/0xd0 [ 28.055065] print_report+0x118/0x5e0 [ 28.055607] kasan_report+0xc8/0x118 [ 28.056240] kasan_check_range+0x100/0x1a8 [ 28.056981] __kasan_check_read+0x20/0x30 [ 28.057648] kasan_atomics_helper+0x2b0/0x4858 [ 28.058400] kasan_atomics+0x198/0x2e8 [ 28.059109] kunit_try_run_case+0x14c/0x3d0 [ 28.059807] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.060547] kthread+0x24c/0x2d0 [ 28.061138] ret_from_fork+0x10/0x20 [ 28.061765] [ 28.062092] Allocated by task 253: [ 28.062596] kasan_save_stack+0x3c/0x68 [ 28.063312] kasan_save_track+0x20/0x40 [ 28.063944] kasan_save_alloc_info+0x40/0x58 [ 28.064544] __kasan_kmalloc+0xd4/0xd8 [ 28.065181] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.065896] kasan_atomics+0xb8/0x2e8 [ 28.066417] kunit_try_run_case+0x14c/0x3d0 [ 28.067057] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.068006] kthread+0x24c/0x2d0 [ 28.068730] ret_from_fork+0x10/0x20 [ 28.069548] [ 28.070139] The buggy address belongs to the object at fff00000c12e8780 [ 28.070139] which belongs to the cache kmalloc-64 of size 64 [ 28.071568] The buggy address is located 0 bytes to the right of [ 28.071568] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.072924] [ 28.073244] The buggy address belongs to the physical page: [ 28.073997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.075239] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.075998] page_type: f5(slab) [ 28.076523] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.077418] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.078268] page dumped because: kasan: bad access detected [ 28.078942] [ 28.079288] Memory state around the buggy address: [ 28.080217] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.080983] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.081904] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.082740] ^ [ 28.083454] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.084260] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.085253] ================================================================== [ 29.822237] ================================================================== [ 29.822895] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 29.823847] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.824636] [ 29.825004] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.826157] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.826667] Hardware name: linux,dummy-virt (DT) [ 29.827201] Call trace: [ 29.827591] show_stack+0x20/0x38 (C) [ 29.828205] dump_stack_lvl+0x8c/0xd0 [ 29.828827] print_report+0x118/0x5e0 [ 29.829384] kasan_report+0xc8/0x118 [ 29.829970] kasan_check_range+0x100/0x1a8 [ 29.830625] __kasan_check_write+0x20/0x30 [ 29.831440] kasan_atomics_helper+0x147c/0x4858 [ 29.832144] kasan_atomics+0x198/0x2e8 [ 29.832693] kunit_try_run_case+0x14c/0x3d0 [ 29.833229] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.833882] kthread+0x24c/0x2d0 [ 29.834400] ret_from_fork+0x10/0x20 [ 29.834977] [ 29.835344] Allocated by task 253: [ 29.835800] kasan_save_stack+0x3c/0x68 [ 29.836402] kasan_save_track+0x20/0x40 [ 29.836959] kasan_save_alloc_info+0x40/0x58 [ 29.837587] __kasan_kmalloc+0xd4/0xd8 [ 29.838137] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.838798] kasan_atomics+0xb8/0x2e8 [ 29.839328] kunit_try_run_case+0x14c/0x3d0 [ 29.839901] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.840518] kthread+0x24c/0x2d0 [ 29.841135] ret_from_fork+0x10/0x20 [ 29.841604] [ 29.841950] The buggy address belongs to the object at fff00000c12e8780 [ 29.841950] which belongs to the cache kmalloc-64 of size 64 [ 29.843245] The buggy address is located 0 bytes to the right of [ 29.843245] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.844507] [ 29.844853] The buggy address belongs to the physical page: [ 29.845611] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.846506] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.847259] page_type: f5(slab) [ 29.847762] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.848601] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.849460] page dumped because: kasan: bad access detected [ 29.850101] [ 29.850409] Memory state around the buggy address: [ 29.851015] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.851795] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.852525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.853366] ^ [ 29.854028] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.854805] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.855553] ================================================================== [ 29.857100] ================================================================== [ 29.857835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 29.858453] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.859507] [ 29.859906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.861123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.861640] Hardware name: linux,dummy-virt (DT) [ 29.862235] Call trace: [ 29.862667] show_stack+0x20/0x38 (C) [ 29.863221] dump_stack_lvl+0x8c/0xd0 [ 29.863789] print_report+0x118/0x5e0 [ 29.864319] kasan_report+0xc8/0x118 [ 29.864949] kasan_check_range+0x100/0x1a8 [ 29.865660] __kasan_check_write+0x20/0x30 [ 29.866264] kasan_atomics_helper+0x14e4/0x4858 [ 29.867042] kasan_atomics+0x198/0x2e8 [ 29.867651] kunit_try_run_case+0x14c/0x3d0 [ 29.868248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.868905] kthread+0x24c/0x2d0 [ 29.869511] ret_from_fork+0x10/0x20 [ 29.870085] [ 29.870427] Allocated by task 253: [ 29.870906] kasan_save_stack+0x3c/0x68 [ 29.871501] kasan_save_track+0x20/0x40 [ 29.872028] kasan_save_alloc_info+0x40/0x58 [ 29.872548] __kasan_kmalloc+0xd4/0xd8 [ 29.873142] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.873903] kasan_atomics+0xb8/0x2e8 [ 29.874446] kunit_try_run_case+0x14c/0x3d0 [ 29.874997] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.875726] kthread+0x24c/0x2d0 [ 29.876215] ret_from_fork+0x10/0x20 [ 29.876755] [ 29.877066] The buggy address belongs to the object at fff00000c12e8780 [ 29.877066] which belongs to the cache kmalloc-64 of size 64 [ 29.878219] The buggy address is located 0 bytes to the right of [ 29.878219] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.879414] [ 29.879804] The buggy address belongs to the physical page: [ 29.880464] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.881297] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.882073] page_type: f5(slab) [ 29.882628] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.883453] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.884333] page dumped because: kasan: bad access detected [ 29.885021] [ 29.885345] Memory state around the buggy address: [ 29.885959] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.886735] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.887525] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.888301] ^ [ 29.888907] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.889669] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.890508] ================================================================== [ 28.125057] ================================================================== [ 28.125843] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x32c/0x4858 [ 28.127550] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.128421] [ 28.128764] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.129923] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.130462] Hardware name: linux,dummy-virt (DT) [ 28.131123] Call trace: [ 28.131531] show_stack+0x20/0x38 (C) [ 28.132100] dump_stack_lvl+0x8c/0xd0 [ 28.132816] print_report+0x118/0x5e0 [ 28.133302] kasan_report+0xc8/0x118 [ 28.133800] kasan_check_range+0x100/0x1a8 [ 28.134395] __kasan_check_write+0x20/0x30 [ 28.135169] kasan_atomics_helper+0x32c/0x4858 [ 28.135883] kasan_atomics+0x198/0x2e8 [ 28.136479] kunit_try_run_case+0x14c/0x3d0 [ 28.137140] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.137826] kthread+0x24c/0x2d0 [ 28.138339] ret_from_fork+0x10/0x20 [ 28.138878] [ 28.139250] Allocated by task 253: [ 28.139685] kasan_save_stack+0x3c/0x68 [ 28.140315] kasan_save_track+0x20/0x40 [ 28.140877] kasan_save_alloc_info+0x40/0x58 [ 28.141438] __kasan_kmalloc+0xd4/0xd8 [ 28.141992] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.142588] kasan_atomics+0xb8/0x2e8 [ 28.143166] kunit_try_run_case+0x14c/0x3d0 [ 28.143767] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.144459] kthread+0x24c/0x2d0 [ 28.144948] ret_from_fork+0x10/0x20 [ 28.145469] [ 28.145805] The buggy address belongs to the object at fff00000c12e8780 [ 28.145805] which belongs to the cache kmalloc-64 of size 64 [ 28.147029] The buggy address is located 0 bytes to the right of [ 28.147029] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.148202] [ 28.148579] The buggy address belongs to the physical page: [ 28.149182] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.150110] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.150841] page_type: f5(slab) [ 28.151302] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.152107] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.152984] page dumped because: kasan: bad access detected [ 28.153624] [ 28.153863] Memory state around the buggy address: [ 28.154452] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.155304] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.156057] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.156968] ^ [ 28.157474] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.158345] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.159104] ================================================================== [ 29.422742] ================================================================== [ 29.423524] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 29.424423] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.425333] [ 29.425724] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.426785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.427269] Hardware name: linux,dummy-virt (DT) [ 29.427842] Call trace: [ 29.428285] show_stack+0x20/0x38 (C) [ 29.428813] dump_stack_lvl+0x8c/0xd0 [ 29.429492] print_report+0x118/0x5e0 [ 29.430006] kasan_report+0xc8/0x118 [ 29.430672] kasan_check_range+0x100/0x1a8 [ 29.431252] __kasan_check_write+0x20/0x30 [ 29.431921] kasan_atomics_helper+0xff0/0x4858 [ 29.432539] kasan_atomics+0x198/0x2e8 [ 29.433152] kunit_try_run_case+0x14c/0x3d0 [ 29.433777] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.434506] kthread+0x24c/0x2d0 [ 29.435026] ret_from_fork+0x10/0x20 [ 29.435596] [ 29.435937] Allocated by task 253: [ 29.436375] kasan_save_stack+0x3c/0x68 [ 29.437034] kasan_save_track+0x20/0x40 [ 29.437589] kasan_save_alloc_info+0x40/0x58 [ 29.438304] __kasan_kmalloc+0xd4/0xd8 [ 29.438861] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.439411] kasan_atomics+0xb8/0x2e8 [ 29.439979] kunit_try_run_case+0x14c/0x3d0 [ 29.440624] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.441304] kthread+0x24c/0x2d0 [ 29.441754] ret_from_fork+0x10/0x20 [ 29.442350] [ 29.442681] The buggy address belongs to the object at fff00000c12e8780 [ 29.442681] which belongs to the cache kmalloc-64 of size 64 [ 29.443820] The buggy address is located 0 bytes to the right of [ 29.443820] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.445157] [ 29.445527] The buggy address belongs to the physical page: [ 29.446104] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.447048] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.447787] page_type: f5(slab) [ 29.448367] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.449227] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.450146] page dumped because: kasan: bad access detected [ 29.450867] [ 29.451172] Memory state around the buggy address: [ 29.451692] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.452497] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.453297] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.454157] ^ [ 29.454744] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.455527] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.456306] ================================================================== [ 29.245899] ================================================================== [ 29.246645] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 29.247373] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.248317] [ 29.248772] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.251084] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.251648] Hardware name: linux,dummy-virt (DT) [ 29.252412] Call trace: [ 29.252830] show_stack+0x20/0x38 (C) [ 29.253474] dump_stack_lvl+0x8c/0xd0 [ 29.254082] print_report+0x118/0x5e0 [ 29.254679] kasan_report+0xc8/0x118 [ 29.255290] kasan_check_range+0x100/0x1a8 [ 29.255908] __kasan_check_write+0x20/0x30 [ 29.256506] kasan_atomics_helper+0xe44/0x4858 [ 29.257220] kasan_atomics+0x198/0x2e8 [ 29.257827] kunit_try_run_case+0x14c/0x3d0 [ 29.258474] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.259212] kthread+0x24c/0x2d0 [ 29.259760] ret_from_fork+0x10/0x20 [ 29.260314] [ 29.260642] Allocated by task 253: [ 29.261145] kasan_save_stack+0x3c/0x68 [ 29.261650] kasan_save_track+0x20/0x40 [ 29.262299] kasan_save_alloc_info+0x40/0x58 [ 29.262867] __kasan_kmalloc+0xd4/0xd8 [ 29.263439] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.264113] kasan_atomics+0xb8/0x2e8 [ 29.264636] kunit_try_run_case+0x14c/0x3d0 [ 29.265228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.265869] kthread+0x24c/0x2d0 [ 29.266400] ret_from_fork+0x10/0x20 [ 29.266932] [ 29.267250] The buggy address belongs to the object at fff00000c12e8780 [ 29.267250] which belongs to the cache kmalloc-64 of size 64 [ 29.268507] The buggy address is located 0 bytes to the right of [ 29.268507] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.269822] [ 29.270183] The buggy address belongs to the physical page: [ 29.270752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.271743] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.272522] page_type: f5(slab) [ 29.273178] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.274051] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.274891] page dumped because: kasan: bad access detected [ 29.275486] [ 29.275816] Memory state around the buggy address: [ 29.276393] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.277289] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.278023] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.278907] ^ [ 29.279553] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.280336] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.281176] ================================================================== [ 28.849655] ================================================================== [ 28.850473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dcc/0x4858 [ 28.851241] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.852740] [ 28.853243] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.854360] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.855007] Hardware name: linux,dummy-virt (DT) [ 28.855629] Call trace: [ 28.856066] show_stack+0x20/0x38 (C) [ 28.856721] dump_stack_lvl+0x8c/0xd0 [ 28.857351] print_report+0x118/0x5e0 [ 28.857940] kasan_report+0xc8/0x118 [ 28.858410] __asan_report_load4_noabort+0x20/0x30 [ 28.859113] kasan_atomics_helper+0x3dcc/0x4858 [ 28.859667] kasan_atomics+0x198/0x2e8 [ 28.860289] kunit_try_run_case+0x14c/0x3d0 [ 28.860929] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.861732] kthread+0x24c/0x2d0 [ 28.862240] ret_from_fork+0x10/0x20 [ 28.862784] [ 28.863160] Allocated by task 253: [ 28.863670] kasan_save_stack+0x3c/0x68 [ 28.864218] kasan_save_track+0x20/0x40 [ 28.864791] kasan_save_alloc_info+0x40/0x58 [ 28.865430] __kasan_kmalloc+0xd4/0xd8 [ 28.865915] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.866610] kasan_atomics+0xb8/0x2e8 [ 28.867133] kunit_try_run_case+0x14c/0x3d0 [ 28.867686] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.868355] kthread+0x24c/0x2d0 [ 28.868920] ret_from_fork+0x10/0x20 [ 28.869420] [ 28.869787] The buggy address belongs to the object at fff00000c12e8780 [ 28.869787] which belongs to the cache kmalloc-64 of size 64 [ 28.871006] The buggy address is located 0 bytes to the right of [ 28.871006] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.872255] [ 28.872615] The buggy address belongs to the physical page: [ 28.873334] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.874268] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.875012] page_type: f5(slab) [ 28.875482] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.876338] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.877127] page dumped because: kasan: bad access detected [ 28.877811] [ 28.878122] Memory state around the buggy address: [ 28.878680] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.879475] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.880276] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.881065] ^ [ 28.881678] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.882555] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.883380] ================================================================== [ 30.138114] ================================================================== [ 30.138865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 30.139808] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.141441] [ 30.141906] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.142993] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.143490] Hardware name: linux,dummy-virt (DT) [ 30.144106] Call trace: [ 30.144515] show_stack+0x20/0x38 (C) [ 30.145075] dump_stack_lvl+0x8c/0xd0 [ 30.145720] print_report+0x118/0x5e0 [ 30.146268] kasan_report+0xc8/0x118 [ 30.146793] kasan_check_range+0x100/0x1a8 [ 30.147433] __kasan_check_write+0x20/0x30 [ 30.148061] kasan_atomics_helper+0x175c/0x4858 [ 30.148694] kasan_atomics+0x198/0x2e8 [ 30.149284] kunit_try_run_case+0x14c/0x3d0 [ 30.149919] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.150667] kthread+0x24c/0x2d0 [ 30.151214] ret_from_fork+0x10/0x20 [ 30.151763] [ 30.152087] Allocated by task 253: [ 30.152547] kasan_save_stack+0x3c/0x68 [ 30.153173] kasan_save_track+0x20/0x40 [ 30.153736] kasan_save_alloc_info+0x40/0x58 [ 30.154364] __kasan_kmalloc+0xd4/0xd8 [ 30.154910] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.155488] kasan_atomics+0xb8/0x2e8 [ 30.156153] kunit_try_run_case+0x14c/0x3d0 [ 30.156743] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.157447] kthread+0x24c/0x2d0 [ 30.157911] ret_from_fork+0x10/0x20 [ 30.158448] [ 30.158812] The buggy address belongs to the object at fff00000c12e8780 [ 30.158812] which belongs to the cache kmalloc-64 of size 64 [ 30.159980] The buggy address is located 0 bytes to the right of [ 30.159980] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.161298] [ 30.161636] The buggy address belongs to the physical page: [ 30.162275] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.163148] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.163869] page_type: f5(slab) [ 30.164321] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.165256] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.166066] page dumped because: kasan: bad access detected [ 30.166729] [ 30.167047] Memory state around the buggy address: [ 30.167604] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.168404] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.169149] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.169974] ^ [ 30.170561] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.171335] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.172056] ================================================================== [ 27.929632] ================================================================== [ 27.930312] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f7c/0x4858 [ 27.931117] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 27.932785] [ 27.933263] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 27.935162] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.936001] Hardware name: linux,dummy-virt (DT) [ 27.936575] Call trace: [ 27.936853] show_stack+0x20/0x38 (C) [ 27.937543] dump_stack_lvl+0x8c/0xd0 [ 27.938145] print_report+0x118/0x5e0 [ 27.938834] kasan_report+0xc8/0x118 [ 27.939432] __asan_report_store4_noabort+0x20/0x30 [ 27.940184] kasan_atomics_helper+0x3f7c/0x4858 [ 27.940868] kasan_atomics+0x198/0x2e8 [ 27.941469] kunit_try_run_case+0x14c/0x3d0 [ 27.942117] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.942904] kthread+0x24c/0x2d0 [ 27.943517] ret_from_fork+0x10/0x20 [ 27.944225] [ 27.944462] Allocated by task 253: [ 27.945186] kasan_save_stack+0x3c/0x68 [ 27.945845] kasan_save_track+0x20/0x40 [ 27.946467] kasan_save_alloc_info+0x40/0x58 [ 27.947126] __kasan_kmalloc+0xd4/0xd8 [ 27.947622] __kmalloc_cache_noprof+0x15c/0x3c0 [ 27.948420] kasan_atomics+0xb8/0x2e8 [ 27.949035] kunit_try_run_case+0x14c/0x3d0 [ 27.949665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 27.950389] kthread+0x24c/0x2d0 [ 27.951002] ret_from_fork+0x10/0x20 [ 27.951561] [ 27.951933] The buggy address belongs to the object at fff00000c12e8780 [ 27.951933] which belongs to the cache kmalloc-64 of size 64 [ 27.953408] The buggy address is located 0 bytes to the right of [ 27.953408] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 27.954472] [ 27.954742] The buggy address belongs to the physical page: [ 27.955483] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 27.956323] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 27.957372] page_type: f5(slab) [ 27.958024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 27.959180] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.960012] page dumped because: kasan: bad access detected [ 27.960339] [ 27.960480] Memory state around the buggy address: [ 27.960776] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.961322] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.962292] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.963137] ^ [ 27.963816] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.964740] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.965548] ================================================================== [ 29.786318] ================================================================== [ 29.787011] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 29.788191] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.789876] [ 29.790278] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.791583] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.792116] Hardware name: linux,dummy-virt (DT) [ 29.792693] Call trace: [ 29.793114] show_stack+0x20/0x38 (C) [ 29.793642] dump_stack_lvl+0x8c/0xd0 [ 29.794244] print_report+0x118/0x5e0 [ 29.794804] kasan_report+0xc8/0x118 [ 29.795396] kasan_check_range+0x100/0x1a8 [ 29.796016] __kasan_check_write+0x20/0x30 [ 29.796671] kasan_atomics_helper+0x1414/0x4858 [ 29.797352] kasan_atomics+0x198/0x2e8 [ 29.797992] kunit_try_run_case+0x14c/0x3d0 [ 29.798584] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.799251] kthread+0x24c/0x2d0 [ 29.799819] ret_from_fork+0x10/0x20 [ 29.800221] [ 29.800596] Allocated by task 253: [ 29.801113] kasan_save_stack+0x3c/0x68 [ 29.801630] kasan_save_track+0x20/0x40 [ 29.802227] kasan_save_alloc_info+0x40/0x58 [ 29.802885] __kasan_kmalloc+0xd4/0xd8 [ 29.803410] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.803974] kasan_atomics+0xb8/0x2e8 [ 29.804559] kunit_try_run_case+0x14c/0x3d0 [ 29.805148] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.805795] kthread+0x24c/0x2d0 [ 29.806338] ret_from_fork+0x10/0x20 [ 29.806890] [ 29.807203] The buggy address belongs to the object at fff00000c12e8780 [ 29.807203] which belongs to the cache kmalloc-64 of size 64 [ 29.808473] The buggy address is located 0 bytes to the right of [ 29.808473] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.809690] [ 29.810021] The buggy address belongs to the physical page: [ 29.810712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.811527] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.812358] page_type: f5(slab) [ 29.812910] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.813758] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.814583] page dumped because: kasan: bad access detected [ 29.815253] [ 29.815573] Memory state around the buggy address: [ 29.816161] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.816910] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.817749] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.818530] ^ [ 29.819183] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.819972] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.820818] ================================================================== [ 28.412064] ================================================================== [ 28.412945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x61c/0x4858 [ 28.413648] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.414323] [ 28.414549] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.415577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.416181] Hardware name: linux,dummy-virt (DT) [ 28.416729] Call trace: [ 28.417209] show_stack+0x20/0x38 (C) [ 28.417852] dump_stack_lvl+0x8c/0xd0 [ 28.418488] print_report+0x118/0x5e0 [ 28.419239] kasan_report+0xc8/0x118 [ 28.419811] kasan_check_range+0x100/0x1a8 [ 28.420532] __kasan_check_write+0x20/0x30 [ 28.421220] kasan_atomics_helper+0x61c/0x4858 [ 28.422003] kasan_atomics+0x198/0x2e8 [ 28.422658] kunit_try_run_case+0x14c/0x3d0 [ 28.423377] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.424167] kthread+0x24c/0x2d0 [ 28.424670] ret_from_fork+0x10/0x20 [ 28.425332] [ 28.425679] Allocated by task 253: [ 28.426171] kasan_save_stack+0x3c/0x68 [ 28.426754] kasan_save_track+0x20/0x40 [ 28.427275] kasan_save_alloc_info+0x40/0x58 [ 28.427798] __kasan_kmalloc+0xd4/0xd8 [ 28.428365] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.428898] kasan_atomics+0xb8/0x2e8 [ 28.429499] kunit_try_run_case+0x14c/0x3d0 [ 28.430095] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.430755] kthread+0x24c/0x2d0 [ 28.431272] ret_from_fork+0x10/0x20 [ 28.431834] [ 28.432125] The buggy address belongs to the object at fff00000c12e8780 [ 28.432125] which belongs to the cache kmalloc-64 of size 64 [ 28.433352] The buggy address is located 0 bytes to the right of [ 28.433352] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.434629] [ 28.434949] The buggy address belongs to the physical page: [ 28.435563] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.436489] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.437350] page_type: f5(slab) [ 28.437870] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.438762] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.439501] page dumped because: kasan: bad access detected [ 28.440219] [ 28.440559] Memory state around the buggy address: [ 28.441154] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.441969] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.442792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.443575] ^ [ 28.444187] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.444981] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.445793] ================================================================== [ 29.458906] ================================================================== [ 29.459747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 29.460434] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.461223] [ 29.461601] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.462677] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.463333] Hardware name: linux,dummy-virt (DT) [ 29.463859] Call trace: [ 29.464335] show_stack+0x20/0x38 (C) [ 29.464962] dump_stack_lvl+0x8c/0xd0 [ 29.465517] print_report+0x118/0x5e0 [ 29.466050] kasan_report+0xc8/0x118 [ 29.466646] kasan_check_range+0x100/0x1a8 [ 29.467217] __kasan_check_write+0x20/0x30 [ 29.467837] kasan_atomics_helper+0x1058/0x4858 [ 29.468495] kasan_atomics+0x198/0x2e8 [ 29.469111] kunit_try_run_case+0x14c/0x3d0 [ 29.469763] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.470472] kthread+0x24c/0x2d0 [ 29.471081] ret_from_fork+0x10/0x20 [ 29.471587] [ 29.471944] Allocated by task 253: [ 29.472416] kasan_save_stack+0x3c/0x68 [ 29.473081] kasan_save_track+0x20/0x40 [ 29.473614] kasan_save_alloc_info+0x40/0x58 [ 29.474184] __kasan_kmalloc+0xd4/0xd8 [ 29.474653] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.475323] kasan_atomics+0xb8/0x2e8 [ 29.475845] kunit_try_run_case+0x14c/0x3d0 [ 29.476367] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.477110] kthread+0x24c/0x2d0 [ 29.477594] ret_from_fork+0x10/0x20 [ 29.478125] [ 29.478445] The buggy address belongs to the object at fff00000c12e8780 [ 29.478445] which belongs to the cache kmalloc-64 of size 64 [ 29.479607] The buggy address is located 0 bytes to the right of [ 29.479607] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.480862] [ 29.481197] The buggy address belongs to the physical page: [ 29.481762] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.482658] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.483464] page_type: f5(slab) [ 29.483950] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.484871] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.485673] page dumped because: kasan: bad access detected [ 29.486318] [ 29.486668] Memory state around the buggy address: [ 29.487265] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.488041] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.488846] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.489691] ^ [ 29.490287] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.491085] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.491839] ================================================================== [ 30.032731] ================================================================== [ 30.033567] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 30.034560] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.035630] [ 30.035983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.037041] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.037529] Hardware name: linux,dummy-virt (DT) [ 30.038164] Call trace: [ 30.038590] show_stack+0x20/0x38 (C) [ 30.039245] dump_stack_lvl+0x8c/0xd0 [ 30.039839] print_report+0x118/0x5e0 [ 30.040430] kasan_report+0xc8/0x118 [ 30.040998] __asan_report_load8_noabort+0x20/0x30 [ 30.041675] kasan_atomics_helper+0x3df4/0x4858 [ 30.042292] kasan_atomics+0x198/0x2e8 [ 30.042883] kunit_try_run_case+0x14c/0x3d0 [ 30.043484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.044210] kthread+0x24c/0x2d0 [ 30.044819] ret_from_fork+0x10/0x20 [ 30.045402] [ 30.045739] Allocated by task 253: [ 30.046164] kasan_save_stack+0x3c/0x68 [ 30.046733] kasan_save_track+0x20/0x40 [ 30.047295] kasan_save_alloc_info+0x40/0x58 [ 30.047914] __kasan_kmalloc+0xd4/0xd8 [ 30.048494] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.049111] kasan_atomics+0xb8/0x2e8 [ 30.049680] kunit_try_run_case+0x14c/0x3d0 [ 30.050315] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.051031] kthread+0x24c/0x2d0 [ 30.051548] ret_from_fork+0x10/0x20 [ 30.052073] [ 30.052403] The buggy address belongs to the object at fff00000c12e8780 [ 30.052403] which belongs to the cache kmalloc-64 of size 64 [ 30.053610] The buggy address is located 0 bytes to the right of [ 30.053610] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.054919] [ 30.055284] The buggy address belongs to the physical page: [ 30.055879] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.056784] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.057491] page_type: f5(slab) [ 30.058024] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.058816] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.059736] page dumped because: kasan: bad access detected [ 30.060355] [ 30.060676] Memory state around the buggy address: [ 30.061267] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.062043] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.062826] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.063592] ^ [ 30.064189] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065016] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.065775] ================================================================== [ 28.885834] ================================================================== [ 28.886760] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 28.887740] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.888531] [ 28.888931] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.890212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.890443] Hardware name: linux,dummy-virt (DT) [ 28.890685] Call trace: [ 28.890883] show_stack+0x20/0x38 (C) [ 28.891131] dump_stack_lvl+0x8c/0xd0 [ 28.891372] print_report+0x118/0x5e0 [ 28.891611] kasan_report+0xc8/0x118 [ 28.892591] kasan_check_range+0x100/0x1a8 [ 28.893548] __kasan_check_write+0x20/0x30 [ 28.894383] kasan_atomics_helper+0xb70/0x4858 [ 28.895173] kasan_atomics+0x198/0x2e8 [ 28.895667] kunit_try_run_case+0x14c/0x3d0 [ 28.896384] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.897158] kthread+0x24c/0x2d0 [ 28.897802] ret_from_fork+0x10/0x20 [ 28.898400] [ 28.898839] Allocated by task 253: [ 28.899511] kasan_save_stack+0x3c/0x68 [ 28.900087] kasan_save_track+0x20/0x40 [ 28.900717] kasan_save_alloc_info+0x40/0x58 [ 28.901367] __kasan_kmalloc+0xd4/0xd8 [ 28.901972] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.902651] kasan_atomics+0xb8/0x2e8 [ 28.903289] kunit_try_run_case+0x14c/0x3d0 [ 28.903955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.904724] kthread+0x24c/0x2d0 [ 28.905257] ret_from_fork+0x10/0x20 [ 28.905827] [ 28.906204] The buggy address belongs to the object at fff00000c12e8780 [ 28.906204] which belongs to the cache kmalloc-64 of size 64 [ 28.907494] The buggy address is located 0 bytes to the right of [ 28.907494] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.908793] [ 28.909199] The buggy address belongs to the physical page: [ 28.909880] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.910878] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.911617] page_type: f5(slab) [ 28.912098] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.913014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.913888] page dumped because: kasan: bad access detected [ 28.914558] [ 28.914887] Memory state around the buggy address: [ 28.915534] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.916355] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.917262] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.918061] ^ [ 28.918715] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.919589] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.920402] ================================================================== [ 28.482601] ================================================================== [ 28.483330] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6ec/0x4858 [ 28.485621] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.486842] [ 28.487266] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.488526] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.489048] Hardware name: linux,dummy-virt (DT) [ 28.489590] Call trace: [ 28.489997] show_stack+0x20/0x38 (C) [ 28.490871] dump_stack_lvl+0x8c/0xd0 [ 28.491448] print_report+0x118/0x5e0 [ 28.492149] kasan_report+0xc8/0x118 [ 28.492657] kasan_check_range+0x100/0x1a8 [ 28.493208] __kasan_check_write+0x20/0x30 [ 28.493795] kasan_atomics_helper+0x6ec/0x4858 [ 28.494448] kasan_atomics+0x198/0x2e8 [ 28.495089] kunit_try_run_case+0x14c/0x3d0 [ 28.495773] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.496636] kthread+0x24c/0x2d0 [ 28.497157] ret_from_fork+0x10/0x20 [ 28.497918] [ 28.498218] Allocated by task 253: [ 28.498675] kasan_save_stack+0x3c/0x68 [ 28.499237] kasan_save_track+0x20/0x40 [ 28.500022] kasan_save_alloc_info+0x40/0x58 [ 28.500657] __kasan_kmalloc+0xd4/0xd8 [ 28.501445] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.502088] kasan_atomics+0xb8/0x2e8 [ 28.502789] kunit_try_run_case+0x14c/0x3d0 [ 28.503494] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.504279] kthread+0x24c/0x2d0 [ 28.504810] ret_from_fork+0x10/0x20 [ 28.505309] [ 28.505645] The buggy address belongs to the object at fff00000c12e8780 [ 28.505645] which belongs to the cache kmalloc-64 of size 64 [ 28.506875] The buggy address is located 0 bytes to the right of [ 28.506875] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.508062] [ 28.508406] The buggy address belongs to the physical page: [ 28.509087] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.509913] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.510761] page_type: f5(slab) [ 28.511285] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.512159] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.513033] page dumped because: kasan: bad access detected [ 28.513695] [ 28.514038] Memory state around the buggy address: [ 28.514652] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.515426] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.516171] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.516963] ^ [ 28.517583] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.518431] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.519213] ================================================================== [ 29.751563] ================================================================== [ 29.752261] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 29.753041] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.753967] [ 29.754303] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.755352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.756095] Hardware name: linux,dummy-virt (DT) [ 29.756736] Call trace: [ 29.757220] show_stack+0x20/0x38 (C) [ 29.757799] dump_stack_lvl+0x8c/0xd0 [ 29.758299] print_report+0x118/0x5e0 [ 29.758890] kasan_report+0xc8/0x118 [ 29.759536] __asan_report_load8_noabort+0x20/0x30 [ 29.760177] kasan_atomics_helper+0x3f04/0x4858 [ 29.760876] kasan_atomics+0x198/0x2e8 [ 29.761352] kunit_try_run_case+0x14c/0x3d0 [ 29.762054] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.762724] kthread+0x24c/0x2d0 [ 29.763307] ret_from_fork+0x10/0x20 [ 29.763892] [ 29.764205] Allocated by task 253: [ 29.764715] kasan_save_stack+0x3c/0x68 [ 29.765345] kasan_save_track+0x20/0x40 [ 29.765962] kasan_save_alloc_info+0x40/0x58 [ 29.766600] __kasan_kmalloc+0xd4/0xd8 [ 29.767159] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.767729] kasan_atomics+0xb8/0x2e8 [ 29.768327] kunit_try_run_case+0x14c/0x3d0 [ 29.769014] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.769671] kthread+0x24c/0x2d0 [ 29.770217] ret_from_fork+0x10/0x20 [ 29.770751] [ 29.771047] The buggy address belongs to the object at fff00000c12e8780 [ 29.771047] which belongs to the cache kmalloc-64 of size 64 [ 29.772293] The buggy address is located 0 bytes to the right of [ 29.772293] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.773615] [ 29.773954] The buggy address belongs to the physical page: [ 29.774661] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.775557] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.776361] page_type: f5(slab) [ 29.776861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.777626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.778469] page dumped because: kasan: bad access detected [ 29.779157] [ 29.779469] Memory state around the buggy address: [ 29.780029] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.780814] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.781610] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.782415] ^ [ 29.783014] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.783764] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.784567] ================================================================== [ 28.636962] ================================================================== [ 28.637733] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 28.638553] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.639938] [ 28.640359] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.641564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.642147] Hardware name: linux,dummy-virt (DT) [ 28.642754] Call trace: [ 28.643198] show_stack+0x20/0x38 (C) [ 28.643850] dump_stack_lvl+0x8c/0xd0 [ 28.644485] print_report+0x118/0x5e0 [ 28.645144] kasan_report+0xc8/0x118 [ 28.645750] __asan_report_load4_noabort+0x20/0x30 [ 28.646450] kasan_atomics_helper+0x42d8/0x4858 [ 28.647107] kasan_atomics+0x198/0x2e8 [ 28.647660] kunit_try_run_case+0x14c/0x3d0 [ 28.648291] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.649010] kthread+0x24c/0x2d0 [ 28.649532] ret_from_fork+0x10/0x20 [ 28.650105] [ 28.650450] Allocated by task 253: [ 28.650984] kasan_save_stack+0x3c/0x68 [ 28.651560] kasan_save_track+0x20/0x40 [ 28.652088] kasan_save_alloc_info+0x40/0x58 [ 28.652761] __kasan_kmalloc+0xd4/0xd8 [ 28.653240] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.653933] kasan_atomics+0xb8/0x2e8 [ 28.654428] kunit_try_run_case+0x14c/0x3d0 [ 28.655072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.655767] kthread+0x24c/0x2d0 [ 28.656314] ret_from_fork+0x10/0x20 [ 28.656836] [ 28.657171] The buggy address belongs to the object at fff00000c12e8780 [ 28.657171] which belongs to the cache kmalloc-64 of size 64 [ 28.658332] The buggy address is located 0 bytes to the right of [ 28.658332] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.659458] [ 28.659818] The