Date
March 19, 2025, 10:35 a.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 39.286388] ================================================================== [ 39.286537] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3db0/0x4858 [ 39.286683] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.286846] [ 39.286946] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.287245] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.287340] Hardware name: linux,dummy-virt (DT) [ 39.287451] Call trace: [ 39.287526] show_stack+0x20/0x38 (C) [ 39.287687] dump_stack_lvl+0x8c/0xd0 [ 39.287837] print_report+0x118/0x5f0 [ 39.287994] kasan_report+0xc8/0x118 [ 39.288161] __asan_report_load8_noabort+0x20/0x30 [ 39.288358] kasan_atomics_helper+0x3db0/0x4858 [ 39.288620] kasan_atomics+0x198/0x2e8 [ 39.288796] kunit_try_run_case+0x14c/0x3d0 [ 39.288979] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.289202] kthread+0x318/0x618 [ 39.289364] ret_from_fork+0x10/0x20 [ 39.289517] [ 39.289577] Allocated by task 267: [ 39.289670] kasan_save_stack+0x3c/0x68 [ 39.289789] kasan_save_track+0x20/0x40 [ 39.289910] kasan_save_alloc_info+0x40/0x58 [ 39.290041] __kasan_kmalloc+0xd4/0xd8 [ 39.290198] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.290338] kasan_atomics+0xb8/0x2e8 [ 39.290539] kunit_try_run_case+0x14c/0x3d0 [ 39.290726] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.291005] kthread+0x318/0x618 [ 39.291173] ret_from_fork+0x10/0x20 [ 39.291308] [ 39.291377] The buggy address belongs to the object at fff00000c5dafc80 [ 39.291377] which belongs to the cache kmalloc-64 of size 64 [ 39.291581] The buggy address is located 0 bytes to the right of [ 39.291581] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.291803] [ 39.291876] The buggy address belongs to the physical page: [ 39.291979] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.292179] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.292333] page_type: f5(slab) [ 39.292451] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.292631] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.292828] page dumped because: kasan: bad access detected [ 39.292971] [ 39.293034] Memory state around the buggy address: [ 39.293213] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.293410] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.293578] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.293732] ^ [ 39.293916] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.294135] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.294264] ================================================================== [ 39.295702] ================================================================== [ 39.295872] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1644/0x4858 [ 39.296133] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.296388] [ 39.296500] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.296939] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.297074] Hardware name: linux,dummy-virt (DT) [ 39.297176] Call trace: [ 39.297256] show_stack+0x20/0x38 (C) [ 39.297405] dump_stack_lvl+0x8c/0xd0 [ 39.297610] print_report+0x118/0x5f0 [ 39.297772] kasan_report+0xc8/0x118 [ 39.297917] kasan_check_range+0x100/0x1a8 [ 39.298084] __kasan_check_write+0x20/0x30 [ 39.298229] kasan_atomics_helper+0x1644/0x4858 [ 39.298395] kasan_atomics+0x198/0x2e8 [ 39.298547] kunit_try_run_case+0x14c/0x3d0 [ 39.298705] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.298888] kthread+0x318/0x618 [ 39.299145] ret_from_fork+0x10/0x20 [ 39.299364] [ 39.299431] Allocated by task 267: [ 39.299533] kasan_save_stack+0x3c/0x68 [ 39.299664] kasan_save_track+0x20/0x40 [ 39.299792] kasan_save_alloc_info+0x40/0x58 [ 39.299926] __kasan_kmalloc+0xd4/0xd8 [ 39.300071] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.300217] kasan_atomics+0xb8/0x2e8 [ 39.300337] kunit_try_run_case+0x14c/0x3d0 [ 39.300468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.300644] kthread+0x318/0x618 [ 39.300842] ret_from_fork+0x10/0x20 [ 39.301047] [ 39.301186] The buggy address belongs to the object at fff00000c5dafc80 [ 39.301186] which belongs to the cache kmalloc-64 of size 64 [ 39.301482] The buggy address is located 0 bytes to the right of [ 39.301482] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.301696] [ 39.301764] The buggy address belongs to the physical page: [ 39.302363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.302738] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.303017] page_type: f5(slab) [ 39.303157] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.303349] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.303518] page dumped because: kasan: bad access detected [ 39.303707] [ 39.303811] Memory state around the buggy address: [ 39.303978] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.304237] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.304804] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.304953] ^ [ 39.305159] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.305326] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.305476] ================================================================== [ 39.131540] ================================================================== [ 39.131712] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11f8/0x4858 [ 39.131807] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.131895] [ 39.131948] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.132144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.132198] Hardware name: linux,dummy-virt (DT) [ 39.132253] Call trace: [ 39.132307] show_stack+0x20/0x38 (C) [ 39.132531] dump_stack_lvl+0x8c/0xd0 [ 39.132765] print_report+0x118/0x5f0 [ 39.132918] kasan_report+0xc8/0x118 [ 39.133148] kasan_check_range+0x100/0x1a8 [ 39.133898] __kasan_check_write+0x20/0x30 [ 39.134108] kasan_atomics_helper+0x11f8/0x4858 [ 39.134719] kasan_atomics+0x198/0x2e8 [ 39.135144] kunit_try_run_case+0x14c/0x3d0 [ 39.135562] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.135771] kthread+0x318/0x618 [ 39.136215] ret_from_fork+0x10/0x20 [ 39.136777] [ 39.136856] Allocated by task 267: [ 39.137245] kasan_save_stack+0x3c/0x68 [ 39.137393] kasan_save_track+0x20/0x40 [ 39.137523] kasan_save_alloc_info+0x40/0x58 [ 39.137747] __kasan_kmalloc+0xd4/0xd8 [ 39.137890] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.138032] kasan_atomics+0xb8/0x2e8 [ 39.138172] kunit_try_run_case+0x14c/0x3d0 [ 39.138299] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.138452] kthread+0x318/0x618 [ 39.138578] ret_from_fork+0x10/0x20 [ 39.138705] [ 39.138831] The buggy address belongs to the object at fff00000c5dafc80 [ 39.138831] which belongs to the cache kmalloc-64 of size 64 [ 39.139174] The buggy address is located 0 bytes to the right of [ 39.139174] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.139518] [ 39.139606] The buggy address belongs to the physical page: [ 39.139713] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.139890] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.140044] page_type: f5(slab) [ 39.140172] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.140336] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.140482] page dumped because: kasan: bad access detected [ 39.140616] [ 39.140708] Memory state around the buggy address: [ 39.140818] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.140970] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.141147] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.141340] ^ [ 39.141661] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.141825] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.142006] ================================================================== [ 39.270530] ================================================================== [ 39.270676] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b4/0x4858 [ 39.270829] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.271006] [ 39.271448] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.271748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.271842] Hardware name: linux,dummy-virt (DT) [ 39.272411] Call trace: [ 39.272525] show_stack+0x20/0x38 (C) [ 39.272710] dump_stack_lvl+0x8c/0xd0 [ 39.272854] print_report+0x118/0x5f0 [ 39.273021] kasan_report+0xc8/0x118 [ 39.273198] kasan_check_range+0x100/0x1a8 [ 39.273861] __kasan_check_write+0x20/0x30 [ 39.274192] kasan_atomics_helper+0x15b4/0x4858 [ 39.274590] kasan_atomics+0x198/0x2e8 [ 39.274784] kunit_try_run_case+0x14c/0x3d0 [ 39.274954] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.275655] kthread+0x318/0x618 [ 39.275840] ret_from_fork+0x10/0x20 [ 39.276005] [ 39.276093] Allocated by task 267: [ 39.276193] kasan_save_stack+0x3c/0x68 [ 39.276342] kasan_save_track+0x20/0x40 [ 39.277147] kasan_save_alloc_info+0x40/0x58 [ 39.277536] __kasan_kmalloc+0xd4/0xd8 [ 39.277860] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.278340] kasan_atomics+0xb8/0x2e8 [ 39.278525] kunit_try_run_case+0x14c/0x3d0 [ 39.278860] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.279651] kthread+0x318/0x618 [ 39.279822] ret_from_fork+0x10/0x20 [ 39.280086] [ 39.280277] The buggy address belongs to the object at fff00000c5dafc80 [ 39.280277] which belongs to the cache kmalloc-64 of size 64 [ 39.280768] The buggy address is located 0 bytes to the right of [ 39.280768] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.281179] [ 39.281370] The buggy address belongs to the physical page: [ 39.281528] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.281939] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.282377] page_type: f5(slab) [ 39.282525] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.283014] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.283348] page dumped because: kasan: bad access detected [ 39.283852] [ 39.284011] Memory state around the buggy address: [ 39.284379] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.284580] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.284736] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.284874] ^ [ 39.285662] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.285769] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.285885] ================================================================== [ 38.727139] ================================================================== [ 38.727294] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x99c/0x4858 [ 38.727451] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.727620] [ 38.727715] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.727992] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.729739] Hardware name: linux,dummy-virt (DT) [ 38.729966] Call trace: [ 38.730535] show_stack+0x20/0x38 (C) [ 38.730958] dump_stack_lvl+0x8c/0xd0 [ 38.731260] print_report+0x118/0x5f0 [ 38.731884] kasan_report+0xc8/0x118 [ 38.732179] kasan_check_range+0x100/0x1a8 [ 38.732356] __kasan_check_write+0x20/0x30 [ 38.732957] kasan_atomics_helper+0x99c/0x4858 [ 38.733429] kasan_atomics+0x198/0x2e8 [ 38.733659] kunit_try_run_case+0x14c/0x3d0 [ 38.733926] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.734450] kthread+0x318/0x618 [ 38.734877] ret_from_fork+0x10/0x20 [ 38.735047] [ 38.735141] Allocated by task 267: [ 38.735241] kasan_save_stack+0x3c/0x68 [ 38.735373] kasan_save_track+0x20/0x40 [ 38.735493] kasan_save_alloc_info+0x40/0x58 [ 38.735639] __kasan_kmalloc+0xd4/0xd8 [ 38.735754] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.735893] kasan_atomics+0xb8/0x2e8 [ 38.736029] kunit_try_run_case+0x14c/0x3d0 [ 38.736183] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.736333] kthread+0x318/0x618 [ 38.736925] ret_from_fork+0x10/0x20 [ 38.737098] [ 38.737165] The buggy address belongs to the object at fff00000c5dafc80 [ 38.737165] which belongs to the cache kmalloc-64 of size 64 [ 38.737628] The buggy address is located 0 bytes to the right of [ 38.737628] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.737867] [ 38.737950] The buggy address belongs to the physical page: [ 38.738070] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.738250] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.738423] page_type: f5(slab) [ 38.738595] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.738822] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.738989] page dumped because: kasan: bad access detected [ 38.739166] [ 38.739251] Memory state around the buggy address: [ 38.739393] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.739539] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.739717] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.740104] ^ [ 38.740312] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.740488] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.740585] ================================================================== [ 38.912813] ================================================================== [ 38.912951] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xdd4/0x4858 [ 38.913122] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.913283] [ 38.913383] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.913667] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.913769] Hardware name: linux,dummy-virt (DT) [ 38.913869] Call trace: [ 38.913937] show_stack+0x20/0x38 (C) [ 38.914110] dump_stack_lvl+0x8c/0xd0 [ 38.914256] print_report+0x118/0x5f0 [ 38.914435] kasan_report+0xc8/0x118 [ 38.914593] kasan_check_range+0x100/0x1a8 [ 38.914752] __kasan_check_read+0x20/0x30 [ 38.914911] kasan_atomics_helper+0xdd4/0x4858 [ 38.915135] kasan_atomics+0x198/0x2e8 [ 38.915472] kunit_try_run_case+0x14c/0x3d0 [ 38.915665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.915851] kthread+0x318/0x618 [ 38.916005] ret_from_fork+0x10/0x20 [ 38.918378] [ 38.918479] Allocated by task 267: [ 38.918612] kasan_save_stack+0x3c/0x68 [ 38.918775] kasan_save_track+0x20/0x40 [ 38.918917] kasan_save_alloc_info+0x40/0x58 [ 38.919082] __kasan_kmalloc+0xd4/0xd8 [ 38.919738] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.920521] kasan_atomics+0xb8/0x2e8 [ 38.920733] kunit_try_run_case+0x14c/0x3d0 [ 38.920886] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.921041] kthread+0x318/0x618 [ 38.921732] ret_from_fork+0x10/0x20 [ 38.922441] [ 38.922551] The buggy address belongs to the object at fff00000c5dafc80 [ 38.922551] which belongs to the cache kmalloc-64 of size 64 [ 38.922752] The buggy address is located 0 bytes to the right of [ 38.922752] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.923690] [ 38.924204] The buggy address belongs to the physical page: [ 38.924438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.925026] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.925502] page_type: f5(slab) [ 38.925853] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.926045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.926206] page dumped because: kasan: bad access detected [ 38.926319] [ 38.926860] Memory state around the buggy address: [ 38.927440] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.927917] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.928479] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.929042] ^ [ 38.929655] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.929831] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.929972] ================================================================== [ 39.229611] ================================================================== [ 39.230010] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x147c/0x4858 [ 39.230398] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.230803] [ 39.230963] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.231353] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.231439] Hardware name: linux,dummy-virt (DT) [ 39.231546] Call trace: [ 39.231619] show_stack+0x20/0x38 (C) [ 39.231850] dump_stack_lvl+0x8c/0xd0 [ 39.232129] print_report+0x118/0x5f0 [ 39.232482] kasan_report+0xc8/0x118 [ 39.233296] kasan_check_range+0x100/0x1a8 [ 39.233561] __kasan_check_write+0x20/0x30 [ 39.233829] kasan_atomics_helper+0x147c/0x4858 [ 39.234007] kasan_atomics+0x198/0x2e8 [ 39.234188] kunit_try_run_case+0x14c/0x3d0 [ 39.234353] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.234576] kthread+0x318/0x618 [ 39.234730] ret_from_fork+0x10/0x20 [ 39.236251] [ 39.236356] Allocated by task 267: [ 39.236990] kasan_save_stack+0x3c/0x68 [ 39.237555] kasan_save_track+0x20/0x40 [ 39.237690] kasan_save_alloc_info+0x40/0x58 [ 39.238044] __kasan_kmalloc+0xd4/0xd8 [ 39.238344] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.239296] kasan_atomics+0xb8/0x2e8 [ 39.239675] kunit_try_run_case+0x14c/0x3d0 [ 39.239848] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.240073] kthread+0x318/0x618 [ 39.240205] ret_from_fork+0x10/0x20 [ 39.240327] [ 39.240674] The buggy address belongs to the object at fff00000c5dafc80 [ 39.240674] which belongs to the cache kmalloc-64 of size 64 [ 39.240901] The buggy address is located 0 bytes to the right of [ 39.240901] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.241162] [ 39.241250] The buggy address belongs to the physical page: [ 39.241429] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.241701] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.241941] page_type: f5(slab) [ 39.242069] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.242238] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.242390] page dumped because: kasan: bad access detected [ 39.242542] [ 39.242610] Memory state around the buggy address: [ 39.242722] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.242877] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.243113] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.243248] ^ [ 39.243369] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.243522] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.243754] ================================================================== [ 39.041858] ================================================================== [ 39.042015] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xff0/0x4858 [ 39.042193] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.044822] [ 39.044931] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.045929] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.046233] Hardware name: linux,dummy-virt (DT) [ 39.046342] Call trace: [ 39.046919] show_stack+0x20/0x38 (C) [ 39.048017] dump_stack_lvl+0x8c/0xd0 [ 39.048665] print_report+0x118/0x5f0 [ 39.048825] kasan_report+0xc8/0x118 [ 39.048970] kasan_check_range+0x100/0x1a8 [ 39.049566] __kasan_check_write+0x20/0x30 [ 39.050165] kasan_atomics_helper+0xff0/0x4858 [ 39.050347] kasan_atomics+0x198/0x2e8 [ 39.051068] kunit_try_run_case+0x14c/0x3d0 [ 39.051245] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.051433] kthread+0x318/0x618 [ 39.051581] ret_from_fork+0x10/0x20 [ 39.051740] [ 39.052391] Allocated by task 267: [ 39.052678] kasan_save_stack+0x3c/0x68 [ 39.052936] kasan_save_track+0x20/0x40 [ 39.053547] kasan_save_alloc_info+0x40/0x58 [ 39.054103] __kasan_kmalloc+0xd4/0xd8 [ 39.054244] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.054389] kasan_atomics+0xb8/0x2e8 [ 39.054557] kunit_try_run_case+0x14c/0x3d0 [ 39.055586] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.056244] kthread+0x318/0x618 [ 39.056550] ret_from_fork+0x10/0x20 [ 39.056953] [ 39.057211] The buggy address belongs to the object at fff00000c5dafc80 [ 39.057211] which belongs to the cache kmalloc-64 of size 64 [ 39.057826] The buggy address is located 0 bytes to the right of [ 39.057826] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.058069] [ 39.058384] The buggy address belongs to the physical page: [ 39.058669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.058990] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.059513] page_type: f5(slab) [ 39.059644] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.060462] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.060619] page dumped because: kasan: bad access detected [ 39.060756] [ 39.060870] Memory state around the buggy address: [ 39.060989] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.061176] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.061361] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.061502] ^ [ 39.061619] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.061771] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.061910] ================================================================== [ 38.903471] ================================================================== [ 38.903701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e04/0x4858 [ 38.903941] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.904137] [ 38.904243] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.904588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.904720] Hardware name: linux,dummy-virt (DT) [ 38.904828] Call trace: [ 38.904905] show_stack+0x20/0x38 (C) [ 38.905095] dump_stack_lvl+0x8c/0xd0 [ 38.905434] print_report+0x118/0x5f0 [ 38.905698] kasan_report+0xc8/0x118 [ 38.905938] __asan_report_load4_noabort+0x20/0x30 [ 38.906136] kasan_atomics_helper+0x3e04/0x4858 [ 38.906303] kasan_atomics+0x198/0x2e8 [ 38.906458] kunit_try_run_case+0x14c/0x3d0 [ 38.906636] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.906855] kthread+0x318/0x618 [ 38.907046] ret_from_fork+0x10/0x20 [ 38.907229] [ 38.907297] Allocated by task 267: [ 38.907407] kasan_save_stack+0x3c/0x68 [ 38.907597] kasan_save_track+0x20/0x40 [ 38.907718] kasan_save_alloc_info+0x40/0x58 [ 38.907886] __kasan_kmalloc+0xd4/0xd8 [ 38.908091] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.908244] kasan_atomics+0xb8/0x2e8 [ 38.908415] kunit_try_run_case+0x14c/0x3d0 [ 38.908541] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.908723] kthread+0x318/0x618 [ 38.908860] ret_from_fork+0x10/0x20 [ 38.909009] [ 38.909144] The buggy address belongs to the object at fff00000c5dafc80 [ 38.909144] which belongs to the cache kmalloc-64 of size 64 [ 38.909352] The buggy address is located 0 bytes to the right of [ 38.909352] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.909574] [ 38.909650] The buggy address belongs to the physical page: [ 38.909747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.910163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.910281] page_type: f5(slab) [ 38.910351] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.910508] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.910653] page dumped because: kasan: bad access detected [ 38.910760] [ 38.910826] Memory state around the buggy address: [ 38.910992] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.911166] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.911352] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.911571] ^ [ 38.911699] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.911852] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.911993] ================================================================== [ 38.850904] ================================================================== [ 38.851075] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3de4/0x4858 [ 38.851420] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.852608] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.852917] show_stack+0x20/0x38 (C) [ 38.853851] kasan_atomics_helper+0x3de4/0x4858 [ 38.855564] kasan_save_stack+0x3c/0x68 [ 38.856416] kunit_try_run_case+0x14c/0x3d0 [ 38.858562] The buggy address is located 0 bytes to the right of [ 38.858562] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.860215] page dumped because: kasan: bad access detected [ 38.860546] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.861888] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.863413] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xca0/0x4858 [ 38.864219] Hardware name: linux,dummy-virt (DT) [ 38.870524] kasan_save_alloc_info+0x40/0x58 [ 38.872417] The buggy address is located 0 bytes to the right of [ 38.872417] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.873766] page dumped because: kasan: bad access detected [ 38.873888] [ 38.874004] Memory state around the buggy address: [ 38.874166] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.874552] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.874795] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.875018] ^ [ 38.875221] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.875466] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.875673] ================================================================== [ 39.245848] ================================================================== [ 39.246001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14e4/0x4858 [ 39.246174] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.246338] [ 39.246433] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.246719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.246811] Hardware name: linux,dummy-virt (DT) [ 39.246922] Call trace: [ 39.247007] show_stack+0x20/0x38 (C) [ 39.247187] dump_stack_lvl+0x8c/0xd0 [ 39.247335] print_report+0x118/0x5f0 [ 39.247491] kasan_report+0xc8/0x118 [ 39.247656] kasan_check_range+0x100/0x1a8 [ 39.247804] __kasan_check_write+0x20/0x30 [ 39.248026] kasan_atomics_helper+0x14e4/0x4858 [ 39.248233] kasan_atomics+0x198/0x2e8 [ 39.248618] kunit_try_run_case+0x14c/0x3d0 [ 39.249531] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.249800] kthread+0x318/0x618 [ 39.249992] ret_from_fork+0x10/0x20 [ 39.250182] [ 39.250314] Allocated by task 267: [ 39.250508] kasan_save_stack+0x3c/0x68 [ 39.250692] kasan_save_track+0x20/0x40 [ 39.250838] kasan_save_alloc_info+0x40/0x58 [ 39.251086] __kasan_kmalloc+0xd4/0xd8 [ 39.251288] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.251482] kasan_atomics+0xb8/0x2e8 [ 39.251612] kunit_try_run_case+0x14c/0x3d0 [ 39.251792] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.252029] kthread+0x318/0x618 [ 39.252259] ret_from_fork+0x10/0x20 [ 39.252657] [ 39.252740] The buggy address belongs to the object at fff00000c5dafc80 [ 39.252740] which belongs to the cache kmalloc-64 of size 64 [ 39.252931] The buggy address is located 0 bytes to the right of [ 39.252931] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.253987] [ 39.254083] The buggy address belongs to the physical page: [ 39.254185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.254335] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.254474] page_type: f5(slab) [ 39.254579] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.254716] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.254853] page dumped because: kasan: bad access detected [ 39.254965] [ 39.255021] Memory state around the buggy address: [ 39.255146] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.255275] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.255418] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.255538] ^ [ 39.255642] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.255781] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.255904] ================================================================== [ 39.011336] ================================================================== [ 39.011575] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf20/0x4858 [ 39.011818] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.012526] [ 39.012679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.013044] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.013160] Hardware name: linux,dummy-virt (DT) [ 39.013323] Call trace: [ 39.013398] show_stack+0x20/0x38 (C) [ 39.013608] dump_stack_lvl+0x8c/0xd0 [ 39.013760] print_report+0x118/0x5f0 [ 39.014009] kasan_report+0xc8/0x118 [ 39.014185] kasan_check_range+0x100/0x1a8 [ 39.014647] __kasan_check_write+0x20/0x30 [ 39.015232] kasan_atomics_helper+0xf20/0x4858 [ 39.015511] kasan_atomics+0x198/0x2e8 [ 39.015771] kunit_try_run_case+0x14c/0x3d0 [ 39.015978] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.016302] kthread+0x318/0x618 [ 39.016466] ret_from_fork+0x10/0x20 [ 39.016677] [ 39.016789] Allocated by task 267: [ 39.016889] kasan_save_stack+0x3c/0x68 [ 39.017022] kasan_save_track+0x20/0x40 [ 39.017159] kasan_save_alloc_info+0x40/0x58 [ 39.017281] __kasan_kmalloc+0xd4/0xd8 [ 39.017774] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.017947] kasan_atomics+0xb8/0x2e8 [ 39.018518] kunit_try_run_case+0x14c/0x3d0 [ 39.018853] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.019113] kthread+0x318/0x618 [ 39.019250] ret_from_fork+0x10/0x20 [ 39.019422] [ 39.019492] The buggy address belongs to the object at fff00000c5dafc80 [ 39.019492] which belongs to the cache kmalloc-64 of size 64 [ 39.019834] The buggy address is located 0 bytes to the right of [ 39.019834] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.020240] [ 39.020366] The buggy address belongs to the physical page: [ 39.020484] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.020652] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.020810] page_type: f5(slab) [ 39.020924] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.021118] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.021265] page dumped because: kasan: bad access detected [ 39.021379] [ 39.021445] Memory state around the buggy address: [ 39.021583] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.021769] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.021932] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.022127] ^ [ 39.022239] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.022705] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.023070] ================================================================== [ 39.112194] ================================================================== [ 39.112349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1190/0x4858 [ 39.113446] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.114342] [ 39.114449] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.114744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.114836] Hardware name: linux,dummy-virt (DT) [ 39.114957] Call trace: [ 39.116313] show_stack+0x20/0x38 (C) [ 39.117294] dump_stack_lvl+0x8c/0xd0 [ 39.117755] print_report+0x118/0x5f0 [ 39.118449] kasan_report+0xc8/0x118 [ 39.118935] kasan_check_range+0x100/0x1a8 [ 39.119297] __kasan_check_write+0x20/0x30 [ 39.119452] kasan_atomics_helper+0x1190/0x4858 [ 39.119682] kasan_atomics+0x198/0x2e8 [ 39.119858] kunit_try_run_case+0x14c/0x3d0 [ 39.120023] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.120436] kthread+0x318/0x618 [ 39.120639] ret_from_fork+0x10/0x20 [ 39.120941] [ 39.121021] Allocated by task 267: [ 39.121437] kasan_save_stack+0x3c/0x68 [ 39.121584] kasan_save_track+0x20/0x40 [ 39.121703] kasan_save_alloc_info+0x40/0x58 [ 39.122219] __kasan_kmalloc+0xd4/0xd8 [ 39.122627] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.122787] kasan_atomics+0xb8/0x2e8 [ 39.122914] kunit_try_run_case+0x14c/0x3d0 [ 39.123085] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.123380] kthread+0x318/0x618 [ 39.123545] ret_from_fork+0x10/0x20 [ 39.123969] [ 39.124626] The buggy address belongs to the object at fff00000c5dafc80 [ 39.124626] which belongs to the cache kmalloc-64 of size 64 [ 39.125126] The buggy address is located 0 bytes to the right of [ 39.125126] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.126098] [ 39.126220] The buggy address belongs to the physical page: [ 39.126339] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.126532] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.126703] page_type: f5(slab) [ 39.126826] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.127020] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.127339] page dumped because: kasan: bad access detected [ 39.127681] [ 39.127772] Memory state around the buggy address: [ 39.127889] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.128041] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.128204] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.128439] ^ [ 39.128565] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.128925] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.129153] ================================================================== [ 39.198133] ================================================================== [ 39.198572] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f04/0x4858 [ 39.199013] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.199480] [ 39.199598] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.200030] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.200144] Hardware name: linux,dummy-virt (DT) [ 39.200261] Call trace: [ 39.200335] show_stack+0x20/0x38 (C) [ 39.200511] dump_stack_lvl+0x8c/0xd0 [ 39.200660] print_report+0x118/0x5f0 [ 39.200817] kasan_report+0xc8/0x118 [ 39.200965] __asan_report_load8_noabort+0x20/0x30 [ 39.201150] kasan_atomics_helper+0x3f04/0x4858 [ 39.201325] kasan_atomics+0x198/0x2e8 [ 39.201487] kunit_try_run_case+0x14c/0x3d0 [ 39.203432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.203644] kthread+0x318/0x618 [ 39.203806] ret_from_fork+0x10/0x20 [ 39.204216] [ 39.204332] Allocated by task 267: [ 39.204458] kasan_save_stack+0x3c/0x68 [ 39.204590] kasan_save_track+0x20/0x40 [ 39.204770] kasan_save_alloc_info+0x40/0x58 [ 39.204987] __kasan_kmalloc+0xd4/0xd8 [ 39.205488] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.206412] kasan_atomics+0xb8/0x2e8 [ 39.206548] kunit_try_run_case+0x14c/0x3d0 [ 39.206679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.207186] kthread+0x318/0x618 [ 39.207403] ret_from_fork+0x10/0x20 [ 39.207586] [ 39.207687] The buggy address belongs to the object at fff00000c5dafc80 [ 39.207687] which belongs to the cache kmalloc-64 of size 64 [ 39.207968] The buggy address is located 0 bytes to the right of [ 39.207968] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.208683] [ 39.208795] The buggy address belongs to the physical page: [ 39.208997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.209198] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.211411] page_type: f5(slab) [ 39.211541] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.211714] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.211865] page dumped because: kasan: bad access detected [ 39.211979] [ 39.212045] Memory state around the buggy address: [ 39.213163] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.213310] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.213444] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.213585] ^ [ 39.213693] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.213824] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.213944] ================================================================== [ 