buggy address belongs to the physical page: [ 28.660548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.661346] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.662135] page_type: f5(slab) [ 28.662647] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.663584] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.664427] page dumped because: kasan: bad access detected [ 28.665117] [ 28.665406] Memory state around the buggy address: [ 28.666030] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.666880] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.667653] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.668411] ^ [ 28.669015] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.669803] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.670534] ================================================================== [ 29.211255] ================================================================== [ 29.212007] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 29.212881] Read of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.213593] [ 29.213983] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.215081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.215736] Hardware name: linux,dummy-virt (DT) [ 29.216229] Call trace: [ 29.216717] show_stack+0x20/0x38 (C) [ 29.217317] dump_stack_lvl+0x8c/0xd0 [ 29.217864] print_report+0x118/0x5e0 [ 29.218542] kasan_report+0xc8/0x118 [ 29.219103] __asan_report_load8_noabort+0x20/0x30 [ 29.219784] kasan_atomics_helper+0x3f58/0x4858 [ 29.220406] kasan_atomics+0x198/0x2e8 [ 29.220960] kunit_try_run_case+0x14c/0x3d0 [ 29.221555] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.222318] kthread+0x24c/0x2d0 [ 29.222795] ret_from_fork+0x10/0x20 [ 29.223441] [ 29.223800] Allocated by task 253: [ 29.224312] kasan_save_stack+0x3c/0x68 [ 29.224965] kasan_save_track+0x20/0x40 [ 29.225550] kasan_save_alloc_info+0x40/0x58 [ 29.226163] __kasan_kmalloc+0xd4/0xd8 [ 29.226750] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.227378] kasan_atomics+0xb8/0x2e8 [ 29.227966] kunit_try_run_case+0x14c/0x3d0 [ 29.228556] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.229263] kthread+0x24c/0x2d0 [ 29.229801] ret_from_fork+0x10/0x20 [ 29.230344] [ 29.230653] The buggy address belongs to the object at fff00000c12e8780 [ 29.230653] which belongs to the cache kmalloc-64 of size 64 [ 29.231861] The buggy address is located 0 bytes to the right of [ 29.231861] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.233199] [ 29.233528] The buggy address belongs to the physical page: [ 29.234209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.235098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.235824] page_type: f5(slab) [ 29.236380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.237263] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.238111] page dumped because: kasan: bad access detected [ 29.238679] [ 29.239078] Memory state around the buggy address: [ 29.239639] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.240504] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.241301] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.242140] ^ [ 29.242694] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.243536] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.244314] ================================================================== [ 28.375184] ================================================================== [ 28.376300] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5b4/0x4858 [ 28.378123] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.379449] [ 28.380113] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.381017] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.381500] Hardware name: linux,dummy-virt (DT) [ 28.382206] Call trace: [ 28.382563] show_stack+0x20/0x38 (C) [ 28.383193] dump_stack_lvl+0x8c/0xd0 [ 28.383826] print_report+0x118/0x5e0 [ 28.384502] kasan_report+0xc8/0x118 [ 28.385215] kasan_check_range+0x100/0x1a8 [ 28.385898] __kasan_check_write+0x20/0x30 [ 28.386322] kasan_atomics_helper+0x5b4/0x4858 [ 28.387012] kasan_atomics+0x198/0x2e8 [ 28.387512] kunit_try_run_case+0x14c/0x3d0 [ 28.388202] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.388892] kthread+0x24c/0x2d0 [ 28.389443] ret_from_fork+0x10/0x20 [ 28.389982] [ 28.390313] Allocated by task 253: [ 28.390833] kasan_save_stack+0x3c/0x68 [ 28.391379] kasan_save_track+0x20/0x40 [ 28.391863] kasan_save_alloc_info+0x40/0x58 [ 28.392469] __kasan_kmalloc+0xd4/0xd8 [ 28.392974] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.393640] kasan_atomics+0xb8/0x2e8 [ 28.394158] kunit_try_run_case+0x14c/0x3d0 [ 28.394678] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.395438] kthread+0x24c/0x2d0 [ 28.395890] ret_from_fork+0x10/0x20 [ 28.396502] [ 28.396856] The buggy address belongs to the object at fff00000c12e8780 [ 28.396856] which belongs to the cache kmalloc-64 of size 64 [ 28.398003] The buggy address is located 0 bytes to the right of [ 28.398003] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.399293] [ 28.399624] The buggy address belongs to the physical page: [ 28.400301] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.401211] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.401929] page_type: f5(slab) [ 28.402463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.403302] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.404144] page dumped because: kasan: bad access detected [ 28.404845] [ 28.405413] Memory state around the buggy address: [ 28.406051] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.406844] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.407552] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.408443] ^ [ 28.409039] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.409897] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.410683] ================================================================== [ 29.892032] ================================================================== [ 29.892684] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 29.893485] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.894488] [ 29.895184] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.896316] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.896849] Hardware name: linux,dummy-virt (DT) [ 29.897359] Call trace: [ 29.897813] show_stack+0x20/0x38 (C) [ 29.898406] dump_stack_lvl+0x8c/0xd0 [ 29.899089] print_report+0x118/0x5e0 [ 29.899656] kasan_report+0xc8/0x118 [ 29.900209] kasan_check_range+0x100/0x1a8 [ 29.900939] __kasan_check_write+0x20/0x30 [ 29.901513] kasan_atomics_helper+0x154c/0x4858 [ 29.902129] kasan_atomics+0x198/0x2e8 [ 29.902678] kunit_try_run_case+0x14c/0x3d0 [ 29.903290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.904048] kthread+0x24c/0x2d0 [ 29.904593] ret_from_fork+0x10/0x20 [ 29.905177] [ 29.905475] Allocated by task 253: [ 29.905931] kasan_save_stack+0x3c/0x68 [ 29.906517] kasan_save_track+0x20/0x40 [ 29.907002] kasan_save_alloc_info+0x40/0x58 [ 29.907641] __kasan_kmalloc+0xd4/0xd8 [ 29.908311] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.908896] kasan_atomics+0xb8/0x2e8 [ 29.909472] kunit_try_run_case+0x14c/0x3d0 [ 29.910040] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.910793] kthread+0x24c/0x2d0 [ 29.911300] ret_from_fork+0x10/0x20 [ 29.911850] [ 29.912192] The buggy address belongs to the object at fff00000c12e8780 [ 29.912192] which belongs to the cache kmalloc-64 of size 64 [ 29.913386] The buggy address is located 0 bytes to the right of [ 29.913386] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.914687] [ 29.915054] The buggy address belongs to the physical page: [ 29.915673] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.916531] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.917290] page_type: f5(slab) [ 29.917807] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.918621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.919476] page dumped because: kasan: bad access detected [ 29.920126] [ 29.920443] Memory state around the buggy address: [ 29.921097] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.921873] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.922638] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.923410] ^ [ 29.924018] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.924818] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.925626] ================================================================== [ 29.680688] ================================================================== [ 29.681581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 29.682607] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.683903] [ 29.684169] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.685289] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.685837] Hardware name: linux,dummy-virt (DT) [ 29.686437] Call trace: [ 29.686823] show_stack+0x20/0x38 (C) [ 29.687420] dump_stack_lvl+0x8c/0xd0 [ 29.687975] print_report+0x118/0x5e0 [ 29.688519] kasan_report+0xc8/0x118 [ 29.689113] kasan_check_range+0x100/0x1a8 [ 29.689715] __kasan_check_write+0x20/0x30 [ 29.690294] kasan_atomics_helper+0x12d8/0x4858 [ 29.690939] kasan_atomics+0x198/0x2e8 [ 29.691491] kunit_try_run_case+0x14c/0x3d0 [ 29.692083] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.692810] kthread+0x24c/0x2d0 [ 29.693333] ret_from_fork+0x10/0x20 [ 29.693889] [ 29.694235] Allocated by task 253: [ 29.694743] kasan_save_stack+0x3c/0x68 [ 29.695286] kasan_save_track+0x20/0x40 [ 29.695758] kasan_save_alloc_info+0x40/0x58 [ 29.696437] __kasan_kmalloc+0xd4/0xd8 [ 29.696966] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.697575] kasan_atomics+0xb8/0x2e8 [ 29.698131] kunit_try_run_case+0x14c/0x3d0 [ 29.698760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.699411] kthread+0x24c/0x2d0 [ 29.699909] ret_from_fork+0x10/0x20 [ 29.700488] [ 29.700823] The buggy address belongs to the object at fff00000c12e8780 [ 29.700823] which belongs to the cache kmalloc-64 of size 64 [ 29.702105] The buggy address is located 0 bytes to the right of [ 29.702105] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.703306] [ 29.703658] The buggy address belongs to the physical page: [ 29.704246] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.705151] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.705888] page_type: f5(slab) [ 29.706393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.707243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.708035] page dumped because: kasan: bad access detected [ 29.708670] [ 29.709038] Memory state around the buggy address: [ 29.709641] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.710420] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.711206] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.711960] ^ [ 29.712624] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.713502] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.714249] ================================================================== [ 28.265725] ================================================================== [ 28.266381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x47c/0x4858 [ 28.267259] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.268119] [ 28.268517] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.269820] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.270253] Hardware name: linux,dummy-virt (DT) [ 28.271165] Call trace: [ 28.271611] show_stack+0x20/0x38 (C) [ 28.272444] dump_stack_lvl+0x8c/0xd0 [ 28.273547] print_report+0x118/0x5e0 [ 28.274188] kasan_report+0xc8/0x118 [ 28.274741] kasan_check_range+0x100/0x1a8 [ 28.275360] __kasan_check_write+0x20/0x30 [ 28.275995] kasan_atomics_helper+0x47c/0x4858 [ 28.276682] kasan_atomics+0x198/0x2e8 [ 28.277263] kunit_try_run_case+0x14c/0x3d0 [ 28.277898] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.278570] kthread+0x24c/0x2d0 [ 28.279142] ret_from_fork+0x10/0x20 [ 28.279730] [ 28.280125] Allocated by task 253: [ 28.280684] kasan_save_stack+0x3c/0x68 [ 28.281236] kasan_save_track+0x20/0x40 [ 28.281945] kasan_save_alloc_info+0x40/0x58 [ 28.282577] __kasan_kmalloc+0xd4/0xd8 [ 28.283174] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.283775] kasan_atomics+0xb8/0x2e8 [ 28.284376] kunit_try_run_case+0x14c/0x3d0 [ 28.285211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.285944] kthread+0x24c/0x2d0 [ 28.286463] ret_from_fork+0x10/0x20 [ 28.287040] [ 28.287388] The buggy address belongs to the object at fff00000c12e8780 [ 28.287388] which belongs to the cache kmalloc-64 of size 64 [ 28.288717] The buggy address is located 0 bytes to the right of [ 28.288717] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.290051] [ 28.290497] The buggy address belongs to the physical page: [ 28.291169] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.292055] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.292929] page_type: f5(slab) [ 28.293477] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.294400] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.295232] page dumped because: kasan: bad access detected [ 28.295964] [ 28.296349] Memory state around the buggy address: [ 28.297006] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.297937] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.298712] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.299597] ^ [ 28.300209] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.301150] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.301879] ================================================================== [ 28.087296] ================================================================== [ 28.088690] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x4858 [ 28.089716] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.091043] [ 28.091529] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.092631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.093290] Hardware name: linux,dummy-virt (DT) [ 28.093844] Call trace: [ 28.094194] show_stack+0x20/0x38 (C) [ 28.094679] dump_stack_lvl+0x8c/0xd0 [ 28.095576] print_report+0x118/0x5e0 [ 28.096277] kasan_report+0xc8/0x118 [ 28.096935] __asan_report_load4_noabort+0x20/0x30 [ 28.097669] kasan_atomics_helper+0x40fc/0x4858 [ 28.098434] kasan_atomics+0x198/0x2e8 [ 28.099102] kunit_try_run_case+0x14c/0x3d0 [ 28.099646] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.100521] kthread+0x24c/0x2d0 [ 28.101198] ret_from_fork+0x10/0x20 [ 28.101898] [ 28.102361] Allocated by task 253: [ 28.103008] kasan_save_stack+0x3c/0x68 [ 28.103634] kasan_save_track+0x20/0x40 [ 28.104299] kasan_save_alloc_info+0x40/0x58 [ 28.104844] __kasan_kmalloc+0xd4/0xd8 [ 28.105324] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.106154] kasan_atomics+0xb8/0x2e8 [ 28.106757] kunit_try_run_case+0x14c/0x3d0 [ 28.107390] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.108155] kthread+0x24c/0x2d0 [ 28.108676] ret_from_fork+0x10/0x20 [ 28.109219] [ 28.109520] The buggy address belongs to the object at fff00000c12e8780 [ 28.109520] which belongs to the cache kmalloc-64 of size 64 [ 28.110759] The buggy address is located 0 bytes to the right of [ 28.110759] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.112023] [ 28.112337] The buggy address belongs to the physical page: [ 28.112971] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.113860] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.114592] page_type: f5(slab) [ 28.115069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.115949] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.116762] page dumped because: kasan: bad access detected [ 28.117396] [ 28.117744] Memory state around the buggy address: [ 28.118300] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.119057] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.119792] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.120600] ^ [ 28.121229] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.122046] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.122817] ================================================================== [ 29.033719] ================================================================== [ 29.034396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 29.035633] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.037412] [ 29.037731] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.039135] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.039632] Hardware name: linux,dummy-virt (DT) [ 29.040203] Call trace: [ 29.040625] show_stack+0x20/0x38 (C) [ 29.041226] dump_stack_lvl+0x8c/0xd0 [ 29.041792] print_report+0x118/0x5e0 [ 29.042344] kasan_report+0xc8/0x118 [ 29.042862] kasan_check_range+0x100/0x1a8 [ 29.043512] __kasan_check_write+0x20/0x30 [ 29.044109] kasan_atomics_helper+0xca0/0x4858 [ 29.044980] kasan_atomics+0x198/0x2e8 [ 29.045618] kunit_try_run_case+0x14c/0x3d0 [ 29.046197] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.047035] kthread+0x24c/0x2d0 [ 29.047605] ret_from_fork+0x10/0x20 [ 29.048157] [ 29.048486] Allocated by task 253: [ 29.049317] kasan_save_stack+0x3c/0x68 [ 29.050088] kasan_save_track+0x20/0x40 [ 29.050713] kasan_save_alloc_info+0x40/0x58 [ 29.051549] __kasan_kmalloc+0xd4/0xd8 [ 29.052055] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.052560] kasan_atomics+0xb8/0x2e8 [ 29.053189] kunit_try_run_case+0x14c/0x3d0 [ 29.053795] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.054551] kthread+0x24c/0x2d0 [ 29.055052] ret_from_fork+0x10/0x20 [ 29.055555] [ 29.055871] The buggy address belongs to the object at fff00000c12e8780 [ 29.055871] which belongs to the cache kmalloc-64 of size 64 [ 29.057893] The buggy address is located 0 bytes to the right of [ 29.057893] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.059080] [ 29.059413] The buggy address belongs to the physical page: [ 29.060123] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.060985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.061689] page_type: f5(slab) [ 29.062219] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.063118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.063894] page dumped because: kasan: bad access detected [ 29.064532] [ 29.064867] Memory state around the buggy address: [ 29.065443] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066261] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.066991] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.067809] ^ [ 29.068418] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.069248] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.070052] ================================================================== [ 28.741967] ================================================================== [ 28.743319] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 28.744311] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.745342] [ 28.745692] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.747004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.747563] Hardware name: linux,dummy-virt (DT) [ 28.748320] Call trace: [ 28.748813] show_stack+0x20/0x38 (C) [ 28.749488] dump_stack_lvl+0x8c/0xd0 [ 28.750104] print_report+0x118/0x5e0 [ 28.750677] kasan_report+0xc8/0x118 [ 28.751393] kasan_check_range+0x100/0x1a8 [ 28.752046] __kasan_check_write+0x20/0x30 [ 28.752693] kasan_atomics_helper+0xa04/0x4858 [ 28.753339] kasan_atomics+0x198/0x2e8 [ 28.754008] kunit_try_run_case+0x14c/0x3d0 [ 28.754659] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.755416] kthread+0x24c/0x2d0 [ 28.755965] ret_from_fork+0x10/0x20 [ 28.756550] [ 28.756919] Allocated by task 253: [ 28.757432] kasan_save_stack+0x3c/0x68 [ 28.757987] kasan_save_track+0x20/0x40 [ 28.758601] kasan_save_alloc_info+0x40/0x58 [ 28.759123] __kasan_kmalloc+0xd4/0xd8 [ 28.759674] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.760320] kasan_atomics+0xb8/0x2e8 [ 28.760922] kunit_try_run_case+0x14c/0x3d0 [ 28.761496] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.762149] kthread+0x24c/0x2d0 [ 28.762717] ret_from_fork+0x10/0x20 [ 28.763218] [ 28.763544] The buggy address belongs to the object at fff00000c12e8780 [ 28.763544] which belongs to the cache kmalloc-64 of size 64 [ 28.764681] The buggy address is located 0 bytes to the right of [ 28.764681] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.766035] [ 28.766344] The buggy address belongs to the physical page: [ 28.767032] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.767950] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.768755] page_type: f5(slab) [ 28.769269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.770063] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.770981] page dumped because: kasan: bad access detected [ 28.771530] [ 28.771873] Memory state around the buggy address: [ 28.772468] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.773338] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.774164] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.774948] ^ [ 28.775561] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.776333] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.777165] ================================================================== [ 28.447081] ================================================================== [ 28.447864] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x684/0x4858 [ 28.448911] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.449754] [ 28.450182] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.451341] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.451968] Hardware name: linux,dummy-virt (DT) [ 28.452640] Call trace: [ 28.453061] show_stack+0x20/0x38 (C) [ 28.453685] dump_stack_lvl+0x8c/0xd0 [ 28.454334] print_report+0x118/0x5e0 [ 28.454969] kasan_report+0xc8/0x118 [ 28.455593] kasan_check_range+0x100/0x1a8 [ 28.456211] __kasan_check_write+0x20/0x30 [ 28.456770] kasan_atomics_helper+0x684/0x4858 [ 28.457408] kasan_atomics+0x198/0x2e8 [ 28.458035] kunit_try_run_case+0x14c/0x3d0 [ 28.458677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.459377] kthread+0x24c/0x2d0 [ 28.459936] ret_from_fork+0x10/0x20 [ 28.460511] [ 28.460844] Allocated by task 253: [ 28.461370] kasan_save_stack+0x3c/0x68 [ 28.461966] kasan_save_track+0x20/0x40 [ 28.462460] kasan_save_alloc_info+0x40/0x58 [ 28.463025] __kasan_kmalloc+0xd4/0xd8 [ 28.463611] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.464232] kasan_atomics+0xb8/0x2e8 [ 28.464768] kunit_try_run_case+0x14c/0x3d0 [ 28.465332] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.466067] kthread+0x24c/0x2d0 [ 28.466560] ret_from_fork+0x10/0x20 [ 28.467068] [ 28.467382] The buggy address belongs to the object at fff00000c12e8780 [ 28.467382] which belongs to the cache kmalloc-64 of size 64 [ 28.468556] The buggy address is located 0 bytes to the right of [ 28.468556] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.469851] [ 28.470153] The buggy address belongs to the physical page: [ 28.470812] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.471666] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.472538] page_type: f5(slab) [ 28.473023] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.473911] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.474692] page dumped because: kasan: bad access detected [ 28.475327] [ 28.475680] Memory state around the buggy address: [ 28.476278] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.477011] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.477900] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.478735] ^ [ 28.479304] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.480147] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.480946] ================================================================== [ 29.927042] ================================================================== [ 29.927849] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 29.928901] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.929791] [ 29.930168] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.931458] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.932077] Hardware name: linux,dummy-virt (DT) [ 29.932736] Call trace: [ 29.933187] show_stack+0x20/0x38 (C) [ 29.933870] dump_stack_lvl+0x8c/0xd0 [ 29.934491] print_report+0x118/0x5e0 [ 29.935048] kasan_report+0xc8/0x118 [ 29.935724] kasan_check_range+0x100/0x1a8 [ 29.936325] __kasan_check_write+0x20/0x30 [ 29.937078] kasan_atomics_helper+0x15b4/0x4858 [ 29.937674] kasan_atomics+0x198/0x2e8 [ 29.938261] kunit_try_run_case+0x14c/0x3d0 [ 29.938843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.939649] kthread+0x24c/0x2d0 [ 29.940165] ret_from_fork+0x10/0x20 [ 29.940762] [ 29.941097] Allocated by task 253: [ 29.941535] kasan_save_stack+0x3c/0x68 [ 29.942148] kasan_save_track+0x20/0x40 [ 29.942726] kasan_save_alloc_info+0x40/0x58 [ 29.943294] __kasan_kmalloc+0xd4/0xd8 [ 29.943772] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.944490] kasan_atomics+0xb8/0x2e8 [ 29.945010] kunit_try_run_case+0x14c/0x3d0 [ 29.945664] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.946326] kthread+0x24c/0x2d0 [ 29.946865] ret_from_fork+0x10/0x20 [ 29.947371] [ 29.947684] The buggy address belongs to the object at fff00000c12e8780 [ 29.947684] which belongs to the cache kmalloc-64 of size 64 [ 29.948865] The buggy address is located 0 bytes to the right of [ 29.948865] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.950111] [ 29.950412] The buggy address belongs to the physical page: [ 29.950999] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.951928] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.952563] page_type: f5(slab) [ 29.952999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.953872] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.954651] page dumped because: kasan: bad access detected [ 29.955284] [ 29.955506] Memory state around the buggy address: [ 29.955979] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.956629] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.957789] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.958542] ^ [ 29.959040] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.959916] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.960678] ================================================================== [ 28.597228] ================================================================== [ 28.597984] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x894/0x4858 [ 28.599287] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.600524] [ 28.601085] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.602249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.602733] Hardware name: linux,dummy-virt (DT) [ 28.603686] Call trace: [ 28.604306] show_stack+0x20/0x38 (C) [ 28.604926] dump_stack_lvl+0x8c/0xd0 [ 28.605600] print_report+0x118/0x5e0 [ 28.606273] kasan_report+0xc8/0x118 [ 28.606925] kasan_check_range+0x100/0x1a8 [ 28.607617] __kasan_check_write+0x20/0x30 [ 28.608306] kasan_atomics_helper+0x894/0x4858 [ 28.609088] kasan_atomics+0x198/0x2e8 [ 28.609758] kunit_try_run_case+0x14c/0x3d0 [ 28.610430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.611241] kthread+0x24c/0x2d0 [ 28.611859] ret_from_fork+0x10/0x20 [ 28.612507] [ 28.612923] Allocated by task 253: [ 28.613481] kasan_save_stack+0x3c/0x68 [ 28.613993] kasan_save_track+0x20/0x40 [ 28.614480] kasan_save_alloc_info+0x40/0x58 [ 28.615085] __kasan_kmalloc+0xd4/0xd8 [ 28.615756] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.616394] kasan_atomics+0xb8/0x2e8 [ 28.617006] kunit_try_run_case+0x14c/0x3d0 [ 28.617645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.618403] kthread+0x24c/0x2d0 [ 28.618902] ret_from_fork+0x10/0x20 [ 28.619393] [ 28.619689] The buggy address belongs to the object at fff00000c12e8780 [ 28.619689] which belongs to the cache kmalloc-64 of size 64 [ 28.621221] The buggy address is located 0 bytes to the right of [ 28.621221] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.622403] [ 28.622689] The buggy address belongs to the physical page: [ 28.623801] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.624826] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.625733] page_type: f5(slab) [ 28.626381] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.627376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.628346] page dumped because: kasan: bad access detected [ 28.629140] [ 28.629610] Memory state around the buggy address: [ 28.630267] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.631215] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.632083] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.632979] ^ [ 28.633644] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.634514] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.635343] ================================================================== [ 28.922647] ================================================================== [ 28.923674] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dbc/0x4858 [ 28.924420] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.925334] [ 28.925873] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.927109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.927680] Hardware name: linux,dummy-virt (DT) [ 28.928415] Call trace: [ 28.928914] show_stack+0x20/0x38 (C) [ 28.929541] dump_stack_lvl+0x8c/0xd0 [ 28.930237] print_report+0x118/0x5e0 [ 28.930891] kasan_report+0xc8/0x118 [ 28.931509] __asan_report_load4_noabort+0x20/0x30 [ 28.932274] kasan_atomics_helper+0x3dbc/0x4858 [ 28.932988] kasan_atomics+0x198/0x2e8 [ 28.933610] kunit_try_run_case+0x14c/0x3d0 [ 28.934290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.935039] kthread+0x24c/0x2d0 [ 28.935598] ret_from_fork+0x10/0x20 [ 28.936200] [ 28.936529] Allocated by task 253: [ 28.937045] kasan_save_stack+0x3c/0x68 [ 28.937687] kasan_save_track+0x20/0x40 [ 28.938323] kasan_save_alloc_info+0x40/0x58 [ 28.938965] __kasan_kmalloc+0xd4/0xd8 [ 28.939554] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.940195] kasan_atomics+0xb8/0x2e8 [ 28.940779] kunit_try_run_case+0x14c/0x3d0 [ 28.941421] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.942144] kthread+0x24c/0x2d0 [ 28.942746] ret_from_fork+0x10/0x20 [ 28.943308] [ 28.943647] The buggy address belongs to the object at fff00000c12e8780 [ 28.943647] which belongs to the cache kmalloc-64 of size 64 [ 28.945010] The buggy address is located 0 bytes to the right of [ 28.945010] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.946367] [ 28.946754] The buggy address belongs to the physical page: [ 28.947438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.948384] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.949173] page_type: f5(slab) [ 28.949678] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.950608] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.951475] page dumped because: kasan: bad access detected [ 28.952120] [ 28.952413] Memory state around the buggy address: [ 28.953081] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.954127] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.954952] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.955759] ^ [ 28.956338] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.957174] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.957981] ================================================================== [ 28.303561] ================================================================== [ 28.304400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4e4/0x4858 [ 28.305157] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.306782] [ 28.307230] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.308353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.308914] Hardware name: linux,dummy-virt (DT) [ 28.309493] Call trace: [ 28.309909] show_stack+0x20/0x38 (C) [ 28.310548] dump_stack_lvl+0x8c/0xd0 [ 28.311138] print_report+0x118/0x5e0 [ 28.311827] kasan_report+0xc8/0x118 [ 28.312429] kasan_check_range+0x100/0x1a8 [ 28.313063] __kasan_check_write+0x20/0x30 [ 28.313759] kasan_atomics_helper+0x4e4/0x4858 [ 28.314408] kasan_atomics+0x198/0x2e8 [ 28.315120] kunit_try_run_case+0x14c/0x3d0 [ 28.315760] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.316540] kthread+0x24c/0x2d0 [ 28.317152] ret_from_fork+0x10/0x20 [ 28.317771] [ 28.318123] Allocated by task 253: [ 28.318620] kasan_save_stack+0x3c/0x68 [ 28.319213] kasan_save_track+0x20/0x40 [ 28.319817] kasan_save_alloc_info+0x40/0x58 [ 28.320487] __kasan_kmalloc+0xd4/0xd8 [ 28.321072] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.321772] kasan_atomics+0xb8/0x2e8 [ 28.322338] kunit_try_run_case+0x14c/0x3d0 [ 28.322937] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.323694] kthread+0x24c/0x2d0 [ 28.324196] ret_from_fork+0x10/0x20 [ 28.324826] [ 28.325168] The buggy address belongs to the object at fff00000c12e8780 [ 28.325168] which belongs to the cache kmalloc-64 of size 64 [ 28.326440] The buggy address is located 0 bytes to the right of [ 28.326440] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.327834] [ 28.328304] The buggy address belongs to the physical page: [ 28.328998] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.329695] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.330484] page_type: f5(slab) [ 28.331027] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.331869] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.332727] page dumped because: kasan: bad access detected [ 28.333376] [ 28.333680] Memory state around the buggy address: [ 28.334273] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.335018] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.335847] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.336587] ^ [ 28.337229] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.337970] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.338837] ================================================================== [ 28.007845] ================================================================== [ 28.008670] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x24c/0x4858 [ 28.009341] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.010117] [ 28.010479] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.011729] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.012690] Hardware name: linux,dummy-virt (DT) [ 28.013411] Call trace: [ 28.013946] show_stack+0x20/0x38 (C) [ 28.014458] dump_stack_lvl+0x8c/0xd0 [ 28.015034] print_report+0x118/0x5e0 [ 28.015675] kasan_report+0xc8/0x118 [ 28.016221] kasan_check_range+0x100/0x1a8 [ 28.016807] __kasan_check_write+0x20/0x30 [ 28.017401] kasan_atomics_helper+0x24c/0x4858 [ 28.018077] kasan_atomics+0x198/0x2e8 [ 28.018616] kunit_try_run_case+0x14c/0x3d0 [ 28.019484] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.020212] kthread+0x24c/0x2d0 [ 28.020720] ret_from_fork+0x10/0x20 [ 28.021341] [ 28.021664] Allocated by task 253: [ 28.022150] kasan_save_stack+0x3c/0x68 [ 28.022778] kasan_save_track+0x20/0x40 [ 28.023403] kasan_save_alloc_info+0x40/0x58 [ 28.024014] __kasan_kmalloc+0xd4/0xd8 [ 28.024542] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.025126] kasan_atomics+0xb8/0x2e8 [ 28.025692] kunit_try_run_case+0x14c/0x3d0 [ 28.026204] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.026989] kthread+0x24c/0x2d0 [ 28.027553] ret_from_fork+0x10/0x20 [ 28.028122] [ 28.028449] The buggy address belongs to the object at fff00000c12e8780 [ 28.028449] which belongs to the cache kmalloc-64 of size 64 [ 28.030849] The buggy address is located 0 bytes to the right of [ 28.030849] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.032252] [ 28.032562] The buggy address belongs to the physical page: [ 28.033215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.034451] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.035475] page_type: f5(slab) [ 28.035926] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.036628] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.037643] page dumped because: kasan: bad access detected [ 28.038232] [ 28.038516] Memory state around the buggy address: [ 28.039223] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.040558] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.041504] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.042329] ^ [ 28.043165] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.044129] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.045089] ================================================================== [ 30.209518] ================================================================== [ 30.210177] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 30.210914] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.211671] [ 30.212087] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.213254] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.213812] Hardware name: linux,dummy-virt (DT) [ 30.214361] Call trace: [ 30.214755] show_stack+0x20/0x38 (C) [ 30.215321] dump_stack_lvl+0x8c/0xd0 [ 30.215915] print_report+0x118/0x5e0 [ 30.216380] kasan_report+0xc8/0x118 [ 30.216827] kasan_check_range+0x100/0x1a8 [ 30.217444] __kasan_check_write+0x20/0x30 [ 30.218159] kasan_atomics_helper+0x17ec/0x4858 [ 30.218888] kasan_atomics+0x198/0x2e8 [ 30.219481] kunit_try_run_case+0x14c/0x3d0 [ 30.220149] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.220917] kthread+0x24c/0x2d0 [ 30.221464] ret_from_fork+0x10/0x20 [ 30.222016] [ 30.222341] Allocated by task 253: [ 30.222866] kasan_save_stack+0x3c/0x68 [ 30.223471] kasan_save_track+0x20/0x40 [ 30.224113] kasan_save_alloc_info+0x40/0x58 [ 30.224726] __kasan_kmalloc+0xd4/0xd8 [ 30.225352] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.225966] kasan_atomics+0xb8/0x2e8 [ 30.226528] kunit_try_run_case+0x14c/0x3d0 [ 30.227160] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.227872] kthread+0x24c/0x2d0 [ 30.228440] ret_from_fork+0x10/0x20 [ 30.229024] [ 30.229392] The buggy address belongs to the object at fff00000c12e8780 [ 30.229392] which belongs to the cache kmalloc-64 of size 64 [ 30.230690] The buggy address is located 0 bytes to the right of [ 30.230690] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.232060] [ 30.232463] The buggy address belongs to the physical page: [ 30.233188] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.234215] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.234998] page_type: f5(slab) [ 30.235582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.236528] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.237381] page dumped because: kasan: bad access detected [ 30.238069] [ 30.238439] Memory state around the buggy address: [ 30.239033] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.239944] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.240784] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.241595] ^ [ 30.242216] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.243045] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.243866] ================================================================== [ 29.071933] ================================================================== [ 29.072663] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 29.073452] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.074463] [ 29.074816] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.075887] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.076384] Hardware name: linux,dummy-virt (DT) [ 29.076990] Call trace: [ 29.077477] show_stack+0x20/0x38 (C) [ 29.078057] dump_stack_lvl+0x8c/0xd0 [ 29.078655] print_report+0x118/0x5e0 [ 29.079216] kasan_report+0xc8/0x118 [ 29.079788] __asan_report_load4_noabort+0x20/0x30 [ 29.080481] kasan_atomics_helper+0x3dd8/0x4858 [ 29.081165] kasan_atomics+0x198/0x2e8 [ 29.081693] kunit_try_run_case+0x14c/0x3d0 [ 29.082272] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.083006] kthread+0x24c/0x2d0 [ 29.083571] ret_from_fork+0x10/0x20 [ 29.084144] [ 29.084476] Allocated by task 253: [ 29.084988] kasan_save_stack+0x3c/0x68 [ 29.085536] kasan_save_track+0x20/0x40 [ 29.086124] kasan_save_alloc_info+0x40/0x58 [ 29.086748] __kasan_kmalloc+0xd4/0xd8 [ 29.087243] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.087987] kasan_atomics+0xb8/0x2e8 [ 29.088451] kunit_try_run_case+0x14c/0x3d0 [ 29.089130] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.089693] kthread+0x24c/0x2d0 [ 29.090204] ret_from_fork+0x10/0x20 [ 29.090715] [ 29.091099] The buggy address belongs to the object at fff00000c12e8780 [ 29.091099] which belongs to the cache kmalloc-64 of size 64 [ 29.092314] The buggy address is located 0 bytes to the right of [ 29.092314] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.093630] [ 29.093962] The buggy address belongs to the physical page: [ 29.094528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.095458] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.096183] page_type: f5(slab) [ 29.096760] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.097582] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.098375] page dumped because: kasan: bad access detected [ 29.099043] [ 29.099368] Memory state around the buggy address: [ 29.099977] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.100765] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.101530] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.102367] ^ [ 29.102956] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.103813] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.104574] ================================================================== [ 28.995815] ================================================================== [ 28.996630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 28.997807] Read of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.998627] [ 28.999033] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.000210] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.000850] Hardware name: linux,dummy-virt (DT) [ 29.001512] Call trace: [ 29.002000] show_stack+0x20/0x38 (C) [ 29.002629] dump_stack_lvl+0x8c/0xd0 [ 29.003274] print_report+0x118/0x5e0 [ 29.003871] kasan_report+0xc8/0x118 [ 29.004459] __asan_report_load4_noabort+0x20/0x30 [ 29.005194] kasan_atomics_helper+0x3de4/0x4858 [ 29.005804] kasan_atomics+0x198/0x2e8 [ 29.006450] kunit_try_run_case+0x14c/0x3d0 [ 29.007121] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.007855] kthread+0x24c/0x2d0 [ 29.008391] ret_from_fork+0x10/0x20 [ 29.009105] [ 29.009587] Allocated by task 253: [ 29.010034] kasan_save_stack+0x3c/0x68 [ 29.010587] kasan_save_track+0x20/0x40 [ 29.011239] kasan_save_alloc_info+0x40/0x58 [ 29.011942] __kasan_kmalloc+0xd4/0xd8 [ 29.012589] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.013311] kasan_atomics+0xb8/0x2e8 [ 29.013797] kunit_try_run_case+0x14c/0x3d0 [ 29.014305] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.014956] kthread+0x24c/0x2d0 [ 29.015540] ret_from_fork+0x10/0x20 [ 29.016306] [ 29.016745] The buggy address belongs to the object at fff00000c12e8780 [ 29.016745] which belongs to the cache kmalloc-64 of size 64 [ 29.018194] The buggy address is located 0 bytes to the right of [ 29.018194] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.019726] [ 29.020155] The buggy address belongs to the physical page: [ 29.020936] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.021909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.022786] page_type: f5(slab) [ 29.023326] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.024277] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.025165] page dumped because: kasan: bad access detected [ 29.025898] [ 29.026284] Memory state around the buggy address: [ 29.026988] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.027868] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.028776] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.029571] ^ [ 29.030291] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.031147] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.032006] ================================================================== [ 28.160888] ================================================================== [ 28.161658] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f94/0x4858 [ 28.162455] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.164053] [ 28.164474] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.165685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.166229] Hardware name: linux,dummy-virt (DT) [ 28.166832] Call trace: [ 28.167275] show_stack+0x20/0x38 (C) [ 28.167855] dump_stack_lvl+0x8c/0xd0 [ 28.168492] print_report+0x118/0x5e0 [ 28.169008] kasan_report+0xc8/0x118 [ 28.169591] __asan_report_store4_noabort+0x20/0x30 [ 28.170303] kasan_atomics_helper+0x3f94/0x4858 [ 28.170982] kasan_atomics+0x198/0x2e8 [ 28.171460] kunit_try_run_case+0x14c/0x3d0 [ 28.172110] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.172810] kthread+0x24c/0x2d0 [ 28.173338] ret_from_fork+0x10/0x20 [ 28.173927] [ 28.174232] Allocated by task 253: [ 28.174754] kasan_save_stack+0x3c/0x68 [ 28.175318] kasan_save_track+0x20/0x40 [ 28.175889] kasan_save_alloc_info+0x40/0x58 [ 28.176443] __kasan_kmalloc+0xd4/0xd8 [ 28.177054] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.177760] kasan_atomics+0xb8/0x2e8 [ 28.178233] kunit_try_run_case+0x14c/0x3d0 [ 28.178861] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.179482] kthread+0x24c/0x2d0 [ 28.180062] ret_from_fork+0x10/0x20 [ 28.180573] [ 28.180930] The buggy address belongs to the object at fff00000c12e8780 [ 28.180930] which belongs to the cache kmalloc-64 of size 64 [ 28.182154] The buggy address is located 0 bytes to the right of [ 28.182154] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.183393] [ 28.183763] The buggy address belongs to the physical page: [ 28.184440] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.185377] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.186117] page_type: f5(slab) [ 28.186635] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.187438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.188214] page dumped because: kasan: bad access detected [ 28.188900] [ 28.189231] Memory state around the buggy address: [ 28.189798] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.190570] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.191388] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.192256] ^ [ 28.192777] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.193582] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.194372] ================================================================== [ 28.707394] ================================================================== [ 28.708381] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 28.709313] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.710097] [ 28.710495] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.712284] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.712820] Hardware name: linux,dummy-virt (DT) [ 28.713407] Call trace: [ 28.713848] show_stack+0x20/0x38 (C) [ 28.714346] dump_stack_lvl+0x8c/0xd0 [ 28.714906] print_report+0x118/0x5e0 [ 28.715453] kasan_report+0xc8/0x118 [ 28.715969] kasan_check_range+0x100/0x1a8 [ 28.716645] __kasan_check_write+0x20/0x30 [ 28.717304] kasan_atomics_helper+0x99c/0x4858 [ 28.717958] kasan_atomics+0x198/0x2e8 [ 28.718581] kunit_try_run_case+0x14c/0x3d0 [ 28.719244] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.719955] kthread+0x24c/0x2d0 [ 28.720570] ret_from_fork+0x10/0x20 [ 28.721135] [ 28.721471] Allocated by task 253: [ 28.721998] kasan_save_stack+0x3c/0x68 [ 28.722511] kasan_save_track+0x20/0x40 [ 28.723113] kasan_save_alloc_info+0x40/0x58 [ 28.723639] __kasan_kmalloc+0xd4/0xd8 [ 28.724249] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.724851] kasan_atomics+0xb8/0x2e8 [ 28.725458] kunit_try_run_case+0x14c/0x3d0 [ 28.726024] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.726781] kthread+0x24c/0x2d0 [ 28.727288] ret_from_fork+0x10/0x20 [ 28.727763] [ 28.728117] The buggy address belongs to the object at fff00000c12e8780 [ 28.728117] which belongs to the cache kmalloc-64 of size 64 [ 28.729432] The buggy address is located 0 bytes to the right of [ 28.729432] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.730716] [ 28.731025] The buggy address belongs to the physical page: [ 28.731753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.732598] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.733356] page_type: f5(slab) [ 28.733924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.734744] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.735582] page dumped because: kasan: bad access detected [ 28.736206] [ 28.736548] Memory state around the buggy address: [ 28.737097] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.737960] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.738799] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.739588] ^ [ 28.740087] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740424] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.740799] ================================================================== [ 29.282410] ================================================================== [ 29.283556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 29.284418] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 29.285254] [ 29.285630] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.286685] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.287279] Hardware name: linux,dummy-virt (DT) [ 29.287856] Call trace: [ 29.288305] show_stack+0x20/0x38 (C) [ 29.288933] dump_stack_lvl+0x8c/0xd0 [ 29.289523] print_report+0x118/0x5e0 [ 29.290107] kasan_report+0xc8/0x118 [ 29.290667] __asan_report_store8_noabort+0x20/0x30 [ 29.291347] kasan_atomics_helper+0x3e5c/0x4858 [ 29.291969] kasan_atomics+0x198/0x2e8 [ 29.292503] kunit_try_run_case+0x14c/0x3d0 [ 29.293188] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.293885] kthread+0x24c/0x2d0 [ 29.294404] ret_from_fork+0x10/0x20 [ 29.294985] [ 29.295331] Allocated by task 253: [ 29.295835] kasan_save_stack+0x3c/0x68 [ 29.296349] kasan_save_track+0x20/0x40 [ 29.296982] kasan_save_alloc_info+0x40/0x58 [ 29.297538] __kasan_kmalloc+0xd4/0xd8 [ 29.298089] __kmalloc_cache_noprof+0x15c/0x3c0 [ 29.298715] kasan_atomics+0xb8/0x2e8 [ 29.299234] kunit_try_run_case+0x14c/0x3d0 [ 29.299826] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 29.300540] kthread+0x24c/0x2d0 [ 29.301058] ret_from_fork+0x10/0x20 [ 29.301581] [ 29.301934] The buggy address belongs to the object at fff00000c12e8780 [ 29.301934] which belongs to the cache kmalloc-64 of size 64 [ 29.303207] The buggy address is located 0 bytes to the right of [ 29.303207] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 29.304555] [ 29.304913] The buggy address belongs to the physical page: [ 29.305547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 29.306558] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 29.307276] page_type: f5(slab) [ 29.307844] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 29.308674] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.309576] page dumped because: kasan: bad access detected [ 29.310270] [ 29.310580] Memory state around the buggy address: [ 29.311135] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.311899] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.312735] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.313481] ^ [ 29.314095] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.314915] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315688] ================================================================== [ 28.778604] ================================================================== [ 28.779354] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 28.780135] Write of size 4 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 28.780816] [ 28.781219] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.782354] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.782863] Hardware name: linux,dummy-virt (DT) [ 28.783525] Call trace: [ 28.783956] show_stack+0x20/0x38 (C) [ 28.784490] dump_stack_lvl+0x8c/0xd0 [ 28.785064] print_report+0x118/0x5e0 [ 28.785721] kasan_report+0xc8/0x118 [ 28.786241] kasan_check_range+0x100/0x1a8 [ 28.786811] __kasan_check_write+0x20/0x30 [ 28.787416] kasan_atomics_helper+0xa6c/0x4858 [ 28.788076] kasan_atomics+0x198/0x2e8 [ 28.788662] kunit_try_run_case+0x14c/0x3d0 [ 28.789302] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.790044] kthread+0x24c/0x2d0 [ 28.790560] ret_from_fork+0x10/0x20 [ 28.791122] [ 28.791472] Allocated by task 253: [ 28.791957] kasan_save_stack+0x3c/0x68 [ 28.792480] kasan_save_track+0x20/0x40 [ 28.793097] kasan_save_alloc_info+0x40/0x58 [ 28.793609] __kasan_kmalloc+0xd4/0xd8 [ 28.794218] __kmalloc_cache_noprof+0x15c/0x3c0 [ 28.794825] kasan_atomics+0xb8/0x2e8 [ 28.795351] kunit_try_run_case+0x14c/0x3d0 [ 28.795876] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 28.796506] kthread+0x24c/0x2d0 [ 28.797096] ret_from_fork+0x10/0x20 [ 28.797647] [ 28.798042] The buggy address belongs to the object at fff00000c12e8780 [ 28.798042] which belongs to the cache kmalloc-64 of size 64 [ 28.799283] The buggy address is located 0 bytes to the right of [ 28.799283] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 28.800536] [ 28.800892] The buggy address belongs to the physical page: [ 28.801517] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 28.802470] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 28.803262] page_type: f5(slab) [ 28.803750] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 28.804593] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.805507] page dumped because: kasan: bad access detected [ 28.806175] [ 28.806497] Memory state around the buggy address: [ 28.807138] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.807925] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.808676] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.809485] ^ [ 28.810026] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.810364] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.810686] ================================================================== [ 29.997733] ================================================================== [ 29.998389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 29.999452] Write of size 8 at addr fff00000c12e87b0 by task kunit_try_catch/253 [ 30.000480] [ 30.000859] CPU: 0 UID: 0 PID: 253 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.002264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.002642] Hardware name: linux,dummy-virt (DT) [ 30.003145] Call trace: [ 30.003615] show_stack+0x20/0x38 (C) [ 30.004185] dump_stack_lvl+0x8c/0xd0 [ 30.004771] print_report+0x118/0x5e0 [ 30.005368] kasan_report+0xc8/0x118 [ 30.005879] kasan_check_range+0x100/0x1a8 [ 30.006571] __kasan_check_write+0x20/0x30 [ 30.007278] kasan_atomics_helper+0x1644/0x4858 [ 30.007905] kasan_atomics+0x198/0x2e8 [ 30.008433] kunit_try_run_case+0x14c/0x3d0 [ 30.009134] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.009945] kthread+0x24c/0x2d0 [ 30.010488] ret_from_fork+0x10/0x20 [ 30.011089] [ 30.011439] Allocated by task 253: [ 30.011898] kasan_save_stack+0x3c/0x68 [ 30.012458] kasan_save_track+0x20/0x40 [ 30.013111] kasan_save_alloc_info+0x40/0x58 [ 30.013681] __kasan_kmalloc+0xd4/0xd8 [ 30.014259] __kmalloc_cache_noprof+0x15c/0x3c0 [ 30.014919] kasan_atomics+0xb8/0x2e8 [ 30.015469] kunit_try_run_case+0x14c/0x3d0 [ 30.016072] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 30.016804] kthread+0x24c/0x2d0 [ 30.017283] ret_from_fork+0x10/0x20 [ 30.017927] [ 30.018232] The buggy address belongs to the object at fff00000c12e8780 [ 30.018232] which belongs to the cache kmalloc-64 of size 64 [ 30.019379] The buggy address is located 0 bytes to the right of [ 30.019379] allocated 48-byte region [fff00000c12e8780, fff00000c12e87b0) [ 30.020468] [ 30.020850] The buggy address belongs to the physical page: [ 30.021585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1012e8 [ 30.022457] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 30.023199] page_type: f5(slab) [ 30.023659] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 30.024525] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.025403] page dumped because: kasan: bad access detected [ 30.026065] [ 30.026391] Memory state around the buggy address: [ 30.026918] fff00000c12e8680: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.027727] fff00000c12e8700: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.028456] >fff00000c12e8780: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.029286] ^ [ 30.029865] fff00000c12e8800: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.030650] fff00000c12e8880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.031406] ==================================================================
[ 31.587929] ================================================================== [ 31.588746] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 31.590044] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.591720] [ 31.591929] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.593020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.593593] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.594539] Call Trace: [ 31.594836] <TASK> [ 31.595227] dump_stack_lvl+0x73/0xb0 [ 31.595715] print_report+0xd1/0x640 [ 31.596319] ? __virt_addr_valid+0x1db/0x2d0 [ 31.596963] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.597554] kasan_report+0x102/0x140 [ 31.597958] ? kasan_atomics_helper+0x4fb4/0x5450 [ 31.598550] ? kasan_atomics_helper+0x4fb4/0x5450 [ 31.599378] __asan_report_load8_noabort+0x18/0x20 [ 31.599843] kasan_atomics_helper+0x4fb4/0x5450 [ 31.600407] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.601119] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.601733] ? kasan_atomics+0x153/0x310 [ 31.602135] kasan_atomics+0x1dd/0x310 [ 31.602554] ? __pfx_kasan_atomics+0x10/0x10 [ 31.603146] ? __pfx_read_tsc+0x10/0x10 [ 31.603811] ? ktime_get_ts64+0x86/0x230 [ 31.604338] kunit_try_run_case+0x1b3/0x490 [ 31.604717] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.605414] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.606142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.606811] ? __kthread_parkme+0x82/0x160 [ 31.607185] ? preempt_count_sub+0x50/0x80 [ 31.607634] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.608306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.608971] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.609635] kthread+0x257/0x310 [ 31.609998] ? __pfx_kthread+0x10/0x10 [ 31.610581] ret_from_fork+0x41/0x80 [ 31.611118] ? __pfx_kthread+0x10/0x10 [ 31.611598] ret_from_fork_asm+0x1a/0x30 [ 31.612091] </TASK> [ 31.612445] [ 31.612749] Allocated by task 272: [ 31.613030] kasan_save_stack+0x3d/0x60 [ 31.613738] kasan_save_track+0x18/0x40 [ 31.614021] kasan_save_alloc_info+0x3b/0x50 [ 31.615357] __kasan_kmalloc+0xb7/0xc0 [ 31.615992] __kmalloc_cache_noprof+0x184/0x410 [ 31.616520] kasan_atomics+0x96/0x310 [ 31.617054] kunit_try_run_case+0x1b3/0x490 [ 31.617645] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.618218] kthread+0x257/0x310 [ 31.618571] ret_from_fork+0x41/0x80 [ 31.618934] ret_from_fork_asm+0x1a/0x30 [ 31.619472] [ 31.619640] The buggy address belongs to the object at ffff888102969600 [ 31.619640] which belongs to the cache kmalloc-64 of size 64 [ 31.621049] The buggy address is located 0 bytes to the right of [ 31.621049] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.622166] [ 31.622535] The buggy address belongs to the physical page: [ 31.623105] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.624009] flags: 0x200000000000000(node=0|zone=2) [ 31.624678] page_type: f5(slab) [ 31.625132] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.626032] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.626809] page dumped because: kasan: bad access detected [ 31.627422] [ 31.627611] Memory state around the buggy address: [ 31.628226] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.628928] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.629651] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.630628] ^ [ 31.631457] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.632065] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.632927] ================================================================== [ 31.100874] ================================================================== [ 31.101858] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 31.103174] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.105005] [ 31.105480] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.106565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.107292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.108384] Call Trace: [ 31.108686] <TASK> [ 31.109353] dump_stack_lvl+0x73/0xb0 [ 31.110049] print_report+0xd1/0x640 [ 31.110722] ? __virt_addr_valid+0x1db/0x2d0 [ 31.111561] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.112461] kasan_report+0x102/0x140 [ 31.113089] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.113606] ? kasan_atomics_helper+0x4f32/0x5450 [ 31.114188] __asan_report_load8_noabort+0x18/0x20 [ 31.114980] kasan_atomics_helper+0x4f32/0x5450 [ 31.115225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.115572] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.116577] ? kasan_atomics+0x153/0x310 [ 31.117384] kasan_atomics+0x1dd/0x310 [ 31.118114] ? __pfx_kasan_atomics+0x10/0x10 [ 31.118601] ? __pfx_read_tsc+0x10/0x10 [ 31.119331] ? ktime_get_ts64+0x86/0x230 [ 31.120040] kunit_try_run_case+0x1b3/0x490 [ 31.120444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.120998] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.121578] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.122119] ? __kthread_parkme+0x82/0x160 [ 31.122846] ? preempt_count_sub+0x50/0x80 [ 31.123324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.124122] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.125010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.125708] kthread+0x257/0x310 [ 31.126280] ? __pfx_kthread+0x10/0x10 [ 31.126886] ret_from_fork+0x41/0x80 [ 31.127457] ? __pfx_kthread+0x10/0x10 [ 31.128029] ret_from_fork_asm+0x1a/0x30 [ 31.128657] </TASK> [ 31.128974] [ 31.129245] Allocated by task 272: [ 31.129696] kasan_save_stack+0x3d/0x60 [ 31.130245] kasan_save_track+0x18/0x40 [ 31.130992] kasan_save_alloc_info+0x3b/0x50 [ 31.131575] __kasan_kmalloc+0xb7/0xc0 [ 31.132134] __kmalloc_cache_noprof+0x184/0x410 [ 31.132888] kasan_atomics+0x96/0x310 [ 31.133438] kunit_try_run_case+0x1b3/0x490 [ 31.134060] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.134728] kthread+0x257/0x310 [ 31.135364] ret_from_fork+0x41/0x80 [ 31.135837] ret_from_fork_asm+0x1a/0x30 [ 31.136275] [ 31.136539] The buggy address belongs to the object at ffff888102969600 [ 31.136539] which belongs to the cache kmalloc-64 of size 64 [ 31.137711] The buggy address is located 0 bytes to the right of [ 31.137711] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.139019] [ 31.139329] The buggy address belongs to the physical page: [ 31.139985] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.140931] flags: 0x200000000000000(node=0|zone=2) [ 31.141643] page_type: f5(slab) [ 31.142036] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.142994] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.143790] page dumped because: kasan: bad access detected [ 31.144452] [ 31.144807] Memory state around the buggy address: [ 31.145411] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.146183] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.146987] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.147677] ^ [ 31.148228] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.149037] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.149846] ================================================================== [ 28.793808] ================================================================== [ 28.794282] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 28.795444] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.796574] [ 28.797168] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.798373] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.798769] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.799582] Call Trace: [ 28.800097] <TASK> [ 28.800353] dump_stack_lvl+0x73/0xb0 [ 28.801670] print_report+0xd1/0x640 [ 28.802371] ? __virt_addr_valid+0x1db/0x2d0 [ 28.802747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.803318] kasan_report+0x102/0x140 [ 28.803744] ? kasan_atomics_helper+0x4a1/0x5450 [ 28.805119] ? kasan_atomics_helper+0x4a1/0x5450 [ 28.805688] kasan_check_range+0x10c/0x1c0 [ 28.806430] __kasan_check_write+0x18/0x20 [ 28.807033] kasan_atomics_helper+0x4a1/0x5450 [ 28.807601] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.808028] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.809242] ? kasan_atomics+0x153/0x310 [ 28.809651] kasan_atomics+0x1dd/0x310 [ 28.810570] ? __pfx_kasan_atomics+0x10/0x10 [ 28.811328] ? __pfx_read_tsc+0x10/0x10 [ 28.811754] ? ktime_get_ts64+0x86/0x230 [ 28.812156] kunit_try_run_case+0x1b3/0x490 [ 28.812669] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.813118] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.814071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.814985] ? __kthread_parkme+0x82/0x160 [ 28.815609] ? preempt_count_sub+0x50/0x80 [ 28.816065] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.816536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.817641] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.819066] kthread+0x257/0x310 [ 28.819968] ? __pfx_kthread+0x10/0x10 [ 28.820550] ret_from_fork+0x41/0x80 [ 28.821735] ? __pfx_kthread+0x10/0x10 [ 28.822145] ret_from_fork_asm+0x1a/0x30 [ 28.822781] </TASK> [ 28.823491] [ 28.823680] Allocated by task 272: [ 28.824041] kasan_save_stack+0x3d/0x60 [ 28.825030] kasan_save_track+0x18/0x40 [ 28.826380] kasan_save_alloc_info+0x3b/0x50 [ 28.827064] __kasan_kmalloc+0xb7/0xc0 [ 28.827728] __kmalloc_cache_noprof+0x184/0x410 [ 28.828721] kasan_atomics+0x96/0x310 [ 28.829123] kunit_try_run_case+0x1b3/0x490 [ 28.829720] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.830332] kthread+0x257/0x310 [ 28.831668] ret_from_fork+0x41/0x80 [ 28.831951] ret_from_fork_asm+0x1a/0x30 [ 28.832825] [ 28.833079] The buggy address belongs to the object at ffff888102969600 [ 28.833079] which belongs to the cache kmalloc-64 of size 64 [ 28.835301] The buggy address is located 0 bytes to the right of [ 28.835301] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.836683] [ 28.836971] The buggy address belongs to the physical page: [ 28.837898] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.839132] flags: 0x200000000000000(node=0|zone=2) [ 28.840004] page_type: f5(slab) [ 28.840498] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.841577] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.842734] page dumped because: kasan: bad access detected [ 28.843492] [ 28.843634] Memory state around the buggy address: [ 28.844323] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.845381] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.846350] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.847090] ^ [ 28.847668] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.848376] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.848873] ================================================================== [ 29.319578] ================================================================== [ 29.321301] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 29.322472] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.323908] [ 29.324713] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.325132] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.325451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.327746] Call Trace: [ 29.328848] <TASK> [ 29.329293] dump_stack_lvl+0x73/0xb0 [ 29.330007] print_report+0xd1/0x640 [ 29.330682] ? __virt_addr_valid+0x1db/0x2d0 [ 29.331478] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.332036] kasan_report+0x102/0x140 [ 29.333221] ? kasan_atomics_helper+0x993/0x5450 [ 29.333714] ? kasan_atomics_helper+0x993/0x5450 [ 29.334818] kasan_check_range+0x10c/0x1c0 [ 29.335242] __kasan_check_write+0x18/0x20 [ 29.336061] kasan_atomics_helper+0x993/0x5450 [ 29.337244] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.337740] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.338523] ? kasan_atomics+0x153/0x310 [ 29.339419] kasan_atomics+0x1dd/0x310 [ 29.340280] ? __pfx_kasan_atomics+0x10/0x10 [ 29.340720] ? __pfx_read_tsc+0x10/0x10 [ 29.341698] ? ktime_get_ts64+0x86/0x230 [ 29.342433] kunit_try_run_case+0x1b3/0x490 [ 29.343036] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.343786] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.344299] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.345702] ? __kthread_parkme+0x82/0x160 [ 29.346150] ? preempt_count_sub+0x50/0x80 [ 29.347128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.348032] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.349309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.350391] kthread+0x257/0x310 [ 29.351363] ? __pfx_kthread+0x10/0x10 [ 29.351961] ret_from_fork+0x41/0x80 [ 29.352542] ? __pfx_kthread+0x10/0x10 [ 29.353871] ret_from_fork_asm+0x1a/0x30 [ 29.354324] </TASK> [ 29.354598] [ 29.355023] Allocated by task 272: [ 29.355525] kasan_save_stack+0x3d/0x60 [ 29.356125] kasan_save_track+0x18/0x40 [ 29.356699] kasan_save_alloc_info+0x3b/0x50 [ 29.357675] __kasan_kmalloc+0xb7/0xc0 [ 29.358099] __kmalloc_cache_noprof+0x184/0x410 [ 29.358510] kasan_atomics+0x96/0x310 [ 29.359231] kunit_try_run_case+0x1b3/0x490 [ 29.359936] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.360501] kthread+0x257/0x310 [ 29.361030] ret_from_fork+0x41/0x80 [ 29.361954] ret_from_fork_asm+0x1a/0x30 [ 29.362519] [ 29.362713] The buggy address belongs to the object at ffff888102969600 [ 29.362713] which belongs to the cache kmalloc-64 of size 64 [ 29.364754] The buggy address is located 0 bytes to the right of [ 29.364754] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.366238] [ 29.366429] The buggy address belongs to the physical page: [ 29.367921] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.369054] flags: 0x200000000000000(node=0|zone=2) [ 29.369861] page_type: f5(slab) [ 29.370230] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.371439] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.373135] page dumped because: kasan: bad access detected [ 29.373686] [ 29.373873] Memory state around the buggy address: [ 29.374361] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.375708] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.376555] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.377563] ^ [ 29.378140] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.379681] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.380701] ================================================================== [ 31.683543] ================================================================== [ 31.684515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 31.685283] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.685915] [ 31.686151] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.686882] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.687397] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.688240] Call Trace: [ 31.688516] <TASK> [ 31.688853] dump_stack_lvl+0x73/0xb0 [ 31.689183] print_report+0xd1/0x640 [ 31.689679] ? __virt_addr_valid+0x1db/0x2d0 [ 31.690275] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.690904] kasan_report+0x102/0x140 [ 31.691344] ? kasan_atomics_helper+0x4fa7/0x5450 [ 31.691808] ? kasan_atomics_helper+0x4fa7/0x5450 [ 31.692298] __asan_report_load8_noabort+0x18/0x20 [ 31.692894] kasan_atomics_helper+0x4fa7/0x5450 [ 31.693240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.693874] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.694453] ? kasan_atomics+0x153/0x310 [ 31.694937] kasan_atomics+0x1dd/0x310 [ 31.695384] ? __pfx_kasan_atomics+0x10/0x10 [ 31.695863] ? __pfx_read_tsc+0x10/0x10 [ 31.696165] ? ktime_get_ts64+0x86/0x230 [ 31.696690] kunit_try_run_case+0x1b3/0x490 [ 31.697224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.697600] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.698113] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.698777] ? __kthread_parkme+0x82/0x160 [ 31.699115] ? preempt_count_sub+0x50/0x80 [ 31.699661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.700047] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.700806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.701352] kthread+0x257/0x310 [ 31.701625] ? __pfx_kthread+0x10/0x10 [ 31.702128] ret_from_fork+0x41/0x80 [ 31.702467] ? __pfx_kthread+0x10/0x10 [ 31.702987] ret_from_fork_asm+0x1a/0x30 [ 31.703490] </TASK> [ 31.704418] [ 31.704634] Allocated by task 272: [ 31.705491] kasan_save_stack+0x3d/0x60 [ 31.705973] kasan_save_track+0x18/0x40 [ 31.706444] kasan_save_alloc_info+0x3b/0x50 [ 31.707200] __kasan_kmalloc+0xb7/0xc0 [ 31.708098] __kmalloc_cache_noprof+0x184/0x410 [ 31.709104] kasan_atomics+0x96/0x310 [ 31.709415] kunit_try_run_case+0x1b3/0x490 [ 31.709614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.710189] kthread+0x257/0x310 [ 31.711044] ret_from_fork+0x41/0x80 [ 31.711346] ret_from_fork_asm+0x1a/0x30 [ 31.711711] [ 31.712398] The buggy address belongs to the object at ffff888102969600 [ 31.712398] which belongs to the cache kmalloc-64 of size 64 [ 31.714059] The buggy address is located 0 bytes to the right of [ 31.714059] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.715456] [ 31.715667] The buggy address belongs to the physical page: [ 31.716916] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.717703] flags: 0x200000000000000(node=0|zone=2) [ 31.718548] page_type: f5(slab) [ 31.718817] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.719615] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.720951] page dumped because: kasan: bad access detected [ 31.721628] [ 31.721781] Memory state around the buggy address: [ 31.722973] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.723667] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.724952] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.725765] ^ [ 31.726452] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.727571] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.728548] ================================================================== [ 31.202700] ================================================================== [ 31.203147] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 31.204959] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.206191] [ 31.206406] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.207998] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.208438] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.209727] Call Trace: [ 31.210062] <TASK> [ 31.210349] dump_stack_lvl+0x73/0xb0 [ 31.210834] print_report+0xd1/0x640 [ 31.211243] ? __virt_addr_valid+0x1db/0x2d0 [ 31.211883] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.212351] kasan_report+0x102/0x140 [ 31.213029] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.213780] ? kasan_atomics_helper+0x1d7b/0x5450 [ 31.214355] kasan_check_range+0x10c/0x1c0 [ 31.214978] __kasan_check_write+0x18/0x20 [ 31.215492] kasan_atomics_helper+0x1d7b/0x5450 [ 31.216043] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.216504] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.217220] ? kasan_atomics+0x153/0x310 [ 31.217794] kasan_atomics+0x1dd/0x310 [ 31.218247] ? __pfx_kasan_atomics+0x10/0x10 [ 31.218678] ? __pfx_read_tsc+0x10/0x10 [ 31.219338] ? ktime_get_ts64+0x86/0x230 [ 31.219935] kunit_try_run_case+0x1b3/0x490 [ 31.220556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.221229] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.221624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.222495] ? __kthread_parkme+0x82/0x160 [ 31.223012] ? preempt_count_sub+0x50/0x80 [ 31.223657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.224100] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.224982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.225604] kthread+0x257/0x310 [ 31.226168] ? __pfx_kthread+0x10/0x10 [ 31.226644] ret_from_fork+0x41/0x80 [ 31.227206] ? __pfx_kthread+0x10/0x10 [ 31.227623] ret_from_fork_asm+0x1a/0x30 [ 31.228286] </TASK> [ 31.228611] [ 31.229017] Allocated by task 272: [ 31.229400] kasan_save_stack+0x3d/0x60 [ 31.229974] kasan_save_track+0x18/0x40 [ 31.230486] kasan_save_alloc_info+0x3b/0x50 [ 31.230955] __kasan_kmalloc+0xb7/0xc0 [ 31.231519] __kmalloc_cache_noprof+0x184/0x410 [ 31.232010] kasan_atomics+0x96/0x310 [ 31.232389] kunit_try_run_case+0x1b3/0x490 [ 31.232854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.233467] kthread+0x257/0x310 [ 31.233808] ret_from_fork+0x41/0x80 [ 31.234154] ret_from_fork_asm+0x1a/0x30 [ 31.234721] [ 31.235031] The buggy address belongs to the object at ffff888102969600 [ 31.235031] which belongs to the cache kmalloc-64 of size 64 [ 31.236148] The buggy address is located 0 bytes to the right of [ 31.236148] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.237248] [ 31.237523] The buggy address belongs to the physical page: [ 31.238163] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.238665] flags: 0x200000000000000(node=0|zone=2) [ 31.239424] page_type: f5(slab) [ 31.239956] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.241433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.242189] page dumped because: kasan: bad access detected [ 31.243085] [ 31.243444] Memory state around the buggy address: [ 31.243699] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.244126] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.245047] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.245954] ^ [ 31.246168] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.246656] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.247495] ================================================================== [ 28.850038] ================================================================== [ 28.851840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 28.853525] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.854232] [ 28.855199] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.856448] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.857190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.858193] Call Trace: [ 28.858560] <TASK> [ 28.859825] dump_stack_lvl+0x73/0xb0 [ 28.860782] print_report+0xd1/0x640 [ 28.861214] ? __virt_addr_valid+0x1db/0x2d0 [ 28.861771] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.862384] kasan_report+0x102/0x140 [ 28.862809] ? kasan_atomics_helper+0x4b3c/0x5450 [ 28.863331] ? kasan_atomics_helper+0x4b3c/0x5450 [ 28.864741] __asan_report_store4_noabort+0x1b/0x30 [ 28.865234] kasan_atomics_helper+0x4b3c/0x5450 [ 28.865641] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.866829] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.867861] ? kasan_atomics+0x153/0x310 [ 28.868287] kasan_atomics+0x1dd/0x310 [ 28.868783] ? __pfx_kasan_atomics+0x10/0x10 [ 28.869683] ? __pfx_read_tsc+0x10/0x10 [ 28.870765] ? ktime_get_ts64+0x86/0x230 [ 28.871217] kunit_try_run_case+0x1b3/0x490 [ 28.871726] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.872216] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.873777] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.874296] ? __kthread_parkme+0x82/0x160 [ 28.874863] ? preempt_count_sub+0x50/0x80 [ 28.876042] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.876475] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.877198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.878515] kthread+0x257/0x310 [ 28.878969] ? __pfx_kthread+0x10/0x10 [ 28.879277] ret_from_fork+0x41/0x80 [ 28.879748] ? __pfx_kthread+0x10/0x10 [ 28.880279] ret_from_fork_asm+0x1a/0x30 [ 28.880670] </TASK> [ 28.881608] [ 28.881886] Allocated by task 272: [ 28.882147] kasan_save_stack+0x3d/0x60 [ 28.882938] kasan_save_track+0x18/0x40 [ 28.883515] kasan_save_alloc_info+0x3b/0x50 [ 28.884525] __kasan_kmalloc+0xb7/0xc0 [ 28.885030] __kmalloc_cache_noprof+0x184/0x410 [ 28.885964] kasan_atomics+0x96/0x310 [ 28.886528] kunit_try_run_case+0x1b3/0x490 [ 28.887206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.887990] kthread+0x257/0x310 [ 28.889330] ret_from_fork+0x41/0x80 [ 28.889605] ret_from_fork_asm+0x1a/0x30 [ 28.890249] [ 28.890719] The buggy address belongs to the object at ffff888102969600 [ 28.890719] which belongs to the cache kmalloc-64 of size 64 [ 28.891389] The buggy address is located 0 bytes to the right of [ 28.891389] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.892693] [ 28.892993] The buggy address belongs to the physical page: [ 28.893872] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.895511] flags: 0x200000000000000(node=0|zone=2) [ 28.895959] page_type: f5(slab) [ 28.896712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.897640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.898515] page dumped because: kasan: bad access detected [ 28.899503] [ 28.899669] Memory state around the buggy address: [ 28.900166] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.901002] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.901846] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.902674] ^ [ 28.903942] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.904876] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.905983] ================================================================== [ 30.529725] ================================================================== [ 30.531586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 30.533207] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.534121] [ 30.534456] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.536376] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.537055] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.537788] Call Trace: [ 30.538145] <TASK> [ 30.538487] dump_stack_lvl+0x73/0xb0 [ 30.538834] print_report+0xd1/0x640 [ 30.539330] ? __virt_addr_valid+0x1db/0x2d0 [ 30.539987] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.540446] kasan_report+0x102/0x140 [ 30.540911] ? kasan_atomics_helper+0x151e/0x5450 [ 30.541396] ? kasan_atomics_helper+0x151e/0x5450 [ 30.542456] kasan_check_range+0x10c/0x1c0 [ 30.542852] __kasan_check_write+0x18/0x20 [ 30.543543] kasan_atomics_helper+0x151e/0x5450 [ 30.544250] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.544729] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.545736] ? kasan_atomics+0x153/0x310 [ 30.546362] kasan_atomics+0x1dd/0x310 [ 30.546792] ? __pfx_kasan_atomics+0x10/0x10 [ 30.547496] ? __pfx_read_tsc+0x10/0x10 [ 30.548307] ? ktime_get_ts64+0x86/0x230 [ 30.548976] kunit_try_run_case+0x1b3/0x490 [ 30.549621] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.550378] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.551278] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.551748] ? __kthread_parkme+0x82/0x160 [ 30.552304] ? preempt_count_sub+0x50/0x80 [ 30.552777] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.553296] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.553845] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.554493] kthread+0x257/0x310 [ 30.554955] ? __pfx_kthread+0x10/0x10 [ 30.555324] ret_from_fork+0x41/0x80 [ 