39.025638] ================================================================== [ 39.025725] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf88/0x4858 [ 39.025809] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.025895] [ 39.025944] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.026137] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.026233] Hardware name: linux,dummy-virt (DT) [ 39.026383] Call trace: [ 39.026476] show_stack+0x20/0x38 (C) [ 39.026629] dump_stack_lvl+0x8c/0xd0 [ 39.026780] print_report+0x118/0x5f0 [ 39.026943] kasan_report+0xc8/0x118 [ 39.027109] kasan_check_range+0x100/0x1a8 [ 39.027279] __kasan_check_write+0x20/0x30 [ 39.027433] kasan_atomics_helper+0xf88/0x4858 [ 39.027720] kasan_atomics+0x198/0x2e8 [ 39.028209] kunit_try_run_case+0x14c/0x3d0 [ 39.028433] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.028797] kthread+0x318/0x618 [ 39.029410] ret_from_fork+0x10/0x20 [ 39.029667] [ 39.029922] Allocated by task 267: [ 39.030699] kasan_save_stack+0x3c/0x68 [ 39.030978] kasan_save_track+0x20/0x40 [ 39.031140] kasan_save_alloc_info+0x40/0x58 [ 39.031308] __kasan_kmalloc+0xd4/0xd8 [ 39.031511] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.031745] kasan_atomics+0xb8/0x2e8 [ 39.031954] kunit_try_run_case+0x14c/0x3d0 [ 39.032142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.032285] kthread+0x318/0x618 [ 39.032913] ret_from_fork+0x10/0x20 [ 39.033142] [ 39.033260] The buggy address belongs to the object at fff00000c5dafc80 [ 39.033260] which belongs to the cache kmalloc-64 of size 64 [ 39.033493] The buggy address is located 0 bytes to the right of [ 39.033493] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.033750] [ 39.033822] The buggy address belongs to the physical page: [ 39.033950] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.034158] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.034332] page_type: f5(slab) [ 39.034448] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.034609] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.034753] page dumped because: kasan: bad access detected [ 39.034871] [ 39.035014] Memory state around the buggy address: [ 39.035389] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.036241] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.037074] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.037295] ^ [ 39.037422] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.037566] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.039207] ================================================================== [ 39.412250] ================================================================== [ 39.412512] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x17ec/0x4858 [ 39.413015] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.413295] [ 39.413700] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.414225] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.414839] Hardware name: linux,dummy-virt (DT) [ 39.415180] Call trace: [ 39.415366] show_stack+0x20/0x38 (C) [ 39.415534] dump_stack_lvl+0x8c/0xd0 [ 39.415677] print_report+0x118/0x5f0 [ 39.415827] kasan_report+0xc8/0x118 [ 39.415977] kasan_check_range+0x100/0x1a8 [ 39.416845] __kasan_check_write+0x20/0x30 [ 39.417257] kasan_atomics_helper+0x17ec/0x4858 [ 39.417418] kasan_atomics+0x198/0x2e8 [ 39.417551] kunit_try_run_case+0x14c/0x3d0 [ 39.417692] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.417855] kthread+0x318/0x618 [ 39.418135] ret_from_fork+0x10/0x20 [ 39.418316] [ 39.418387] Allocated by task 267: [ 39.418489] kasan_save_stack+0x3c/0x68 [ 39.418620] kasan_save_track+0x20/0x40 [ 39.422164] kasan_save_alloc_info+0x40/0x58 [ 39.422318] __kasan_kmalloc+0xd4/0xd8 [ 39.422440] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.422571] kasan_atomics+0xb8/0x2e8 [ 39.424036] kunit_try_run_case+0x14c/0x3d0 [ 39.424307] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.425048] kthread+0x318/0x618 [ 39.425805] ret_from_fork+0x10/0x20 [ 39.425933] [ 39.426001] The buggy address belongs to the object at fff00000c5dafc80 [ 39.426001] which belongs to the cache kmalloc-64 of size 64 [ 39.428490] The buggy address is located 0 bytes to the right of [ 39.428490] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.431044] [ 39.431142] The buggy address belongs to the physical page: [ 39.431251] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.431417] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.431578] page_type: f5(slab) [ 39.434081] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.434501] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.434677] page dumped because: kasan: bad access detected [ 39.434790] [ 39.434863] Memory state around the buggy address: [ 39.434983] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.436230] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.436557] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.436994] ^ [ 39.437201] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.437651] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.438118] ================================================================== [ 38.876110] ================================================================== [ 38.876249] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3dd8/0x4858 [ 38.876416] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.876585] [ 38.876680] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.876956] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.877136] Hardware name: linux,dummy-virt (DT) [ 38.877253] Call trace: [ 38.877335] show_stack+0x20/0x38 (C) [ 38.877496] dump_stack_lvl+0x8c/0xd0 [ 38.877646] print_report+0x118/0x5f0 [ 38.878313] kasan_report+0xc8/0x118 [ 38.878486] __asan_report_load4_noabort+0x20/0x30 [ 38.878669] kasan_atomics_helper+0x3dd8/0x4858 [ 38.878861] kasan_atomics+0x198/0x2e8 [ 38.879152] kunit_try_run_case+0x14c/0x3d0 [ 38.879419] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.879628] kthread+0x318/0x618 [ 38.879841] ret_from_fork+0x10/0x20 [ 38.880001] [ 38.880088] Allocated by task 267: [ 38.880182] kasan_save_stack+0x3c/0x68 [ 38.880308] kasan_save_track+0x20/0x40 [ 38.880433] kasan_save_alloc_info+0x40/0x58 [ 38.880565] __kasan_kmalloc+0xd4/0xd8 [ 38.880690] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.880834] kasan_atomics+0xb8/0x2e8 [ 38.880984] kunit_try_run_case+0x14c/0x3d0 [ 38.881139] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.881292] kthread+0x318/0x618 [ 38.881413] ret_from_fork+0x10/0x20 [ 38.881535] [ 38.881618] The buggy address belongs to the object at fff00000c5dafc80 [ 38.881618] which belongs to the cache kmalloc-64 of size 64 [ 38.881956] The buggy address is located 0 bytes to the right of [ 38.881956] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.882253] [ 38.882329] The buggy address belongs to the physical page: [ 38.882426] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.882613] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.882768] page_type: f5(slab) [ 38.882861] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.883013] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.883153] page dumped because: kasan: bad access detected [ 38.883249] [ 38.883478] Memory state around the buggy address: [ 38.883594] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.884888] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.885047] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.885204] ^ [ 38.885316] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.885459] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.885579] ================================================================== [ 39.256689] ================================================================== [ 39.256833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x154c/0x4858 [ 39.256983] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.257189] [ 39.257298] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.257674] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.257811] Hardware name: linux,dummy-virt (DT) [ 39.257958] Call trace: [ 39.258084] show_stack+0x20/0x38 (C) [ 39.258243] dump_stack_lvl+0x8c/0xd0 [ 39.258431] print_report+0x118/0x5f0 [ 39.258694] kasan_report+0xc8/0x118 [ 39.258918] kasan_check_range+0x100/0x1a8 [ 39.259097] __kasan_check_write+0x20/0x30 [ 39.259262] kasan_atomics_helper+0x154c/0x4858 [ 39.259433] kasan_atomics+0x198/0x2e8 [ 39.259588] kunit_try_run_case+0x14c/0x3d0 [ 39.259746] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.259933] kthread+0x318/0x618 [ 39.260576] ret_from_fork+0x10/0x20 [ 39.261007] [ 39.261206] Allocated by task 267: [ 39.261375] kasan_save_stack+0x3c/0x68 [ 39.261576] kasan_save_track+0x20/0x40 [ 39.261691] kasan_save_alloc_info+0x40/0x58 [ 39.261852] __kasan_kmalloc+0xd4/0xd8 [ 39.261973] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.262135] kasan_atomics+0xb8/0x2e8 [ 39.262267] kunit_try_run_case+0x14c/0x3d0 [ 39.262676] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.262949] kthread+0x318/0x618 [ 39.263187] ret_from_fork+0x10/0x20 [ 39.263396] [ 39.263517] The buggy address belongs to the object at fff00000c5dafc80 [ 39.263517] which belongs to the cache kmalloc-64 of size 64 [ 39.263786] The buggy address is located 0 bytes to the right of [ 39.263786] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.264133] [ 39.264208] The buggy address belongs to the physical page: [ 39.264313] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.264964] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.265146] page_type: f5(slab) [ 39.265261] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.265414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.265556] page dumped because: kasan: bad access detected [ 39.265662] [ 39.265726] Memory state around the buggy address: [ 39.265832] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.266680] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.266856] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.266995] ^ [ 39.267162] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.267316] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.267662] ================================================================== [ 38.993563] ================================================================== [ 38.994151] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb8/0x4858 [ 38.994839] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.995316] [ 38.995435] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.995725] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.995814] Hardware name: linux,dummy-virt (DT) [ 38.995921] Call trace: [ 38.995996] show_stack+0x20/0x38 (C) [ 38.997257] dump_stack_lvl+0x8c/0xd0 [ 38.997616] print_report+0x118/0x5f0 [ 38.997793] kasan_report+0xc8/0x118 [ 38.997938] kasan_check_range+0x100/0x1a8 [ 38.998942] __kasan_check_write+0x20/0x30 [ 38.999473] kasan_atomics_helper+0xeb8/0x4858 [ 38.999665] kasan_atomics+0x198/0x2e8 [ 38.999850] kunit_try_run_case+0x14c/0x3d0 [ 39.000021] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.000233] kthread+0x318/0x618 [ 39.001303] ret_from_fork+0x10/0x20 [ 39.001534] [ 39.002352] Allocated by task 267: [ 39.002498] kasan_save_stack+0x3c/0x68 [ 39.002969] kasan_save_track+0x20/0x40 [ 39.003147] kasan_save_alloc_info+0x40/0x58 [ 39.003316] __kasan_kmalloc+0xd4/0xd8 [ 39.003443] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.003939] kasan_atomics+0xb8/0x2e8 [ 39.004158] kunit_try_run_case+0x14c/0x3d0 [ 39.004321] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.004894] kthread+0x318/0x618 [ 39.005035] ret_from_fork+0x10/0x20 [ 39.005179] [ 39.005244] The buggy address belongs to the object at fff00000c5dafc80 [ 39.005244] which belongs to the cache kmalloc-64 of size 64 [ 39.005473] The buggy address is located 0 bytes to the right of [ 39.005473] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.005694] [ 39.006129] The buggy address belongs to the physical page: [ 39.006618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.007033] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.007233] page_type: f5(slab) [ 39.007393] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.007638] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.007784] page dumped because: kasan: bad access detected [ 39.007940] [ 39.008077] Memory state around the buggy address: [ 39.008260] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.008476] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.008656] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.008799] ^ [ 39.008938] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.009109] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.009234] ================================================================== [ 39.370310] ================================================================== [ 39.370834] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x175c/0x4858 [ 39.371317] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.371663] [ 39.372068] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.372356] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.372460] Hardware name: linux,dummy-virt (DT) [ 39.372568] Call trace: [ 39.372842] show_stack+0x20/0x38 (C) [ 39.373728] dump_stack_lvl+0x8c/0xd0 [ 39.373920] print_report+0x118/0x5f0 [ 39.374095] kasan_report+0xc8/0x118 [ 39.374721] kasan_check_range+0x100/0x1a8 [ 39.375627] __kasan_check_write+0x20/0x30 [ 39.376169] kasan_atomics_helper+0x175c/0x4858 [ 39.377098] kasan_atomics+0x198/0x2e8 [ 39.377750] kunit_try_run_case+0x14c/0x3d0 [ 39.377941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.378478] kthread+0x318/0x618 [ 39.378671] ret_from_fork+0x10/0x20 [ 39.378833] [ 39.378901] Allocated by task 267: [ 39.379008] kasan_save_stack+0x3c/0x68 [ 39.379153] kasan_save_track+0x20/0x40 [ 39.379276] kasan_save_alloc_info+0x40/0x58 [ 39.379412] __kasan_kmalloc+0xd4/0xd8 [ 39.380339] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.381084] kasan_atomics+0xb8/0x2e8 [ 39.381404] kunit_try_run_case+0x14c/0x3d0 [ 39.381718] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.382321] kthread+0x318/0x618 [ 39.382887] ret_from_fork+0x10/0x20 [ 39.383041] [ 39.383567] The buggy address belongs to the object at fff00000c5dafc80 [ 39.383567] which belongs to the cache kmalloc-64 of size 64 [ 39.384186] The buggy address is located 0 bytes to the right of [ 39.384186] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.384733] [ 39.384815] The buggy address belongs to the physical page: [ 39.385342] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.386178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.386538] page_type: f5(slab) [ 39.386692] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.386854] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.387005] page dumped because: kasan: bad access detected [ 39.387964] [ 39.388410] Memory state around the buggy address: [ 39.388599] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.389152] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.389792] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.390417] ^ [ 39.390689] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.390841] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.390985] ================================================================== [ 38.741789] ================================================================== [ 38.741940] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa04/0x4858 [ 38.742181] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.742465] [ 38.742574] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.742844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.742952] Hardware name: linux,dummy-virt (DT) [ 38.743081] Call trace: [ 38.743163] show_stack+0x20/0x38 (C) [ 38.743468] dump_stack_lvl+0x8c/0xd0 [ 38.743643] print_report+0x118/0x5f0 [ 38.743813] kasan_report+0xc8/0x118 [ 38.744087] kasan_check_range+0x100/0x1a8 [ 38.744342] __kasan_check_write+0x20/0x30 [ 38.744549] kasan_atomics_helper+0xa04/0x4858 [ 38.744814] kasan_atomics+0x198/0x2e8 [ 38.744973] kunit_try_run_case+0x14c/0x3d0 [ 38.745487] kthread+0x318/0x618 [ 38.747630] ret_from_fork+0x10/0x20 [ 38.748273] [ 38.748451] The buggy address belongs to the physical page: [ 38.748564] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.748757] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.749010] page_type: f5(slab) [ 38.749154] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.749328] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.749462] page dumped because: kasan: bad access detected [ 38.749612] [ 38.749738] Memory state around the buggy address: [ 38.749857] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.750013] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.750186] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.750324] ^ [ 38.750508] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.750746] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.750976] ================================================================== [ 39.393495] ================================================================== [ 39.393675] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e20/0x4858 [ 39.394010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.394264] [ 