30.555715] ? __pfx_kthread+0x10/0x10 [ 30.556172] ret_from_fork_asm+0x1a/0x30 [ 30.556516] </TASK> [ 30.556977] [ 30.557316] Allocated by task 272: [ 30.557698] kasan_save_stack+0x3d/0x60 [ 30.558287] kasan_save_track+0x18/0x40 [ 30.558712] kasan_save_alloc_info+0x3b/0x50 [ 30.559204] __kasan_kmalloc+0xb7/0xc0 [ 30.559515] __kmalloc_cache_noprof+0x184/0x410 [ 30.559870] kasan_atomics+0x96/0x310 [ 30.560347] kunit_try_run_case+0x1b3/0x490 [ 30.560872] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.561546] kthread+0x257/0x310 [ 30.562073] ret_from_fork+0x41/0x80 [ 30.562378] ret_from_fork_asm+0x1a/0x30 [ 30.563063] [ 30.563251] The buggy address belongs to the object at ffff888102969600 [ 30.563251] which belongs to the cache kmalloc-64 of size 64 [ 30.564089] The buggy address is located 0 bytes to the right of [ 30.564089] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.565334] [ 30.565616] The buggy address belongs to the physical page: [ 30.566317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.567019] flags: 0x200000000000000(node=0|zone=2) [ 30.567624] page_type: f5(slab) [ 30.568000] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.569095] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.569616] page dumped because: kasan: bad access detected [ 30.570166] [ 30.570476] Memory state around the buggy address: [ 30.571226] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.572897] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.573559] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.574436] ^ [ 30.575115] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.575686] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.576543] ================================================================== [ 31.780920] ================================================================== [ 31.781476] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 31.782497] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.783320] [ 31.783555] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.784490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.785096] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.785827] Call Trace: [ 31.786522] <TASK> [ 31.787816] dump_stack_lvl+0x73/0xb0 [ 31.788298] print_report+0xd1/0x640 [ 31.789684] ? __virt_addr_valid+0x1db/0x2d0 [ 31.790106] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.790878] kasan_report+0x102/0x140 [ 31.791455] ? kasan_atomics_helper+0x5117/0x5450 [ 31.792189] ? kasan_atomics_helper+0x5117/0x5450 [ 31.792917] __asan_report_load8_noabort+0x18/0x20 [ 31.793628] kasan_atomics_helper+0x5117/0x5450 [ 31.794590] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.795090] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.795802] ? kasan_atomics+0x153/0x310 [ 31.796460] kasan_atomics+0x1dd/0x310 [ 31.797070] ? __pfx_kasan_atomics+0x10/0x10 [ 31.797688] ? __pfx_read_tsc+0x10/0x10 [ 31.798642] ? ktime_get_ts64+0x86/0x230 [ 31.799122] kunit_try_run_case+0x1b3/0x490 [ 31.799584] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.800332] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.801019] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.801672] ? __kthread_parkme+0x82/0x160 [ 31.802491] ? preempt_count_sub+0x50/0x80 [ 31.802911] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.803553] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.804335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.805076] kthread+0x257/0x310 [ 31.805650] ? __pfx_kthread+0x10/0x10 [ 31.806315] ret_from_fork+0x41/0x80 [ 31.806694] ? __pfx_kthread+0x10/0x10 [ 31.807651] ret_from_fork_asm+0x1a/0x30 [ 31.808162] </TASK> [ 31.808464] [ 31.808677] Allocated by task 272: [ 31.809451] kasan_save_stack+0x3d/0x60 [ 31.809732] kasan_save_track+0x18/0x40 [ 31.810529] kasan_save_alloc_info+0x3b/0x50 [ 31.811195] __kasan_kmalloc+0xb7/0xc0 [ 31.811607] __kmalloc_cache_noprof+0x184/0x410 [ 31.812510] kasan_atomics+0x96/0x310 [ 31.813107] kunit_try_run_case+0x1b3/0x490 [ 31.813547] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.814577] kthread+0x257/0x310 [ 31.814931] ret_from_fork+0x41/0x80 [ 31.815445] ret_from_fork_asm+0x1a/0x30 [ 31.816234] [ 31.816566] The buggy address belongs to the object at ffff888102969600 [ 31.816566] which belongs to the cache kmalloc-64 of size 64 [ 31.818216] The buggy address is located 0 bytes to the right of [ 31.818216] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.819843] [ 31.820310] The buggy address belongs to the physical page: [ 31.820780] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.822073] flags: 0x200000000000000(node=0|zone=2) [ 31.822807] page_type: f5(slab) [ 31.823375] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.824480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.825525] page dumped because: kasan: bad access detected [ 31.825975] [ 31.826641] Memory state around the buggy address: [ 31.827386] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.828396] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.829432] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.830101] ^ [ 31.830823] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.831492] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.832657] ================================================================== [ 29.023971] ================================================================== [ 29.024652] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 29.025342] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.026714] [ 29.027226] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.028996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.029739] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.031209] Call Trace: [ 29.031444] <TASK> [ 29.031763] dump_stack_lvl+0x73/0xb0 [ 29.032178] print_report+0xd1/0x640 [ 29.033417] ? __virt_addr_valid+0x1db/0x2d0 [ 29.034179] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.035413] kasan_report+0x102/0x140 [ 29.035806] ? kasan_atomics_helper+0x698/0x5450 [ 29.037067] ? kasan_atomics_helper+0x698/0x5450 [ 29.037678] kasan_check_range+0x10c/0x1c0 [ 29.038939] __kasan_check_write+0x18/0x20 [ 29.040073] kasan_atomics_helper+0x698/0x5450 [ 29.040591] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.041217] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.041970] ? kasan_atomics+0x153/0x310 [ 29.042748] kasan_atomics+0x1dd/0x310 [ 29.043144] ? __pfx_kasan_atomics+0x10/0x10 [ 29.044250] ? __pfx_read_tsc+0x10/0x10 [ 29.044652] ? ktime_get_ts64+0x86/0x230 [ 29.045171] kunit_try_run_case+0x1b3/0x490 [ 29.046107] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.047307] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.047787] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.048858] ? __kthread_parkme+0x82/0x160 [ 29.049450] ? preempt_count_sub+0x50/0x80 [ 29.050417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.051466] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.052096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.053294] kthread+0x257/0x310 [ 29.053679] ? __pfx_kthread+0x10/0x10 [ 29.054852] ret_from_fork+0x41/0x80 [ 29.055073] ? __pfx_kthread+0x10/0x10 [ 29.056051] ret_from_fork_asm+0x1a/0x30 [ 29.056747] </TASK> [ 29.057062] [ 29.057721] Allocated by task 272: [ 29.058908] kasan_save_stack+0x3d/0x60 [ 29.059249] kasan_save_track+0x18/0x40 [ 29.060369] kasan_save_alloc_info+0x3b/0x50 [ 29.060814] __kasan_kmalloc+0xb7/0xc0 [ 29.061185] __kmalloc_cache_noprof+0x184/0x410 [ 29.061614] kasan_atomics+0x96/0x310 [ 29.062040] kunit_try_run_case+0x1b3/0x490 [ 29.062989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.063854] kthread+0x257/0x310 [ 29.064109] ret_from_fork+0x41/0x80 [ 29.064711] ret_from_fork_asm+0x1a/0x30 [ 29.065328] [ 29.065567] The buggy address belongs to the object at ffff888102969600 [ 29.065567] which belongs to the cache kmalloc-64 of size 64 [ 29.067054] The buggy address is located 0 bytes to the right of [ 29.067054] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.068676] [ 29.068923] The buggy address belongs to the physical page: [ 29.069559] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.070223] flags: 0x200000000000000(node=0|zone=2) [ 29.070683] page_type: f5(slab) [ 29.071098] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.072142] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.073002] page dumped because: kasan: bad access detected [ 29.073650] [ 29.073898] Memory state around the buggy address: [ 29.074584] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.075696] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.076512] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.077437] ^ [ 29.078482] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.079595] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.080516] ================================================================== [ 29.773609] ================================================================== [ 29.775794] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 29.776546] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.778067] [ 29.778348] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.779499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.780220] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.781218] Call Trace: [ 29.781471] <TASK> [ 29.781993] dump_stack_lvl+0x73/0xb0 [ 29.782504] print_report+0xd1/0x640 [ 29.782871] ? __virt_addr_valid+0x1db/0x2d0 [ 29.783310] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.784350] kasan_report+0x102/0x140 [ 29.784786] ? kasan_atomics_helper+0xf11/0x5450 [ 29.785461] ? kasan_atomics_helper+0xf11/0x5450 [ 29.785692] kasan_check_range+0x10c/0x1c0 [ 29.786031] __kasan_check_write+0x18/0x20 [ 29.786623] kasan_atomics_helper+0xf11/0x5450 [ 29.787167] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.788012] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.788599] ? kasan_atomics+0x153/0x310 [ 29.789355] kasan_atomics+0x1dd/0x310 [ 29.790368] ? __pfx_kasan_atomics+0x10/0x10 [ 29.790888] ? __pfx_read_tsc+0x10/0x10 [ 29.791348] ? ktime_get_ts64+0x86/0x230 [ 29.791864] kunit_try_run_case+0x1b3/0x490 [ 29.792417] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.792875] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.793546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.794143] ? __kthread_parkme+0x82/0x160 [ 29.794673] ? preempt_count_sub+0x50/0x80 [ 29.795483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.796441] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.797322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.797774] kthread+0x257/0x310 [ 29.798384] ? __pfx_kthread+0x10/0x10 [ 29.799073] ret_from_fork+0x41/0x80 [ 29.799471] ? __pfx_kthread+0x10/0x10 [ 29.800289] ret_from_fork_asm+0x1a/0x30 [ 29.801072] </TASK> [ 29.801365] [ 29.801558] Allocated by task 272: [ 29.802537] kasan_save_stack+0x3d/0x60 [ 29.803174] kasan_save_track+0x18/0x40 [ 29.803650] kasan_save_alloc_info+0x3b/0x50 [ 29.804425] __kasan_kmalloc+0xb7/0xc0 [ 29.804796] __kmalloc_cache_noprof+0x184/0x410 [ 29.805386] kasan_atomics+0x96/0x310 [ 29.806109] kunit_try_run_case+0x1b3/0x490 [ 29.806586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.807555] kthread+0x257/0x310 [ 29.808336] ret_from_fork+0x41/0x80 [ 29.809068] ret_from_fork_asm+0x1a/0x30 [ 29.809657] [ 29.810035] The buggy address belongs to the object at ffff888102969600 [ 29.810035] which belongs to the cache kmalloc-64 of size 64 [ 29.812005] The buggy address is located 0 bytes to the right of [ 29.812005] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.813546] [ 29.813788] The buggy address belongs to the physical page: [ 29.814824] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.815702] flags: 0x200000000000000(node=0|zone=2) [ 29.816436] page_type: f5(slab) [ 29.816824] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.817959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.818608] page dumped because: kasan: bad access detected [ 29.819676] [ 29.819886] Memory state around the buggy address: [ 29.820195] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.821594] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.822440] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.823379] ^ [ 29.824186] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825342] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.825996] ================================================================== [ 28.907313] ================================================================== [ 28.909199] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 28.910075] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.911315] [ 28.911738] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.912785] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.913197] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.914507] Call Trace: [ 28.914878] <TASK> [ 28.915287] dump_stack_lvl+0x73/0xb0 [ 28.915761] print_report+0xd1/0x640 [ 28.916335] ? __virt_addr_valid+0x1db/0x2d0 [ 28.917000] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.917813] kasan_report+0x102/0x140 [ 28.918614] ? kasan_atomics_helper+0x566/0x5450 [ 28.919224] ? kasan_atomics_helper+0x566/0x5450 [ 28.920055] kasan_check_range+0x10c/0x1c0 [ 28.920680] __kasan_check_write+0x18/0x20 [ 28.921471] kasan_atomics_helper+0x566/0x5450 [ 28.922189] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.923496] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.924051] ? kasan_atomics+0x153/0x310 [ 28.924700] kasan_atomics+0x1dd/0x310 [ 28.925072] ? __pfx_kasan_atomics+0x10/0x10 [ 28.925708] ? __pfx_read_tsc+0x10/0x10 [ 28.926835] ? ktime_get_ts64+0x86/0x230 [ 28.927493] kunit_try_run_case+0x1b3/0x490 [ 28.928025] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.928786] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.929142] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.930007] ? __kthread_parkme+0x82/0x160 [ 28.930635] ? preempt_count_sub+0x50/0x80 [ 28.931773] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.932743] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.933635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.934294] kthread+0x257/0x310 [ 28.934703] ? __pfx_kthread+0x10/0x10 [ 28.935344] ret_from_fork+0x41/0x80 [ 28.936240] ? __pfx_kthread+0x10/0x10 [ 28.936749] ret_from_fork_asm+0x1a/0x30 [ 28.937451] </TASK> [ 28.937706] [ 28.938064] Allocated by task 272: [ 28.938755] kasan_save_stack+0x3d/0x60 [ 28.939196] kasan_save_track+0x18/0x40 [ 28.940155] kasan_save_alloc_info+0x3b/0x50 [ 28.940690] __kasan_kmalloc+0xb7/0xc0 [ 28.941289] __kmalloc_cache_noprof+0x184/0x410 [ 28.941613] kasan_atomics+0x96/0x310 [ 28.942183] kunit_try_run_case+0x1b3/0x490 [ 28.943065] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.944413] kthread+0x257/0x310 [ 28.944739] ret_from_fork+0x41/0x80 [ 28.945148] ret_from_fork_asm+0x1a/0x30 [ 28.945557] [ 28.945764] The buggy address belongs to the object at ffff888102969600 [ 28.945764] which belongs to the cache kmalloc-64 of size 64 [ 28.946901] The buggy address is located 0 bytes to the right of [ 28.946901] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.948171] [ 28.948695] The buggy address belongs to the physical page: [ 28.949592] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.951020] flags: 0x200000000000000(node=0|zone=2) [ 28.951796] page_type: f5(slab) [ 28.952365] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.953191] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.954521] page dumped because: kasan: bad access detected [ 28.955543] [ 28.955804] Memory state around the buggy address: [ 28.956422] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.957249] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.958593] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.959509] ^ [ 28.959897] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.960732] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.962119] ================================================================== [ 30.310231] ================================================================== [ 30.311515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 30.311987] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.313544] [ 30.314191] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.315112] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.315686] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.316712] Call Trace: [ 30.317044] <TASK> [ 30.317370] dump_stack_lvl+0x73/0xb0 [ 30.317801] print_report+0xd1/0x640 [ 30.318188] ? __virt_addr_valid+0x1db/0x2d0 [ 30.318648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.319175] kasan_report+0x102/0x140 [ 30.320277] ? kasan_atomics_helper+0x13b6/0x5450 [ 30.321344] ? kasan_atomics_helper+0x13b6/0x5450 [ 30.322181] kasan_check_range+0x10c/0x1c0 [ 30.322634] __kasan_check_read+0x15/0x20 [ 30.323431] kasan_atomics_helper+0x13b6/0x5450 [ 30.324153] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.325224] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.325714] ? kasan_atomics+0x153/0x310 [ 30.326378] kasan_atomics+0x1dd/0x310 [ 30.326833] ? __pfx_kasan_atomics+0x10/0x10 [ 30.327577] ? __pfx_read_tsc+0x10/0x10 [ 30.328185] ? ktime_get_ts64+0x86/0x230 [ 30.328800] kunit_try_run_case+0x1b3/0x490 [ 30.329484] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.330550] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.331511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.332160] ? __kthread_parkme+0x82/0x160 [ 30.332637] ? preempt_count_sub+0x50/0x80 [ 30.333329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.334327] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.335112] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.335809] kthread+0x257/0x310 [ 30.336381] ? __pfx_kthread+0x10/0x10 [ 30.337474] ret_from_fork+0x41/0x80 [ 30.338221] ? __pfx_kthread+0x10/0x10 [ 30.338661] ret_from_fork_asm+0x1a/0x30 [ 30.339371] </TASK> [ 30.339596] [ 30.339847] Allocated by task 272: [ 30.340666] kasan_save_stack+0x3d/0x60 [ 30.340951] kasan_save_track+0x18/0x40 [ 30.341588] kasan_save_alloc_info+0x3b/0x50 [ 30.342111] __kasan_kmalloc+0xb7/0xc0 [ 30.342925] __kmalloc_cache_noprof+0x184/0x410 [ 30.343484] kasan_atomics+0x96/0x310 [ 30.344355] kunit_try_run_case+0x1b3/0x490 [ 30.344692] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.345535] kthread+0x257/0x310 [ 30.346134] ret_from_fork+0x41/0x80 [ 30.346601] ret_from_fork_asm+0x1a/0x30 [ 30.347457] [ 30.347624] The buggy address belongs to the object at ffff888102969600 [ 30.347624] which belongs to the cache kmalloc-64 of size 64 [ 30.349549] The buggy address is located 0 bytes to the right of [ 30.349549] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.351019] [ 30.351190] The buggy address belongs to the physical page: [ 30.352006] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.353239] flags: 0x200000000000000(node=0|zone=2) [ 30.353981] page_type: f5(slab) [ 30.354301] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.355233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.356192] page dumped because: kasan: bad access detected [ 30.356593] [ 30.357280] Memory state around the buggy address: [ 30.357943] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.358713] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.359547] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.360766] ^ [ 30.361589] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.362738] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.363478] ================================================================== [ 30.114880] ================================================================== [ 30.115543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 30.116139] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.116789] [ 30.117062] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.117705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.118239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.119008] Call Trace: [ 30.119228] <TASK> [ 30.119584] dump_stack_lvl+0x73/0xb0 [ 30.120231] print_report+0xd1/0x640 [ 30.120600] ? __virt_addr_valid+0x1db/0x2d0 [ 30.121292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.121761] kasan_report+0x102/0x140 [ 30.122109] ? kasan_atomics_helper+0x1218/0x5450 [ 30.122575] ? kasan_atomics_helper+0x1218/0x5450 [ 30.122998] kasan_check_range+0x10c/0x1c0 [ 30.123701] __kasan_check_write+0x18/0x20 [ 30.124014] kasan_atomics_helper+0x1218/0x5450 [ 30.124438] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.125293] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.125900] ? kasan_atomics+0x153/0x310 [ 30.126251] kasan_atomics+0x1dd/0x310 [ 30.126623] ? __pfx_kasan_atomics+0x10/0x10 [ 30.127207] ? __pfx_read_tsc+0x10/0x10 [ 30.127638] ? ktime_get_ts64+0x86/0x230 [ 30.128227] kunit_try_run_case+0x1b3/0x490 [ 30.128564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.128885] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.129214] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.129860] ? __kthread_parkme+0x82/0x160 [ 30.130432] ? preempt_count_sub+0x50/0x80 [ 30.131290] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.131728] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.132241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.132619] kthread+0x257/0x310 [ 30.133346] ? __pfx_kthread+0x10/0x10 [ 30.133689] ret_from_fork+0x41/0x80 [ 30.134169] ? __pfx_kthread+0x10/0x10 [ 30.134571] ret_from_fork_asm+0x1a/0x30 [ 30.135097] </TASK> [ 30.135352] [ 30.135532] Allocated by task 272: [ 30.135772] kasan_save_stack+0x3d/0x60 [ 30.136064] kasan_save_track+0x18/0x40 [ 30.136454] kasan_save_alloc_info+0x3b/0x50 [ 30.137010] __kasan_kmalloc+0xb7/0xc0 [ 30.137727] __kmalloc_cache_noprof+0x184/0x410 [ 30.138491] kasan_atomics+0x96/0x310 [ 30.138765] kunit_try_run_case+0x1b3/0x490 [ 30.139223] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.141468] kthread+0x257/0x310 [ 30.141818] ret_from_fork+0x41/0x80 [ 30.142270] ret_from_fork_asm+0x1a/0x30 [ 30.142586] [ 30.142752] The buggy address belongs to the object at ffff888102969600 [ 30.142752] which belongs to the cache kmalloc-64 of size 64 [ 30.145004] The buggy address is located 0 bytes to the right of [ 30.145004] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.147918] [ 30.148202] The buggy address belongs to the physical page: [ 30.148624] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.150861] flags: 0x200000000000000(node=0|zone=2) [ 30.151461] page_type: f5(slab) [ 30.151715] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.152397] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.153101] page dumped because: kasan: bad access detected [ 30.153591] [ 30.153874] Memory state around the buggy address: [ 30.154226] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.154930] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.155389] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.156106] ^ [ 30.156662] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.157362] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.157862] ================================================================== [ 30.421890] ================================================================== [ 30.423302] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 30.424290] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.426274] [ 30.426493] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.427681] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.428458] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.429538] Call Trace: [ 30.430379] <TASK> [ 30.430615] dump_stack_lvl+0x73/0xb0 [ 30.431040] print_report+0xd1/0x640 [ 30.431741] ? __virt_addr_valid+0x1db/0x2d0 [ 30.432345] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.433304] kasan_report+0x102/0x140 [ 30.433762] ? kasan_atomics_helper+0x1468/0x5450 [ 30.434248] ? kasan_atomics_helper+0x1468/0x5450 [ 30.434667] kasan_check_range+0x10c/0x1c0 [ 30.435288] __kasan_check_write+0x18/0x20 [ 30.435882] kasan_atomics_helper+0x1468/0x5450 [ 30.436395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.437174] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.438345] ? kasan_atomics+0x153/0x310 [ 30.438646] kasan_atomics+0x1dd/0x310 [ 30.439221] ? __pfx_kasan_atomics+0x10/0x10 [ 30.439707] ? __pfx_read_tsc+0x10/0x10 [ 30.440354] ? ktime_get_ts64+0x86/0x230 [ 30.441132] kunit_try_run_case+0x1b3/0x490 [ 30.441685] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.442637] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.443420] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.443802] ? __kthread_parkme+0x82/0x160 [ 30.444370] ? preempt_count_sub+0x50/0x80 [ 30.445308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.446143] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.447006] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.447593] kthread+0x257/0x310 [ 30.447946] ? __pfx_kthread+0x10/0x10 [ 30.448455] ret_from_fork+0x41/0x80 [ 30.449002] ? __pfx_kthread+0x10/0x10 [ 30.449532] ret_from_fork_asm+0x1a/0x30 [ 30.450087] </TASK> [ 30.450405] [ 30.450699] Allocated by task 272: [ 30.451153] kasan_save_stack+0x3d/0x60 [ 30.451747] kasan_save_track+0x18/0x40 [ 30.452817] kasan_save_alloc_info+0x3b/0x50 [ 30.453492] __kasan_kmalloc+0xb7/0xc0 [ 30.454404] __kmalloc_cache_noprof+0x184/0x410 [ 30.455206] kasan_atomics+0x96/0x310 [ 30.455477] kunit_try_run_case+0x1b3/0x490 [ 30.456755] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.457285] kthread+0x257/0x310 [ 30.457655] ret_from_fork+0x41/0x80 [ 30.458355] ret_from_fork_asm+0x1a/0x30 [ 30.459305] [ 30.459495] The buggy address belongs to the object at ffff888102969600 [ 30.459495] which belongs to the cache kmalloc-64 of size 64 [ 30.461290] The buggy address is located 0 bytes to the right of [ 30.461290] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.462789] [ 30.463001] The buggy address belongs to the physical page: [ 30.463549] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.464751] flags: 0x200000000000000(node=0|zone=2) [ 30.465371] page_type: f5(slab) [ 30.465726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.467067] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.467836] page dumped because: kasan: bad access detected [ 30.468602] [ 30.468900] Memory state around the buggy address: [ 30.469202] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.470172] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.471376] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.472321] ^ [ 30.472981] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.473485] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.474215] ================================================================== [ 28.963180] ================================================================== [ 28.963992] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 28.964755] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.966173] [ 28.966386] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.967741] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.968461] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.970132] Call Trace: [ 28.970988] <TASK> [ 28.971389] dump_stack_lvl+0x73/0xb0 [ 28.972489] print_report+0xd1/0x640 [ 28.972964] ? __virt_addr_valid+0x1db/0x2d0 [ 28.973859] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.974409] kasan_report+0x102/0x140 [ 28.974833] ? kasan_atomics_helper+0x5ff/0x5450 [ 28.975944] ? kasan_atomics_helper+0x5ff/0x5450 [ 28.976802] kasan_check_range+0x10c/0x1c0 [ 28.977877] __kasan_check_write+0x18/0x20 [ 28.978284] kasan_atomics_helper+0x5ff/0x5450 [ 28.979244] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.979937] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.980575] ? kasan_atomics+0x153/0x310 [ 28.981843] kasan_atomics+0x1dd/0x310 [ 28.982215] ? __pfx_kasan_atomics+0x10/0x10 [ 28.983101] ? __pfx_read_tsc+0x10/0x10 [ 28.983788] ? ktime_get_ts64+0x86/0x230 [ 28.984806] kunit_try_run_case+0x1b3/0x490 [ 28.985722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.986614] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.987151] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.988341] ? __kthread_parkme+0x82/0x160 [ 28.988808] ? preempt_count_sub+0x50/0x80 [ 28.989184] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.989746] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.990504] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.991540] kthread+0x257/0x310 [ 28.991819] ? __pfx_kthread+0x10/0x10 [ 28.992424] ret_from_fork+0x41/0x80 [ 28.992938] ? __pfx_kthread+0x10/0x10 [ 28.993594] ret_from_fork_asm+0x1a/0x30 [ 28.994422] </TASK> [ 28.994631] [ 28.995136] Allocated by task 272: [ 28.996451] kasan_save_stack+0x3d/0x60 [ 28.997020] kasan_save_track+0x18/0x40 [ 28.997686] kasan_save_alloc_info+0x3b/0x50 [ 28.998430] __kasan_kmalloc+0xb7/0xc0 [ 28.999158] __kmalloc_cache_noprof+0x184/0x410 [ 29.000177] kasan_atomics+0x96/0x310 [ 29.000717] kunit_try_run_case+0x1b3/0x490 [ 29.001694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.002336] kthread+0x257/0x310 [ 29.003178] ret_from_fork+0x41/0x80 [ 29.003983] ret_from_fork_asm+0x1a/0x30 [ 29.004421] [ 29.004630] The buggy address belongs to the object at ffff888102969600 [ 29.004630] which belongs to the cache kmalloc-64 of size 64 [ 29.006583] The buggy address is located 0 bytes to the right of [ 29.006583] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.008443] [ 29.008669] The buggy address belongs to the physical page: [ 29.009161] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.011056] flags: 0x200000000000000(node=0|zone=2) [ 29.011391] page_type: f5(slab) [ 29.011826] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.012572] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.013420] page dumped because: kasan: bad access detected [ 29.014079] [ 29.014857] Memory state around the buggy address: [ 29.015762] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.016705] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.018039] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.019034] ^ [ 29.019764] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.021010] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.022705] ================================================================== [ 28.503039] ================================================================== [ 28.503912] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 28.504621] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.505454] [ 28.505915] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.507121] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.507526] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.508622] Call Trace: [ 28.508897] <TASK> [ 28.509193] dump_stack_lvl+0x73/0xb0 [ 28.509699] print_report+0xd1/0x640 [ 28.510192] ? __virt_addr_valid+0x1db/0x2d0 [ 28.510557] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.511146] kasan_report+0x102/0x140 [ 28.511753] ? kasan_atomics_helper+0x4ba4/0x5450 [ 28.512200] ? kasan_atomics_helper+0x4ba4/0x5450 [ 28.512765] __asan_report_store4_noabort+0x1b/0x30 [ 28.513321] kasan_atomics_helper+0x4ba4/0x5450 [ 28.513763] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.514331] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.514974] ? kasan_atomics+0x153/0x310 [ 28.516152] kasan_atomics+0x1dd/0x310 [ 28.516548] ? __pfx_kasan_atomics+0x10/0x10 [ 28.516853] ? __pfx_read_tsc+0x10/0x10 [ 28.517677] ? ktime_get_ts64+0x86/0x230 [ 28.517983] kunit_try_run_case+0x1b3/0x490 [ 28.518760] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.519469] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.520023] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.520408] ? __kthread_parkme+0x82/0x160 [ 28.520892] ? preempt_count_sub+0x50/0x80 [ 28.521852] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.522443] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.523008] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.523394] kthread+0x257/0x310 [ 28.523858] ? __pfx_kthread+0x10/0x10 [ 28.525167] ret_from_fork+0x41/0x80 [ 28.525494] ? __pfx_kthread+0x10/0x10 [ 28.525967] ret_from_fork_asm+0x1a/0x30 [ 28.526427] </TASK> [ 28.526752] [ 28.527366] Allocated by task 272: [ 28.527778] kasan_save_stack+0x3d/0x60 [ 28.528089] kasan_save_track+0x18/0x40 [ 28.528395] kasan_save_alloc_info+0x3b/0x50 [ 28.528946] __kasan_kmalloc+0xb7/0xc0 [ 28.529453] __kmalloc_cache_noprof+0x184/0x410 [ 28.530512] kasan_atomics+0x96/0x310 [ 28.530833] kunit_try_run_case+0x1b3/0x490 [ 28.531126] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.531912] kthread+0x257/0x310 [ 28.532438] ret_from_fork+0x41/0x80 [ 28.532939] ret_from_fork_asm+0x1a/0x30 [ 28.533418] [ 28.533616] The buggy address belongs to the object at ffff888102969600 [ 28.533616] which belongs to the cache kmalloc-64 of size 64 [ 28.534697] The buggy address is located 0 bytes to the right of [ 28.534697] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.535797] [ 28.535959] The buggy address belongs to the physical page: [ 28.536738] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.537891] flags: 0x200000000000000(node=0|zone=2) [ 28.538218] page_type: f5(slab) [ 28.538511] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.539363] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.540183] page dumped because: kasan: bad access detected [ 28.540712] [ 28.540920] Memory state around the buggy address: [ 28.541875] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.542539] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.543180] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.543861] ^ [ 28.544170] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.545531] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.546430] ================================================================== [ 29.982334] ================================================================== [ 29.982885] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 29.984943] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.985737] [ 29.986499] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.987527] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.988270] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.989390] Call Trace: [ 29.989938] <TASK> [ 29.990326] dump_stack_lvl+0x73/0xb0 [ 29.991182] print_report+0xd1/0x640 [ 29.991820] ? __virt_addr_valid+0x1db/0x2d0 [ 29.992277] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.993159] kasan_report+0x102/0x140 [ 29.993594] ? kasan_atomics_helper+0x4a1e/0x5450 [ 29.994431] ? kasan_atomics_helper+0x4a1e/0x5450 [ 29.995286] __asan_report_load4_noabort+0x18/0x20 [ 29.995954] kasan_atomics_helper+0x4a1e/0x5450 [ 29.996457] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.997420] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.997886] ? kasan_atomics+0x153/0x310 [ 29.998544] kasan_atomics+0x1dd/0x310 [ 29.999183] ? __pfx_kasan_atomics+0x10/0x10 [ 29.999811] ? __pfx_read_tsc+0x10/0x10 [ 30.000577] ? ktime_get_ts64+0x86/0x230 [ 30.001195] kunit_try_run_case+0x1b3/0x490 [ 30.001633] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.002406] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.003415] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.003891] ? __kthread_parkme+0x82/0x160 [ 30.004503] ? preempt_count_sub+0x50/0x80 [ 30.005287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.005911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.006722] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.007470] kthread+0x257/0x310 [ 30.008201] ? __pfx_kthread+0x10/0x10 [ 30.008612] ret_from_fork+0x41/0x80 [ 30.009306] ? __pfx_kthread+0x10/0x10 [ 30.009724] ret_from_fork_asm+0x1a/0x30 [ 30.010628] </TASK> [ 30.010825] [ 30.011220] Allocated by task 272: [ 30.011733] kasan_save_stack+0x3d/0x60 [ 30.012173] kasan_save_track+0x18/0x40 [ 30.012708] kasan_save_alloc_info+0x3b/0x50 [ 30.013082] __kasan_kmalloc+0xb7/0xc0 [ 30.013548] __kmalloc_cache_noprof+0x184/0x410 [ 30.014411] kasan_atomics+0x96/0x310 [ 30.014675] kunit_try_run_case+0x1b3/0x490 [ 30.015604] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.016312] kthread+0x257/0x310 [ 30.016862] ret_from_fork+0x41/0x80 [ 30.017504] ret_from_fork_asm+0x1a/0x30 [ 30.018086] [ 30.018248] The buggy address belongs to the object at ffff888102969600 [ 30.018248] which belongs to the cache kmalloc-64 of size 64 [ 30.019897] The buggy address is located 0 bytes to the right of [ 30.019897] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.021378] [ 30.021830] The buggy address belongs to the physical page: [ 30.022305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.023408] flags: 0x200000000000000(node=0|zone=2) [ 30.024130] page_type: f5(slab) [ 30.024689] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.025683] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.026627] page dumped because: kasan: bad access detected [ 30.027400] [ 30.027580] Memory state around the buggy address: [ 30.028481] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.029282] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.030232] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.030836] ^ [ 30.031564] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.032664] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.033497] ================================================================== [ 30.475843] ================================================================== [ 30.476573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 30.477343] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.478429] [ 30.478649] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.480877] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.481698] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.483233] Call Trace: [ 30.483662] <TASK> [ 30.484356] dump_stack_lvl+0x73/0xb0 [ 30.485033] print_report+0xd1/0x640 [ 30.485449] ? __virt_addr_valid+0x1db/0x2d0 [ 30.485891] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.486479] kasan_report+0x102/0x140 [ 30.486784] ? kasan_atomics_helper+0x50d6/0x5450 [ 30.487345] ? kasan_atomics_helper+0x50d6/0x5450 [ 30.487947] __asan_report_store8_noabort+0x1b/0x30 [ 30.488497] kasan_atomics_helper+0x50d6/0x5450 [ 30.489522] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.490281] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.490756] ? kasan_atomics+0x153/0x310 [ 30.491122] kasan_atomics+0x1dd/0x310 [ 30.491543] ? __pfx_kasan_atomics+0x10/0x10 [ 30.492319] ? __pfx_read_tsc+0x10/0x10 [ 30.492729] ? ktime_get_ts64+0x86/0x230 [ 30.493954] kunit_try_run_case+0x1b3/0x490 [ 30.494458] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.495415] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.496127] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.496648] ? __kthread_parkme+0x82/0x160 [ 30.497589] ? preempt_count_sub+0x50/0x80 [ 30.498289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.498758] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.499654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.500900] kthread+0x257/0x310 [ 30.501278] ? __pfx_kthread+0x10/0x10 [ 30.501861] ret_from_fork+0x41/0x80 [ 30.502374] ? __pfx_kthread+0x10/0x10 [ 30.502997] ret_from_fork_asm+0x1a/0x30 [ 30.503483] </TASK> [ 30.504059] [ 30.504556] Allocated by task 272: [ 30.504801] kasan_save_stack+0x3d/0x60 [ 30.505650] kasan_save_track+0x18/0x40 [ 30.506103] kasan_save_alloc_info+0x3b/0x50 [ 30.506573] __kasan_kmalloc+0xb7/0xc0 [ 30.507582] __kmalloc_cache_noprof+0x184/0x410 [ 30.507949] kasan_atomics+0x96/0x310 [ 30.508748] kunit_try_run_case+0x1b3/0x490 [ 30.509486] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.510075] kthread+0x257/0x310 [ 30.510973] ret_from_fork+0x41/0x80 [ 30.511410] ret_from_fork_asm+0x1a/0x30 [ 30.512329] [ 30.512509] The buggy address belongs to the object at ffff888102969600 [ 30.512509] which belongs to the cache kmalloc-64 of size 64 [ 30.513910] The buggy address is located 0 bytes to the right of [ 30.513910] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.515621] [ 30.516039] The buggy address belongs to the physical page: [ 30.516545] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.517621] flags: 0x200000000000000(node=0|zone=2) [ 30.518380] page_type: f5(slab) [ 30.519462] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.520155] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.521215] page dumped because: kasan: bad access detected [ 30.521730] [ 30.522320] Memory state around the buggy address: [ 30.523003] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.523690] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.524653] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.525469] ^ [ 30.526079] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.527197] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.528295] ================================================================== [ 30.075546] ================================================================== [ 30.076474] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 30.077440] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.077937] [ 30.078201] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.078825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.079117] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.080300] Call Trace: [ 30.080670] <TASK> [ 30.080965] dump_stack_lvl+0x73/0xb0 [ 30.081427] print_report+0xd1/0x640 [ 30.081723] ? __virt_addr_valid+0x1db/0x2d0 [ 30.082316] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.082966] kasan_report+0x102/0x140 [ 30.083382] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.083791] ? kasan_atomics_helper+0x4a04/0x5450 [ 30.084283] __asan_report_load4_noabort+0x18/0x20 [ 30.084757] kasan_atomics_helper+0x4a04/0x5450 [ 30.085071] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.085574] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.086121] ? kasan_atomics+0x153/0x310 [ 30.086461] kasan_atomics+0x1dd/0x310 [ 30.086756] ? __pfx_kasan_atomics+0x10/0x10 [ 30.087362] ? __pfx_read_tsc+0x10/0x10 [ 30.088147] ? ktime_get_ts64+0x86/0x230 [ 30.088544] kunit_try_run_case+0x1b3/0x490 [ 30.089057] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.089837] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.090208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.090957] ? __kthread_parkme+0x82/0x160 [ 30.091392] ? preempt_count_sub+0x50/0x80 [ 30.091814] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.092299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.092814] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.093368] kthread+0x257/0x310 [ 30.093721] ? __pfx_kthread+0x10/0x10 [ 30.094092] ret_from_fork+0x41/0x80 [ 30.094522] ? __pfx_kthread+0x10/0x10 [ 30.094813] ret_from_fork_asm+0x1a/0x30 [ 30.095132] </TASK> [ 30.095395] [ 30.095665] Allocated by task 272: [ 30.096390] kasan_save_stack+0x3d/0x60 [ 30.096995] kasan_save_track+0x18/0x40 [ 30.097524] kasan_save_alloc_info+0x3b/0x50 [ 30.098066] __kasan_kmalloc+0xb7/0xc0 [ 30.098446] __kmalloc_cache_noprof+0x184/0x410 [ 30.098956] kasan_atomics+0x96/0x310 [ 30.099294] kunit_try_run_case+0x1b3/0x490 [ 30.099619] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.099978] kthread+0x257/0x310 [ 30.100237] ret_from_fork+0x41/0x80 [ 30.100559] ret_from_fork_asm+0x1a/0x30 [ 30.101076] [ 30.101357] The buggy address belongs to the object at ffff888102969600 [ 30.101357] which belongs to the cache kmalloc-64 of size 64 [ 30.102619] The buggy address is located 0 bytes to the right of [ 30.102619] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.104205] [ 30.104394] The buggy address belongs to the physical page: [ 30.104735] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.105599] flags: 0x200000000000000(node=0|zone=2) [ 30.106551] page_type: f5(slab) [ 30.107064] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.107684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.108365] page dumped because: kasan: bad access detected [ 30.108706] [ 30.108868] Memory state around the buggy address: [ 30.109175] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.109984] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.110725] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.111138] ^ [ 30.111957] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.112740] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.113523] ================================================================== [ 29.474170] ================================================================== [ 29.475102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 29.476732] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.477436] [ 29.477630] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.478947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.479416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.480507] Call Trace: [ 29.480906] <TASK> [ 29.481330] dump_stack_lvl+0x73/0xb0 [ 29.481926] print_report+0xd1/0x640 [ 29.482453] ? __virt_addr_valid+0x1db/0x2d0 [ 29.483135] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.483798] kasan_report+0x102/0x140 [ 29.484322] ? kasan_atomics_helper+0xb6b/0x5450 [ 29.484739] ? kasan_atomics_helper+0xb6b/0x5450 [ 29.485172] kasan_check_range+0x10c/0x1c0 [ 29.485807] __kasan_check_write+0x18/0x20 [ 29.486284] kasan_atomics_helper+0xb6b/0x5450 [ 29.486916] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.487590] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.488378] ? kasan_atomics+0x153/0x310 [ 29.488896] kasan_atomics+0x1dd/0x310 [ 29.489453] ? __pfx_kasan_atomics+0x10/0x10 [ 29.489918] ? __pfx_read_tsc+0x10/0x10 [ 29.490652] ? ktime_get_ts64+0x86/0x230 [ 29.491128] kunit_try_run_case+0x1b3/0x490 [ 29.491702] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.492344] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.492801] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.493302] ? __kthread_parkme+0x82/0x160 [ 29.493926] ? preempt_count_sub+0x50/0x80 [ 29.494390] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.495025] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.495838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.496345] kthread+0x257/0x310 [ 29.496863] ? __pfx_kthread+0x10/0x10 [ 29.497334] ret_from_fork+0x41/0x80 [ 29.497716] ? __pfx_kthread+0x10/0x10 [ 29.498688] ret_from_fork_asm+0x1a/0x30 [ 29.499247] </TASK> [ 29.499518] [ 29.499794] Allocated by task 272: [ 29.500064] kasan_save_stack+0x3d/0x60 [ 29.500631] kasan_save_track+0x18/0x40 [ 29.500963] kasan_save_alloc_info+0x3b/0x50 [ 29.501646] __kasan_kmalloc+0xb7/0xc0 [ 29.501974] __kmalloc_cache_noprof+0x184/0x410 [ 29.502528] kasan_atomics+0x96/0x310 [ 29.503048] kunit_try_run_case+0x1b3/0x490 [ 29.503389] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.504053] kthread+0x257/0x310 [ 29.504570] ret_from_fork+0x41/0x80 [ 29.504961] ret_from_fork_asm+0x1a/0x30 [ 29.505271] [ 29.505619] The buggy address belongs to the object at ffff888102969600 [ 29.505619] which belongs to the cache kmalloc-64 of size 64 [ 29.506891] The buggy address is located 0 bytes to the right of [ 29.506891] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.507627] [ 29.508011] The buggy address belongs to the physical page: [ 29.508707] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.509400] flags: 0x200000000000000(node=0|zone=2) [ 29.510203] page_type: f5(slab) [ 29.510565] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.511480] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.511951] page dumped because: kasan: bad access detected [ 29.512600] [ 29.513043] Memory state around the buggy address: [ 29.513413] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.514219] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.515020] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.515452] ^ [ 29.516033] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.516615] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.517458] ================================================================== [ 31.494042] ================================================================== [ 31.495659] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 31.496616] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.497186] [ 31.498110] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.499443] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.500155] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.500856] Call Trace: [ 31.501386] <TASK> [ 31.501671] dump_stack_lvl+0x73/0xb0 [ 31.502172] print_report+0xd1/0x640 [ 31.502511] ? __virt_addr_valid+0x1db/0x2d0 [ 31.503019] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.503427] kasan_report+0x102/0x140 [ 31.503944] ? kasan_atomics_helper+0x4f9a/0x5450 [ 31.504520] ? kasan_atomics_helper+0x4f9a/0x5450 [ 31.505092] __asan_report_load8_noabort+0x18/0x20 [ 31.505689] kasan_atomics_helper+0x4f9a/0x5450 [ 31.506307] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.507153] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.507988] ? kasan_atomics+0x153/0x310 [ 31.508460] kasan_atomics+0x1dd/0x310 [ 31.509532] ? __pfx_kasan_atomics+0x10/0x10 [ 31.509926] ? __pfx_read_tsc+0x10/0x10 [ 31.510123] ? ktime_get_ts64+0x86/0x230 [ 31.510417] kunit_try_run_case+0x1b3/0x490 [ 31.511186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.512275] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.513012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.513729] ? __kthread_parkme+0x82/0x160 [ 31.514496] ? preempt_count_sub+0x50/0x80 [ 31.514955] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.515643] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.516818] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.517848] kthread+0x257/0x310 [ 31.518118] ? __pfx_kthread+0x10/0x10 [ 31.518647] ret_from_fork+0x41/0x80 [ 31.519186] ? __pfx_kthread+0x10/0x10 [ 31.519715] ret_from_fork_asm+0x1a/0x30 [ 31.520121] </TASK> [ 31.520512] [ 31.520777] Allocated by task 272: [ 31.521219] kasan_save_stack+0x3d/0x60 [ 31.522385] kasan_save_track+0x18/0x40 [ 31.522666] kasan_save_alloc_info+0x3b/0x50 [ 31.523478] __kasan_kmalloc+0xb7/0xc0 [ 31.524269] __kmalloc_cache_noprof+0x184/0x410 [ 31.524693] kasan_atomics+0x96/0x310 [ 31.525168] kunit_try_run_case+0x1b3/0x490 [ 31.525578] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.526501] kthread+0x257/0x310 [ 31.526824] ret_from_fork+0x41/0x80 [ 31.527400] ret_from_fork_asm+0x1a/0x30 [ 31.527896] [ 31.528018] The buggy address belongs to the object at ffff888102969600 [ 31.528018] which belongs to the cache kmalloc-64 of size 64 [ 31.528485] The buggy address is located 0 bytes to the right of [ 31.528485] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.529113] [ 31.529301] The buggy address belongs to the physical page: [ 31.529915] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.531595] flags: 0x200000000000000(node=0|zone=2) [ 31.532115] page_type: f5(slab) [ 31.532516] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.533133] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.534030] page dumped because: kasan: bad access detected [ 31.534583] [ 31.534807] Memory state around the buggy address: [ 31.535401] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.536120] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.536844] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.537524] ^ [ 31.537983] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.538688] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.539474] ================================================================== [ 29.200635] ================================================================== [ 29.202736] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 29.203510] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.203947] [ 29.205358] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.206166] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.207126] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.208362] Call Trace: [ 29.208787] <TASK> [ 29.209979] dump_stack_lvl+0x73/0xb0 [ 29.210580] print_report+0xd1/0x640 [ 29.210979] ? __virt_addr_valid+0x1db/0x2d0 [ 29.211837] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.212377] kasan_report+0x102/0x140 [ 29.212673] ? kasan_atomics_helper+0x861/0x5450 [ 29.214216] ? kasan_atomics_helper+0x861/0x5450 [ 29.214752] kasan_check_range+0x10c/0x1c0 [ 29.215812] __kasan_check_write+0x18/0x20 [ 29.216196] kasan_atomics_helper+0x861/0x5450 [ 29.216693] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.216994] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.217745] ? kasan_atomics+0x153/0x310 [ 29.218189] kasan_atomics+0x1dd/0x310 [ 29.219855] ? __pfx_kasan_atomics+0x10/0x10 [ 29.221075] ? __pfx_read_tsc+0x10/0x10 [ 29.221534] ? ktime_get_ts64+0x86/0x230 [ 29.222432] kunit_try_run_case+0x1b3/0x490 [ 29.222788] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.223910] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.225022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.225742] ? __kthread_parkme+0x82/0x160 [ 29.226514] ? preempt_count_sub+0x50/0x80 [ 29.226827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.227774] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.228761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.229862] kthread+0x257/0x310 [ 29.230472] ? __pfx_kthread+0x10/0x10 [ 29.231108] ret_from_fork+0x41/0x80 [ 29.232176] ? __pfx_kthread+0x10/0x10 [ 29.232629] ret_from_fork_asm+0x1a/0x30 [ 29.233330] </TASK> [ 29.233849] [ 29.234021] Allocated by task 272: [ 29.234884] kasan_save_stack+0x3d/0x60 [ 29.235925] kasan_save_track+0x18/0x40 [ 29.236196] kasan_save_alloc_info+0x3b/0x50 [ 29.237430] __kasan_kmalloc+0xb7/0xc0 [ 29.237780] __kmalloc_cache_noprof+0x184/0x410 [ 29.238482] kasan_atomics+0x96/0x310 [ 29.238769] kunit_try_run_case+0x1b3/0x490 [ 29.239066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.240355] kthread+0x257/0x310 [ 29.240719] ret_from_fork+0x41/0x80 [ 29.241130] ret_from_fork_asm+0x1a/0x30 [ 29.241839] [ 29.243160] The buggy address belongs to the object at ffff888102969600 [ 29.243160] which belongs to the cache kmalloc-64 of size 64 [ 29.245960] The buggy address is located 0 bytes to the right of [ 29.245960] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.247473] [ 29.248434] The buggy address belongs to the physical page: [ 29.248857] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.250937] flags: 0x200000000000000(node=0|zone=2) [ 29.251532] page_type: f5(slab) [ 29.251785] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.252583] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.253627] page dumped because: kasan: bad access detected [ 29.255340] [ 29.255542] Memory state around the buggy address: [ 29.255885] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.257822] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.259245] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.260402] ^ [ 29.260704] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262002] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.262824] ================================================================== [ 30.664681] ================================================================== [ 30.667313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 30.668028] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.669358] [ 30.669712] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.670962] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.671515] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.672241] Call Trace: [ 30.672564] <TASK> [ 30.672799] dump_stack_lvl+0x73/0xb0 [ 30.673121] print_report+0xd1/0x640 [ 30.673622] ? __virt_addr_valid+0x1db/0x2d0 [ 30.674126] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.674596] kasan_report+0x102/0x140 [ 30.675298] ? kasan_atomics_helper+0x16e8/0x5450 [ 30.675732] ? kasan_atomics_helper+0x16e8/0x5450 [ 30.676341] kasan_check_range+0x10c/0x1c0 [ 30.676741] __kasan_check_write+0x18/0x20 [ 30.677194] kasan_atomics_helper+0x16e8/0x5450 [ 30.677819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.678304] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.678690] ? kasan_atomics+0x153/0x310 [ 30.679181] kasan_atomics+0x1dd/0x310 [ 30.679671] ? __pfx_kasan_atomics+0x10/0x10 [ 30.680043] ? __pfx_read_tsc+0x10/0x10 [ 30.680496] ? ktime_get_ts64+0x86/0x230 [ 30.681176] kunit_try_run_case+0x1b3/0x490 [ 30.681610] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.682079] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.682788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.683237] ? __kthread_parkme+0x82/0x160 [ 30.683619] ? preempt_count_sub+0x50/0x80 [ 30.684004] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.684407] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.685529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.686194] kthread+0x257/0x310 [ 30.686522] ? __pfx_kthread+0x10/0x10 [ 30.687117] ret_from_fork+0x41/0x80 [ 30.687547] ? __pfx_kthread+0x10/0x10 [ 30.687837] ret_from_fork_asm+0x1a/0x30 [ 30.688389] </TASK> [ 30.688686] [ 30.688977] Allocated by task 272: [ 30.689500] kasan_save_stack+0x3d/0x60 [ 30.689962] kasan_save_track+0x18/0x40 [ 30.690272] kasan_save_alloc_info+0x3b/0x50 [ 30.690657] __kasan_kmalloc+0xb7/0xc0 [ 30.691110] __kmalloc_cache_noprof+0x184/0x410 [ 30.691858] kasan_atomics+0x96/0x310 [ 30.692311] kunit_try_run_case+0x1b3/0x490 [ 30.692695] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.693191] kthread+0x257/0x310 [ 30.693482] ret_from_fork+0x41/0x80 [ 30.693748] ret_from_fork_asm+0x1a/0x30 [ 30.694249] [ 30.694552] The buggy address belongs to the object at ffff888102969600 [ 30.694552] which belongs to the cache kmalloc-64 of size 64 [ 30.695835] The buggy address is located 0 bytes to the right of [ 30.695835] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.698893] [ 30.699076] The buggy address belongs to the physical page: [ 30.699426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.700364] flags: 0x200000000000000(node=0|zone=2) [ 30.701326] page_type: f5(slab) [ 30.701670] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.702426] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.703358] page dumped because: kasan: bad access detected [ 30.704010] [ 30.704335] Memory state around the buggy address: [ 30.705139] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.705972] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.706587] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.707756] ^ [ 30.708219] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709068] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.709854] ================================================================== [ 29.827048] ================================================================== [ 29.828575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 29.830239] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.830774] [ 29.830964] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.832659] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.833231] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.834099] Call Trace: [ 29.834542] <TASK> [ 29.834823] dump_stack_lvl+0x73/0xb0 [ 29.835526] print_report+0xd1/0x640 [ 29.836114] ? __virt_addr_valid+0x1db/0x2d0 [ 29.836587] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.837633] kasan_report+0x102/0x140 [ 29.838114] ? kasan_atomics_helper+0xfaa/0x5450 [ 29.838615] ? kasan_atomics_helper+0xfaa/0x5450 [ 29.839420] kasan_check_range+0x10c/0x1c0 [ 29.839758] __kasan_check_write+0x18/0x20 [ 29.840201] kasan_atomics_helper+0xfaa/0x5450 [ 29.841121] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.841681] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.842721] ? kasan_atomics+0x153/0x310 [ 29.843471] kasan_atomics+0x1dd/0x310 [ 29.843976] ? __pfx_kasan_atomics+0x10/0x10 [ 29.844839] ? __pfx_read_tsc+0x10/0x10 [ 29.845427] ? ktime_get_ts64+0x86/0x230 [ 29.846157] kunit_try_run_case+0x1b3/0x490 [ 29.846655] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.847651] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.848192] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.848903] ? __kthread_parkme+0x82/0x160 [ 29.849524] ? preempt_count_sub+0x50/0x80 [ 29.850200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.850965] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.851540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.852158] kthread+0x257/0x310 [ 29.852964] ? __pfx_kthread+0x10/0x10 [ 29.853509] ret_from_fork+0x41/0x80 [ 29.854137] ? __pfx_kthread+0x10/0x10 [ 29.854729] ret_from_fork_asm+0x1a/0x30 [ 29.855495] </TASK> [ 29.856099] [ 29.856307] Allocated by task 272: [ 29.856719] kasan_save_stack+0x3d/0x60 [ 29.857092] kasan_save_track+0x18/0x40 [ 29.857672] kasan_save_alloc_info+0x3b/0x50 [ 29.858132] __kasan_kmalloc+0xb7/0xc0 [ 29.858562] __kmalloc_cache_noprof+0x184/0x410 [ 29.859081] kasan_atomics+0x96/0x310 [ 29.859404] kunit_try_run_case+0x1b3/0x490 [ 29.859853] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.860974] kthread+0x257/0x310 [ 29.861228] ret_from_fork+0x41/0x80 [ 29.861523] ret_from_fork_asm+0x1a/0x30 [ 29.861816] [ 29.862135] The buggy address belongs to the object at ffff888102969600 [ 29.862135] which belongs to the cache kmalloc-64 of size 64 [ 29.864124] The buggy address is located 0 bytes to the right of [ 29.864124] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.866281] [ 29.866702] The buggy address belongs to the physical page: [ 29.867185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.867561] flags: 0x200000000000000(node=0|zone=2) [ 29.867849] page_type: f5(slab) [ 29.868401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.869476] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.870137] page dumped because: kasan: bad access detected [ 29.870748] [ 29.871049] Memory state around the buggy address: [ 29.871519] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.872099] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.872921] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.874237] ^ [ 29.875294] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.875853] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.876667] ================================================================== [ 30.365006] ================================================================== [ 30.366854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 30.368153] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.369659] [ 30.369900] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.370974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.371433] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.372495] Call Trace: [ 30.372955] <TASK> [ 30.373629] dump_stack_lvl+0x73/0xb0 [ 30.374085] print_report+0xd1/0x640 [ 30.374629] ? __virt_addr_valid+0x1db/0x2d0 [ 30.375169] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.375875] kasan_report+0x102/0x140 [ 30.376524] ? kasan_atomics_helper+0x4eb0/0x5450 [ 30.377688] ? kasan_atomics_helper+0x4eb0/0x5450 [ 30.378206] __asan_report_load8_noabort+0x18/0x20 [ 30.378925] kasan_atomics_helper+0x4eb0/0x5450 [ 30.379485] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.380029] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.381227] ? kasan_atomics+0x153/0x310 [ 30.381662] kasan_atomics+0x1dd/0x310 [ 30.382425] ? __pfx_kasan_atomics+0x10/0x10 [ 30.383031] ? __pfx_read_tsc+0x10/0x10 [ 30.383599] ? ktime_get_ts64+0x86/0x230 [ 30.384573] kunit_try_run_case+0x1b3/0x490 [ 30.385182] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.385703] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.386572] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.387342] ? __kthread_parkme+0x82/0x160 [ 30.388026] ? preempt_count_sub+0x50/0x80 [ 30.388488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.389565] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.390323] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.391110] kthread+0x257/0x310 [ 30.391771] ? __pfx_kthread+0x10/0x10 [ 30.392444] ret_from_fork+0x41/0x80 [ 30.393159] ? __pfx_kthread+0x10/0x10 [ 30.393756] ret_from_fork_asm+0x1a/0x30 [ 30.394540] </TASK> [ 30.395226] [ 30.395448] Allocated by task 272: [ 30.395693] kasan_save_stack+0x3d/0x60 [ 30.396629] kasan_save_track+0x18/0x40 [ 30.397426] kasan_save_alloc_info+0x3b/0x50 [ 30.398295] __kasan_kmalloc+0xb7/0xc0 [ 30.399048] __kmalloc_cache_noprof+0x184/0x410 [ 30.399605] kasan_atomics+0x96/0x310 [ 30.400119] kunit_try_run_case+0x1b3/0x490 [ 30.400554] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.401438] kthread+0x257/0x310 [ 30.401688] ret_from_fork+0x41/0x80 [ 30.401964] ret_from_fork_asm+0x1a/0x30 [ 30.402240] [ 30.402446] The buggy address belongs to the object at ffff888102969600 [ 30.402446] which belongs to the cache kmalloc-64 of size 64 [ 30.403063] The buggy address is located 0 bytes to the right of [ 30.403063] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.407362] [ 30.407628] The buggy address belongs to the physical page: [ 30.408566] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.409539] flags: 0x200000000000000(node=0|zone=2) [ 30.410604] page_type: f5(slab) [ 30.410940] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.411588] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.412714] page dumped because: kasan: bad access detected [ 30.413704] [ 30.413935] Memory state around the buggy address: [ 30.414869] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.415617] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.416478] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.416860] ^ [ 30.417318] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.418598] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.419548] ================================================================== [ 30.910111] ================================================================== [ 30.910686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 30.911562] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.912205] [ 30.912679] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.913705] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.914176] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.915030] Call Trace: [ 30.915279] <TASK> [ 30.915666] dump_stack_lvl+0x73/0xb0 [ 30.916393] print_report+0xd1/0x640 [ 30.916942] ? __virt_addr_valid+0x1db/0x2d0 [ 30.917395] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.918072] kasan_report+0x102/0x140 [ 30.918720] ? kasan_atomics_helper+0x19e4/0x5450 [ 30.919079] ? kasan_atomics_helper+0x19e4/0x5450 [ 30.919637] kasan_check_range+0x10c/0x1c0 [ 30.920310] __kasan_check_write+0x18/0x20 [ 30.920922] kasan_atomics_helper+0x19e4/0x5450 [ 30.921429] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.921981] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.922705] ? kasan_atomics+0x153/0x310 [ 30.923224] kasan_atomics+0x1dd/0x310 [ 30.923696] ? __pfx_kasan_atomics+0x10/0x10 [ 30.924315] ? __pfx_read_tsc+0x10/0x10 [ 30.924723] ? ktime_get_ts64+0x86/0x230 [ 30.925222] kunit_try_run_case+0x1b3/0x490 [ 30.925733] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.926378] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.926894] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.927307] ? __kthread_parkme+0x82/0x160 [ 30.927856] ? preempt_count_sub+0x50/0x80 [ 30.928167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.928510] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.929003] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.929746] kthread+0x257/0x310 [ 30.930491] ? __pfx_kthread+0x10/0x10 [ 30.930837] ret_from_fork+0x41/0x80 [ 30.931278] ? __pfx_kthread+0x10/0x10 [ 30.931743] ret_from_fork_asm+0x1a/0x30 [ 30.932277] </TASK> [ 30.932615] [ 30.932832] Allocated by task 272: [ 30.933172] kasan_save_stack+0x3d/0x60 [ 30.933546] kasan_save_track+0x18/0x40 [ 30.934428] kasan_save_alloc_info+0x3b/0x50 [ 30.934966] __kasan_kmalloc+0xb7/0xc0 [ 30.935459] __kmalloc_cache_noprof+0x184/0x410 [ 30.936184] kasan_atomics+0x96/0x310 [ 30.936588] kunit_try_run_case+0x1b3/0x490 [ 30.937192] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.937798] kthread+0x257/0x310 [ 30.938213] ret_from_fork+0x41/0x80 [ 30.938530] ret_from_fork_asm+0x1a/0x30 [ 30.938885] [ 30.939184] The buggy address belongs to the object at ffff888102969600 [ 30.939184] which belongs to the cache kmalloc-64 of size 64 [ 30.941937] The buggy address is located 0 bytes to the right of [ 30.941937] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.943431] [ 30.943773] The buggy address belongs to the physical page: [ 30.944938] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.945614] flags: 0x200000000000000(node=0|zone=2) [ 30.946438] page_type: f5(slab) [ 30.946851] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.947927] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.948907] page dumped because: kasan: bad access detected [ 30.949645] [ 30.950176] Memory state around the buggy address: [ 30.950543] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.951457] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.952284] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.953189] ^ [ 30.953819] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.954520] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.955156] ================================================================== [ 31.540728] ================================================================== [ 31.541665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 31.542456] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.543290] [ 31.543545] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.544619] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.545080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.545871] Call Trace: [ 31.546237] <TASK> [ 31.546530] dump_stack_lvl+0x73/0xb0 [ 31.546972] print_report+0xd1/0x640 [ 31.547482] ? __virt_addr_valid+0x1db/0x2d0 [ 31.547926] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.548513] kasan_report+0x102/0x140 [ 31.548863] ? kasan_atomics_helper+0x20c9/0x5450 [ 31.549396] ? kasan_atomics_helper+0x20c9/0x5450 [ 31.550171] kasan_check_range+0x10c/0x1c0 [ 31.550783] __kasan_check_write+0x18/0x20 [ 31.551222] kasan_atomics_helper+0x20c9/0x5450 [ 31.551846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.552499] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.553022] ? kasan_atomics+0x153/0x310 [ 31.553570] kasan_atomics+0x1dd/0x310 [ 31.554058] ? __pfx_kasan_atomics+0x10/0x10 [ 31.554569] ? __pfx_read_tsc+0x10/0x10 [ 31.555089] ? ktime_get_ts64+0x86/0x230 [ 31.555491] kunit_try_run_case+0x1b3/0x490 [ 31.556092] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.556703] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.557820] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.558302] ? __kthread_parkme+0x82/0x160 [ 31.559123] ? preempt_count_sub+0x50/0x80 [ 31.559751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.560238] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.560953] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.561595] kthread+0x257/0x310 [ 31.562223] ? __pfx_kthread+0x10/0x10 [ 31.562652] ret_from_fork+0x41/0x80 [ 31.563037] ? __pfx_kthread+0x10/0x10 [ 31.563449] ret_from_fork_asm+0x1a/0x30 [ 31.563873] </TASK> [ 31.564152] [ 31.564413] Allocated by task 272: [ 31.564768] kasan_save_stack+0x3d/0x60 [ 31.565160] kasan_save_track+0x18/0x40 [ 31.566451] kasan_save_alloc_info+0x3b/0x50 [ 31.566833] __kasan_kmalloc+0xb7/0xc0 [ 31.567513] __kmalloc_cache_noprof+0x184/0x410 [ 31.568242] kasan_atomics+0x96/0x310 [ 31.569003] kunit_try_run_case+0x1b3/0x490 [ 31.569585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.570657] kthread+0x257/0x310 [ 31.571221] ret_from_fork+0x41/0x80 [ 31.571489] ret_from_fork_asm+0x1a/0x30 [ 31.572019] [ 31.572236] The buggy address belongs to the object at ffff888102969600 [ 31.572236] which belongs to the cache kmalloc-64 of size 64 [ 31.573694] The buggy address is located 0 bytes to the right of [ 31.573694] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.575550] [ 31.576097] The buggy address belongs to the physical page: [ 31.576594] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.577642] flags: 0x200000000000000(node=0|zone=2) [ 31.578536] page_type: f5(slab) [ 31.579028] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.579873] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.580943] page dumped because: kasan: bad access detected [ 31.581513] [ 31.581713] Memory state around the buggy address: [ 31.582708] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.583316] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.583800] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.584596] ^ [ 31.585157] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.585655] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.586691] ================================================================== [ 29.930828] ================================================================== [ 29.932272] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 29.933549] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.934690] [ 29.935518] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.936731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.937468] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.938528] Call Trace: [ 29.939006] <TASK> [ 29.939319] dump_stack_lvl+0x73/0xb0 [ 29.939761] print_report+0xd1/0x640 [ 29.940875] ? __virt_addr_valid+0x1db/0x2d0 [ 29.941396] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.942354] kasan_report+0x102/0x140 [ 29.942943] ? kasan_atomics_helper+0x107a/0x5450 [ 29.943433] ? kasan_atomics_helper+0x107a/0x5450 [ 29.944049] kasan_check_range+0x10c/0x1c0 [ 29.944589] __kasan_check_write+0x18/0x20 [ 29.945358] kasan_atomics_helper+0x107a/0x5450 [ 29.946110] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.946484] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.946993] ? kasan_atomics+0x153/0x310 [ 29.947566] kasan_atomics+0x1dd/0x310 [ 29.948315] ? __pfx_kasan_atomics+0x10/0x10 [ 29.949051] ? __pfx_read_tsc+0x10/0x10 [ 29.949617] ? ktime_get_ts64+0x86/0x230 [ 29.950099] kunit_try_run_case+0x1b3/0x490 [ 29.950556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.951474] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.952236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.952741] ? __kthread_parkme+0x82/0x160 [ 29.953200] ? preempt_count_sub+0x50/0x80 [ 29.953683] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.954639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.955211] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.955651] kthread+0x257/0x310 [ 29.956372] ? __pfx_kthread+0x10/0x10 [ 29.956786] ret_from_fork+0x41/0x80 [ 29.957526] ? __pfx_kthread+0x10/0x10 [ 29.958138] ret_from_fork_asm+0x1a/0x30 [ 29.959422] </TASK> [ 29.960053] [ 29.960234] Allocated by task 272: [ 29.960673] kasan_save_stack+0x3d/0x60 [ 29.961041] kasan_save_track+0x18/0x40 [ 29.961677] kasan_save_alloc_info+0x3b/0x50 [ 29.962173] __kasan_kmalloc+0xb7/0xc0 [ 29.962737] __kmalloc_cache_noprof+0x184/0x410 [ 29.963107] kasan_atomics+0x96/0x310 [ 29.963515] kunit_try_run_case+0x1b3/0x490 [ 29.963964] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.964630] kthread+0x257/0x310 [ 29.964980] ret_from_fork+0x41/0x80 [ 29.965438] ret_from_fork_asm+0x1a/0x30 [ 29.965739] [ 29.965922] The buggy address belongs to the object at ffff888102969600 [ 29.965922] which belongs to the cache kmalloc-64 of size 64 [ 29.967187] The buggy address is located 0 bytes to the right of [ 29.967187] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.969215] [ 29.969530] The buggy address belongs to the physical page: [ 29.970166] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.971338] flags: 0x200000000000000(node=0|zone=2) [ 29.971790] page_type: f5(slab) [ 29.972796] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.973291] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.974463] page dumped because: kasan: bad access detected [ 29.975159] [ 29.975515] Memory state around the buggy address: [ 29.976339] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.976985] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.977829] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.978674] ^ [ 29.979334] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.980189] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.981064] ================================================================== [ 30.035198] ================================================================== [ 30.036559] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 30.037438] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.038698] [ 30.039119] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.040222] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.041087] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.042342] Call Trace: [ 30.042581] <TASK> [ 30.042734] dump_stack_lvl+0x73/0xb0 [ 30.043071] print_report+0xd1/0x640 [ 30.043430] ? __virt_addr_valid+0x1db/0x2d0 [ 30.043740] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.044491] kasan_report+0x102/0x140 [ 30.045148] ? kasan_atomics_helper+0x1149/0x5450 [ 30.045664] ? kasan_atomics_helper+0x1149/0x5450 [ 30.046037] kasan_check_range+0x10c/0x1c0 [ 30.046381] __kasan_check_write+0x18/0x20 [ 30.046868] kasan_atomics_helper+0x1149/0x5450 [ 30.047290] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.047735] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.048320] ? kasan_atomics+0x153/0x310 [ 30.048627] kasan_atomics+0x1dd/0x310 [ 30.049100] ? __pfx_kasan_atomics+0x10/0x10 [ 30.049497] ? __pfx_read_tsc+0x10/0x10 [ 30.049969] ? ktime_get_ts64+0x86/0x230 [ 30.050566] kunit_try_run_case+0x1b3/0x490 [ 30.051011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.051640] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.052103] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.052568] ? __kthread_parkme+0x82/0x160 [ 30.053076] ? preempt_count_sub+0x50/0x80 [ 30.053542] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.053930] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.054576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.055123] kthread+0x257/0x310 [ 30.055427] ? __pfx_kthread+0x10/0x10 [ 30.055976] ret_from_fork+0x41/0x80 [ 30.056313] ? __pfx_kthread+0x10/0x10 [ 30.056637] ret_from_fork_asm+0x1a/0x30 [ 30.057325] </TASK> [ 30.057718] [ 30.057946] Allocated by task 272: [ 30.058197] kasan_save_stack+0x3d/0x60 [ 30.058737] kasan_save_track+0x18/0x40 [ 30.059307] kasan_save_alloc_info+0x3b/0x50 [ 30.059732] __kasan_kmalloc+0xb7/0xc0 [ 30.060066] __kmalloc_cache_noprof+0x184/0x410 [ 30.060476] kasan_atomics+0x96/0x310 [ 30.060753] kunit_try_run_case+0x1b3/0x490 [ 30.061309] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.062166] kthread+0x257/0x310 [ 30.062494] ret_from_fork+0x41/0x80 [ 30.062982] ret_from_fork_asm+0x1a/0x30 [ 30.063371] [ 30.063539] The buggy address belongs to the object at ffff888102969600 [ 30.063539] which belongs to the cache kmalloc-64 of size 64 [ 30.064659] The buggy address is located 0 bytes to the right of [ 30.064659] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.065953] [ 30.066157] The buggy address belongs to the physical page: [ 30.066531] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.067431] flags: 0x200000000000000(node=0|zone=2) [ 30.068036] page_type: f5(slab) [ 30.068471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.069156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.069609] page dumped because: kasan: bad access detected [ 30.070149] [ 30.070548] Memory state around the buggy address: [ 30.071083] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.071525] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.072408] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.073089] ^ [ 30.073543] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.074165] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.074609] ================================================================== [ 29.726840] ================================================================== [ 29.727477] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 29.728179] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.728765] [ 29.729047] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.729870] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.730597] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.732459] Call Trace: [ 29.732878] <TASK> [ 29.733220] dump_stack_lvl+0x73/0xb0 [ 29.733765] print_report+0xd1/0x640 [ 29.734144] ? __virt_addr_valid+0x1db/0x2d0 [ 29.734648] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.735399] kasan_report+0x102/0x140 [ 29.735789] ? kasan_atomics_helper+0xe79/0x5450 [ 29.736300] ? kasan_atomics_helper+0xe79/0x5450 [ 29.737033] kasan_check_range+0x10c/0x1c0 [ 29.737511] __kasan_check_write+0x18/0x20 [ 29.737994] kasan_atomics_helper+0xe79/0x5450 [ 29.738729] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.739167] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.739741] ? kasan_atomics+0x153/0x310 [ 29.740450] kasan_atomics+0x1dd/0x310 [ 29.740828] ? __pfx_kasan_atomics+0x10/0x10 [ 29.741620] ? __pfx_read_tsc+0x10/0x10 [ 29.741963] ? ktime_get_ts64+0x86/0x230 [ 29.742551] kunit_try_run_case+0x1b3/0x490 [ 29.742923] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.743601] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.744297] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.744841] ? __kthread_parkme+0x82/0x160 [ 29.745409] ? preempt_count_sub+0x50/0x80 [ 29.745951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.746438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.747041] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.747587] kthread+0x257/0x310 [ 29.748099] ? __pfx_kthread+0x10/0x10 [ 29.748476] ret_from_fork+0x41/0x80 [ 29.749160] ? __pfx_kthread+0x10/0x10 [ 29.749566] ret_from_fork_asm+0x1a/0x30 [ 29.750235] </TASK> [ 29.750483] [ 29.750833] Allocated by task 272: [ 29.751308] kasan_save_stack+0x3d/0x60 [ 29.751820] kasan_save_track+0x18/0x40 [ 29.752283] kasan_save_alloc_info+0x3b/0x50 [ 29.752801] __kasan_kmalloc+0xb7/0xc0 [ 29.753401] __kmalloc_cache_noprof+0x184/0x410 [ 29.753792] kasan_atomics+0x96/0x310 [ 29.754558] kunit_try_run_case+0x1b3/0x490 [ 29.755044] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.755657] kthread+0x257/0x310 [ 29.756331] ret_from_fork+0x41/0x80 [ 29.756789] ret_from_fork_asm+0x1a/0x30 [ 29.757447] [ 29.757798] The buggy address belongs to the object at ffff888102969600 [ 29.757798] which belongs to the cache kmalloc-64 of size 64 [ 29.758516] The buggy address is located 0 bytes to the right of [ 29.758516] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.759709] [ 29.759934] The buggy address belongs to the physical page: [ 29.760636] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.761500] flags: 0x200000000000000(node=0|zone=2) [ 29.762209] page_type: f5(slab) [ 29.763324] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.764084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.764744] page dumped because: kasan: bad access detected [ 29.766070] [ 29.766279] Memory state around the buggy address: [ 29.767191] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.767791] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.768895] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.769544] ^ [ 