39.394369] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.394676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.394774] Hardware name: linux,dummy-virt (DT) [ 39.394880] Call trace: [ 39.394968] show_stack+0x20/0x38 (C) [ 39.396283] dump_stack_lvl+0x8c/0xd0 [ 39.396858] print_report+0x118/0x5f0 [ 39.397029] kasan_report+0xc8/0x118 [ 39.397365] __asan_report_load8_noabort+0x20/0x30 [ 39.397625] kasan_atomics_helper+0x3e20/0x4858 [ 39.397868] kasan_atomics+0x198/0x2e8 [ 39.398015] kunit_try_run_case+0x14c/0x3d0 [ 39.398630] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.398836] kthread+0x318/0x618 [ 39.399433] ret_from_fork+0x10/0x20 [ 39.399642] [ 39.399711] Allocated by task 267: [ 39.399812] kasan_save_stack+0x3c/0x68 [ 39.399935] kasan_save_track+0x20/0x40 [ 39.400079] kasan_save_alloc_info+0x40/0x58 [ 39.401086] __kasan_kmalloc+0xd4/0xd8 [ 39.401581] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.401758] kasan_atomics+0xb8/0x2e8 [ 39.401898] kunit_try_run_case+0x14c/0x3d0 [ 39.402035] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.402214] kthread+0x318/0x618 [ 39.402516] ret_from_fork+0x10/0x20 [ 39.403463] [ 39.403900] The buggy address belongs to the object at fff00000c5dafc80 [ 39.403900] which belongs to the cache kmalloc-64 of size 64 [ 39.404386] The buggy address is located 0 bytes to the right of [ 39.404386] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.405133] [ 39.405210] The buggy address belongs to the physical page: [ 39.405317] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.406035] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.406783] page_type: f5(slab) [ 39.406934] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.407626] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.408174] page dumped because: kasan: bad access detected [ 39.408296] [ 39.408369] Memory state around the buggy address: [ 39.408481] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.408776] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.409481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.409815] ^ [ 39.410182] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.410402] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.410533] ================================================================== [ 39.214502] ================================================================== [ 39.214727] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1414/0x4858 [ 39.214985] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.215270] [ 39.215432] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.215818] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.215916] Hardware name: linux,dummy-virt (DT) [ 39.216021] Call trace: [ 39.216410] show_stack+0x20/0x38 (C) [ 39.216659] dump_stack_lvl+0x8c/0xd0 [ 39.218253] print_report+0x118/0x5f0 [ 39.218389] kasan_report+0xc8/0x118 [ 39.218526] kasan_check_range+0x100/0x1a8 [ 39.218676] __kasan_check_write+0x20/0x30 [ 39.218810] kasan_atomics_helper+0x1414/0x4858 [ 39.219890] kasan_atomics+0x198/0x2e8 [ 39.220187] kunit_try_run_case+0x14c/0x3d0 [ 39.220397] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.220945] kthread+0x318/0x618 [ 39.221267] ret_from_fork+0x10/0x20 [ 39.221540] [ 39.221623] Allocated by task 267: [ 39.221780] kasan_save_stack+0x3c/0x68 [ 39.221934] kasan_save_track+0x20/0x40 [ 39.222046] kasan_save_alloc_info+0x40/0x58 [ 39.222239] __kasan_kmalloc+0xd4/0xd8 [ 39.222398] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.222989] kasan_atomics+0xb8/0x2e8 [ 39.223165] kunit_try_run_case+0x14c/0x3d0 [ 39.223358] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.223804] kthread+0x318/0x618 [ 39.224102] ret_from_fork+0x10/0x20 [ 39.224248] [ 39.224398] The buggy address belongs to the object at fff00000c5dafc80 [ 39.224398] which belongs to the cache kmalloc-64 of size 64 [ 39.224651] The buggy address is located 0 bytes to the right of [ 39.224651] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.224954] [ 39.225026] The buggy address belongs to the physical page: [ 39.225152] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.225319] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.225498] page_type: f5(slab) [ 39.225937] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.226233] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.226482] page dumped because: kasan: bad access detected [ 39.226645] [ 39.226708] Memory state around the buggy address: [ 39.226815] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.227118] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.227278] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.227493] ^ [ 39.227986] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.228179] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.228315] ================================================================== [ 38.695124] ================================================================== [ 38.695262] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x42d8/0x4858 [ 38.695417] Read of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.695584] [ 38.695685] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.695959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.696077] Hardware name: linux,dummy-virt (DT) [ 38.696178] Call trace: [ 38.696248] show_stack+0x20/0x38 (C) [ 38.696989] dump_stack_lvl+0x8c/0xd0 [ 38.697219] print_report+0x118/0x5f0 [ 38.697538] kasan_report+0xc8/0x118 [ 38.698029] __asan_report_load4_noabort+0x20/0x30 [ 38.698258] kasan_atomics_helper+0x42d8/0x4858 [ 38.698429] kasan_atomics+0x198/0x2e8 [ 38.698625] kunit_try_run_case+0x14c/0x3d0 [ 38.698890] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.699281] kthread+0x318/0x618 [ 38.699978] ret_from_fork+0x10/0x20 [ 38.700237] [ 38.700306] Allocated by task 267: [ 38.700414] kasan_save_stack+0x3c/0x68 [ 38.700547] kasan_save_track+0x20/0x40 [ 38.700668] kasan_save_alloc_info+0x40/0x58 [ 38.701871] __kasan_kmalloc+0xd4/0xd8 [ 38.701977] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.702074] kasan_atomics+0xb8/0x2e8 [ 38.702178] kunit_try_run_case+0x14c/0x3d0 [ 38.702250] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.702388] kthread+0x318/0x618 [ 38.702520] ret_from_fork+0x10/0x20 [ 38.702637] [ 38.702699] The buggy address belongs to the object at fff00000c5dafc80 [ 38.702699] which belongs to the cache kmalloc-64 of size 64 [ 38.702942] The buggy address is located 0 bytes to the right of [ 38.702942] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.703304] [ 38.703515] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.703711] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.704075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.705150] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.705556] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.709130] [ 38.709706] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.710319] print_report+0x118/0x5f0 [ 38.711422] kasan_atomics+0x198/0x2e8 [ 38.712801] Allocated by task 267: [ 38.713422] __kasan_kmalloc+0xd4/0xd8 [ 38.713541] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.713675] kasan_atomics+0xb8/0x2e8 [ 38.713795] kunit_try_run_case+0x14c/0x3d0 [ 38.713958] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.714194] kthread+0x318/0x618 [ 38.714386] ret_from_fork+0x10/0x20 [ 38.715042] [ 38.715590] The buggy address belongs to the object at fff00000c5dafc80 [ 38.715590] which belongs to the cache kmalloc-64 of size 64 [ 38.716674] The buggy address is located 0 bytes to the right of [ 38.716674] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.717555] [ 38.718166] The buggy address belongs to the physical page: [ 38.718363] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.718819] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.719044] page_type: f5(slab) [ 38.720303] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.720923] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.721343] page dumped because: kasan: bad access detected [ 38.721742] [ 38.722238] Memory state around the buggy address: [ 38.722588] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.723640] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.724223] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.724381] ^ [ 38.724622] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.724803] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.725570] ================================================================== [ 39.089657] ================================================================== [ 39.090117] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1128/0x4858 [ 39.090278] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.090446] [ 39.090540] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.090826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.090922] Hardware name: linux,dummy-virt (DT) [ 39.091036] Call trace: [ 39.091131] show_stack+0x20/0x38 (C) [ 39.091279] dump_stack_lvl+0x8c/0xd0 [ 39.091432] print_report+0x118/0x5f0 [ 39.091579] kasan_report+0xc8/0x118 [ 39.091724] kasan_check_range+0x100/0x1a8 [ 39.091873] __kasan_check_write+0x20/0x30 [ 39.092039] kasan_atomics_helper+0x1128/0x4858 [ 39.092234] kasan_atomics+0x198/0x2e8 [ 39.092916] kunit_try_run_case+0x14c/0x3d0 [ 39.093288] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.093507] kthread+0x318/0x618 [ 39.094170] ret_from_fork+0x10/0x20 [ 39.094443] [ 39.094562] Allocated by task 267: [ 39.094664] kasan_save_stack+0x3c/0x68 [ 39.094806] kasan_save_track+0x20/0x40 [ 39.095015] kasan_save_alloc_info+0x40/0x58 [ 39.095338] __kasan_kmalloc+0xd4/0xd8 [ 39.095472] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.095646] kasan_atomics+0xb8/0x2e8 [ 39.095854] kunit_try_run_case+0x14c/0x3d0 [ 39.096274] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.097104] kthread+0x318/0x618 [ 39.097260] ret_from_fork+0x10/0x20 [ 39.097391] [ 39.098347] The buggy address belongs to the object at fff00000c5dafc80 [ 39.098347] which belongs to the cache kmalloc-64 of size 64 [ 39.099018] The buggy address is located 0 bytes to the right of [ 39.099018] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.100015] [ 39.100116] The buggy address belongs to the physical page: [ 39.100228] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.101424] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.102305] page_type: f5(slab) [ 39.102513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.103684] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.104268] page dumped because: kasan: bad access detected [ 39.104697] [ 39.105541] Memory state around the buggy address: [ 39.106015] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.106235] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.106396] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.107796] ^ [ 39.108426] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.109267] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.110156] ================================================================== [ 39.325945] ================================================================== [ 39.326194] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16d0/0x4858 [ 39.326418] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.326585] [ 39.326679] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.326972] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.327086] Hardware name: linux,dummy-virt (DT) [ 39.327189] Call trace: [ 39.327259] show_stack+0x20/0x38 (C) [ 39.327519] dump_stack_lvl+0x8c/0xd0 [ 39.327938] print_report+0x118/0x5f0 [ 39.328130] kasan_report+0xc8/0x118 [ 39.328282] kasan_check_range+0x100/0x1a8 [ 39.328484] __kasan_check_write+0x20/0x30 [ 39.329580] kasan_atomics_helper+0x16d0/0x4858 [ 39.329762] kasan_atomics+0x198/0x2e8 [ 39.330500] kunit_try_run_case+0x14c/0x3d0 [ 39.331076] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.331514] kthread+0x318/0x618 [ 39.331700] ret_from_fork+0x10/0x20 [ 39.332799] [ 39.332966] Allocated by task 267: [ 39.333101] kasan_save_stack+0x3c/0x68 [ 39.333420] kasan_save_track+0x20/0x40 [ 39.333569] kasan_save_alloc_info+0x40/0x58 [ 39.333704] __kasan_kmalloc+0xd4/0xd8 [ 39.333830] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.334588] kasan_atomics+0xb8/0x2e8 [ 39.335184] kunit_try_run_case+0x14c/0x3d0 [ 39.335417] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.336218] kthread+0x318/0x618 [ 39.336366] ret_from_fork+0x10/0x20 [ 39.336493] [ 39.336565] The buggy address belongs to the object at fff00000c5dafc80 [ 39.336565] which belongs to the cache kmalloc-64 of size 64 [ 39.336765] The buggy address is located 0 bytes to the right of [ 39.336765] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.336989] [ 39.338659] The buggy address belongs to the physical page: [ 39.339434] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.340000] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.340930] page_type: f5(slab) [ 39.341075] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.341242] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.342626] page dumped because: kasan: bad access detected [ 39.342808] [ 39.342879] Memory state around the buggy address: [ 39.342991] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.344514] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.344861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.346186] ^ [ 39.346648] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.346853] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.347890] ================================================================== [ 39.177949] ================================================================== [ 39.178218] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1384/0x4858 [ 39.178496] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.178650] [ 39.178741] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.179506] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.179741] Hardware name: linux,dummy-virt (DT) [ 39.180588] Call trace: [ 39.180939] show_stack+0x20/0x38 (C) [ 39.181174] dump_stack_lvl+0x8c/0xd0 [ 39.181663] print_report+0x118/0x5f0 [ 39.181996] kasan_report+0xc8/0x118 [ 39.182194] kasan_check_range+0x100/0x1a8 [ 39.182831] __kasan_check_write+0x20/0x30 [ 39.184133] kasan_atomics_helper+0x1384/0x4858 [ 39.184494] kasan_atomics+0x198/0x2e8 [ 39.184664] kunit_try_run_case+0x14c/0x3d0 [ 39.184830] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.185286] kthread+0x318/0x618 [ 39.185778] ret_from_fork+0x10/0x20 [ 39.185944] [ 39.186013] Allocated by task 267: [ 39.186277] kasan_save_stack+0x3c/0x68 [ 39.186621] kasan_save_track+0x20/0x40 [ 39.187101] kasan_save_alloc_info+0x40/0x58 [ 39.187250] __kasan_kmalloc+0xd4/0xd8 [ 39.187365] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.187934] kasan_atomics+0xb8/0x2e8 [ 39.188315] kunit_try_run_case+0x14c/0x3d0 [ 39.189008] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.189441] kthread+0x318/0x618 [ 39.189568] ret_from_fork+0x10/0x20 [ 39.189969] [ 39.190289] The buggy address belongs to the object at fff00000c5dafc80 [ 39.190289] which belongs to the cache kmalloc-64 of size 64 [ 39.190624] The buggy address is located 0 bytes to the right of [ 39.190624] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.191344] [ 39.191594] The buggy address belongs to the physical page: [ 39.192121] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.192621] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.192927] page_type: f5(slab) [ 39.193459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.193968] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.194199] page dumped because: kasan: bad access detected [ 39.194312] [ 39.195119] Memory state around the buggy address: [ 39.195310] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.195489] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.195642] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.195840] ^ [ 39.195963] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.196144] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.196293] ================================================================== [ 39.076925] ================================================================== [ 39.077086] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10c0/0x4858 [ 39.077547] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.077821] [ 39.077977] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.078437] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.078547] Hardware name: linux,dummy-virt (DT) [ 39.078650] Call trace: [ 39.078746] show_stack+0x20/0x38 (C) [ 39.078948] dump_stack_lvl+0x8c/0xd0 [ 39.079112] print_report+0x118/0x5f0 [ 39.079253] kasan_report+0xc8/0x118 [ 39.079397] kasan_check_range+0x100/0x1a8 [ 39.079550] __kasan_check_write+0x20/0x30 [ 39.079720] kasan_atomics_helper+0x10c0/0x4858 [ 39.079892] kasan_atomics+0x198/0x2e8 [ 39.080047] kunit_try_run_case+0x14c/0x3d0 [ 39.080907] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.081198] kthread+0x318/0x618 [ 39.081362] ret_from_fork+0x10/0x20 [ 39.081519] [ 39.081588] Allocated by task 267: [ 39.081674] kasan_save_stack+0x3c/0x68 [ 39.081871] kasan_save_track+0x20/0x40 [ 39.082389] kasan_save_alloc_info+0x40/0x58 [ 39.082612] __kasan_kmalloc+0xd4/0xd8 [ 39.082803] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.083034] kasan_atomics+0xb8/0x2e8 [ 39.083275] kunit_try_run_case+0x14c/0x3d0 [ 39.083493] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.083662] kthread+0x318/0x618 [ 39.083787] ret_from_fork+0x10/0x20 [ 39.083914] [ 39.083989] The buggy address belongs to the object at fff00000c5dafc80 [ 39.083989] which belongs to the cache kmalloc-64 of size 64 [ 39.084196] The buggy address is located 0 bytes to the right of [ 39.084196] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.084478] [ 39.085011] The buggy address belongs to the physical page: [ 39.085438] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.085642] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.085866] page_type: f5(slab) [ 39.086086] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.086495] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.086940] page dumped because: kasan: bad access detected [ 39.087156] [ 39.087266] Memory state around the buggy address: [ 39.087451] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.087690] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.087929] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.088158] ^ [ 39.088342] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.088541] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.088965] ================================================================== [ 39.155389] ================================================================== [ 39.155543] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12d8/0x4858 [ 39.155697] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.155863] [ 39.155962] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.156268] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.156365] Hardware name: linux,dummy-virt (DT) [ 39.159149] Call trace: [ 39.159235] show_stack+0x20/0x38 (C) [ 39.159395] dump_stack_lvl+0x8c/0xd0 [ 39.159540] print_report+0x118/0x5f0 [ 39.159691] kasan_report+0xc8/0x118 [ 39.159841] kasan_check_range+0x100/0x1a8 [ 39.159988] __kasan_check_write+0x20/0x30 [ 39.160162] kasan_atomics_helper+0x12d8/0x4858 [ 39.160326] kasan_atomics+0x198/0x2e8 [ 39.160484] kunit_try_run_case+0x14c/0x3d0 [ 39.160652] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.160827] kthread+0x318/0x618 [ 39.160983] ret_from_fork+0x10/0x20 [ 39.164688] [ 39.164766] Allocated by task 267: [ 39.165262] kasan_save_stack+0x3c/0x68 [ 39.166081] kasan_save_track+0x20/0x40 [ 39.166228] kasan_save_alloc_info+0x40/0x58 [ 39.166356] __kasan_kmalloc+0xd4/0xd8 [ 39.166482] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.166656] kasan_atomics+0xb8/0x2e8 [ 39.166786] kunit_try_run_case+0x14c/0x3d0 [ 39.166915] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.167294] kthread+0x318/0x618 [ 39.167735] ret_from_fork+0x10/0x20 [ 39.168246] [ 39.168560] The buggy address belongs to the object at fff00000c5dafc80 [ 39.168560] which belongs to the cache kmalloc-64 of size 64 [ 39.169145] The buggy address is located 0 bytes to the right of [ 39.169145] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.169362] [ 39.169441] The buggy address belongs to the physical page: [ 39.169651] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.170680] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.171241] page_type: f5(slab) [ 39.171648] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.172563] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.173272] page dumped because: kasan: bad access detected [ 39.173735] [ 39.174110] Memory state around the buggy address: [ 39.174305] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.174624] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.174772] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.174902] ^ [ 39.175030] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.175214] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.176476] ================================================================== [ 38.806575] ================================================================== [ 38.807088] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb70/0x4858 [ 38.808240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.808453] Call trace: [ 38.810316] __kasan_check_write+0x20/0x30 [ 38.813092] ret_from_fork+0x10/0x20 [ 38.815267] kthread+0x318/0x618 [ 38.815535] [ 38.817087] page_type: f5(slab) [ 38.817208] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.817522] page dumped because: kasan: bad access detected [ 38.819488] ^ [ 38.822411] [ 38.822869] Hardware name: linux,dummy-virt (DT) [ 38.826574] kthread+0x318/0x618 [ 38.830355] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.830971] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.831553] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.834288] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc08/0x4858 [ 38.835197] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.835678] dump_stack_lvl+0x8c/0xd0 [ 38.836478] __kasan_check_write+0x20/0x30 [ 38.842812] __kasan_kmalloc+0xd4/0xd8 [ 38.844248] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.845481] The buggy address is located 0 bytes to the right of [ 38.845481] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.847641] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.848262] page dumped because: kasan: bad access detected [ 38.848390] [ 38.848462] Memory state around the buggy address: [ 38.848569] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.848712] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.848861] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.848998] ^ [ 38.849138] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.849289] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.850323] ================================================================== [ 39.349606] ================================================================== [ 39.350108] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e10/0x4858 [ 39.351010] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.351443] [ 39.351558] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.351829] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.351924] Hardware name: linux,dummy-virt (DT) [ 39.352036] Call trace: [ 39.352132] show_stack+0x20/0x38 (C) [ 39.352294] dump_stack_lvl+0x8c/0xd0 [ 39.353530] print_report+0x118/0x5f0 [ 39.353860] kasan_report+0xc8/0x118 [ 39.354318] __asan_report_load8_noabort+0x20/0x30 [ 39.354916] kasan_atomics_helper+0x3e10/0x4858 [ 39.355288] kasan_atomics+0x198/0x2e8 [ 39.355982] kunit_try_run_case+0x14c/0x3d0 [ 39.356510] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.357095] kthread+0x318/0x618 [ 39.357534] ret_from_fork+0x10/0x20 [ 39.358018] [ 39.358110] Allocated by task 267: [ 39.358214] kasan_save_stack+0x3c/0x68 [ 39.358473] kasan_save_track+0x20/0x40 [ 39.359135] kasan_save_alloc_info+0x40/0x58 [ 39.359764] __kasan_kmalloc+0xd4/0xd8 [ 39.360097] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.360250] kasan_atomics+0xb8/0x2e8 [ 39.360436] kunit_try_run_case+0x14c/0x3d0 [ 39.361152] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.361638] kthread+0x318/0x618 [ 39.361766] ret_from_fork+0x10/0x20 [ 39.361889] [ 39.361957] The buggy address belongs to the object at fff00000c5dafc80 [ 39.361957] which belongs to the cache kmalloc-64 of size 64 [ 39.362582] The buggy address is located 0 bytes to the right of [ 39.362582] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.363459] [ 39.363717] The buggy address belongs to the physical page: [ 39.363838] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.364376] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.364974] page_type: f5(slab) [ 39.365269] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.365736] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.365874] page dumped because: kasan: bad access detected [ 39.365982] [ 39.366045] Memory state around the buggy address: [ 39.366179] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.366329] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.366486] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.367244] ^ [ 39.367585] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.368400] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.368556] ================================================================== [ 39.142796] ================================================================== [ 39.143000] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x126c/0x4858 [ 39.143177] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.143335] [ 39.143431] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.143696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.143849] Hardware name: linux,dummy-virt (DT) [ 39.143976] Call trace: [ 39.144075] show_stack+0x20/0x38 (C) [ 39.144264] dump_stack_lvl+0x8c/0xd0 [ 39.144449] print_report+0x118/0x5f0 [ 39.144658] kasan_report+0xc8/0x118 [ 39.144901] kasan_check_range+0x100/0x1a8 [ 39.145126] __kasan_check_write+0x20/0x30 [ 39.145322] kasan_atomics_helper+0x126c/0x4858 [ 39.145614] kasan_atomics+0x198/0x2e8 [ 39.145862] kunit_try_run_case+0x14c/0x3d0 [ 39.146137] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.146433] kthread+0x318/0x618 [ 39.146622] ret_from_fork+0x10/0x20 [ 39.146773] [ 39.146840] Allocated by task 267: [ 39.146947] kasan_save_stack+0x3c/0x68 [ 39.147138] kasan_save_track+0x20/0x40 [ 39.147293] kasan_save_alloc_info+0x40/0x58 [ 39.147507] __kasan_kmalloc+0xd4/0xd8 [ 39.147641] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.147780] kasan_atomics+0xb8/0x2e8 [ 39.147911] kunit_try_run_case+0x14c/0x3d0 [ 39.148048] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.148215] kthread+0x318/0x618 [ 39.148333] ret_from_fork+0x10/0x20 [ 39.148449] [ 39.148509] The buggy address belongs to the object at fff00000c5dafc80 [ 39.148509] which belongs to the cache kmalloc-64 of size 64 [ 39.148684] The buggy address is located 0 bytes to the right of [ 39.148684] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.149026] [ 39.149126] The buggy address belongs to the physical page: [ 39.150149] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.150358] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.150517] page_type: f5(slab) [ 39.151527] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.152149] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.152742] page dumped because: kasan: bad access detected [ 39.152861] [ 39.152926] Memory state around the buggy address: [ 39.153036] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.153238] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.153387] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.153523] ^ [ 39.153638] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.153789] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.153924] ================================================================== [ 39.062870] ================================================================== [ 39.063030] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1058/0x4858 [ 39.063206] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.063371] [ 39.063462] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.063746] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.063844] Hardware name: linux,dummy-virt (DT) [ 39.063949] Call trace: [ 39.064024] show_stack+0x20/0x38 (C) [ 39.064877] dump_stack_lvl+0x8c/0xd0 [ 39.065021] print_report+0x118/0x5f0 [ 39.065201] kasan_report+0xc8/0x118 [ 39.065349] kasan_check_range+0x100/0x1a8 [ 39.065507] __kasan_check_write+0x20/0x30 [ 39.065730] kasan_atomics_helper+0x1058/0x4858 [ 39.065945] kasan_atomics+0x198/0x2e8 [ 39.066327] kunit_try_run_case+0x14c/0x3d0 [ 39.066502] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.066736] kthread+0x318/0x618 [ 39.067223] ret_from_fork+0x10/0x20 [ 39.067406] [ 39.067495] Allocated by task 267: [ 39.067745] kasan_save_stack+0x3c/0x68 [ 39.067933] kasan_save_track+0x20/0x40 [ 39.068617] kasan_save_alloc_info+0x40/0x58 [ 39.068768] __kasan_kmalloc+0xd4/0xd8 [ 39.068884] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.069027] kasan_atomics+0xb8/0x2e8 [ 39.069213] kunit_try_run_case+0x14c/0x3d0 [ 39.069574] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.070298] kthread+0x318/0x618 [ 39.070989] ret_from_fork+0x10/0x20 [ 39.071233] [ 39.071309] The buggy address belongs to the object at fff00000c5dafc80 [ 39.071309] which belongs to the cache kmalloc-64 of size 64 [ 39.071510] The buggy address is located 0 bytes to the right of [ 39.071510] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.071725] [ 39.071794] The buggy address belongs to the physical page: [ 39.071905] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.072098] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.072262] page_type: f5(slab) [ 39.072461] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.072616] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.073178] page dumped because: kasan: bad access detected [ 39.073639] [ 39.073864] Memory state around the buggy address: [ 39.073997] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.074167] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.074320] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.074487] ^ [ 39.074610] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.075374] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.075908] ================================================================== [ 39.306628] ================================================================== [ 39.306841] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df4/0x4858 [ 39.307000] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 39.307191] [ 39.307762] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 39.308797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 39.309036] Hardware name: linux,dummy-virt (DT) [ 39.309423] Call trace: [ 39.309572] show_stack+0x20/0x38 (C) [ 39.309726] dump_stack_lvl+0x8c/0xd0 [ 39.309878] print_report+0x118/0x5f0 [ 39.310025] kasan_report+0xc8/0x118 [ 39.310208] __asan_report_load8_noabort+0x20/0x30 [ 39.310377] kasan_atomics_helper+0x3df4/0x4858 [ 39.310545] kasan_atomics+0x198/0x2e8 [ 39.310705] kunit_try_run_case+0x14c/0x3d0 [ 39.310868] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.312270] kthread+0x318/0x618 [ 39.312588] ret_from_fork+0x10/0x20 [ 39.312757] [ 39.312826] Allocated by task 267: [ 39.312926] kasan_save_stack+0x3c/0x68 [ 39.313159] kasan_save_track+0x20/0x40 [ 39.314140] kasan_save_alloc_info+0x40/0x58 [ 39.314836] __kasan_kmalloc+0xd4/0xd8 [ 39.315014] __kmalloc_cache_noprof+0x15c/0x3c0 [ 39.315336] kasan_atomics+0xb8/0x2e8 [ 39.315915] kunit_try_run_case+0x14c/0x3d0 [ 39.316466] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 39.316911] kthread+0x318/0x618 [ 39.317126] ret_from_fork+0x10/0x20 [ 39.317457] [ 39.317703] The buggy address belongs to the object at fff00000c5dafc80 [ 39.317703] which belongs to the cache kmalloc-64 of size 64 [ 39.318557] The buggy address is located 0 bytes to the right of [ 39.318557] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 39.318880] [ 39.319506] The buggy address belongs to the physical page: [ 39.319711] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 39.320409] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 39.321003] page_type: f5(slab) [ 39.321276] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 39.321611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 39.321972] page dumped because: kasan: bad access detected [ 39.322355] [ 39.322733] Memory state around the buggy address: [ 39.323229] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.324284] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 39.324544] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 39.324707] ^ [ 39.324854] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.325041] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 39.325287] ================================================================== [ 38.752819] ================================================================== [ 38.752968] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa6c/0x4858 [ 38.753197] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.753459] [ 38.753629] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.754089] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.754231] Hardware name: linux,dummy-virt (DT) [ 38.754328] Call trace: [ 38.754402] show_stack+0x20/0x38 (C) [ 38.754554] dump_stack_lvl+0x8c/0xd0 [ 38.754719] print_report+0x118/0x5f0 [ 38.754977] kasan_report+0xc8/0x118 [ 38.755221] kasan_check_range+0x100/0x1a8 [ 38.755394] __kasan_check_write+0x20/0x30 [ 38.755691] kasan_atomics_helper+0xa6c/0x4858 [ 38.755881] kasan_atomics+0x198/0x2e8 [ 38.756046] kunit_try_run_case+0x14c/0x3d0 [ 38.756294] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.756543] kthread+0x318/0x618 [ 38.756795] ret_from_fork+0x10/0x20 [ 38.756953] [ 38.757024] Allocated by task 267: [ 38.757140] kasan_save_stack+0x3c/0x68 [ 38.757309] kasan_save_track+0x20/0x40 [ 38.757444] kasan_save_alloc_info+0x40/0x58 [ 38.757570] __kasan_kmalloc+0xd4/0xd8 [ 38.757686] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.757832] kasan_atomics+0xb8/0x2e8 [ 38.758048] kunit_try_run_case+0x14c/0x3d0 [ 38.758742] The buggy address belongs to the object at fff00000c5dafc80 [ 38.758742] which belongs to the cache kmalloc-64 