29.770587] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.771476] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.772485] ================================================================== [ 28.448006] ================================================================== [ 28.449700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 28.451115] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.451561] [ 28.452156] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.453850] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.454157] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.455493] Call Trace: [ 28.455688] <TASK> [ 28.456134] dump_stack_lvl+0x73/0xb0 [ 28.457533] print_report+0xd1/0x640 [ 28.458613] ? __virt_addr_valid+0x1db/0x2d0 [ 28.459109] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.459832] kasan_report+0x102/0x140 [ 28.460684] ? kasan_atomics_helper+0x4bbe/0x5450 [ 28.461706] ? kasan_atomics_helper+0x4bbe/0x5450 [ 28.462202] __asan_report_load4_noabort+0x18/0x20 [ 28.463226] kasan_atomics_helper+0x4bbe/0x5450 [ 28.463669] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.465454] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.465960] ? kasan_atomics+0x153/0x310 [ 28.466892] kasan_atomics+0x1dd/0x310 [ 28.467556] ? __pfx_kasan_atomics+0x10/0x10 [ 28.468531] ? __pfx_read_tsc+0x10/0x10 [ 28.469340] ? ktime_get_ts64+0x86/0x230 [ 28.469643] kunit_try_run_case+0x1b3/0x490 [ 28.470141] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.470570] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.471007] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.472117] ? __kthread_parkme+0x82/0x160 [ 28.473141] ? preempt_count_sub+0x50/0x80 [ 28.473608] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.474360] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.475023] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.475907] kthread+0x257/0x310 [ 28.476492] ? __pfx_kthread+0x10/0x10 [ 28.476850] ret_from_fork+0x41/0x80 [ 28.477405] ? __pfx_kthread+0x10/0x10 [ 28.478312] ret_from_fork_asm+0x1a/0x30 [ 28.479108] </TASK> [ 28.479599] [ 28.480075] Allocated by task 272: [ 28.480484] kasan_save_stack+0x3d/0x60 [ 28.481499] kasan_save_track+0x18/0x40 [ 28.482011] kasan_save_alloc_info+0x3b/0x50 [ 28.482555] __kasan_kmalloc+0xb7/0xc0 [ 28.483194] __kmalloc_cache_noprof+0x184/0x410 [ 28.483849] kasan_atomics+0x96/0x310 [ 28.484657] kunit_try_run_case+0x1b3/0x490 [ 28.485021] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.486120] kthread+0x257/0x310 [ 28.486679] ret_from_fork+0x41/0x80 [ 28.487235] ret_from_fork_asm+0x1a/0x30 [ 28.487902] [ 28.488249] The buggy address belongs to the object at ffff888102969600 [ 28.488249] which belongs to the cache kmalloc-64 of size 64 [ 28.489584] The buggy address is located 0 bytes to the right of [ 28.489584] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.491715] [ 28.491910] The buggy address belongs to the physical page: [ 28.492651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.493311] flags: 0x200000000000000(node=0|zone=2) [ 28.493878] page_type: f5(slab) [ 28.494232] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.495050] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.495690] page dumped because: kasan: bad access detected [ 28.496696] [ 28.497036] Memory state around the buggy address: [ 28.497393] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.498492] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.499127] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.499830] ^ [ 28.500239] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.500833] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.501435] ================================================================== [ 29.429874] ================================================================== [ 29.430868] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 29.432046] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.432779] [ 29.432969] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.433946] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.434470] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.435350] Call Trace: [ 29.435681] <TASK> [ 29.435890] dump_stack_lvl+0x73/0xb0 [ 29.436797] print_report+0xd1/0x640 [ 29.437542] ? __virt_addr_valid+0x1db/0x2d0 [ 29.438584] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.439461] kasan_report+0x102/0x140 [ 29.439655] ? kasan_atomics_helper+0xac8/0x5450 [ 29.439989] ? kasan_atomics_helper+0xac8/0x5450 [ 29.440957] kasan_check_range+0x10c/0x1c0 [ 29.441722] __kasan_check_write+0x18/0x20 [ 29.442231] kasan_atomics_helper+0xac8/0x5450 [ 29.442725] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.443170] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.443726] ? kasan_atomics+0x153/0x310 [ 29.444210] kasan_atomics+0x1dd/0x310 [ 29.444525] ? __pfx_kasan_atomics+0x10/0x10 [ 29.445100] ? __pfx_read_tsc+0x10/0x10 [ 29.445798] ? ktime_get_ts64+0x86/0x230 [ 29.446160] kunit_try_run_case+0x1b3/0x490 [ 29.446722] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.447224] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.447604] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.448612] ? __kthread_parkme+0x82/0x160 [ 29.448994] ? preempt_count_sub+0x50/0x80 [ 29.449602] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.450056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.450629] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.451182] kthread+0x257/0x310 [ 29.451700] ? __pfx_kthread+0x10/0x10 [ 29.452172] ret_from_fork+0x41/0x80 [ 29.452594] ? __pfx_kthread+0x10/0x10 [ 29.452931] ret_from_fork_asm+0x1a/0x30 [ 29.453620] </TASK> [ 29.454033] [ 29.454219] Allocated by task 272: [ 29.454610] kasan_save_stack+0x3d/0x60 [ 29.455505] kasan_save_track+0x18/0x40 [ 29.455903] kasan_save_alloc_info+0x3b/0x50 [ 29.456279] __kasan_kmalloc+0xb7/0xc0 [ 29.456735] __kmalloc_cache_noprof+0x184/0x410 [ 29.457186] kasan_atomics+0x96/0x310 [ 29.457681] kunit_try_run_case+0x1b3/0x490 [ 29.458037] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.458432] kthread+0x257/0x310 [ 29.458853] ret_from_fork+0x41/0x80 [ 29.459455] ret_from_fork_asm+0x1a/0x30 [ 29.460153] [ 29.460462] The buggy address belongs to the object at ffff888102969600 [ 29.460462] which belongs to the cache kmalloc-64 of size 64 [ 29.461595] The buggy address is located 0 bytes to the right of [ 29.461595] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.462662] [ 29.462837] The buggy address belongs to the physical page: [ 29.463454] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.464189] flags: 0x200000000000000(node=0|zone=2) [ 29.464834] page_type: f5(slab) [ 29.465216] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.466002] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.466911] page dumped because: kasan: bad access detected [ 29.467418] [ 29.467525] Memory state around the buggy address: [ 29.467727] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.468991] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.470189] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.470797] ^ [ 29.471237] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472033] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.472891] ================================================================== [ 30.578066] ================================================================== [ 30.578854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 30.580432] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.582150] [ 30.583215] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.583952] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.584494] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.585505] Call Trace: [ 30.585859] <TASK> [ 30.586231] dump_stack_lvl+0x73/0xb0 [ 30.586809] print_report+0xd1/0x640 [ 30.587309] ? __virt_addr_valid+0x1db/0x2d0 [ 30.587928] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.588588] kasan_report+0x102/0x140 [ 30.589139] ? kasan_atomics_helper+0x15b7/0x5450 [ 30.589914] ? kasan_atomics_helper+0x15b7/0x5450 [ 30.590640] kasan_check_range+0x10c/0x1c0 [ 30.591327] __kasan_check_write+0x18/0x20 [ 30.591765] kasan_atomics_helper+0x15b7/0x5450 [ 30.592230] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.593199] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.593980] ? kasan_atomics+0x153/0x310 [ 30.594599] kasan_atomics+0x1dd/0x310 [ 30.595323] ? __pfx_kasan_atomics+0x10/0x10 [ 30.596307] ? __pfx_read_tsc+0x10/0x10 [ 30.596708] ? ktime_get_ts64+0x86/0x230 [ 30.597166] kunit_try_run_case+0x1b3/0x490 [ 30.597664] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.598905] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.599892] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.600314] ? __kthread_parkme+0x82/0x160 [ 30.600779] ? preempt_count_sub+0x50/0x80 [ 30.601340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.601839] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.602729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.603336] kthread+0x257/0x310 [ 30.603701] ? __pfx_kthread+0x10/0x10 [ 30.604726] ret_from_fork+0x41/0x80 [ 30.605028] ? __pfx_kthread+0x10/0x10 [ 30.605530] ret_from_fork_asm+0x1a/0x30 [ 30.606036] </TASK> [ 30.606359] [ 30.606571] Allocated by task 272: [ 30.606887] kasan_save_stack+0x3d/0x60 [ 30.607455] kasan_save_track+0x18/0x40 [ 30.607761] kasan_save_alloc_info+0x3b/0x50 [ 30.608222] __kasan_kmalloc+0xb7/0xc0 [ 30.608707] __kmalloc_cache_noprof+0x184/0x410 [ 30.609120] kasan_atomics+0x96/0x310 [ 30.609544] kunit_try_run_case+0x1b3/0x490 [ 30.610066] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.610474] kthread+0x257/0x310 [ 30.610789] ret_from_fork+0x41/0x80 [ 30.611273] ret_from_fork_asm+0x1a/0x30 [ 30.611711] [ 30.612003] The buggy address belongs to the object at ffff888102969600 [ 30.612003] which belongs to the cache kmalloc-64 of size 64 [ 30.613046] The buggy address is located 0 bytes to the right of [ 30.613046] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.613888] [ 30.614057] The buggy address belongs to the physical page: [ 30.614683] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.615592] flags: 0x200000000000000(node=0|zone=2) [ 30.616184] page_type: f5(slab) [ 30.616472] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.617099] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.618299] page dumped because: kasan: bad access detected [ 30.618755] [ 30.618939] Memory state around the buggy address: [ 30.619273] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.620019] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.620576] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.621676] ^ [ 30.622194] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.622707] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.623298] ================================================================== [ 28.608077] ================================================================== [ 28.608758] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 28.610620] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.611153] [ 28.611361] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.613200] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.613517] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.614372] Call Trace: [ 28.614661] <TASK> [ 28.614918] dump_stack_lvl+0x73/0xb0 [ 28.615890] print_report+0xd1/0x640 [ 28.616503] ? __virt_addr_valid+0x1db/0x2d0 [ 28.617009] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.618164] kasan_report+0x102/0x140 [ 28.618764] ? kasan_atomics_helper+0x4b70/0x5450 [ 28.619569] ? kasan_atomics_helper+0x4b70/0x5450 [ 28.619923] __asan_report_store4_noabort+0x1b/0x30 [ 28.621285] kasan_atomics_helper+0x4b70/0x5450 [ 28.622363] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.623198] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.624188] ? kasan_atomics+0x153/0x310 [ 28.624801] kasan_atomics+0x1dd/0x310 [ 28.626014] ? __pfx_kasan_atomics+0x10/0x10 [ 28.626630] ? __pfx_read_tsc+0x10/0x10 [ 28.627543] ? ktime_get_ts64+0x86/0x230 [ 28.627958] kunit_try_run_case+0x1b3/0x490 [ 28.628619] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.629475] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.630879] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.631432] ? __kthread_parkme+0x82/0x160 [ 28.632370] ? preempt_count_sub+0x50/0x80 [ 28.633253] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.633715] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.634333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.634879] kthread+0x257/0x310 [ 28.635725] ? __pfx_kthread+0x10/0x10 [ 28.635992] ret_from_fork+0x41/0x80 [ 28.636225] ? __pfx_kthread+0x10/0x10 [ 28.636871] ret_from_fork_asm+0x1a/0x30 [ 28.637709] </TASK> [ 28.638181] [ 28.638956] Allocated by task 272: [ 28.639714] kasan_save_stack+0x3d/0x60 [ 28.640789] kasan_save_track+0x18/0x40 [ 28.641418] kasan_save_alloc_info+0x3b/0x50 [ 28.642245] __kasan_kmalloc+0xb7/0xc0 [ 28.642719] __kmalloc_cache_noprof+0x184/0x410 [ 28.643678] kasan_atomics+0x96/0x310 [ 28.643944] kunit_try_run_case+0x1b3/0x490 [ 28.644952] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.645503] kthread+0x257/0x310 [ 28.645989] ret_from_fork+0x41/0x80 [ 28.646483] ret_from_fork_asm+0x1a/0x30 [ 28.647438] [ 28.647635] The buggy address belongs to the object at ffff888102969600 [ 28.647635] which belongs to the cache kmalloc-64 of size 64 [ 28.649455] The buggy address is located 0 bytes to the right of [ 28.649455] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.651477] [ 28.651669] The buggy address belongs to the physical page: [ 28.653056] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.653772] flags: 0x200000000000000(node=0|zone=2) [ 28.654524] page_type: f5(slab) [ 28.655476] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.656959] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.657951] page dumped because: kasan: bad access detected [ 28.658919] [ 28.659423] Memory state around the buggy address: [ 28.660143] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.661424] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.662878] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.663447] ^ [ 28.664397] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.665669] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.666221] ================================================================== [ 30.624625] ================================================================== [ 30.625840] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 30.626993] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.627700] [ 30.627887] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.628924] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.629246] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.630095] Call Trace: [ 30.630446] <TASK> [ 30.630673] dump_stack_lvl+0x73/0xb0 [ 30.631025] print_report+0xd1/0x640 [ 30.631569] ? __virt_addr_valid+0x1db/0x2d0 [ 30.632323] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.632761] kasan_report+0x102/0x140 [ 30.633051] ? kasan_atomics_helper+0x1650/0x5450 [ 30.633713] ? kasan_atomics_helper+0x1650/0x5450 [ 30.634221] kasan_check_range+0x10c/0x1c0 [ 30.634709] __kasan_check_write+0x18/0x20 [ 30.635084] kasan_atomics_helper+0x1650/0x5450 [ 30.635601] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.636130] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.636489] ? kasan_atomics+0x153/0x310 [ 30.636954] kasan_atomics+0x1dd/0x310 [ 30.637479] ? __pfx_kasan_atomics+0x10/0x10 [ 30.638068] ? __pfx_read_tsc+0x10/0x10 [ 30.638480] ? ktime_get_ts64+0x86/0x230 [ 30.638891] kunit_try_run_case+0x1b3/0x490 [ 30.639427] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.640050] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.640511] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.641147] ? __kthread_parkme+0x82/0x160 [ 30.641575] ? preempt_count_sub+0x50/0x80 [ 30.642066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.642658] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.643159] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.643850] kthread+0x257/0x310 [ 30.644147] ? __pfx_kthread+0x10/0x10 [ 30.644460] ret_from_fork+0x41/0x80 [ 30.644808] ? __pfx_kthread+0x10/0x10 [ 30.645112] ret_from_fork_asm+0x1a/0x30 [ 30.645612] </TASK> [ 30.645992] [ 30.646276] Allocated by task 272: [ 30.646791] kasan_save_stack+0x3d/0x60 [ 30.647290] kasan_save_track+0x18/0x40 [ 30.647850] kasan_save_alloc_info+0x3b/0x50 [ 30.648310] __kasan_kmalloc+0xb7/0xc0 [ 30.648798] __kmalloc_cache_noprof+0x184/0x410 [ 30.649282] kasan_atomics+0x96/0x310 [ 30.649794] kunit_try_run_case+0x1b3/0x490 [ 30.650131] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.650705] kthread+0x257/0x310 [ 30.651164] ret_from_fork+0x41/0x80 [ 30.651537] ret_from_fork_asm+0x1a/0x30 [ 30.652014] [ 30.652291] The buggy address belongs to the object at ffff888102969600 [ 30.652291] which belongs to the cache kmalloc-64 of size 64 [ 30.653003] The buggy address is located 0 bytes to the right of [ 30.653003] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.654147] [ 30.654725] The buggy address belongs to the physical page: [ 30.655377] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.656111] flags: 0x200000000000000(node=0|zone=2) [ 30.656590] page_type: f5(slab) [ 30.656975] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.657640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.658362] page dumped because: kasan: bad access detected [ 30.658863] [ 30.659094] Memory state around the buggy address: [ 30.659599] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.660250] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.660890] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.661510] ^ [ 30.661990] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.662559] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.663311] ================================================================== [ 29.569395] ================================================================== [ 29.570000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 29.570870] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.571656] [ 29.571980] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.573221] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.573548] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.574684] Call Trace: [ 29.574963] <TASK> [ 29.575173] dump_stack_lvl+0x73/0xb0 [ 29.575974] print_report+0xd1/0x640 [ 29.576365] ? __virt_addr_valid+0x1db/0x2d0 [ 29.576693] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.577451] kasan_report+0x102/0x140 [ 29.577751] ? kasan_atomics_helper+0x4a86/0x5450 [ 29.578458] ? kasan_atomics_helper+0x4a86/0x5450 [ 29.579302] __asan_report_load4_noabort+0x18/0x20 [ 29.579719] kasan_atomics_helper+0x4a86/0x5450 [ 29.580251] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.581168] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.581610] ? kasan_atomics+0x153/0x310 [ 29.582149] kasan_atomics+0x1dd/0x310 [ 29.582738] ? __pfx_kasan_atomics+0x10/0x10 [ 29.583483] ? __pfx_read_tsc+0x10/0x10 [ 29.584002] ? ktime_get_ts64+0x86/0x230 [ 29.584384] kunit_try_run_case+0x1b3/0x490 [ 29.584951] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.585486] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.587067] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.587827] ? __kthread_parkme+0x82/0x160 [ 29.588481] ? preempt_count_sub+0x50/0x80 [ 29.589355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.590080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.590844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.591641] kthread+0x257/0x310 [ 29.592290] ? __pfx_kthread+0x10/0x10 [ 29.592638] ret_from_fork+0x41/0x80 [ 29.593304] ? __pfx_kthread+0x10/0x10 [ 29.593705] ret_from_fork_asm+0x1a/0x30 [ 29.594620] </TASK> [ 29.595206] [ 29.595670] Allocated by task 272: [ 29.596226] kasan_save_stack+0x3d/0x60 [ 29.597301] kasan_save_track+0x18/0x40 [ 29.597720] kasan_save_alloc_info+0x3b/0x50 [ 29.598285] __kasan_kmalloc+0xb7/0xc0 [ 29.599044] __kmalloc_cache_noprof+0x184/0x410 [ 29.599432] kasan_atomics+0x96/0x310 [ 29.600223] kunit_try_run_case+0x1b3/0x490 [ 29.601310] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.602422] kthread+0x257/0x310 [ 29.602766] ret_from_fork+0x41/0x80 [ 29.603464] ret_from_fork_asm+0x1a/0x30 [ 29.604510] [ 29.604704] The buggy address belongs to the object at ffff888102969600 [ 29.604704] which belongs to the cache kmalloc-64 of size 64 [ 29.606386] The buggy address is located 0 bytes to the right of [ 29.606386] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.608101] [ 29.608326] The buggy address belongs to the physical page: [ 29.608855] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.609721] flags: 0x200000000000000(node=0|zone=2) [ 29.610539] page_type: f5(slab) [ 29.611142] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.611778] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.612929] page dumped because: kasan: bad access detected [ 29.613504] [ 29.613704] Memory state around the buggy address: [ 29.615192] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.616516] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.617182] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.618105] ^ [ 29.618774] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.619482] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.620555] ================================================================== [ 30.209947] ================================================================== [ 30.211507] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 30.212325] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.213026] [ 30.213423] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.214565] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.215208] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.216170] Call Trace: [ 30.216614] <TASK> [ 30.216998] dump_stack_lvl+0x73/0xb0 [ 30.217580] print_report+0xd1/0x640 [ 30.218195] ? __virt_addr_valid+0x1db/0x2d0 [ 30.218647] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.219517] kasan_report+0x102/0x140 [ 30.219867] ? kasan_atomics_helper+0x12e7/0x5450 [ 30.220570] ? kasan_atomics_helper+0x12e7/0x5450 [ 30.221136] kasan_check_range+0x10c/0x1c0 [ 30.221663] __kasan_check_write+0x18/0x20 [ 30.222229] kasan_atomics_helper+0x12e7/0x5450 [ 30.222879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.223502] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.224095] ? kasan_atomics+0x153/0x310 [ 30.224547] kasan_atomics+0x1dd/0x310 [ 30.225043] ? __pfx_kasan_atomics+0x10/0x10 [ 30.225562] ? __pfx_read_tsc+0x10/0x10 [ 30.226145] ? ktime_get_ts64+0x86/0x230 [ 30.226669] kunit_try_run_case+0x1b3/0x490 [ 30.227245] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.227911] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.228375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.229145] ? __kthread_parkme+0x82/0x160 [ 30.229590] ? preempt_count_sub+0x50/0x80 [ 30.230308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.231000] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.231746] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.232495] kthread+0x257/0x310 [ 30.233001] ? __pfx_kthread+0x10/0x10 [ 30.233520] ret_from_fork+0x41/0x80 [ 30.234010] ? __pfx_kthread+0x10/0x10 [ 30.234598] ret_from_fork_asm+0x1a/0x30 [ 30.235154] </TASK> [ 30.235635] [ 30.235862] Allocated by task 272: [ 30.236403] kasan_save_stack+0x3d/0x60 [ 30.237087] kasan_save_track+0x18/0x40 [ 30.237633] kasan_save_alloc_info+0x3b/0x50 [ 30.238166] __kasan_kmalloc+0xb7/0xc0 [ 30.238794] __kmalloc_cache_noprof+0x184/0x410 [ 30.239197] kasan_atomics+0x96/0x310 [ 30.239917] kunit_try_run_case+0x1b3/0x490 [ 30.240239] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.240930] kthread+0x257/0x310 [ 30.241388] ret_from_fork+0x41/0x80 [ 30.241977] ret_from_fork_asm+0x1a/0x30 [ 30.242683] [ 30.243089] The buggy address belongs to the object at ffff888102969600 [ 30.243089] which belongs to the cache kmalloc-64 of size 64 [ 30.244768] The buggy address is located 0 bytes to the right of [ 30.244768] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.246452] [ 30.246623] The buggy address belongs to the physical page: [ 30.247948] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.248806] flags: 0x200000000000000(node=0|zone=2) [ 30.249797] page_type: f5(slab) [ 30.250059] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.250792] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.252302] page dumped because: kasan: bad access detected [ 30.253525] [ 30.253736] Memory state around the buggy address: [ 30.254646] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.255624] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.256966] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.257247] ^ [ 30.258041] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.258630] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.259650] ================================================================== [ 31.052056] ================================================================== [ 31.052896] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 31.053653] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.054501] [ 31.055660] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.056363] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.057239] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.058486] Call Trace: [ 31.058804] <TASK> [ 31.059054] dump_stack_lvl+0x73/0xb0 [ 31.059499] print_report+0xd1/0x640 [ 31.059983] ? __virt_addr_valid+0x1db/0x2d0 [ 31.060506] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.061145] kasan_report+0x102/0x140 [ 31.061567] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.062169] ? kasan_atomics_helper+0x1c19/0x5450 [ 31.062726] kasan_check_range+0x10c/0x1c0 [ 31.063220] __kasan_check_write+0x18/0x20 [ 31.063820] kasan_atomics_helper+0x1c19/0x5450 [ 31.064376] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.064960] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.065457] ? kasan_atomics+0x153/0x310 [ 31.066054] kasan_atomics+0x1dd/0x310 [ 31.066575] ? __pfx_kasan_atomics+0x10/0x10 [ 31.067214] ? __pfx_read_tsc+0x10/0x10 [ 31.067595] ? ktime_get_ts64+0x86/0x230 [ 31.068243] kunit_try_run_case+0x1b3/0x490 [ 31.068827] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.069339] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.069822] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.070516] ? __kthread_parkme+0x82/0x160 [ 31.071001] ? preempt_count_sub+0x50/0x80 [ 31.071462] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.072086] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.072699] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.073340] kthread+0x257/0x310 [ 31.073898] ? __pfx_kthread+0x10/0x10 [ 31.074206] ret_from_fork+0x41/0x80 [ 31.074715] ? __pfx_kthread+0x10/0x10 [ 31.075187] ret_from_fork_asm+0x1a/0x30 [ 31.075869] </TASK> [ 31.076115] [ 31.076303] Allocated by task 272: [ 31.076892] kasan_save_stack+0x3d/0x60 [ 31.077436] kasan_save_track+0x18/0x40 [ 31.077988] kasan_save_alloc_info+0x3b/0x50 [ 31.078576] __kasan_kmalloc+0xb7/0xc0 [ 31.079129] __kmalloc_cache_noprof+0x184/0x410 [ 31.079708] kasan_atomics+0x96/0x310 [ 31.080297] kunit_try_run_case+0x1b3/0x490 [ 31.080864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.081466] kthread+0x257/0x310 [ 31.081967] ret_from_fork+0x41/0x80 [ 31.082477] ret_from_fork_asm+0x1a/0x30 [ 31.083072] [ 31.083362] The buggy address belongs to the object at ffff888102969600 [ 31.083362] which belongs to the cache kmalloc-64 of size 64 [ 31.084486] The buggy address is located 0 bytes to the right of [ 31.084486] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.085544] [ 31.085751] The buggy address belongs to the physical page: [ 31.086215] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.088585] flags: 0x200000000000000(node=0|zone=2) [ 31.089540] page_type: f5(slab) [ 31.090549] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.091537] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.092473] page dumped because: kasan: bad access detected [ 31.093120] [ 31.093346] Memory state around the buggy address: [ 31.094183] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.095620] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.096451] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.097277] ^ [ 31.098057] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.098961] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.099473] ================================================================== [ 31.396476] ================================================================== [ 31.397184] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 31.397983] Read of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.398818] [ 31.399109] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.400394] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.400806] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.401945] Call Trace: [ 31.402182] <TASK> [ 31.402772] dump_stack_lvl+0x73/0xb0 [ 31.403506] print_report+0xd1/0x640 [ 31.404638] ? __virt_addr_valid+0x1db/0x2d0 [ 31.405547] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.406427] kasan_report+0x102/0x140 [ 31.406625] ? kasan_atomics_helper+0x4f73/0x5450 [ 31.407121] ? kasan_atomics_helper+0x4f73/0x5450 [ 31.407897] __asan_report_load8_noabort+0x18/0x20 [ 31.408646] kasan_atomics_helper+0x4f73/0x5450 [ 31.408975] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.409575] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.410051] ? kasan_atomics+0x153/0x310 [ 31.410583] kasan_atomics+0x1dd/0x310 [ 31.411166] ? __pfx_kasan_atomics+0x10/0x10 [ 31.411603] ? __pfx_read_tsc+0x10/0x10 [ 31.412006] ? ktime_get_ts64+0x86/0x230 [ 31.412569] kunit_try_run_case+0x1b3/0x490 [ 31.412936] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.413526] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.414117] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.414563] ? __kthread_parkme+0x82/0x160 [ 31.415302] ? preempt_count_sub+0x50/0x80 [ 31.415658] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.416196] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.416665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.417246] kthread+0x257/0x310 [ 31.417719] ? __pfx_kthread+0x10/0x10 [ 31.418087] ret_from_fork+0x41/0x80 [ 31.418471] ? __pfx_kthread+0x10/0x10 [ 31.418761] ret_from_fork_asm+0x1a/0x30 [ 31.419304] </TASK> [ 31.419630] [ 31.420015] Allocated by task 272: [ 31.420381] kasan_save_stack+0x3d/0x60 [ 31.420746] kasan_save_track+0x18/0x40 [ 31.421151] kasan_save_alloc_info+0x3b/0x50 [ 31.421481] __kasan_kmalloc+0xb7/0xc0 [ 31.421768] __kmalloc_cache_noprof+0x184/0x410 [ 31.422363] kasan_atomics+0x96/0x310 [ 31.423077] kunit_try_run_case+0x1b3/0x490 [ 31.423428] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.423856] kthread+0x257/0x310 [ 31.424569] ret_from_fork+0x41/0x80 [ 31.425155] ret_from_fork_asm+0x1a/0x30 [ 31.425472] [ 31.425640] The buggy address belongs to the object at ffff888102969600 [ 31.425640] which belongs to the cache kmalloc-64 of size 64 [ 31.426916] The buggy address is located 0 bytes to the right of [ 31.426916] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.428223] [ 31.428447] The buggy address belongs to the physical page: [ 31.430348] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.431076] flags: 0x200000000000000(node=0|zone=2) [ 31.431730] page_type: f5(slab) [ 31.432080] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.432826] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.433591] page dumped because: kasan: bad access detected [ 31.434180] [ 31.434473] Memory state around the buggy address: [ 31.435040] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.435824] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.436425] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.437216] ^ [ 31.437697] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.438366] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.439154] ================================================================== [ 30.714426] ================================================================== [ 30.715175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 30.716295] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.716794] [ 30.716997] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.718196] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.718553] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.720984] Call Trace: [ 30.721651] <TASK> [ 30.721859] dump_stack_lvl+0x73/0xb0 [ 30.722216] print_report+0xd1/0x640 [ 30.723040] ? __virt_addr_valid+0x1db/0x2d0 [ 30.723597] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.724297] kasan_report+0x102/0x140 [ 30.724621] ? kasan_atomics_helper+0x1780/0x5450 [ 30.725002] ? kasan_atomics_helper+0x1780/0x5450 [ 30.726141] kasan_check_range+0x10c/0x1c0 [ 30.727114] __kasan_check_write+0x18/0x20 [ 30.727981] kasan_atomics_helper+0x1780/0x5450 [ 30.729278] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.729725] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.730187] ? kasan_atomics+0x153/0x310 [ 30.731010] kasan_atomics+0x1dd/0x310 [ 30.731419] ? __pfx_kasan_atomics+0x10/0x10 [ 30.731709] ? __pfx_read_tsc+0x10/0x10 [ 30.732035] ? ktime_get_ts64+0x86/0x230 [ 30.732427] kunit_try_run_case+0x1b3/0x490 [ 30.733348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.733764] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.734965] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.735486] ? __kthread_parkme+0x82/0x160 [ 30.736490] ? preempt_count_sub+0x50/0x80 [ 30.737282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.737988] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.738665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.739359] kthread+0x257/0x310 [ 30.740015] ? __pfx_kthread+0x10/0x10 [ 30.740699] ret_from_fork+0x41/0x80 [ 30.741217] ? __pfx_kthread+0x10/0x10 [ 30.741661] ret_from_fork_asm+0x1a/0x30 [ 30.742172] </TASK> [ 30.742459] [ 30.742622] Allocated by task 272: [ 30.743272] kasan_save_stack+0x3d/0x60 [ 30.743957] kasan_save_track+0x18/0x40 [ 30.744451] kasan_save_alloc_info+0x3b/0x50 [ 30.745121] __kasan_kmalloc+0xb7/0xc0 [ 30.745937] __kmalloc_cache_noprof+0x184/0x410 [ 30.746309] kasan_atomics+0x96/0x310 [ 30.746738] kunit_try_run_case+0x1b3/0x490 [ 30.747108] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.748156] kthread+0x257/0x310 [ 30.748540] ret_from_fork+0x41/0x80 [ 30.749497] ret_from_fork_asm+0x1a/0x30 [ 30.749771] [ 30.750240] The buggy address belongs to the object at ffff888102969600 [ 30.750240] which belongs to the cache kmalloc-64 of size 64 [ 30.751337] The buggy address is located 0 bytes to the right of [ 30.751337] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.753120] [ 30.753709] The buggy address belongs to the physical page: [ 30.754577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.755881] flags: 0x200000000000000(node=0|zone=2) [ 30.756290] page_type: f5(slab) [ 30.756712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.757832] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.758736] page dumped because: kasan: bad access detected [ 30.759524] [ 30.759695] Memory state around the buggy address: [ 30.760333] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.761591] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.762848] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.763489] ^ [ 30.764278] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.765120] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.765783] ================================================================== [ 31.248762] ================================================================== [ 31.249953] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 31.250623] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.251513] [ 31.251828] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.253036] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.253341] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.254495] Call Trace: [ 31.254947] <TASK> [ 31.255289] dump_stack_lvl+0x73/0xb0 [ 31.255695] print_report+0xd1/0x640 [ 31.256336] ? __virt_addr_valid+0x1db/0x2d0 [ 31.257043] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.257538] kasan_report+0x102/0x140 [ 31.257830] ? kasan_atomics_helper+0x1e13/0x5450 [ 31.258486] ? kasan_atomics_helper+0x1e13/0x5450 [ 31.259182] kasan_check_range+0x10c/0x1c0 [ 31.259683] __kasan_check_write+0x18/0x20 [ 31.260324] kasan_atomics_helper+0x1e13/0x5450 [ 31.260767] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.261320] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.262054] ? kasan_atomics+0x153/0x310 [ 31.262714] kasan_atomics+0x1dd/0x310 [ 31.263231] ? __pfx_kasan_atomics+0x10/0x10 [ 31.263574] ? __pfx_read_tsc+0x10/0x10 [ 31.264358] ? ktime_get_ts64+0x86/0x230 [ 31.264976] kunit_try_run_case+0x1b3/0x490 [ 31.265348] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.266005] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.266876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.267372] ? __kthread_parkme+0x82/0x160 [ 31.267811] ? preempt_count_sub+0x50/0x80 [ 31.268465] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.268902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.269780] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.270609] kthread+0x257/0x310 [ 31.271103] ? __pfx_kthread+0x10/0x10 [ 31.271569] ret_from_fork+0x41/0x80 [ 31.271859] ? __pfx_kthread+0x10/0x10 [ 31.272070] ret_from_fork_asm+0x1a/0x30 [ 31.272305] </TASK> [ 31.272437] [ 31.272536] Allocated by task 272: [ 31.272694] kasan_save_stack+0x3d/0x60 [ 31.272885] kasan_save_track+0x18/0x40 [ 31.273067] kasan_save_alloc_info+0x3b/0x50 [ 31.273334] __kasan_kmalloc+0xb7/0xc0 [ 31.273950] __kmalloc_cache_noprof+0x184/0x410 [ 31.274653] kasan_atomics+0x96/0x310 [ 31.275311] kunit_try_run_case+0x1b3/0x490 [ 31.276036] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.276926] kthread+0x257/0x310 [ 31.277498] ret_from_fork+0x41/0x80 [ 31.278110] ret_from_fork_asm+0x1a/0x30 [ 31.278752] [ 31.279129] The buggy address belongs to the object at ffff888102969600 [ 31.279129] which belongs to the cache kmalloc-64 of size 64 [ 31.279927] The buggy address is located 0 bytes to the right of [ 31.279927] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.281622] [ 31.282541] The buggy address belongs to the physical page: [ 31.283370] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.284240] flags: 0x200000000000000(node=0|zone=2) [ 31.284757] page_type: f5(slab) [ 31.285118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.286352] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.287543] page dumped because: kasan: bad access detected [ 31.288370] [ 31.288539] Memory state around the buggy address: [ 31.289054] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.289823] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.290450] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.291209] ^ [ 31.291827] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.292470] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.293683] ================================================================== [ 29.878648] ================================================================== [ 29.879360] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 29.880310] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.881547] [ 29.881996] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.883148] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.883763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.884807] Call Trace: [ 29.885204] <TASK> [ 29.885531] dump_stack_lvl+0x73/0xb0 [ 29.886525] print_report+0xd1/0x640 [ 29.886901] ? __virt_addr_valid+0x1db/0x2d0 [ 29.887653] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.888546] kasan_report+0x102/0x140 [ 29.889371] ? kasan_atomics_helper+0x4a38/0x5450 [ 29.890318] ? kasan_atomics_helper+0x4a38/0x5450 [ 29.891310] __asan_report_load4_noabort+0x18/0x20 [ 29.891757] kasan_atomics_helper+0x4a38/0x5450 [ 29.892566] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.893029] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.893716] ? kasan_atomics+0x153/0x310 [ 29.894429] kasan_atomics+0x1dd/0x310 [ 29.895239] ? __pfx_kasan_atomics+0x10/0x10 [ 29.895694] ? __pfx_read_tsc+0x10/0x10 [ 29.896344] ? ktime_get_ts64+0x86/0x230 [ 29.896948] kunit_try_run_case+0x1b3/0x490 [ 29.897561] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.898133] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.898643] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.899272] ? __kthread_parkme+0x82/0x160 [ 29.900229] ? preempt_count_sub+0x50/0x80 [ 29.900921] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.901604] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.902386] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.903316] kthread+0x257/0x310 [ 29.904004] ? __pfx_kthread+0x10/0x10 [ 29.904406] ret_from_fork+0x41/0x80 [ 29.905068] ? __pfx_kthread+0x10/0x10 [ 29.905517] ret_from_fork_asm+0x1a/0x30 [ 29.906878] </TASK> [ 29.907102] [ 29.907325] Allocated by task 272: [ 29.907867] kasan_save_stack+0x3d/0x60 [ 29.908562] kasan_save_track+0x18/0x40 [ 29.909058] kasan_save_alloc_info+0x3b/0x50 [ 29.909370] __kasan_kmalloc+0xb7/0xc0 [ 29.909793] __kmalloc_cache_noprof+0x184/0x410 [ 29.911211] kasan_atomics+0x96/0x310 [ 29.911591] kunit_try_run_case+0x1b3/0x490 [ 29.912440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.913404] kthread+0x257/0x310 [ 29.913752] ret_from_fork+0x41/0x80 [ 29.914152] ret_from_fork_asm+0x1a/0x30 [ 29.914912] [ 29.915361] The buggy address belongs to the object at ffff888102969600 [ 29.915361] which belongs to the cache kmalloc-64 of size 64 [ 29.916652] The buggy address is located 0 bytes to the right of [ 29.916652] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.918195] [ 29.918489] The buggy address belongs to the physical page: [ 29.919137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.920060] flags: 0x200000000000000(node=0|zone=2) [ 29.920591] page_type: f5(slab) [ 29.921383] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.922036] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.922483] page dumped because: kasan: bad access detected [ 29.922719] [ 29.923466] Memory state around the buggy address: [ 29.924478] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.925492] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.926514] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.927400] ^ [ 29.927892] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.928646] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.929706] ================================================================== [ 31.007031] ================================================================== [ 31.007593] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 31.009103] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.010188] [ 31.010425] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.011838] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.012242] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.012997] Call Trace: [ 31.013458] <TASK> [ 31.013798] dump_stack_lvl+0x73/0xb0 [ 31.014205] print_report+0xd1/0x640 [ 31.014700] ? __virt_addr_valid+0x1db/0x2d0 [ 31.015186] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.015780] kasan_report+0x102/0x140 [ 31.016189] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.016756] ? kasan_atomics_helper+0x1b23/0x5450 [ 31.017821] kasan_check_range+0x10c/0x1c0 [ 31.018225] __kasan_check_write+0x18/0x20 [ 31.018658] kasan_atomics_helper+0x1b23/0x5450 [ 31.019173] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.019881] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.020232] ? kasan_atomics+0x153/0x310 [ 31.020821] kasan_atomics+0x1dd/0x310 [ 31.021194] ? __pfx_kasan_atomics+0x10/0x10 [ 31.021839] ? __pfx_read_tsc+0x10/0x10 [ 31.022236] ? ktime_get_ts64+0x86/0x230 [ 31.022912] kunit_try_run_case+0x1b3/0x490 [ 31.023409] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.023991] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.024518] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.025117] ? __kthread_parkme+0x82/0x160 [ 31.025536] ? preempt_count_sub+0x50/0x80 [ 31.026131] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.026656] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.027279] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.027882] kthread+0x257/0x310 [ 31.028412] ? __pfx_kthread+0x10/0x10 [ 31.028794] ret_from_fork+0x41/0x80 [ 31.029324] ? __pfx_kthread+0x10/0x10 [ 31.029933] ret_from_fork_asm+0x1a/0x30 [ 31.030309] </TASK> [ 31.030719] [ 31.031034] Allocated by task 272: [ 31.031316] kasan_save_stack+0x3d/0x60 [ 31.031898] kasan_save_track+0x18/0x40 [ 31.032487] kasan_save_alloc_info+0x3b/0x50 [ 31.033025] __kasan_kmalloc+0xb7/0xc0 [ 31.033376] __kmalloc_cache_noprof+0x184/0x410 [ 31.034013] kasan_atomics+0x96/0x310 [ 31.034427] kunit_try_run_case+0x1b3/0x490 [ 31.034914] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.035726] kthread+0x257/0x310 [ 31.036191] ret_from_fork+0x41/0x80 [ 31.036587] ret_from_fork_asm+0x1a/0x30 [ 31.036943] [ 31.037210] The buggy address belongs to the object at ffff888102969600 [ 31.037210] which belongs to the cache kmalloc-64 of size 64 [ 31.038485] The buggy address is located 0 bytes to the right of [ 31.038485] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.039681] [ 31.039949] The buggy address belongs to the physical page: [ 31.040508] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.041349] flags: 0x200000000000000(node=0|zone=2) [ 31.041879] page_type: f5(slab) [ 31.042355] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.043171] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.043953] page dumped because: kasan: bad access detected [ 31.044502] [ 31.044841] Memory state around the buggy address: [ 31.045323] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.046037] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.046648] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.047365] ^ [ 31.047947] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.048686] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.049741] ================================================================== [ 31.151561] ================================================================== [ 31.152475] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 31.153419] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.154608] [ 31.155047] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.156020] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.156449] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.157224] Call Trace: [ 31.157809] <TASK> [ 31.158329] dump_stack_lvl+0x73/0xb0 [ 31.159165] print_report+0xd1/0x640 [ 31.159591] ? __virt_addr_valid+0x1db/0x2d0 [ 31.160361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.160958] kasan_report+0x102/0x140 [ 31.161606] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.162177] ? kasan_atomics_helper+0x1ce2/0x5450 [ 31.162899] kasan_check_range+0x10c/0x1c0 [ 31.163507] __kasan_check_write+0x18/0x20 [ 31.164191] kasan_atomics_helper+0x1ce2/0x5450 [ 31.164687] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.165372] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.165985] ? kasan_atomics+0x153/0x310 [ 31.166624] kasan_atomics+0x1dd/0x310 [ 31.167019] ? __pfx_kasan_atomics+0x10/0x10 [ 31.167658] ? __pfx_read_tsc+0x10/0x10 [ 31.168182] ? ktime_get_ts64+0x86/0x230 [ 31.168833] kunit_try_run_case+0x1b3/0x490 [ 31.169395] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.169978] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.170598] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.171285] ? __kthread_parkme+0x82/0x160 [ 31.171830] ? preempt_count_sub+0x50/0x80 [ 31.172463] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.172984] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.173733] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.174466] kthread+0x257/0x310 [ 31.175011] ? __pfx_kthread+0x10/0x10 [ 31.175571] ret_from_fork+0x41/0x80 [ 31.176244] ? __pfx_kthread+0x10/0x10 [ 31.176754] ret_from_fork_asm+0x1a/0x30 [ 31.177133] </TASK> [ 31.177516] [ 31.177761] Allocated by task 272: [ 31.178065] kasan_save_stack+0x3d/0x60 [ 31.178593] kasan_save_track+0x18/0x40 [ 31.178994] kasan_save_alloc_info+0x3b/0x50 [ 31.179329] __kasan_kmalloc+0xb7/0xc0 [ 31.179612] __kmalloc_cache_noprof+0x184/0x410 [ 31.180355] kasan_atomics+0x96/0x310 [ 31.180808] kunit_try_run_case+0x1b3/0x490 [ 31.181194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.182946] kthread+0x257/0x310 [ 31.183342] ret_from_fork+0x41/0x80 [ 31.183729] ret_from_fork_asm+0x1a/0x30 [ 31.184863] [ 31.185130] The buggy address belongs to the object at ffff888102969600 [ 31.185130] which belongs to the cache kmalloc-64 of size 64 [ 31.187143] The buggy address is located 0 bytes to the right of [ 31.187143] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.188772] [ 31.189383] The buggy address belongs to the physical page: [ 31.190054] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.191246] flags: 0x200000000000000(node=0|zone=2) [ 31.191709] page_type: f5(slab) [ 31.192380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.193236] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.194451] page dumped because: kasan: bad access detected [ 31.195335] [ 31.195522] Memory state around the buggy address: [ 31.196057] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.196855] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.197872] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.198576] ^ [ 31.199052] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.200688] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.201442] ================================================================== [ 31.348853] ================================================================== [ 31.350350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 31.351802] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.352647] [ 31.353164] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.354513] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.355032] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.355690] Call Trace: [ 31.356012] <TASK> [ 31.356419] dump_stack_lvl+0x73/0xb0 [ 31.356744] print_report+0xd1/0x640 [ 31.357200] ? __virt_addr_valid+0x1db/0x2d0 [ 31.357600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.358065] kasan_report+0x102/0x140 [ 31.358566] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.359427] ? kasan_atomics_helper+0x1f44/0x5450 [ 31.360081] kasan_check_range+0x10c/0x1c0 [ 31.360639] __kasan_check_write+0x18/0x20 [ 31.361294] kasan_atomics_helper+0x1f44/0x5450 [ 31.362317] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.363118] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.363542] ? kasan_atomics+0x153/0x310 [ 31.363953] kasan_atomics+0x1dd/0x310 [ 31.364509] ? __pfx_kasan_atomics+0x10/0x10 [ 31.364944] ? __pfx_read_tsc+0x10/0x10 [ 31.365715] ? ktime_get_ts64+0x86/0x230 [ 31.366642] kunit_try_run_case+0x1b3/0x490 [ 31.367329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.368300] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.368788] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.369250] ? __kthread_parkme+0x82/0x160 [ 31.369672] ? preempt_count_sub+0x50/0x80 [ 31.370083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.370614] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.371326] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.372093] kthread+0x257/0x310 [ 31.372644] ? __pfx_kthread+0x10/0x10 [ 31.373176] ret_from_fork+0x41/0x80 [ 31.373782] ? __pfx_kthread+0x10/0x10 [ 31.374309] ret_from_fork_asm+0x1a/0x30 [ 31.374968] </TASK> [ 31.375202] [ 31.375540] Allocated by task 272: [ 31.376175] kasan_save_stack+0x3d/0x60 [ 31.376556] kasan_save_track+0x18/0x40 [ 31.377228] kasan_save_alloc_info+0x3b/0x50 [ 31.377703] __kasan_kmalloc+0xb7/0xc0 [ 31.378280] __kmalloc_cache_noprof+0x184/0x410 [ 31.378890] kasan_atomics+0x96/0x310 [ 31.379146] kunit_try_run_case+0x1b3/0x490 [ 31.379694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.380649] kthread+0x257/0x310 [ 31.381328] ret_from_fork+0x41/0x80 [ 31.381719] ret_from_fork_asm+0x1a/0x30 [ 31.382272] [ 31.382502] The buggy address belongs to the object at ffff888102969600 [ 31.382502] which belongs to the cache kmalloc-64 of size 64 [ 31.383801] The buggy address is located 0 bytes to the right of [ 31.383801] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.384840] [ 31.385139] The buggy address belongs to the physical page: [ 31.385629] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.386510] flags: 0x200000000000000(node=0|zone=2) [ 31.387048] page_type: f5(slab) [ 31.387413] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.388212] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.389031] page dumped because: kasan: bad access detected [ 31.389637] [ 31.389872] Memory state around the buggy address: [ 31.390361] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.391069] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.391688] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.392191] ^ [ 31.393002] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.393820] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.394299] ================================================================== [ 30.867805] ================================================================== [ 30.868595] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 30.869535] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.870244] [ 30.870617] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.871220] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.871797] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.872662] Call Trace: [ 30.873175] <TASK> [ 30.873492] dump_stack_lvl+0x73/0xb0 [ 30.874030] print_report+0xd1/0x640 [ 30.874462] ? __virt_addr_valid+0x1db/0x2d0 [ 30.874991] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.875576] kasan_report+0x102/0x140 [ 30.876040] ? kasan_atomics_helper+0x194b/0x5450 [ 30.876550] ? kasan_atomics_helper+0x194b/0x5450 [ 30.877105] kasan_check_range+0x10c/0x1c0 [ 30.877603] __kasan_check_write+0x18/0x20 [ 30.878089] kasan_atomics_helper+0x194b/0x5450 [ 30.878846] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.879440] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.880013] ? kasan_atomics+0x153/0x310 [ 30.880343] kasan_atomics+0x1dd/0x310 [ 30.880868] ? __pfx_kasan_atomics+0x10/0x10 [ 30.881796] ? __pfx_read_tsc+0x10/0x10 [ 30.882116] ? ktime_get_ts64+0x86/0x230 [ 30.882638] kunit_try_run_case+0x1b3/0x490 [ 30.883274] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.883825] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.884363] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.884841] ? __kthread_parkme+0x82/0x160 [ 30.885336] ? preempt_count_sub+0x50/0x80 [ 30.885647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.886321] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.886920] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.887753] kthread+0x257/0x310 [ 30.888236] ? __pfx_kthread+0x10/0x10 [ 30.888645] ret_from_fork+0x41/0x80 [ 30.889170] ? __pfx_kthread+0x10/0x10 [ 30.889686] ret_from_fork_asm+0x1a/0x30 [ 30.890212] </TASK> [ 30.890634] [ 30.890906] Allocated by task 272: [ 30.891215] kasan_save_stack+0x3d/0x60 [ 30.891697] kasan_save_track+0x18/0x40 [ 30.892104] kasan_save_alloc_info+0x3b/0x50 [ 30.892527] __kasan_kmalloc+0xb7/0xc0 [ 30.892814] __kmalloc_cache_noprof+0x184/0x410 [ 30.893130] kasan_atomics+0x96/0x310 [ 30.893743] kunit_try_run_case+0x1b3/0x490 [ 30.894325] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.895015] kthread+0x257/0x310 [ 30.895304] ret_from_fork+0x41/0x80 [ 30.895805] ret_from_fork_asm+0x1a/0x30 [ 30.896406] [ 30.896731] The buggy address belongs to the object at ffff888102969600 [ 30.896731] which belongs to the cache kmalloc-64 of size 64 [ 30.897985] The buggy address is located 0 bytes to the right of [ 30.897985] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.899205] [ 30.899427] The buggy address belongs to the physical page: [ 30.899770] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.900594] flags: 0x200000000000000(node=0|zone=2) [ 30.900963] page_type: f5(slab) [ 30.901515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.902491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.903527] page dumped because: kasan: bad access detected [ 30.904050] [ 30.904331] Memory state around the buggy address: [ 30.904648] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.905317] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.906037] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.906782] ^ [ 30.907432] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.908217] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.908821] ================================================================== [ 30.956680] ================================================================== [ 30.957364] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 30.959685] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.960585] [ 30.960826] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.961657] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.962034] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.962853] Call Trace: [ 30.963121] <TASK> [ 30.963482] dump_stack_lvl+0x73/0xb0 [ 30.964689] print_report+0xd1/0x640 [ 30.965291] ? __virt_addr_valid+0x1db/0x2d0 [ 30.965755] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.966342] kasan_report+0x102/0x140 [ 30.966558] ? kasan_atomics_helper+0x1a80/0x5450 [ 30.966895] ? kasan_atomics_helper+0x1a80/0x5450 [ 30.968034] kasan_check_range+0x10c/0x1c0 [ 30.968654] __kasan_check_write+0x18/0x20 [ 30.969323] kasan_atomics_helper+0x1a80/0x5450 [ 30.969812] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.970329] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.970824] ? kasan_atomics+0x153/0x310 [ 30.971245] kasan_atomics+0x1dd/0x310 [ 30.971580] ? __pfx_kasan_atomics+0x10/0x10 [ 30.971897] ? __pfx_read_tsc+0x10/0x10 [ 30.973190] ? ktime_get_ts64+0x86/0x230 [ 30.973868] kunit_try_run_case+0x1b3/0x490 [ 30.974520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.975163] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.975646] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.976223] ? __kthread_parkme+0x82/0x160 [ 30.976602] ? preempt_count_sub+0x50/0x80 [ 30.977300] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.978242] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.979224] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.980014] kthread+0x257/0x310 [ 30.980542] ? __pfx_kthread+0x10/0x10 [ 30.980910] ret_from_fork+0x41/0x80 [ 30.981383] ? __pfx_kthread+0x10/0x10 [ 30.981747] ret_from_fork_asm+0x1a/0x30 [ 30.982241] </TASK> [ 30.982528] [ 30.982695] Allocated by task 272: [ 30.983190] kasan_save_stack+0x3d/0x60 [ 30.983647] kasan_save_track+0x18/0x40 [ 30.984119] kasan_save_alloc_info+0x3b/0x50 [ 30.984450] __kasan_kmalloc+0xb7/0xc0 [ 30.984948] __kmalloc_cache_noprof+0x184/0x410 [ 30.986063] kasan_atomics+0x96/0x310 [ 30.986607] kunit_try_run_case+0x1b3/0x490 [ 30.987200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.987785] kthread+0x257/0x310 [ 30.988453] ret_from_fork+0x41/0x80 [ 30.989096] ret_from_fork_asm+0x1a/0x30 [ 30.989626] [ 30.989870] The buggy address belongs to the object at ffff888102969600 [ 30.989870] which belongs to the cache kmalloc-64 of size 64 [ 30.991482] The buggy address is located 0 bytes to the right of [ 30.991482] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.992710] [ 30.993171] The buggy address belongs to the physical page: [ 30.994194] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.995356] flags: 0x200000000000000(node=0|zone=2) [ 30.996196] page_type: f5(slab) [ 30.996732] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.997437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.999083] page dumped because: kasan: bad access detected [ 30.999537] [ 30.999795] Memory state around the buggy address: [ 31.000338] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.001738] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.002433] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.003324] ^ [ 31.003751] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.004449] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.005577] ================================================================== [ 28.667987] ================================================================== [ 28.668742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 28.670125] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.671249] [ 28.671599] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.672907] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.673596] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.674981] Call Trace: [ 28.675489] <TASK> [ 28.675703] dump_stack_lvl+0x73/0xb0 [ 28.676945] print_report+0xd1/0x640 [ 28.677521] ? __virt_addr_valid+0x1db/0x2d0 [ 28.678636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.679245] kasan_report+0x102/0x140 [ 28.680244] ? kasan_atomics_helper+0x3e0/0x5450 [ 28.680686] ? kasan_atomics_helper+0x3e0/0x5450 [ 28.681322] kasan_check_range+0x10c/0x1c0 [ 28.682754] __kasan_check_read+0x15/0x20 [ 28.683186] kasan_atomics_helper+0x3e0/0x5450 [ 28.684123] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.684927] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.686282] ? kasan_atomics+0x153/0x310 [ 28.687112] kasan_atomics+0x1dd/0x310 [ 28.687807] ? __pfx_kasan_atomics+0x10/0x10 [ 28.688617] ? __pfx_read_tsc+0x10/0x10 [ 28.689143] ? ktime_get_ts64+0x86/0x230 [ 28.690366] kunit_try_run_case+0x1b3/0x490 [ 28.691009] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.691948] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.692698] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.693192] ? __kthread_parkme+0x82/0x160 [ 28.694190] ? preempt_count_sub+0x50/0x80 [ 28.695323] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.695856] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.696118] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.696444] kthread+0x257/0x310 [ 28.696891] ? __pfx_kthread+0x10/0x10 [ 28.697245] ret_from_fork+0x41/0x80 [ 28.698055] ? __pfx_kthread+0x10/0x10 [ 28.698949] ret_from_fork_asm+0x1a/0x30 [ 28.699592] </TASK> [ 28.699979] [ 28.700163] Allocated by task 272: [ 28.700815] kasan_save_stack+0x3d/0x60 [ 28.701845] kasan_save_track+0x18/0x40 [ 28.702631] kasan_save_alloc_info+0x3b/0x50 [ 28.703553] __kasan_kmalloc+0xb7/0xc0 [ 28.704025] __kmalloc_cache_noprof+0x184/0x410 [ 28.704699] kasan_atomics+0x96/0x310 [ 28.705304] kunit_try_run_case+0x1b3/0x490 [ 28.706180] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.707178] kthread+0x257/0x310 [ 28.707881] ret_from_fork+0x41/0x80 [ 28.708724] ret_from_fork_asm+0x1a/0x30 [ 28.709720] [ 28.709890] The buggy address belongs to the object at ffff888102969600 [ 28.709890] which belongs to the cache kmalloc-64 of size 64 [ 28.712183] The buggy address is located 0 bytes to the right of [ 28.712183] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.713923] [ 28.714165] The buggy address belongs to the physical page: [ 28.715029] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.716452] flags: 0x200000000000000(node=0|zone=2) [ 28.716979] page_type: f5(slab) [ 28.718018] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.718963] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.720360] page dumped because: kasan: bad access detected [ 28.721174] [ 28.721638] Memory state around the buggy address: [ 28.723190] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.723864] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.724672] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.726078] ^ [ 28.727023] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.728038] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.728828] ================================================================== [ 29.382458] ================================================================== [ 29.384096] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 29.385310] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.387036] [ 29.387452] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.389005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.389307] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.390242] Call Trace: [ 29.390608] <TASK> [ 29.390846] dump_stack_lvl+0x73/0xb0 [ 29.391337] print_report+0xd1/0x640 [ 29.391789] ? __virt_addr_valid+0x1db/0x2d0 [ 29.392334] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.393165] kasan_report+0x102/0x140 [ 29.393626] ? kasan_atomics_helper+0xa2c/0x5450 [ 29.394094] ? kasan_atomics_helper+0xa2c/0x5450 [ 29.394639] kasan_check_range+0x10c/0x1c0 [ 29.395003] __kasan_check_write+0x18/0x20 [ 29.395563] kasan_atomics_helper+0xa2c/0x5450 [ 29.395943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.396485] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.396994] ? kasan_atomics+0x153/0x310 [ 29.397469] kasan_atomics+0x1dd/0x310 [ 29.398170] ? __pfx_kasan_atomics+0x10/0x10 [ 29.398613] ? __pfx_read_tsc+0x10/0x10 [ 29.399203] ? ktime_get_ts64+0x86/0x230 [ 29.399562] kunit_try_run_case+0x1b3/0x490 [ 29.400129] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.400644] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.401172] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.401610] ? __kthread_parkme+0x82/0x160 [ 29.402370] ? preempt_count_sub+0x50/0x80 [ 29.402858] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.403231] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.404010] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.405184] kthread+0x257/0x310 [ 29.405601] ? __pfx_kthread+0x10/0x10 [ 29.406618] ret_from_fork+0x41/0x80 [ 29.407096] ? __pfx_kthread+0x10/0x10 [ 29.407658] ret_from_fork_asm+0x1a/0x30 [ 29.408414] </TASK> [ 29.408871] [ 29.409287] Allocated by task 272: [ 29.409661] kasan_save_stack+0x3d/0x60 [ 29.410339] kasan_save_track+0x18/0x40 [ 29.410973] kasan_save_alloc_info+0x3b/0x50 [ 29.411570] __kasan_kmalloc+0xb7/0xc0 [ 29.412341] __kmalloc_cache_noprof+0x184/0x410 [ 29.412802] kasan_atomics+0x96/0x310 [ 29.413298] kunit_try_run_case+0x1b3/0x490 [ 29.413701] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.414225] kthread+0x257/0x310 [ 29.414681] ret_from_fork+0x41/0x80 [ 29.415305] ret_from_fork_asm+0x1a/0x30 [ 29.415682] [ 29.415968] The buggy address belongs to the object at ffff888102969600 [ 29.415968] which belongs to the cache kmalloc-64 of size 64 [ 29.417057] The buggy address is located 0 bytes to the right of [ 29.417057] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.418246] [ 29.418602] The buggy address belongs to the physical page: [ 29.419530] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.420085] flags: 0x200000000000000(node=0|zone=2) [ 29.420625] page_type: f5(slab) [ 29.420898] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.421767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.422751] page dumped because: kasan: bad access detected [ 29.423203] [ 29.423533] Memory state around the buggy address: [ 29.423864] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.424828] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.425876] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.426309] ^ [ 29.426866] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.427820] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.428619] ================================================================== [ 29.263833] ================================================================== [ 29.264454] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 29.265238] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.266027] [ 29.266217] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.268163] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.268566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.269765] Call Trace: [ 29.270019] <TASK> [ 29.270469] dump_stack_lvl+0x73/0xb0 [ 29.271436] print_report+0xd1/0x640 [ 29.271909] ? __virt_addr_valid+0x1db/0x2d0 [ 29.272413] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.273522] kasan_report+0x102/0x140 [ 29.274747] ? kasan_atomics_helper+0x8fa/0x5450 [ 29.275541] ? kasan_atomics_helper+0x8fa/0x5450 [ 29.276381] kasan_check_range+0x10c/0x1c0 [ 29.277647] __kasan_check_write+0x18/0x20 [ 29.278519] kasan_atomics_helper+0x8fa/0x5450 [ 29.279195] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.280056] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.280669] ? kasan_atomics+0x153/0x310 [ 29.281158] kasan_atomics+0x1dd/0x310 [ 29.281788] ? __pfx_kasan_atomics+0x10/0x10 [ 29.282576] ? __pfx_read_tsc+0x10/0x10 [ 29.283145] ? ktime_get_ts64+0x86/0x230 [ 29.283690] kunit_try_run_case+0x1b3/0x490 [ 29.284394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.285094] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.285630] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.286881] ? __kthread_parkme+0x82/0x160 [ 29.287359] ? preempt_count_sub+0x50/0x80 [ 29.287737] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.288250] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.288694] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.289864] kthread+0x257/0x310 [ 29.290550] ? __pfx_kthread+0x10/0x10 [ 29.291087] ret_from_fork+0x41/0x80 [ 29.291550] ? __pfx_kthread+0x10/0x10 [ 29.292049] ret_from_fork_asm+0x1a/0x30 [ 29.293124] </TASK> [ 29.293747] [ 29.294037] Allocated by task 272: [ 29.294655] kasan_save_stack+0x3d/0x60 [ 29.295331] kasan_save_track+0x18/0x40 [ 29.295858] kasan_save_alloc_info+0x3b/0x50 [ 29.296174] __kasan_kmalloc+0xb7/0xc0 [ 29.296809] __kmalloc_cache_noprof+0x184/0x410 [ 29.297424] kasan_atomics+0x96/0x310 [ 29.297915] kunit_try_run_case+0x1b3/0x490 [ 29.298513] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.299381] kthread+0x257/0x310 [ 29.300406] ret_from_fork+0x41/0x80 [ 29.300929] ret_from_fork_asm+0x1a/0x30 [ 29.301533] [ 29.301891] The buggy address belongs to the object at ffff888102969600 [ 29.301891] which belongs to the cache kmalloc-64 of size 64 [ 29.303157] The buggy address is located 0 bytes to the right of [ 29.303157] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.304478] [ 29.304695] The buggy address belongs to the physical page: [ 29.305226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.306175] flags: 0x200000000000000(node=0|zone=2) [ 29.306690] page_type: f5(slab) [ 29.307314] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.308636] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.309513] page dumped because: kasan: bad access detected [ 29.310104] [ 29.310579] Memory state around the buggy address: [ 29.311069] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.312467] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.314151] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.314746] ^ [ 29.315232] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.315833] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.317686] ================================================================== [ 31.730017] ================================================================== [ 31.730879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 31.732998] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.733921] [ 31.734360] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.735482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.736092] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.736847] Call Trace: [ 31.737120] <TASK> [ 31.737430] dump_stack_lvl+0x73/0xb0 [ 31.737834] print_report+0xd1/0x640 [ 31.738828] ? __virt_addr_valid+0x1db/0x2d0 [ 31.739472] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.740235] kasan_report+0x102/0x140 [ 31.740844] ? kasan_atomics_helper+0x224d/0x5450 [ 31.741468] ? kasan_atomics_helper+0x224d/0x5450 [ 31.742382] kasan_check_range+0x10c/0x1c0 [ 31.743106] __kasan_check_write+0x18/0x20 [ 31.743706] kasan_atomics_helper+0x224d/0x5450 [ 31.744322] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.745118] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.745769] ? kasan_atomics+0x153/0x310 [ 31.746429] kasan_atomics+0x1dd/0x310 [ 31.746999] ? __pfx_kasan_atomics+0x10/0x10 [ 31.747585] ? __pfx_read_tsc+0x10/0x10 [ 31.748467] ? ktime_get_ts64+0x86/0x230 [ 31.748854] kunit_try_run_case+0x1b3/0x490 [ 31.749526] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.750087] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.751071] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.751738] ? __kthread_parkme+0x82/0x160 [ 31.752440] ? preempt_count_sub+0x50/0x80 [ 31.753014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.753584] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.754530] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.755478] kthread+0x257/0x310 [ 31.756107] ? __pfx_kthread+0x10/0x10 [ 31.756683] ret_from_fork+0x41/0x80 [ 31.757275] ? __pfx_kthread+0x10/0x10 [ 31.757920] ret_from_fork_asm+0x1a/0x30 [ 31.758354] </TASK> [ 31.758639] [ 31.758839] Allocated by task 272: [ 31.759702] kasan_save_stack+0x3d/0x60 [ 31.760300] kasan_save_track+0x18/0x40 [ 31.760900] kasan_save_alloc_info+0x3b/0x50 [ 31.761465] __kasan_kmalloc+0xb7/0xc0 [ 31.762128] __kmalloc_cache_noprof+0x184/0x410 [ 31.762752] kasan_atomics+0x96/0x310 [ 31.763340] kunit_try_run_case+0x1b3/0x490 [ 31.764179] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.764683] kthread+0x257/0x310 [ 31.765439] ret_from_fork+0x41/0x80 [ 31.765806] ret_from_fork_asm+0x1a/0x30 [ 31.766299] [ 31.766577] The buggy address belongs to the object at ffff888102969600 [ 31.766577] which belongs to the cache kmalloc-64 of size 64 [ 31.767589] The buggy address is located 0 bytes to the right of [ 31.767589] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.768771] [ 31.769166] The buggy address belongs to the physical page: [ 31.769646] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.770520] flags: 0x200000000000000(node=0|zone=2) [ 31.770942] page_type: f5(slab) [ 31.771323] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.772010] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.772535] page dumped because: kasan: bad access detected [ 31.773220] [ 31.773527] Memory state around the buggy address: [ 31.773965] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.774847] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.775570] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.776372] ^ [ 31.777187] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.778339] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.779304] ================================================================== [ 28.729910] ================================================================== [ 28.731377] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 28.734114] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.735773] [ 28.735942] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.736623] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.737988] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.739420] Call Trace: [ 28.740189] <TASK> [ 28.741029] dump_stack_lvl+0x73/0xb0 [ 28.741627] print_report+0xd1/0x640 [ 28.742043] ? __virt_addr_valid+0x1db/0x2d0 [ 28.743054] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.743613] kasan_report+0x102/0x140 [ 28.744016] ? kasan_atomics_helper+0x4b56/0x5450 [ 28.745846] ? kasan_atomics_helper+0x4b56/0x5450 [ 28.746461] __asan_report_load4_noabort+0x18/0x20 [ 28.747070] kasan_atomics_helper+0x4b56/0x5450 [ 28.747757] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.748754] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.749482] ? kasan_atomics+0x153/0x310 [ 28.749819] kasan_atomics+0x1dd/0x310 [ 28.750615] ? __pfx_kasan_atomics+0x10/0x10 [ 28.751365] ? __pfx_read_tsc+0x10/0x10 [ 28.751849] ? ktime_get_ts64+0x86/0x230 [ 28.752317] kunit_try_run_case+0x1b3/0x490 [ 28.753061] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.753734] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.754218] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.755035] ? __kthread_parkme+0x82/0x160 [ 28.756359] ? preempt_count_sub+0x50/0x80 [ 28.757665] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.758490] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.759419] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.760516] kthread+0x257/0x310 [ 28.761058] ? __pfx_kthread+0x10/0x10 [ 28.761440] ret_from_fork+0x41/0x80 [ 28.762486] ? __pfx_kthread+0x10/0x10 [ 28.763653] ret_from_fork_asm+0x1a/0x30 [ 28.764964] </TASK> [ 28.765395] [ 28.765616] Allocated by task 272: [ 28.765917] kasan_save_stack+0x3d/0x60 [ 28.767008] kasan_save_track+0x18/0x40 [ 28.767301] kasan_save_alloc_info+0x3b/0x50 [ 28.768386] __kasan_kmalloc+0xb7/0xc0 [ 28.769003] __kmalloc_cache_noprof+0x184/0x410 [ 28.769550] kasan_atomics+0x96/0x310 [ 28.770344] kunit_try_run_case+0x1b3/0x490 [ 28.771140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.772440] kthread+0x257/0x310 [ 28.772665] ret_from_fork+0x41/0x80 [ 28.773058] ret_from_fork_asm+0x1a/0x30 [ 28.774293] [ 28.774729] The buggy address belongs to the object at ffff888102969600 [ 28.774729] which belongs to the cache kmalloc-64 of size 64 [ 28.777236] The buggy address is located 0 bytes to the right of [ 28.777236] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.778566] [ 28.779185] The buggy address belongs to the physical page: [ 28.779918] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.781252] flags: 0x200000000000000(node=0|zone=2) [ 28.782610] page_type: f5(slab) [ 28.783088] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.784390] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.785248] page dumped because: kasan: bad access detected [ 28.785805] [ 28.786167] Memory state around the buggy address: [ 28.787049] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.787606] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.789096] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.789788] ^ [ 28.790033] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.790819] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.792209] ================================================================== [ 29.139738] ================================================================== [ 29.140503] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 29.141224] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.142717] [ 29.143054] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.143869] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.144833] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.146728] Call Trace: [ 29.147409] <TASK> [ 29.147806] dump_stack_lvl+0x73/0xb0 [ 29.148100] print_report+0xd1/0x640 [ 29.148791] ? __virt_addr_valid+0x1db/0x2d0 [ 29.149623] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.151034] kasan_report+0x102/0x140 [ 29.151779] ? kasan_atomics_helper+0x7c8/0x5450 [ 29.152424] ? kasan_atomics_helper+0x7c8/0x5450 [ 29.153004] kasan_check_range+0x10c/0x1c0 [ 29.154058] __kasan_check_write+0x18/0x20 [ 29.154643] kasan_atomics_helper+0x7c8/0x5450 [ 29.155580] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.156607] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.157545] ? kasan_atomics+0x153/0x310 [ 29.158354] kasan_atomics+0x1dd/0x310 [ 29.158738] ? __pfx_kasan_atomics+0x10/0x10 [ 29.159648] ? __pfx_read_tsc+0x10/0x10 [ 29.160212] ? ktime_get_ts64+0x86/0x230 [ 29.160773] kunit_try_run_case+0x1b3/0x490 [ 29.161371] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.162126] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.163342] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.163798] ? __kthread_parkme+0x82/0x160 [ 29.164561] ? preempt_count_sub+0x50/0x80 [ 29.164804] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.165891] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.166893] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.167824] kthread+0x257/0x310 [ 29.168168] ? __pfx_kthread+0x10/0x10 [ 29.168582] ret_from_fork+0x41/0x80 [ 29.169482] ? __pfx_kthread+0x10/0x10 [ 29.169783] ret_from_fork_asm+0x1a/0x30 [ 29.170686] </TASK> [ 29.171348] [ 29.171865] Allocated by task 272: [ 29.172140] kasan_save_stack+0x3d/0x60 [ 29.172751] kasan_save_track+0x18/0x40 [ 29.173196] kasan_save_alloc_info+0x3b/0x50 [ 29.174443] __kasan_kmalloc+0xb7/0xc0 [ 29.175672] __kmalloc_cache_noprof+0x184/0x410 [ 29.176927] kasan_atomics+0x96/0x310 [ 29.177235] kunit_try_run_case+0x1b3/0x490 [ 29.177628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.178124] kthread+0x257/0x310 [ 29.178506] ret_from_fork+0x41/0x80 [ 29.178948] ret_from_fork_asm+0x1a/0x30 [ 29.180045] [ 29.180215] The buggy address belongs to the object at ffff888102969600 [ 29.180215] which belongs to the cache kmalloc-64 of size 64 [ 29.182463] The buggy address is located 0 bytes to the right of [ 29.182463] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.183674] [ 29.184859] The buggy address belongs to the physical page: [ 29.185722] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.186761] flags: 0x200000000000000(node=0|zone=2) [ 29.187669] page_type: f5(slab) [ 29.187933] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.189450] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.190590] page dumped because: kasan: bad access detected [ 29.190927] [ 29.191093] Memory state around the buggy address: [ 29.192362] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.193049] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.193737] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.195873] ^ [ 29.196207] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.198026] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.199065] ================================================================== [ 31.634343] ================================================================== [ 31.635393] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 31.636705] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.638134] [ 31.638781] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.639731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.640549] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.641887] Call Trace: [ 31.642434] <TASK> [ 31.642718] dump_stack_lvl+0x73/0xb0 [ 31.643545] print_report+0xd1/0x640 [ 31.644103] ? __virt_addr_valid+0x1db/0x2d0 [ 31.644600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.645623] kasan_report+0x102/0x140 [ 31.646160] ? kasan_atomics_helper+0x218b/0x5450 [ 31.646709] ? kasan_atomics_helper+0x218b/0x5450 [ 31.647532] kasan_check_range+0x10c/0x1c0 [ 31.648338] __kasan_check_write+0x18/0x20 [ 31.648762] kasan_atomics_helper+0x218b/0x5450 [ 31.649240] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.650240] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.650911] ? kasan_atomics+0x153/0x310 [ 31.651353] kasan_atomics+0x1dd/0x310 [ 31.651707] ? __pfx_kasan_atomics+0x10/0x10 [ 31.652186] ? __pfx_read_tsc+0x10/0x10 [ 31.653149] ? ktime_get_ts64+0x86/0x230 [ 31.653611] kunit_try_run_case+0x1b3/0x490 [ 31.654723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.655488] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.656150] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.656724] ? __kthread_parkme+0x82/0x160 [ 31.657561] ? preempt_count_sub+0x50/0x80 [ 31.658128] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.658978] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.659531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.660300] kthread+0x257/0x310 [ 31.660851] ? __pfx_kthread+0x10/0x10 [ 31.661882] ret_from_fork+0x41/0x80 [ 31.662330] ? __pfx_kthread+0x10/0x10 [ 31.662753] ret_from_fork_asm+0x1a/0x30 [ 31.663195] </TASK> [ 31.663469] [ 31.663667] Allocated by task 272: [ 31.665024] kasan_save_stack+0x3d/0x60 [ 31.665554] kasan_save_track+0x18/0x40 [ 31.666122] kasan_save_alloc_info+0x3b/0x50 [ 31.666752] __kasan_kmalloc+0xb7/0xc0 [ 31.667360] __kmalloc_cache_noprof+0x184/0x410 [ 31.667831] kasan_atomics+0x96/0x310 [ 31.668582] kunit_try_run_case+0x1b3/0x490 [ 31.669194] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.669721] kthread+0x257/0x310 [ 31.670502] ret_from_fork+0x41/0x80 [ 31.670757] ret_from_fork_asm+0x1a/0x30 [ 31.671400] [ 31.671605] The buggy address belongs to the object at ffff888102969600 [ 31.671605] which belongs to the cache kmalloc-64 of size 64 [ 31.672727] The buggy address is located 0 bytes to the right of [ 31.672727] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.673896] [ 31.674098] The buggy address belongs to the physical page: [ 31.674648] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.675196] flags: 0x200000000000000(node=0|zone=2) [ 31.675550] page_type: f5(slab) [ 31.675935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.676821] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.677418] page dumped because: kasan: bad access detected [ 31.677800] [ 31.678060] Memory state around the buggy address: [ 31.678646] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.679390] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.680017] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.680585] ^ [ 31.681163] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.681627] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.682430] ================================================================== [ 30.767629] ================================================================== [ 30.768734] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 30.769905] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.770538] [ 30.771440] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.772392] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.773084] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.774356] Call Trace: [ 30.774883] <TASK> [ 30.775104] dump_stack_lvl+0x73/0xb0 [ 30.775657] print_report+0xd1/0x640 [ 30.776083] ? __virt_addr_valid+0x1db/0x2d0 [ 30.776500] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.777236] kasan_report+0x102/0x140 [ 30.777747] ? kasan_atomics_helper+0x1819/0x5450 [ 30.778738] ? kasan_atomics_helper+0x1819/0x5450 [ 30.779273] kasan_check_range+0x10c/0x1c0 [ 30.780058] __kasan_check_write+0x18/0x20 [ 30.780512] kasan_atomics_helper+0x1819/0x5450 [ 30.781491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.782230] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.782725] ? kasan_atomics+0x153/0x310 [ 30.783386] kasan_atomics+0x1dd/0x310 [ 30.784227] ? __pfx_kasan_atomics+0x10/0x10 [ 30.785005] ? __pfx_read_tsc+0x10/0x10 [ 30.785468] ? ktime_get_ts64+0x86/0x230 [ 30.786371] kunit_try_run_case+0x1b3/0x490 [ 30.786775] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.787476] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.788235] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.789301] ? __kthread_parkme+0x82/0x160 [ 30.789703] ? preempt_count_sub+0x50/0x80 [ 30.790180] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.790671] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.792199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.792801] kthread+0x257/0x310 [ 30.793410] ? __pfx_kthread+0x10/0x10 [ 30.793857] ret_from_fork+0x41/0x80 [ 30.794574] ? __pfx_kthread+0x10/0x10 [ 30.795287] ret_from_fork_asm+0x1a/0x30 [ 30.795714] </TASK> [ 30.796376] [ 30.796583] Allocated by task 272: [ 30.797208] kasan_save_stack+0x3d/0x60 [ 30.797612] kasan_save_track+0x18/0x40 [ 30.798406] kasan_save_alloc_info+0x3b/0x50 [ 30.799122] __kasan_kmalloc+0xb7/0xc0 [ 30.799750] __kmalloc_cache_noprof+0x184/0x410 [ 30.800325] kasan_atomics+0x96/0x310 [ 30.801033] kunit_try_run_case+0x1b3/0x490 [ 30.801558] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.802557] kthread+0x257/0x310 [ 30.803304] ret_from_fork+0x41/0x80 [ 30.803916] ret_from_fork_asm+0x1a/0x30 [ 30.804553] [ 30.804840] The buggy address belongs to the object at ffff888102969600 [ 30.804840] which belongs to the cache kmalloc-64 of size 64 [ 30.805873] The buggy address is located 0 bytes to the right of [ 30.805873] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.807644] [ 30.807939] The buggy address belongs to the physical page: [ 30.808551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.809273] flags: 0x200000000000000(node=0|zone=2) [ 30.810135] page_type: f5(slab) [ 30.810836] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.811610] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.812426] page dumped because: kasan: bad access detected [ 30.813415] [ 30.813768] Memory state around the buggy address: [ 30.814427] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.815441] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.815734] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.816735] ^ [ 30.817305] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.818061] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.819006] ================================================================== [ 29.519978] ================================================================== [ 29.521013] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 29.521632] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.522511] [ 29.522791] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.523589] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.524053] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.524613] Call Trace: [ 29.525004] <TASK> [ 29.525374] dump_stack_lvl+0x73/0xb0 [ 29.525872] print_report+0xd1/0x640 [ 29.526279] ? __virt_addr_valid+0x1db/0x2d0 [ 29.526616] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.527611] kasan_report+0x102/0x140 [ 29.528222] ? kasan_atomics_helper+0xc71/0x5450 [ 29.528801] ? kasan_atomics_helper+0xc71/0x5450 [ 29.530027] kasan_check_range+0x10c/0x1c0 [ 29.530350] __kasan_check_write+0x18/0x20 [ 29.531158] kasan_atomics_helper+0xc71/0x5450 [ 29.531786] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.532486] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.533231] ? kasan_atomics+0x153/0x310 [ 29.533890] kasan_atomics+0x1dd/0x310 [ 29.534545] ? __pfx_kasan_atomics+0x10/0x10 [ 29.534981] ? __pfx_read_tsc+0x10/0x10 [ 29.535575] ? ktime_get_ts64+0x86/0x230 [ 29.536290] kunit_try_run_case+0x1b3/0x490 [ 29.536906] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.537571] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.538301] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.539033] ? __kthread_parkme+0x82/0x160 [ 29.539659] ? preempt_count_sub+0x50/0x80 [ 29.540428] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.540883] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.542053] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.542784] kthread+0x257/0x310 [ 29.543536] ? __pfx_kthread+0x10/0x10 [ 29.544212] ret_from_fork+0x41/0x80 [ 29.544799] ? __pfx_kthread+0x10/0x10 [ 29.545446] ret_from_fork_asm+0x1a/0x30 [ 29.545904] </TASK> [ 29.546637] [ 29.546895] Allocated by task 272: [ 29.547160] kasan_save_stack+0x3d/0x60 [ 29.548075] kasan_save_track+0x18/0x40 [ 29.548497] kasan_save_alloc_info+0x3b/0x50 [ 29.549432] __kasan_kmalloc+0xb7/0xc0 [ 29.549718] __kmalloc_cache_noprof+0x184/0x410 [ 29.550588] kasan_atomics+0x96/0x310 [ 29.550935] kunit_try_run_case+0x1b3/0x490 [ 29.551418] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.552363] kthread+0x257/0x310 [ 29.552646] ret_from_fork+0x41/0x80 [ 29.553447] ret_from_fork_asm+0x1a/0x30 [ 29.554019] [ 29.554443] The buggy address belongs to the object at ffff888102969600 [ 29.554443] which belongs to the cache kmalloc-64 of size 64 [ 29.555332] The buggy address is located 0 bytes to the right of [ 29.555332] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.556715] [ 29.557070] The buggy address belongs to the physical page: [ 29.557506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.558432] flags: 0x200000000000000(node=0|zone=2) [ 29.559007] page_type: f5(slab) [ 29.559532] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.561218] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.562281] page dumped because: kasan: bad access detected [ 29.562769] [ 29.563051] Memory state around the buggy address: [ 29.563385] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.564249] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.564769] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.565535] ^ [ 29.566135] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.566986] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.567657] ================================================================== [ 31.440641] ================================================================== [ 31.441212] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 31.442425] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.443154] [ 31.443544] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.444537] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.444722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.445928] Call Trace: [ 31.446231] <TASK> [ 31.446546] dump_stack_lvl+0x73/0xb0 [ 31.447396] print_report+0xd1/0x640 [ 31.448004] ? __virt_addr_valid+0x1db/0x2d0 [ 31.448629] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.449270] kasan_report+0x102/0x140 [ 31.450169] ? kasan_atomics_helper+0x2007/0x5450 [ 31.450612] ? kasan_atomics_helper+0x2007/0x5450 [ 31.451418] kasan_check_range+0x10c/0x1c0 [ 31.452487] __kasan_check_write+0x18/0x20 [ 31.452916] kasan_atomics_helper+0x2007/0x5450 [ 31.453562] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.454779] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.455228] ? kasan_atomics+0x153/0x310 [ 31.456193] kasan_atomics+0x1dd/0x310 [ 31.456590] ? __pfx_kasan_atomics+0x10/0x10 [ 31.457283] ? __pfx_read_tsc+0x10/0x10 [ 31.457717] ? ktime_get_ts64+0x86/0x230 [ 31.458475] kunit_try_run_case+0x1b3/0x490 [ 31.459200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.459797] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.460355] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.461201] ? __kthread_parkme+0x82/0x160 [ 31.461597] ? preempt_count_sub+0x50/0x80 [ 31.462014] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.463294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.463831] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.464616] kthread+0x257/0x310 [ 31.465200] ? __pfx_kthread+0x10/0x10 [ 31.465717] ret_from_fork+0x41/0x80 [ 31.466436] ? __pfx_kthread+0x10/0x10 [ 31.466991] ret_from_fork_asm+0x1a/0x30 [ 31.467800] </TASK> [ 31.468182] [ 31.468391] Allocated by task 272: [ 31.469567] kasan_save_stack+0x3d/0x60 [ 31.469958] kasan_save_track+0x18/0x40 [ 31.470620] kasan_save_alloc_info+0x3b/0x50 [ 31.471113] __kasan_kmalloc+0xb7/0xc0 [ 31.471561] __kmalloc_cache_noprof+0x184/0x410 [ 31.472422] kasan_atomics+0x96/0x310 [ 31.473304] kunit_try_run_case+0x1b3/0x490 [ 31.473726] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.474604] kthread+0x257/0x310 [ 31.475378] ret_from_fork+0x41/0x80 [ 31.475728] ret_from_fork_asm+0x1a/0x30 [ 31.476387] [ 31.476864] The buggy address belongs to the object at ffff888102969600 [ 31.476864] which belongs to the cache kmalloc-64 of size 64 [ 31.477797] The buggy address is located 0 bytes to the right of [ 31.477797] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.479576] [ 31.480348] The buggy address belongs to the physical page: [ 31.481017] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.482323] flags: 0x200000000000000(node=0|zone=2) [ 31.482740] page_type: f5(slab) [ 31.483182] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.484461] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.485436] page dumped because: kasan: bad access detected [ 31.485767] [ 31.486507] Memory state around the buggy address: [ 31.487275] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.488159] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.488721] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.489626] ^ [ 31.490588] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.491365] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.492434] ================================================================== [ 30.820020] ================================================================== [ 30.820679] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 30.821578] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.822471] [ 30.822793] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.824540] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.824952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.825641] Call Trace: [ 30.826307] <TASK> [ 30.826617] dump_stack_lvl+0x73/0xb0 [ 30.827402] print_report+0xd1/0x640 [ 30.828039] ? __virt_addr_valid+0x1db/0x2d0 [ 30.828428] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.829239] kasan_report+0x102/0x140 [ 30.829697] ? kasan_atomics_helper+0x18b2/0x5450 [ 30.830597] ? kasan_atomics_helper+0x18b2/0x5450 [ 30.831735] kasan_check_range+0x10c/0x1c0 [ 30.832172] __kasan_check_write+0x18/0x20 [ 30.833144] kasan_atomics_helper+0x18b2/0x5450 [ 30.833599] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.834148] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.834618] ? kasan_atomics+0x153/0x310 [ 30.835228] kasan_atomics+0x1dd/0x310 [ 30.835613] ? __pfx_kasan_atomics+0x10/0x10 [ 30.837011] ? __pfx_read_tsc+0x10/0x10 [ 30.837575] ? ktime_get_ts64+0x86/0x230 [ 30.838344] kunit_try_run_case+0x1b3/0x490 [ 30.838724] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.839426] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.840501] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.841132] ? __kthread_parkme+0x82/0x160 [ 30.841775] ? preempt_count_sub+0x50/0x80 [ 30.842700] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.843299] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.844096] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.844785] kthread+0x257/0x310 [ 30.845589] ? __pfx_kthread+0x10/0x10 [ 30.846039] ret_from_fork+0x41/0x80 [ 30.846383] ? __pfx_kthread+0x10/0x10 [ 30.846793] ret_from_fork_asm+0x1a/0x30 [ 30.847350] </TASK> [ 30.847813] [ 30.848124] Allocated by task 272: [ 30.848487] kasan_save_stack+0x3d/0x60 [ 30.848960] kasan_save_track+0x18/0x40 [ 30.849512] kasan_save_alloc_info+0x3b/0x50 [ 30.850030] __kasan_kmalloc+0xb7/0xc0 [ 30.850336] __kmalloc_cache_noprof+0x184/0x410 [ 30.851080] kasan_atomics+0x96/0x310 [ 30.851548] kunit_try_run_case+0x1b3/0x490 [ 30.852238] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.852755] kthread+0x257/0x310 [ 30.853167] ret_from_fork+0x41/0x80 [ 30.853585] ret_from_fork_asm+0x1a/0x30 [ 30.854044] [ 30.854336] The buggy address belongs to the object at ffff888102969600 [ 30.854336] which belongs to the cache kmalloc-64 of size 64 [ 30.855571] The buggy address is located 0 bytes to the right of [ 30.855571] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.856697] [ 30.857010] The buggy address belongs to the physical page: [ 30.857551] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.858188] flags: 0x200000000000000(node=0|zone=2) [ 30.858854] page_type: f5(slab) [ 30.859181] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.859991] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.860791] page dumped because: kasan: bad access detected [ 30.861132] [ 30.861361] Memory state around the buggy address: [ 30.861997] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.863089] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.863551] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.864471] ^ [ 30.865174] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.865707] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.866357] ================================================================== [ 31.295046] ================================================================== [ 31.295632] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 31.297363] Write of size 8 at addr ffff888102969630 by task kunit_try_catch/272 [ 31.298201] [ 31.298424] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 31.299755] Tainted: [B]=BAD_PAGE, [N]=TEST [ 31.300097] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 31.301305] Call Trace: [ 31.302453] <TASK> [ 31.302686] dump_stack_lvl+0x73/0xb0 [ 31.303321] print_report+0xd1/0x640 [ 31.303844] ? __virt_addr_valid+0x1db/0x2d0 [ 31.304600] ? kasan_complete_mode_report_info+0x2a/0x200 [ 31.305241] kasan_report+0x102/0x140 [ 31.305652] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.306810] ? kasan_atomics_helper+0x1eab/0x5450 [ 31.307304] kasan_check_range+0x10c/0x1c0 [ 31.308170] __kasan_check_write+0x18/0x20 [ 31.308643] kasan_atomics_helper+0x1eab/0x5450 [ 31.309470] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 31.310198] ? __kmalloc_cache_noprof+0x184/0x410 [ 31.310800] ? kasan_atomics+0x153/0x310 [ 31.311316] kasan_atomics+0x1dd/0x310 [ 31.312201] ? __pfx_kasan_atomics+0x10/0x10 [ 31.312655] ? __pfx_read_tsc+0x10/0x10 [ 31.313430] ? ktime_get_ts64+0x86/0x230 [ 31.314425] kunit_try_run_case+0x1b3/0x490 [ 31.315200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.315617] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 31.316354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 31.317057] ? __kthread_parkme+0x82/0x160 [ 31.317514] ? preempt_count_sub+0x50/0x80 [ 31.318403] ? __pfx_kunit_try_run_case+0x10/0x10 [ 31.318938] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 31.319574] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.320343] kthread+0x257/0x310 [ 31.321144] ? __pfx_kthread+0x10/0x10 [ 31.321527] ret_from_fork+0x41/0x80 [ 31.322543] ? __pfx_kthread+0x10/0x10 [ 31.322935] ret_from_fork_asm+0x1a/0x30 [ 31.323152] </TASK> [ 31.323319] [ 31.323482] Allocated by task 272: [ 31.324248] kasan_save_stack+0x3d/0x60 [ 31.325408] kasan_save_track+0x18/0x40 [ 31.325742] kasan_save_alloc_info+0x3b/0x50 [ 31.326762] __kasan_kmalloc+0xb7/0xc0 [ 31.327305] __kmalloc_cache_noprof+0x184/0x410 [ 31.328417] kasan_atomics+0x96/0x310 [ 31.328786] kunit_try_run_case+0x1b3/0x490 [ 31.329668] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 31.330453] kthread+0x257/0x310 [ 31.330702] ret_from_fork+0x41/0x80 [ 31.331239] ret_from_fork_asm+0x1a/0x30 [ 31.331634] [ 31.331895] The buggy address belongs to the object at ffff888102969600 [ 31.331895] which belongs to the cache kmalloc-64 of size 64 [ 31.333779] The buggy address is located 0 bytes to the right of [ 31.333779] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 31.334804] [ 31.335478] The buggy address belongs to the physical page: [ 31.336209] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 31.337127] flags: 0x200000000000000(node=0|zone=2) [ 31.338010] page_type: f5(slab) [ 31.338381] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 31.339565] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 31.340553] page dumped because: kasan: bad access detected [ 31.341313] [ 31.341421] Memory state around the buggy address: [ 31.341627] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.342425] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 31.343612] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 31.344576] ^ [ 31.345591] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.346595] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 31.347499] ================================================================== [ 30.159037] ================================================================== [ 30.159739] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 30.160443] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.160989] [ 30.161177] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.162130] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.162503] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.163388] Call Trace: [ 30.163611] <TASK> [ 30.163946] dump_stack_lvl+0x73/0xb0 [ 30.164491] print_report+0xd1/0x640 [ 30.164939] ? __virt_addr_valid+0x1db/0x2d0 [ 30.165456] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.166100] kasan_report+0x102/0x140 [ 30.166546] ? kasan_atomics_helper+0x49ea/0x5450 [ 30.166973] ? kasan_atomics_helper+0x49ea/0x5450 [ 30.167556] __asan_report_load4_noabort+0x18/0x20 [ 30.167897] kasan_atomics_helper+0x49ea/0x5450 [ 30.168488] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.170420] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.171685] ? kasan_atomics+0x153/0x310 [ 30.172709] kasan_atomics+0x1dd/0x310 [ 30.173134] ? __pfx_kasan_atomics+0x10/0x10 [ 30.173587] ? __pfx_read_tsc+0x10/0x10 [ 30.174184] ? ktime_get_ts64+0x86/0x230 [ 30.174929] kunit_try_run_case+0x1b3/0x490 [ 30.175617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.176521] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.177112] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.177673] ? __kthread_parkme+0x82/0x160 [ 30.178668] ? preempt_count_sub+0x50/0x80 [ 30.179064] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.179997] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.180575] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.181596] kthread+0x257/0x310 [ 30.181953] ? __pfx_kthread+0x10/0x10 [ 30.182601] ret_from_fork+0x41/0x80 [ 30.183223] ? __pfx_kthread+0x10/0x10 [ 30.183908] ret_from_fork_asm+0x1a/0x30 [ 30.184612] </TASK> [ 30.185076] [ 30.185310] Allocated by task 272: [ 30.185676] kasan_save_stack+0x3d/0x60 [ 30.186911] kasan_save_track+0x18/0x40 [ 30.187213] kasan_save_alloc_info+0x3b/0x50 [ 30.187933] __kasan_kmalloc+0xb7/0xc0 [ 30.188374] __kmalloc_cache_noprof+0x184/0x410 [ 30.189171] kasan_atomics+0x96/0x310 [ 30.189574] kunit_try_run_case+0x1b3/0x490 [ 30.190087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.190855] kthread+0x257/0x310 [ 30.191357] ret_from_fork+0x41/0x80 [ 30.191646] ret_from_fork_asm+0x1a/0x30 [ 30.192177] [ 30.192938] The buggy address belongs to the object at ffff888102969600 [ 30.192938] which belongs to the cache kmalloc-64 of size 64 [ 30.194105] The buggy address is located 0 bytes to the right of [ 30.194105] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.195441] [ 30.195634] The buggy address belongs to the physical page: [ 30.196733] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.197386] flags: 0x200000000000000(node=0|zone=2) [ 30.198123] page_type: f5(slab) [ 30.198635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.199652] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.200387] page dumped because: kasan: bad access detected [ 30.201413] [ 30.201588] Memory state around the buggy address: [ 30.202460] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.203362] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.204560] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.205639] ^ [ 30.206309] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.207311] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.208067] ================================================================== [ 30.262285] ================================================================== [ 30.263002] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 30.264093] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 30.264576] [ 30.265416] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 30.266809] Tainted: [B]=BAD_PAGE, [N]=TEST [ 30.267209] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 30.268239] Call Trace: [ 30.268818] <TASK> [ 30.269075] dump_stack_lvl+0x73/0xb0 [ 30.269493] print_report+0xd1/0x640 [ 30.270358] ? __virt_addr_valid+0x1db/0x2d0 [ 30.270867] ? kasan_complete_mode_report_info+0x2a/0x200 [ 30.271553] kasan_report+0x102/0x140 [ 30.272205] ? kasan_atomics_helper+0x49d0/0x5450 [ 30.272744] ? kasan_atomics_helper+0x49d0/0x5450 [ 30.273587] __asan_report_load4_noabort+0x18/0x20 [ 30.274062] kasan_atomics_helper+0x49d0/0x5450 [ 30.274832] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 30.275476] ? __kmalloc_cache_noprof+0x184/0x410 [ 30.276190] ? kasan_atomics+0x153/0x310 [ 30.276618] kasan_atomics+0x1dd/0x310 [ 30.277558] ? __pfx_kasan_atomics+0x10/0x10 [ 30.278040] ? __pfx_read_tsc+0x10/0x10 [ 30.278628] ? ktime_get_ts64+0x86/0x230 [ 30.279353] kunit_try_run_case+0x1b3/0x490 [ 30.280000] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.280633] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 30.281414] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 30.282155] ? __kthread_parkme+0x82/0x160 [ 30.282852] ? preempt_count_sub+0x50/0x80 [ 30.283422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 30.284178] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 30.284951] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.285515] kthread+0x257/0x310 [ 30.286184] ? __pfx_kthread+0x10/0x10 [ 30.286758] ret_from_fork+0x41/0x80 [ 30.287394] ? __pfx_kthread+0x10/0x10 [ 30.288003] ret_from_fork_asm+0x1a/0x30 [ 30.288499] </TASK> [ 30.288771] [ 30.289439] Allocated by task 272: [ 30.289689] kasan_save_stack+0x3d/0x60 [ 30.290073] kasan_save_track+0x18/0x40 [ 30.290595] kasan_save_alloc_info+0x3b/0x50 [ 30.291047] __kasan_kmalloc+0xb7/0xc0 [ 30.291434] __kmalloc_cache_noprof+0x184/0x410 [ 30.292048] kasan_atomics+0x96/0x310 [ 30.292543] kunit_try_run_case+0x1b3/0x490 [ 30.293167] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 30.293698] kthread+0x257/0x310 [ 30.294161] ret_from_fork+0x41/0x80 [ 30.294615] ret_from_fork_asm+0x1a/0x30 [ 30.295222] [ 30.295490] The buggy address belongs to the object at ffff888102969600 [ 30.295490] which belongs to the cache kmalloc-64 of size 64 [ 30.296501] The buggy address is located 0 bytes to the right of [ 30.296501] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 30.297895] [ 30.298096] The buggy address belongs to the physical page: [ 30.298645] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 30.299592] flags: 0x200000000000000(node=0|zone=2) [ 30.300242] page_type: f5(slab) [ 30.300644] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 30.301575] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 30.302248] page dumped because: kasan: bad access detected [ 30.302898] [ 30.303171] Memory state around the buggy address: [ 30.303714] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.304526] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 30.305367] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 30.306440] ^ [ 30.307339] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.308031] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 30.308748] ================================================================== [ 29.674757] ================================================================== [ 29.676278] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 29.677166] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.678811] [ 29.679069] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.680499] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.680966] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.681548] Call Trace: [ 29.681699] <TASK> [ 29.682009] dump_stack_lvl+0x73/0xb0 [ 29.682721] print_report+0xd1/0x640 [ 29.683533] ? __virt_addr_valid+0x1db/0x2d0 [ 29.684747] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.685381] kasan_report+0x102/0x140 [ 29.686086] ? kasan_atomics_helper+0xde1/0x5450 [ 29.686779] ? kasan_atomics_helper+0xde1/0x5450 [ 29.687397] kasan_check_range+0x10c/0x1c0 [ 29.688137] __kasan_check_write+0x18/0x20 [ 29.688676] kasan_atomics_helper+0xde1/0x5450 [ 29.689189] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.689802] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.690300] ? kasan_atomics+0x153/0x310 [ 29.690677] kasan_atomics+0x1dd/0x310 [ 29.691228] ? __pfx_kasan_atomics+0x10/0x10 [ 29.691651] ? __pfx_read_tsc+0x10/0x10 [ 29.692096] ? ktime_get_ts64+0x86/0x230 [ 29.692616] kunit_try_run_case+0x1b3/0x490 [ 29.693336] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.694225] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.694900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.695613] ? __kthread_parkme+0x82/0x160 [ 29.696378] ? preempt_count_sub+0x50/0x80 [ 29.697544] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.698335] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.698978] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.699629] kthread+0x257/0x310 [ 29.700389] ? __pfx_kthread+0x10/0x10 [ 29.700970] ret_from_fork+0x41/0x80 [ 29.701570] ? __pfx_kthread+0x10/0x10 [ 29.702110] ret_from_fork_asm+0x1a/0x30 [ 29.702531] </TASK> [ 29.703230] [ 29.703622] Allocated by task 272: [ 29.704045] kasan_save_stack+0x3d/0x60 [ 29.704747] kasan_save_track+0x18/0x40 [ 29.705305] kasan_save_alloc_info+0x3b/0x50 [ 29.705754] __kasan_kmalloc+0xb7/0xc0 [ 29.706838] __kmalloc_cache_noprof+0x184/0x410 [ 29.707482] kasan_atomics+0x96/0x310 [ 29.708021] kunit_try_run_case+0x1b3/0x490 [ 29.708415] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.709323] kthread+0x257/0x310 [ 29.709656] ret_from_fork+0x41/0x80 [ 29.710222] ret_from_fork_asm+0x1a/0x30 [ 29.710674] [ 29.711297] The buggy address belongs to the object at ffff888102969600 [ 29.711297] which belongs to the cache kmalloc-64 of size 64 [ 29.712384] The buggy address is located 0 bytes to the right of [ 29.712384] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.713860] [ 29.714319] The buggy address belongs to the physical page: [ 29.714912] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.715991] flags: 0x200000000000000(node=0|zone=2) [ 29.716548] page_type: f5(slab) [ 29.717412] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.718538] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.719028] page dumped because: kasan: bad access detected [ 29.719277] [ 29.719479] Memory state around the buggy address: [ 29.720534] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.721277] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.721911] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.723078] ^ [ 29.723571] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.724432] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.725290] ================================================================== [ 29.622016] ================================================================== [ 29.624065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 29.625117] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.625873] [ 29.626423] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.628032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.628672] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.629445] Call Trace: [ 29.629750] <TASK> [ 29.630041] dump_stack_lvl+0x73/0xb0 [ 29.631475] print_report+0xd1/0x640 [ 29.632136] ? __virt_addr_valid+0x1db/0x2d0 [ 29.632637] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.633048] kasan_report+0x102/0x140 [ 29.633774] ? kasan_atomics_helper+0xd48/0x5450 [ 29.634687] ? kasan_atomics_helper+0xd48/0x5450 [ 29.635409] kasan_check_range+0x10c/0x1c0 [ 29.636163] __kasan_check_write+0x18/0x20 [ 29.636841] kasan_atomics_helper+0xd48/0x5450 [ 29.637324] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.637791] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.638301] ? kasan_atomics+0x153/0x310 [ 29.639065] kasan_atomics+0x1dd/0x310 [ 29.639513] ? __pfx_kasan_atomics+0x10/0x10 [ 29.640342] ? __pfx_read_tsc+0x10/0x10 [ 29.641372] ? ktime_get_ts64+0x86/0x230 [ 29.642097] kunit_try_run_case+0x1b3/0x490 [ 29.642699] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.643517] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.643976] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.644726] ? __kthread_parkme+0x82/0x160 [ 29.645163] ? preempt_count_sub+0x50/0x80 [ 29.645984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.646509] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.647412] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.647798] kthread+0x257/0x310 [ 29.648278] ? __pfx_kthread+0x10/0x10 [ 29.649133] ret_from_fork+0x41/0x80 [ 29.649540] ? __pfx_kthread+0x10/0x10 [ 29.650193] ret_from_fork_asm+0x1a/0x30 [ 29.650962] </TASK> [ 29.651224] [ 29.651461] Allocated by task 272: [ 29.652296] kasan_save_stack+0x3d/0x60 [ 29.652744] kasan_save_track+0x18/0x40 [ 29.653049] kasan_save_alloc_info+0x3b/0x50 [ 29.653547] __kasan_kmalloc+0xb7/0xc0 [ 29.654390] __kmalloc_cache_noprof+0x184/0x410 [ 29.654706] kasan_atomics+0x96/0x310 [ 29.655209] kunit_try_run_case+0x1b3/0x490 [ 29.655585] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.656033] kthread+0x257/0x310 [ 29.656679] ret_from_fork+0x41/0x80 [ 29.657287] ret_from_fork_asm+0x1a/0x30 [ 29.658586] [ 29.658808] The buggy address belongs to the object at ffff888102969600 [ 29.658808] which belongs to the cache kmalloc-64 of size 64 [ 29.660063] The buggy address is located 0 bytes to the right of [ 29.660063] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.661734] [ 29.662025] The buggy address belongs to the physical page: [ 29.662585] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.663784] flags: 0x200000000000000(node=0|zone=2) [ 29.664646] page_type: f5(slab) [ 29.665044] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.666135] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.667149] page dumped because: kasan: bad access detected [ 29.667493] [ 29.667950] Memory state around the buggy address: [ 29.668895] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.669731] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.670470] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.671302] ^ [ 29.671913] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.672569] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.673468] ================================================================== [ 28.547556] ================================================================== [ 28.548790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 28.550009] Read of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 28.551017] [ 28.551421] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 28.552564] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.552971] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.553835] Call Trace: [ 28.554131] <TASK> [ 28.554968] dump_stack_lvl+0x73/0xb0 [ 28.555680] print_report+0xd1/0x640 [ 28.556149] ? __virt_addr_valid+0x1db/0x2d0 [ 28.556823] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.557682] kasan_report+0x102/0x140 [ 28.558162] ? kasan_atomics_helper+0x4b8a/0x5450 [ 28.559137] ? kasan_atomics_helper+0x4b8a/0x5450 [ 28.560152] __asan_report_load4_noabort+0x18/0x20 [ 28.561426] kasan_atomics_helper+0x4b8a/0x5450 [ 28.562609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.563131] ? __kmalloc_cache_noprof+0x184/0x410 [ 28.564150] ? kasan_atomics+0x153/0x310 [ 28.565362] kasan_atomics+0x1dd/0x310 [ 28.565908] ? __pfx_kasan_atomics+0x10/0x10 [ 28.567359] ? __pfx_read_tsc+0x10/0x10 [ 28.567843] ? ktime_get_ts64+0x86/0x230 [ 28.568928] kunit_try_run_case+0x1b3/0x490 [ 28.569422] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.569739] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 28.570236] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.571532] ? __kthread_parkme+0x82/0x160 [ 28.572008] ? preempt_count_sub+0x50/0x80 [ 28.572849] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.573500] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.574566] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.575326] kthread+0x257/0x310 [ 28.576030] ? __pfx_kthread+0x10/0x10 [ 28.576534] ret_from_fork+0x41/0x80 [ 28.577326] ? __pfx_kthread+0x10/0x10 [ 28.577674] ret_from_fork_asm+0x1a/0x30 [ 28.578524] </TASK> [ 28.579515] [ 28.579794] Allocated by task 272: [ 28.580748] kasan_save_stack+0x3d/0x60 [ 28.581419] kasan_save_track+0x18/0x40 [ 28.581957] kasan_save_alloc_info+0x3b/0x50 [ 28.582821] __kasan_kmalloc+0xb7/0xc0 [ 28.583440] __kmalloc_cache_noprof+0x184/0x410 [ 28.584426] kasan_atomics+0x96/0x310 [ 28.584821] kunit_try_run_case+0x1b3/0x490 [ 28.585614] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.586718] kthread+0x257/0x310 [ 28.587438] ret_from_fork+0x41/0x80 [ 28.587793] ret_from_fork_asm+0x1a/0x30 [ 28.588527] [ 28.589159] The buggy address belongs to the object at ffff888102969600 [ 28.589159] which belongs to the cache kmalloc-64 of size 64 [ 28.591037] The buggy address is located 0 bytes to the right of [ 28.591037] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 28.593072] [ 28.593347] The buggy address belongs to the physical page: [ 28.593828] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 28.594959] flags: 0x200000000000000(node=0|zone=2) [ 28.595178] page_type: f5(slab) [ 28.595820] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.597178] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.597765] page dumped because: kasan: bad access detected [ 28.598753] [ 28.598954] Memory state around the buggy address: [ 28.600030] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.601231] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.602475] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.603321] ^ [ 28.604471] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.605850] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.606393] ================================================================== [ 29.083588] ================================================================== [ 29.084303] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 29.084951] Write of size 4 at addr ffff888102969630 by task kunit_try_catch/272 [ 29.085694] [ 29.086003] CPU: 0 UID: 0 PID: 272 Comm: kunit_try_catch Tainted: G B N 6.13.0-rc2-next-20241209 #1 [ 29.087420] Tainted: [B]=BAD_PAGE, [N]=TEST [ 29.087665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 29.089554] Call Trace: [ 29.090203] <TASK> [ 29.090737] dump_stack_lvl+0x73/0xb0 [ 29.091173] print_report+0xd1/0x640 [ 29.092216] ? __virt_addr_valid+0x1db/0x2d0 [ 29.092694] ? kasan_complete_mode_report_info+0x2a/0x200 [ 29.093227] kasan_report+0x102/0x140 [ 29.093650] ? kasan_atomics_helper+0x730/0x5450 [ 29.094144] ? kasan_atomics_helper+0x730/0x5450 [ 29.095337] kasan_check_range+0x10c/0x1c0 [ 29.095896] __kasan_check_write+0x18/0x20 [ 29.096507] kasan_atomics_helper+0x730/0x5450 [ 29.097449] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 29.098654] ? __kmalloc_cache_noprof+0x184/0x410 [ 29.099430] ? kasan_atomics+0x153/0x310 [ 29.100035] kasan_atomics+0x1dd/0x310 [ 29.100942] ? __pfx_kasan_atomics+0x10/0x10 [ 29.101439] ? __pfx_read_tsc+0x10/0x10 [ 29.101975] ? ktime_get_ts64+0x86/0x230 [ 29.102542] kunit_try_run_case+0x1b3/0x490 [ 29.103066] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.104433] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 29.104667] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 29.105992] ? __kthread_parkme+0x82/0x160 [ 29.106456] ? preempt_count_sub+0x50/0x80 [ 29.107086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 29.108171] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 29.108855] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.109572] kthread+0x257/0x310 [ 29.110170] ? __pfx_kthread+0x10/0x10 [ 29.110728] ret_from_fork+0x41/0x80 [ 29.111230] ? __pfx_kthread+0x10/0x10 [ 29.111725] ret_from_fork_asm+0x1a/0x30 [ 29.112879] </TASK> [ 29.113285] [ 29.113752] Allocated by task 272: [ 29.114514] kasan_save_stack+0x3d/0x60 [ 29.115062] kasan_save_track+0x18/0x40 [ 29.115478] kasan_save_alloc_info+0x3b/0x50 [ 29.116072] __kasan_kmalloc+0xb7/0xc0 [ 29.117110] __kmalloc_cache_noprof+0x184/0x410 [ 29.117468] kasan_atomics+0x96/0x310 [ 29.117957] kunit_try_run_case+0x1b3/0x490 [ 29.118693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 29.119061] kthread+0x257/0x310 [ 29.119791] ret_from_fork+0x41/0x80 [ 29.120322] ret_from_fork_asm+0x1a/0x30 [ 29.121310] [ 29.121502] The buggy address belongs to the object at ffff888102969600 [ 29.121502] which belongs to the cache kmalloc-64 of size 64 [ 29.123196] The buggy address is located 0 bytes to the right of [ 29.123196] allocated 48-byte region [ffff888102969600, ffff888102969630) [ 29.125024] [ 29.125305] The buggy address belongs to the physical page: [ 29.126047] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102969 [ 29.127501] flags: 0x200000000000000(node=0|zone=2) [ 29.128379] page_type: f5(slab) [ 29.128978] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 29.129698] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 29.131349] page dumped because: kasan: bad access detected [ 29.131722] [ 29.132067] Memory state around the buggy address: [ 29.133432] ffff888102969500: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.134276] ffff888102969580: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 29.135173] >ffff888102969600: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 29.136100] ^ [ 29.136728] ffff888102969680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.137846] ffff888102969700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 29.138731] ==================================================================