of size 64 [ 38.759455] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.759626] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.759785] page_type: f5(slab) [ 38.759903] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.760085] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.760817] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.763508] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xad4/0x4858 [ 38.782068] [ 38.783450] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.783690] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.785166] page_type: f5(slab) [ 38.785999] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.786346] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.787636] page dumped because: kasan: bad access detected [ 38.787986] [ 38.788343] Memory state around the buggy address: [ 38.788889] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.789042] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.789494] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.790463] ^ [ 38.791263] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.791592] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.791788] ================================================================== [ 38.954965] ================================================================== [ 38.955146] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe44/0x4858 [ 38.955302] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.955469] [ 38.955562] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.957523] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.957709] Hardware name: linux,dummy-virt (DT) [ 38.958016] Call trace: [ 38.958165] show_stack+0x20/0x38 (C) [ 38.958503] dump_stack_lvl+0x8c/0xd0 [ 38.958665] print_report+0x118/0x5f0 [ 38.958820] kasan_report+0xc8/0x118 [ 38.959040] kasan_check_range+0x100/0x1a8 [ 38.959927] __kasan_check_write+0x20/0x30 [ 38.960601] kasan_atomics_helper+0xe44/0x4858 [ 38.961613] kasan_atomics+0x198/0x2e8 [ 38.961857] kunit_try_run_case+0x14c/0x3d0 [ 38.962460] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.963258] kthread+0x318/0x618 [ 38.963452] ret_from_fork+0x10/0x20 [ 38.964091] [ 38.964172] Allocated by task 267: [ 38.964278] kasan_save_stack+0x3c/0x68 [ 38.964430] kasan_save_track+0x20/0x40 [ 38.965731] kasan_save_alloc_info+0x40/0x58 [ 38.965910] __kasan_kmalloc+0xd4/0xd8 [ 38.966837] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.967352] kasan_atomics+0xb8/0x2e8 [ 38.967968] kunit_try_run_case+0x14c/0x3d0 [ 38.968142] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.969362] kthread+0x318/0x618 [ 38.969520] ret_from_fork+0x10/0x20 [ 38.969711] [ 38.970337] The buggy address belongs to the object at fff00000c5dafc80 [ 38.970337] which belongs to the cache kmalloc-64 of size 64 [ 38.971030] The buggy address is located 0 bytes to the right of [ 38.971030] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.971364] [ 38.972421] The buggy address belongs to the physical page: [ 38.972712] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.972909] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.973092] page_type: f5(slab) [ 38.974097] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.974491] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.975468] page dumped because: kasan: bad access detected [ 38.975967] [ 38.976076] Memory state around the buggy address: [ 38.976351] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.976588] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.976739] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.977270] ^ [ 38.978073] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.978427] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.978641] ================================================================== [ 38.886171] ================================================================== [ 38.886304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd3c/0x4858 [ 38.886454] Write of size 4 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.886611] [ 38.886707] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.886996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.889335] Hardware name: linux,dummy-virt (DT) [ 38.889752] Call trace: [ 38.890514] show_stack+0x20/0x38 (C) [ 38.890688] dump_stack_lvl+0x8c/0xd0 [ 38.890843] print_report+0x118/0x5f0 [ 38.891012] kasan_report+0xc8/0x118 [ 38.891183] kasan_check_range+0x100/0x1a8 [ 38.891340] __kasan_check_write+0x20/0x30 [ 38.891495] kasan_atomics_helper+0xd3c/0x4858 [ 38.891656] kasan_atomics+0x198/0x2e8 [ 38.891806] kunit_try_run_case+0x14c/0x3d0 [ 38.891964] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.894597] kthread+0x318/0x618 [ 38.894770] ret_from_fork+0x10/0x20 [ 38.894942] [ 38.895010] Allocated by task 267: [ 38.895130] kasan_save_stack+0x3c/0x68 [ 38.895253] kasan_save_track+0x20/0x40 [ 38.895384] kasan_save_alloc_info+0x40/0x58 [ 38.895522] __kasan_kmalloc+0xd4/0xd8 [ 38.895645] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.895783] kasan_atomics+0xb8/0x2e8 [ 38.895912] kunit_try_run_case+0x14c/0x3d0 [ 38.896046] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.898021] kthread+0x318/0x618 [ 38.898941] ret_from_fork+0x10/0x20 [ 38.899205] [ 38.899280] The buggy address belongs to the object at fff00000c5dafc80 [ 38.899280] which belongs to the cache kmalloc-64 of size 64 [ 38.899542] The buggy address is located 0 bytes to the right of [ 38.899542] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.899880] [ 38.900000] The buggy address belongs to the physical page: [ 38.900137] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.900400] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.900551] page_type: f5(slab) [ 38.900668] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.900880] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.901028] page dumped because: kasan: bad access detected [ 38.901168] [ 38.901236] Memory state around the buggy address: [ 38.901350] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.901500] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.901688] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.901823] ^ [ 38.901933] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.902146] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.902287] ================================================================== [ 38.980267] ================================================================== [ 38.980561] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e5c/0x4858 [ 38.980748] Write of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.980982] [ 38.981209] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.981588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.981709] Hardware name: linux,dummy-virt (DT) [ 38.981887] Call trace: [ 38.981998] show_stack+0x20/0x38 (C) [ 38.982189] dump_stack_lvl+0x8c/0xd0 [ 38.982340] print_report+0x118/0x5f0 [ 38.982486] kasan_report+0xc8/0x118 [ 38.982673] __asan_report_store8_noabort+0x20/0x30 [ 38.982857] kasan_atomics_helper+0x3e5c/0x4858 [ 38.983037] kasan_atomics+0x198/0x2e8 [ 38.983214] kunit_try_run_case+0x14c/0x3d0 [ 38.983375] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.983572] kthread+0x318/0x618 [ 38.983787] ret_from_fork+0x10/0x20 [ 38.983967] [ 38.984078] Allocated by task 267: [ 38.984177] kasan_save_stack+0x3c/0x68 [ 38.984358] kasan_save_track+0x20/0x40 [ 38.984510] kasan_save_alloc_info+0x40/0x58 [ 38.984696] __kasan_kmalloc+0xd4/0xd8 [ 38.984826] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.984985] kasan_atomics+0xb8/0x2e8 [ 38.985158] kunit_try_run_case+0x14c/0x3d0 [ 38.985283] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.985739] kthread+0x318/0x618 [ 38.985898] ret_from_fork+0x10/0x20 [ 38.986037] [ 38.986132] The buggy address belongs to the object at fff00000c5dafc80 [ 38.986132] which belongs to the cache kmalloc-64 of size 64 [ 38.986366] The buggy address is located 0 bytes to the right of [ 38.986366] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.986586] [ 38.986659] The buggy address belongs to the physical page: [ 38.986768] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.987408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.987615] page_type: f5(slab) [ 38.987742] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.988419] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.988595] page dumped because: kasan: bad access detected [ 38.988711] [ 38.989398] Memory state around the buggy address: [ 38.989793] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.990305] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.990481] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.990626] ^ [ 38.991435] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.992177] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.992758] ================================================================== [ 38.931930] ================================================================== [ 38.932110] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f58/0x4858 [ 38.932271] Read of size 8 at addr fff00000c5dafcb0 by task kunit_try_catch/267 [ 38.932976] [ 38.933287] CPU: 1 UID: 0 PID: 267 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT [ 38.933955] Tainted: [B]=BAD_PAGE, [N]=TEST [ 38.934401] Hardware name: linux,dummy-virt (DT) [ 38.934882] Call trace: [ 38.935363] show_stack+0x20/0x38 (C) [ 38.935622] dump_stack_lvl+0x8c/0xd0 [ 38.935835] print_report+0x118/0x5f0 [ 38.936157] kasan_report+0xc8/0x118 [ 38.936342] __asan_report_load8_noabort+0x20/0x30 [ 38.936655] kasan_atomics_helper+0x3f58/0x4858 [ 38.936871] kasan_atomics+0x198/0x2e8 [ 38.937041] kunit_try_run_case+0x14c/0x3d0 [ 38.937231] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.937407] kthread+0x318/0x618 [ 38.938985] ret_from_fork+0x10/0x20 [ 38.939647] [ 38.939762] Allocated by task 267: [ 38.939868] kasan_save_stack+0x3c/0x68 [ 38.940005] kasan_save_track+0x20/0x40 [ 38.940153] kasan_save_alloc_info+0x40/0x58 [ 38.940284] __kasan_kmalloc+0xd4/0xd8 [ 38.942099] __kmalloc_cache_noprof+0x15c/0x3c0 [ 38.942369] kasan_atomics+0xb8/0x2e8 [ 38.943139] kunit_try_run_case+0x14c/0x3d0 [ 38.943530] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 38.943709] kthread+0x318/0x618 [ 38.944451] ret_from_fork+0x10/0x20 [ 38.944605] [ 38.944674] The buggy address belongs to the object at fff00000c5dafc80 [ 38.944674] which belongs to the cache kmalloc-64 of size 64 [ 38.945575] The buggy address is located 0 bytes to the right of [ 38.945575] allocated 48-byte region [fff00000c5dafc80, fff00000c5dafcb0) [ 38.946703] [ 38.946822] The buggy address belongs to the physical page: [ 38.946952] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x105daf [ 38.947678] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 38.948271] page_type: f5(slab) [ 38.948695] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 38.948935] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 38.949522] page dumped because: kasan: bad access detected [ 38.950081] [ 38.950175] Memory state around the buggy address: [ 38.950819] fff00000c5dafb80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.951012] fff00000c5dafc00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 38.951193] >fff00000c5dafc80: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 38.951332] ^ [ 38.952030] fff00000c5dafd00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.952776] fff00000c5dafd80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 38.953295] ==================================================================
[ 26.574186] ================================================================== [ 26.574857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac7/0x5450 [ 26.575856] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.576549] [ 26.576786] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.576918] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.576995] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.577063] Call Trace: [ 26.577100] <TASK> [ 26.577156] dump_stack_lvl+0x73/0xb0 [ 26.577281] print_report+0xd1/0x660 [ 26.577365] ? __virt_addr_valid+0x1db/0x2d0 [ 26.577491] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.577571] kasan_report+0x104/0x140 [ 26.577631] ? kasan_atomics_helper+0xac7/0x5450 [ 26.577699] ? kasan_atomics_helper+0xac7/0x5450 [ 26.577887] kasan_check_range+0x10c/0x1c0 [ 26.577971] __kasan_check_write+0x18/0x20 [ 26.578082] kasan_atomics_helper+0xac7/0x5450 [ 26.578185] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.578258] ? kasan_save_alloc_info+0x3b/0x50 [ 26.578395] kasan_atomics+0x1dc/0x310 [ 26.578470] ? __pfx_kasan_atomics+0x10/0x10 [ 26.578546] ? __pfx_read_tsc+0x10/0x10 [ 26.578611] ? ktime_get_ts64+0x86/0x240 [ 26.578688] kunit_try_run_case+0x1b2/0x490 [ 26.578821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.578891] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.579004] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.579078] ? __kthread_parkme+0x82/0x160 [ 26.579163] ? preempt_count_sub+0x50/0x80 [ 26.579241] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.579365] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.579438] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.579505] kthread+0x323/0x710 [ 26.579569] ? trace_preempt_on+0x20/0xc0 [ 26.579669] ? __pfx_kthread+0x10/0x10 [ 26.579792] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.579909] ? calculate_sigpending+0x7b/0xa0 [ 26.579988] ? __pfx_kthread+0x10/0x10 [ 26.580054] ret_from_fork+0x41/0x80 [ 26.580148] ? __pfx_kthread+0x10/0x10 [ 26.580194] ret_from_fork_asm+0x1a/0x30 [ 26.580244] </TASK> [ 26.580262] [ 26.597551] Allocated by task 286: [ 26.599412] kasan_save_stack+0x3d/0x60 [ 26.600165] kasan_save_track+0x18/0x40 [ 26.601521] kasan_save_alloc_info+0x3b/0x50 [ 26.603220] __kasan_kmalloc+0xb7/0xc0 [ 26.603624] __kmalloc_cache_noprof+0x183/0x410 [ 26.605841] kasan_atomics+0x95/0x310 [ 26.606154] kunit_try_run_case+0x1b2/0x490 [ 26.607266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.608602] kthread+0x323/0x710 [ 26.609378] ret_from_fork+0x41/0x80 [ 26.609785] ret_from_fork_asm+0x1a/0x30 [ 26.610083] [ 26.610269] The buggy address belongs to the object at ffff888103231c00 [ 26.610269] which belongs to the cache kmalloc-64 of size 64 [ 26.611097] The buggy address is located 0 bytes to the right of [ 26.611097] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.612234] [ 26.612405] The buggy address belongs to the physical page: [ 26.612747] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.613524] flags: 0x200000000000000(node=0|zone=2) [ 26.614163] page_type: f5(slab) [ 26.614540] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.615243] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.615871] page dumped because: kasan: bad access detected [ 26.616473] [ 26.616742] Memory state around the buggy address: [ 26.617287] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.617803] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.618397] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.619067] ^ [ 26.619562] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.620316] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.620958] ================================================================== [ 26.979031] ================================================================== [ 26.980067] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1079/0x5450 [ 26.980915] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.981373] [ 26.981568] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.981692] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.981751] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.981811] Call Trace: [ 26.981847] <TASK> [ 26.981884] dump_stack_lvl+0x73/0xb0 [ 26.981966] print_report+0xd1/0x660 [ 26.982033] ? __virt_addr_valid+0x1db/0x2d0 [ 26.982289] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.982386] kasan_report+0x104/0x140 [ 26.982450] ? kasan_atomics_helper+0x1079/0x5450 [ 26.982524] ? kasan_atomics_helper+0x1079/0x5450 [ 26.982607] kasan_check_range+0x10c/0x1c0 [ 26.982682] __kasan_check_write+0x18/0x20 [ 26.982802] kasan_atomics_helper+0x1079/0x5450 [ 26.982876] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.982947] ? kasan_save_alloc_info+0x3b/0x50 [ 26.983134] kasan_atomics+0x1dc/0x310 [ 26.983223] ? __pfx_kasan_atomics+0x10/0x10 [ 26.983296] ? __pfx_read_tsc+0x10/0x10 [ 26.983358] ? ktime_get_ts64+0x86/0x240 [ 26.983524] kunit_try_run_case+0x1b2/0x490 [ 26.983637] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.983748] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.983882] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.983996] ? __kthread_parkme+0x82/0x160 [ 26.984065] ? preempt_count_sub+0x50/0x80 [ 26.984162] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.984295] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.984403] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.984473] kthread+0x323/0x710 [ 26.984534] ? trace_preempt_on+0x20/0xc0 [ 26.984670] ? __pfx_kthread+0x10/0x10 [ 26.984827] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.984919] ? calculate_sigpending+0x7b/0xa0 [ 26.985047] ? __pfx_kthread+0x10/0x10 [ 26.985176] ret_from_fork+0x41/0x80 [ 26.985276] ? __pfx_kthread+0x10/0x10 [ 26.985344] ret_from_fork_asm+0x1a/0x30 [ 26.985533] </TASK> [ 26.985598] [ 27.000585] Allocated by task 286: [ 27.000997] kasan_save_stack+0x3d/0x60 [ 27.001318] kasan_save_track+0x18/0x40 [ 27.001602] kasan_save_alloc_info+0x3b/0x50 [ 27.002187] __kasan_kmalloc+0xb7/0xc0 [ 27.002614] __kmalloc_cache_noprof+0x183/0x410 [ 27.003219] kasan_atomics+0x95/0x310 [ 27.003794] kunit_try_run_case+0x1b2/0x490 [ 27.004363] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.005000] kthread+0x323/0x710 [ 27.005434] ret_from_fork+0x41/0x80 [ 27.005980] ret_from_fork_asm+0x1a/0x30 [ 27.006356] [ 27.006519] The buggy address belongs to the object at ffff888103231c00 [ 27.006519] which belongs to the cache kmalloc-64 of size 64 [ 27.007293] The buggy address is located 0 bytes to the right of [ 27.007293] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.008648] [ 27.008949] The buggy address belongs to the physical page: [ 27.009288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.009844] flags: 0x200000000000000(node=0|zone=2) [ 27.010495] page_type: f5(slab) [ 27.011002] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.011855] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.012552] page dumped because: kasan: bad access detected [ 27.013075] [ 27.013325] Memory state around the buggy address: [ 27.013799] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.014210] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.014855] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.015633] ^ [ 27.016194] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.016757] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.017161] ================================================================== [ 27.284961] ================================================================== [ 27.285780] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ce/0x5450 [ 27.286492] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.287024] [ 27.287549] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.287712] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.287842] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.287949] Call Trace: [ 27.287990] <TASK> [ 27.288026] dump_stack_lvl+0x73/0xb0 [ 27.288378] print_report+0xd1/0x660 [ 27.288488] ? __virt_addr_valid+0x1db/0x2d0 [ 27.288618] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.288697] kasan_report+0x104/0x140 [ 27.290072] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.290213] ? kasan_atomics_helper+0x49ce/0x5450 [ 27.290303] __asan_report_load4_noabort+0x18/0x20 [ 27.290375] kasan_atomics_helper+0x49ce/0x5450 [ 27.290450] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.290525] ? kasan_save_alloc_info+0x3b/0x50 [ 27.290615] kasan_atomics+0x1dc/0x310 [ 27.290688] ? __pfx_kasan_atomics+0x10/0x10 [ 27.290783] ? __pfx_read_tsc+0x10/0x10 [ 27.290856] ? ktime_get_ts64+0x86/0x240 [ 27.290922] kunit_try_run_case+0x1b2/0x490 [ 27.290963] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.290998] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.291033] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.291068] ? __kthread_parkme+0x82/0x160 [ 27.291102] ? preempt_count_sub+0x50/0x80 [ 27.291167] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.291204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.291240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.291276] kthread+0x323/0x710 [ 27.291307] ? trace_preempt_on+0x20/0xc0 [ 27.291344] ? __pfx_kthread+0x10/0x10 [ 27.291378] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.291410] ? calculate_sigpending+0x7b/0xa0 [ 27.291443] ? __pfx_kthread+0x10/0x10 [ 27.291477] ret_from_fork+0x41/0x80 [ 27.291511] ? __pfx_kthread+0x10/0x10 [ 27.291545] ret_from_fork_asm+0x1a/0x30 [ 27.291618] </TASK> [ 27.291637] [ 27.305392] Allocated by task 286: [ 27.305780] kasan_save_stack+0x3d/0x60 [ 27.306235] kasan_save_track+0x18/0x40 [ 27.306775] kasan_save_alloc_info+0x3b/0x50 [ 27.307264] __kasan_kmalloc+0xb7/0xc0 [ 27.307735] __kmalloc_cache_noprof+0x183/0x410 [ 27.308396] kasan_atomics+0x95/0x310 [ 27.308782] kunit_try_run_case+0x1b2/0x490 [ 27.309299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.309992] kthread+0x323/0x710 [ 27.310286] ret_from_fork+0x41/0x80 [ 27.310780] ret_from_fork_asm+0x1a/0x30 [ 27.311221] [ 27.311559] The buggy address belongs to the object at ffff888103231c00 [ 27.311559] which belongs to the cache kmalloc-64 of size 64 [ 27.312533] The buggy address is located 0 bytes to the right of [ 27.312533] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.313751] [ 27.314067] The buggy address belongs to the physical page: [ 27.314547] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.315313] flags: 0x200000000000000(node=0|zone=2) [ 27.315786] page_type: f5(slab) [ 27.316141] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.316810] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.317388] page dumped because: kasan: bad access detected [ 27.317876] [ 27.318034] Memory state around the buggy address: [ 27.318419] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.319651] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.320578] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.323199] ^ [ 27.323536] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.324298] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.326466] ================================================================== [ 28.126713] ================================================================== [ 28.127406] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7a/0x5450 [ 28.127994] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.129554] [ 28.129834] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.129971] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.130009] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.130074] Call Trace: [ 28.130140] <TASK> [ 28.130185] dump_stack_lvl+0x73/0xb0 [ 28.130264] print_report+0xd1/0x660 [ 28.130336] ? __virt_addr_valid+0x1db/0x2d0 [ 28.130465] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.130546] kasan_report+0x104/0x140 [ 28.130659] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.130804] ? kasan_atomics_helper+0x1d7a/0x5450 [ 28.130965] kasan_check_range+0x10c/0x1c0 [ 28.131055] __kasan_check_write+0x18/0x20 [ 28.131142] kasan_atomics_helper+0x1d7a/0x5450 [ 28.131218] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.131288] ? kasan_save_alloc_info+0x3b/0x50 [ 28.131338] kasan_atomics+0x1dc/0x310 [ 28.131376] ? __pfx_kasan_atomics+0x10/0x10 [ 28.131415] ? __pfx_read_tsc+0x10/0x10 [ 28.131450] ? ktime_get_ts64+0x86/0x240 [ 28.131490] kunit_try_run_case+0x1b2/0x490 [ 28.131528] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.131562] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.131623] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.131658] ? __kthread_parkme+0x82/0x160 [ 28.131694] ? preempt_count_sub+0x50/0x80 [ 28.131829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.131891] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.131942] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.131979] kthread+0x323/0x710 [ 28.132012] ? trace_preempt_on+0x20/0xc0 [ 28.132050] ? __pfx_kthread+0x10/0x10 [ 28.132085] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.132141] ? calculate_sigpending+0x7b/0xa0 [ 28.132176] ? __pfx_kthread+0x10/0x10 [ 28.132211] ret_from_fork+0x41/0x80 [ 28.132246] ? __pfx_kthread+0x10/0x10 [ 28.132280] ret_from_fork_asm+0x1a/0x30 [ 28.132329] </TASK> [ 28.132347] [ 28.151201] Allocated by task 286: [ 28.152361] kasan_save_stack+0x3d/0x60 [ 28.152888] kasan_save_track+0x18/0x40 [ 28.153244] kasan_save_alloc_info+0x3b/0x50 [ 28.153681] __kasan_kmalloc+0xb7/0xc0 [ 28.154220] __kmalloc_cache_noprof+0x183/0x410 [ 28.154650] kasan_atomics+0x95/0x310 [ 28.155040] kunit_try_run_case+0x1b2/0x490 [ 28.155528] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.156048] kthread+0x323/0x710 [ 28.156387] ret_from_fork+0x41/0x80 [ 28.156884] ret_from_fork_asm+0x1a/0x30 [ 28.157202] [ 28.157352] The buggy address belongs to the object at ffff888103231c00 [ 28.157352] which belongs to the cache kmalloc-64 of size 64 [ 28.158107] The buggy address is located 0 bytes to the right of [ 28.158107] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.159369] [ 28.159632] The buggy address belongs to the physical page: [ 28.160162] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.160752] flags: 0x200000000000000(node=0|zone=2) [ 28.161129] page_type: f5(slab) [ 28.161500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.162260] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.162935] page dumped because: kasan: bad access detected [ 28.163409] [ 28.163696] Memory state around the buggy address: [ 28.164174] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.164850] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.165410] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.166225] ^ [ 28.166840] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.167659] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.168513] ================================================================== [ 27.713311] ================================================================== [ 27.714027] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1818/0x5450 [ 27.714757] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.715491] [ 27.715739] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.715876] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.715918] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.715983] Call Trace: [ 27.716023] <TASK> [ 27.716074] dump_stack_lvl+0x73/0xb0 [ 27.716183] print_report+0xd1/0x660 [ 27.716257] ? __virt_addr_valid+0x1db/0x2d0 [ 27.716385] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.716463] kasan_report+0x104/0x140 [ 27.716526] ? kasan_atomics_helper+0x1818/0x5450 [ 27.716600] ? kasan_atomics_helper+0x1818/0x5450 [ 27.716685] kasan_check_range+0x10c/0x1c0 [ 27.716760] __kasan_check_write+0x18/0x20 [ 27.716823] kasan_atomics_helper+0x1818/0x5450 [ 27.716896] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.716971] ? kasan_save_alloc_info+0x3b/0x50 [ 27.717061] kasan_atomics+0x1dc/0x310 [ 27.717366] ? __pfx_kasan_atomics+0x10/0x10 [ 27.717497] ? __pfx_read_tsc+0x10/0x10 [ 27.717572] ? ktime_get_ts64+0x86/0x240 [ 27.717654] kunit_try_run_case+0x1b2/0x490 [ 27.717765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.717841] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.717950] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.718051] ? __kthread_parkme+0x82/0x160 [ 27.718179] ? preempt_count_sub+0x50/0x80 [ 27.718293] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.718399] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.718479] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.718550] kthread+0x323/0x710 [ 27.718612] ? trace_preempt_on+0x20/0xc0 [ 27.718674] ? __pfx_kthread+0x10/0x10 [ 27.718825] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.718921] ? calculate_sigpending+0x7b/0xa0 [ 27.718997] ? __pfx_kthread+0x10/0x10 [ 27.719098] ret_from_fork+0x41/0x80 [ 27.719227] ? __pfx_kthread+0x10/0x10 [ 27.719299] ret_from_fork_asm+0x1a/0x30 [ 27.719430] </TASK> [ 27.719490] [ 27.734488] Allocated by task 286: [ 27.734877] kasan_save_stack+0x3d/0x60 [ 27.735323] kasan_save_track+0x18/0x40 [ 27.735777] kasan_save_alloc_info+0x3b/0x50 [ 27.739691] __kasan_kmalloc+0xb7/0xc0 [ 27.740770] __kmalloc_cache_noprof+0x183/0x410 [ 27.741355] kasan_atomics+0x95/0x310 [ 27.741843] kunit_try_run_case+0x1b2/0x490 [ 27.742212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.742827] kthread+0x323/0x710 [ 27.743277] ret_from_fork+0x41/0x80 [ 27.743570] ret_from_fork_asm+0x1a/0x30 [ 27.744146] [ 27.744376] The buggy address belongs to the object at ffff888103231c00 [ 27.744376] which belongs to the cache kmalloc-64 of size 64 [ 27.745216] The buggy address is located 0 bytes to the right of [ 27.745216] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.746074] [ 27.746329] The buggy address belongs to the physical page: [ 27.746922] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.747575] flags: 0x200000000000000(node=0|zone=2) [ 27.748187] page_type: f5(slab) [ 27.748556] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.749169] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.749748] page dumped because: kasan: bad access detected [ 27.750304] [ 27.750532] Memory state around the buggy address: [ 27.750985] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.751640] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.752096] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.752790] ^ [ 27.753324] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.754009] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.754655] ================================================================== [ 25.963087] ================================================================== [ 25.964345] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b6e/0x5450 [ 25.965146] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 25.966401] [ 25.966671] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.967071] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.967204] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.967287] Call Trace: [ 25.967322] <TASK> [ 25.967356] dump_stack_lvl+0x73/0xb0 [ 25.967433] print_report+0xd1/0x660 [ 25.967497] ? __virt_addr_valid+0x1db/0x2d0 [ 25.967651] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.967859] kasan_report+0x104/0x140 [ 25.967952] ? kasan_atomics_helper+0x4b6e/0x5450 [ 25.968021] ? kasan_atomics_helper+0x4b6e/0x5450 [ 25.968360] __asan_report_store4_noabort+0x1b/0x30 [ 25.968527] kasan_atomics_helper+0x4b6e/0x5450 [ 25.968702] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.968912] ? kasan_save_alloc_info+0x3b/0x50 [ 25.969005] kasan_atomics+0x1dc/0x310 [ 25.969074] ? __pfx_kasan_atomics+0x10/0x10 [ 25.969169] ? __pfx_read_tsc+0x10/0x10 [ 25.969232] ? ktime_get_ts64+0x86/0x240 [ 25.969307] kunit_try_run_case+0x1b2/0x490 [ 25.969375] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.969440] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.969503] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.969568] ? __kthread_parkme+0x82/0x160 [ 25.969632] ? preempt_count_sub+0x50/0x80 [ 25.969703] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.969774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.969842] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.969910] kthread+0x323/0x710 [ 25.969970] ? trace_preempt_on+0x20/0xc0 [ 25.970037] ? __pfx_kthread+0x10/0x10 [ 25.970101] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.970184] ? calculate_sigpending+0x7b/0xa0 [ 25.970248] ? __pfx_kthread+0x10/0x10 [ 25.970313] ret_from_fork+0x41/0x80 [ 25.970378] ? __pfx_kthread+0x10/0x10 [ 25.970440] ret_from_fork_asm+0x1a/0x30 [ 25.970533] </TASK> [ 25.970565] [ 25.988173] Allocated by task 286: [ 25.988411] kasan_save_stack+0x3d/0x60 [ 25.988684] kasan_save_track+0x18/0x40 [ 25.988944] kasan_save_alloc_info+0x3b/0x50 [ 25.989658] __kasan_kmalloc+0xb7/0xc0 [ 25.990729] __kmalloc_cache_noprof+0x183/0x410 [ 25.991510] kasan_atomics+0x95/0x310 [ 25.992305] kunit_try_run_case+0x1b2/0x490 [ 25.993569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.994261] kthread+0x323/0x710 [ 25.994645] ret_from_fork+0x41/0x80 [ 25.995456] ret_from_fork_asm+0x1a/0x30 [ 25.996443] [ 25.996785] The buggy address belongs to the object at ffff888103231c00 [ 25.996785] which belongs to the cache kmalloc-64 of size 64 [ 25.997628] The buggy address is located 0 bytes to the right of [ 25.997628] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 25.999547] [ 25.999903] The buggy address belongs to the physical page: [ 26.000461] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.000891] flags: 0x200000000000000(node=0|zone=2) [ 26.001264] page_type: f5(slab) [ 26.002390] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.003546] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.004552] page dumped because: kasan: bad access detected [ 26.005247] [ 26.005564] Memory state around the buggy address: [ 26.006030] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.006927] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.007939] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.008550] ^ [ 26.009570] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.010326] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.011534] ================================================================== [ 27.983355] ================================================================== [ 27.983871] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c18/0x5450 [ 27.984572] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.985093] [ 27.985878] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.985958] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.985978] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.986010] Call Trace: [ 27.986031] <TASK> [ 27.986052] dump_stack_lvl+0x73/0xb0 [ 27.986096] print_report+0xd1/0x660 [ 27.986172] ? __virt_addr_valid+0x1db/0x2d0 [ 27.986292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.986372] kasan_report+0x104/0x140 [ 27.986434] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.986508] ? kasan_atomics_helper+0x1c18/0x5450 [ 27.986593] kasan_check_range+0x10c/0x1c0 [ 27.986669] __kasan_check_write+0x18/0x20 [ 27.986733] kasan_atomics_helper+0x1c18/0x5450 [ 27.986809] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.986883] ? kasan_save_alloc_info+0x3b/0x50 [ 27.986973] kasan_atomics+0x1dc/0x310 [ 27.987046] ? __pfx_kasan_atomics+0x10/0x10 [ 27.987417] ? __pfx_read_tsc+0x10/0x10 [ 27.987511] ? ktime_get_ts64+0x86/0x240 [ 27.987623] kunit_try_run_case+0x1b2/0x490 [ 27.987763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.987869] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.987951] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.988022] ? __kthread_parkme+0x82/0x160 [ 27.988091] ? preempt_count_sub+0x50/0x80 [ 27.988200] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.988270] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.988315] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.988353] kthread+0x323/0x710 [ 27.988385] ? trace_preempt_on+0x20/0xc0 [ 27.988424] ? __pfx_kthread+0x10/0x10 [ 27.988459] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.988491] ? calculate_sigpending+0x7b/0xa0 [ 27.988524] ? __pfx_kthread+0x10/0x10 [ 27.988560] ret_from_fork+0x41/0x80 [ 27.988594] ? __pfx_kthread+0x10/0x10 [ 27.988628] ret_from_fork_asm+0x1a/0x30 [ 27.988677] </TASK> [ 27.988696] [ 28.008596] Allocated by task 286: [ 28.008956] kasan_save_stack+0x3d/0x60 [ 28.009375] kasan_save_track+0x18/0x40 [ 28.009696] kasan_save_alloc_info+0x3b/0x50 [ 28.010383] __kasan_kmalloc+0xb7/0xc0 [ 28.010781] __kmalloc_cache_noprof+0x183/0x410 [ 28.011146] kasan_atomics+0x95/0x310 [ 28.011807] kunit_try_run_case+0x1b2/0x490 [ 28.012320] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.012824] kthread+0x323/0x710 [ 28.013091] ret_from_fork+0x41/0x80 [ 28.014422] ret_from_fork_asm+0x1a/0x30 [ 28.014940] [ 28.015499] The buggy address belongs to the object at ffff888103231c00 [ 28.015499] which belongs to the cache kmalloc-64 of size 64 [ 28.016965] The buggy address is located 0 bytes to the right of [ 28.016965] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.017924] [ 28.018100] The buggy address belongs to the physical page: [ 28.018635] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.020018] flags: 0x200000000000000(node=0|zone=2) [ 28.020576] page_type: f5(slab) [ 28.021275] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.022045] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.022926] page dumped because: kasan: bad access detected [ 28.023682] [ 28.023985] Memory state around the buggy address: [ 28.024766] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.025397] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.026276] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.026964] ^ [ 28.028008] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.028520] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.029197] ================================================================== [ 25.869930] ================================================================== [ 25.871158] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba2/0x5450 [ 25.871787] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 25.872535] [ 25.872999] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.873146] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.873184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.873240] Call Trace: [ 25.873273] <TASK> [ 25.873360] dump_stack_lvl+0x73/0xb0 [ 25.873474] print_report+0xd1/0x660 [ 25.873547] ? __virt_addr_valid+0x1db/0x2d0 [ 25.873667] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.873918] kasan_report+0x104/0x140 [ 25.873999] ? kasan_atomics_helper+0x4ba2/0x5450 [ 25.874072] ? kasan_atomics_helper+0x4ba2/0x5450 [ 25.874294] __asan_report_store4_noabort+0x1b/0x30 [ 25.874403] kasan_atomics_helper+0x4ba2/0x5450 [ 25.874491] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.874616] ? kasan_save_alloc_info+0x3b/0x50 [ 25.874740] kasan_atomics+0x1dc/0x310 [ 25.874959] ? __pfx_kasan_atomics+0x10/0x10 [ 25.875100] ? __pfx_read_tsc+0x10/0x10 [ 25.875212] ? ktime_get_ts64+0x86/0x240 [ 25.875285] kunit_try_run_case+0x1b2/0x490 [ 25.875355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.875473] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.875573] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.875677] ? __kthread_parkme+0x82/0x160 [ 25.875795] ? preempt_count_sub+0x50/0x80 [ 25.875844] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.875882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.875920] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.875966] kthread+0x323/0x710 [ 25.875996] ? trace_preempt_on+0x20/0xc0 [ 25.876030] ? __pfx_kthread+0x10/0x10 [ 25.876064] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.876094] ? calculate_sigpending+0x7b/0xa0 [ 25.876168] ? __pfx_kthread+0x10/0x10 [ 25.876264] ret_from_fork+0x41/0x80 [ 25.876337] ? __pfx_kthread+0x10/0x10 [ 25.876397] ret_from_fork_asm+0x1a/0x30 [ 25.876477] </TASK> [ 25.876502] [ 25.892101] Allocated by task 286: [ 25.892487] kasan_save_stack+0x3d/0x60 [ 25.893517] kasan_save_track+0x18/0x40 [ 25.894305] kasan_save_alloc_info+0x3b/0x50 [ 25.894916] __kasan_kmalloc+0xb7/0xc0 [ 25.895456] __kmalloc_cache_noprof+0x183/0x410 [ 25.896249] kasan_atomics+0x95/0x310 [ 25.896733] kunit_try_run_case+0x1b2/0x490 [ 25.897165] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.897505] kthread+0x323/0x710 [ 25.898138] ret_from_fork+0x41/0x80 [ 25.898632] ret_from_fork_asm+0x1a/0x30 [ 25.899667] [ 25.899891] The buggy address belongs to the object at ffff888103231c00 [ 25.899891] which belongs to the cache kmalloc-64 of size 64 [ 25.900835] The buggy address is located 0 bytes to the right of [ 25.900835] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 25.902355] [ 25.902588] The buggy address belongs to the physical page: [ 25.903309] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 25.904294] flags: 0x200000000000000(node=0|zone=2) [ 25.904877] page_type: f5(slab) [ 25.905286] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.906436] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.906833] page dumped because: kasan: bad access detected [ 25.907515] [ 25.908052] Memory state around the buggy address: [ 25.908502] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.909526] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.910300] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.911101] ^ [ 25.911410] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.912307] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.913278] ================================================================== [ 25.915593] ================================================================== [ 25.916457] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b88/0x5450 [ 25.917295] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 25.917977] [ 25.918350] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.918472] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.918508] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.918563] Call Trace: [ 25.918792] <TASK> [ 25.918867] dump_stack_lvl+0x73/0xb0 [ 25.918950] print_report+0xd1/0x660 [ 25.919079] ? __virt_addr_valid+0x1db/0x2d0 [ 25.919256] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.919334] kasan_report+0x104/0x140 [ 25.919449] ? kasan_atomics_helper+0x4b88/0x5450 [ 25.919561] ? kasan_atomics_helper+0x4b88/0x5450 [ 25.919671] __asan_report_load4_noabort+0x18/0x20 [ 25.919741] kasan_atomics_helper+0x4b88/0x5450 [ 25.919935] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.920043] ? kasan_save_alloc_info+0x3b/0x50 [ 25.920154] kasan_atomics+0x1dc/0x310 [ 25.920229] ? __pfx_kasan_atomics+0x10/0x10 [ 25.920891] ? __pfx_read_tsc+0x10/0x10 [ 25.920985] ? ktime_get_ts64+0x86/0x240 [ 25.921064] kunit_try_run_case+0x1b2/0x490 [ 25.921157] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.921214] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.921274] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.921334] ? __kthread_parkme+0x82/0x160 [ 25.921554] ? preempt_count_sub+0x50/0x80 [ 25.921690] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.921806] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.922073] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.922249] kthread+0x323/0x710 [ 25.922402] ? trace_preempt_on+0x20/0xc0 [ 25.922548] ? __pfx_kthread+0x10/0x10 [ 25.922714] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.922936] ? calculate_sigpending+0x7b/0xa0 [ 25.923023] ? __pfx_kthread+0x10/0x10 [ 25.923091] ret_from_fork+0x41/0x80 [ 25.923183] ? __pfx_kthread+0x10/0x10 [ 25.923250] ret_from_fork_asm+0x1a/0x30 [ 25.923337] </TASK> [ 25.923372] [ 25.940526] Allocated by task 286: [ 25.941069] kasan_save_stack+0x3d/0x60 [ 25.941802] kasan_save_track+0x18/0x40 [ 25.942103] kasan_save_alloc_info+0x3b/0x50 [ 25.942424] __kasan_kmalloc+0xb7/0xc0 [ 25.943285] __kmalloc_cache_noprof+0x183/0x410 [ 25.944083] kasan_atomics+0x95/0x310 [ 25.944547] kunit_try_run_case+0x1b2/0x490 [ 25.945078] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.946031] kthread+0x323/0x710 [ 25.946469] ret_from_fork+0x41/0x80 [ 25.946985] ret_from_fork_asm+0x1a/0x30 [ 25.947574] [ 25.947883] The buggy address belongs to the object at ffff888103231c00 [ 25.947883] which belongs to the cache kmalloc-64 of size 64 [ 25.949392] The buggy address is located 0 bytes to the right of [ 25.949392] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 25.950714] [ 25.950919] The buggy address belongs to the physical page: [ 25.951691] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 25.952642] flags: 0x200000000000000(node=0|zone=2) [ 25.953318] page_type: f5(slab) [ 25.954430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.955780] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.956427] page dumped because: kasan: bad access detected [ 25.956785] [ 25.957005] Memory state around the buggy address: [ 25.957470] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.958223] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.959425] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.959897] ^ [ 25.960228] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.960605] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.961199] ================================================================== [ 27.195626] ================================================================== [ 27.196337] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49e8/0x5450 [ 27.197011] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.199304] [ 27.199559] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.199719] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.200130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.200209] Call Trace: [ 27.200248] <TASK> [ 27.200287] dump_stack_lvl+0x73/0xb0 [ 27.200368] print_report+0xd1/0x660 [ 27.200436] ? __virt_addr_valid+0x1db/0x2d0 [ 27.200527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.200568] kasan_report+0x104/0x140 [ 27.200601] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.200638] ? kasan_atomics_helper+0x49e8/0x5450 [ 27.200681] __asan_report_load4_noabort+0x18/0x20 [ 27.200741] kasan_atomics_helper+0x49e8/0x5450 [ 27.200783] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.200846] ? kasan_save_alloc_info+0x3b/0x50 [ 27.200894] kasan_atomics+0x1dc/0x310 [ 27.200930] ? __pfx_kasan_atomics+0x10/0x10 [ 27.200968] ? __pfx_read_tsc+0x10/0x10 [ 27.201002] ? ktime_get_ts64+0x86/0x240 [ 27.201042] kunit_try_run_case+0x1b2/0x490 [ 27.201079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.201135] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.201171] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.201205] ? __kthread_parkme+0x82/0x160 [ 27.201240] ? preempt_count_sub+0x50/0x80 [ 27.201280] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.201316] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.201352] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.201388] kthread+0x323/0x710 [ 27.201420] ? trace_preempt_on+0x20/0xc0 [ 27.201454] ? __pfx_kthread+0x10/0x10 [ 27.201488] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.201519] ? calculate_sigpending+0x7b/0xa0 [ 27.201552] ? __pfx_kthread+0x10/0x10 [ 27.201587] ret_from_fork+0x41/0x80 [ 27.201621] ? __pfx_kthread+0x10/0x10 [ 27.201655] ret_from_fork_asm+0x1a/0x30 [ 27.201705] </TASK> [ 27.201752] [ 27.221461] Allocated by task 286: [ 27.222365] kasan_save_stack+0x3d/0x60 [ 27.223012] kasan_save_track+0x18/0x40 [ 27.223290] kasan_save_alloc_info+0x3b/0x50 [ 27.224033] __kasan_kmalloc+0xb7/0xc0 [ 27.224707] __kmalloc_cache_noprof+0x183/0x410 [ 27.225239] kasan_atomics+0x95/0x310 [ 27.225818] kunit_try_run_case+0x1b2/0x490 [ 27.226621] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.227256] kthread+0x323/0x710 [ 27.227963] ret_from_fork+0x41/0x80 [ 27.228330] ret_from_fork_asm+0x1a/0x30 [ 27.228982] [ 27.229169] The buggy address belongs to the object at ffff888103231c00 [ 27.229169] which belongs to the cache kmalloc-64 of size 64 [ 27.230659] The buggy address is located 0 bytes to the right of [ 27.230659] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.231761] [ 27.232355] The buggy address belongs to the physical page: [ 27.232670] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.234162] flags: 0x200000000000000(node=0|zone=2) [ 27.234553] page_type: f5(slab) [ 27.234913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.235981] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.236787] page dumped because: kasan: bad access detected [ 27.237443] [ 27.237677] Memory state around the buggy address: [ 27.238477] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.239203] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.240106] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.240911] ^ [ 27.241311] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.242236] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.242924] ================================================================== [ 28.257569] ================================================================== [ 28.258275] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f43/0x5450 [ 28.258848] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.259524] [ 28.259767] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.259898] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.259935] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.259998] Call Trace: [ 28.260045] <TASK> [ 28.260084] dump_stack_lvl+0x73/0xb0 [ 28.260649] print_report+0xd1/0x660 [ 28.261068] ? __virt_addr_valid+0x1db/0x2d0 [ 28.261463] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.261563] kasan_report+0x104/0x140 [ 28.261631] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.261818] ? kasan_atomics_helper+0x1f43/0x5450 [ 28.261937] kasan_check_range+0x10c/0x1c0 [ 28.262018] __kasan_check_write+0x18/0x20 [ 28.262082] kasan_atomics_helper+0x1f43/0x5450 [ 28.262186] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.262262] ? kasan_save_alloc_info+0x3b/0x50 [ 28.262351] kasan_atomics+0x1dc/0x310 [ 28.262419] ? __pfx_kasan_atomics+0x10/0x10 [ 28.262492] ? __pfx_read_tsc+0x10/0x10 [ 28.262558] ? ktime_get_ts64+0x86/0x240 [ 28.262635] kunit_try_run_case+0x1b2/0x490 [ 28.262696] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.262776] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.262831] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.262867] ? __kthread_parkme+0x82/0x160 [ 28.262904] ? preempt_count_sub+0x50/0x80 [ 28.262944] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.262981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.263018] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.263054] kthread+0x323/0x710 [ 28.263086] ? trace_preempt_on+0x20/0xc0 [ 28.263143] ? __pfx_kthread+0x10/0x10 [ 28.263177] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.263209] ? calculate_sigpending+0x7b/0xa0 [ 28.263242] ? __pfx_kthread+0x10/0x10 [ 28.263277] ret_from_fork+0x41/0x80 [ 28.263311] ? __pfx_kthread+0x10/0x10 [ 28.263345] ret_from_fork_asm+0x1a/0x30 [ 28.263393] </TASK> [ 28.263411] [ 28.275981] Allocated by task 286: [ 28.276241] kasan_save_stack+0x3d/0x60 [ 28.276678] kasan_save_track+0x18/0x40 [ 28.277143] kasan_save_alloc_info+0x3b/0x50 [ 28.277596] __kasan_kmalloc+0xb7/0xc0 [ 28.278130] __kmalloc_cache_noprof+0x183/0x410 [ 28.278512] kasan_atomics+0x95/0x310 [ 28.278803] kunit_try_run_case+0x1b2/0x490 [ 28.279101] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.279682] kthread+0x323/0x710 [ 28.280215] ret_from_fork+0x41/0x80 [ 28.280635] ret_from_fork_asm+0x1a/0x30 [ 28.281136] [ 28.281366] The buggy address belongs to the object at ffff888103231c00 [ 28.281366] which belongs to the cache kmalloc-64 of size 64 [ 28.282729] The buggy address is located 0 bytes to the right of [ 28.282729] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.283360] [ 28.283641] The buggy address belongs to the physical page: [ 28.284226] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.284811] flags: 0x200000000000000(node=0|zone=2) [ 28.285144] page_type: f5(slab) [ 28.285535] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.286391] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.287067] page dumped because: kasan: bad access detected [ 28.287496] [ 28.287688] Memory state around the buggy address: [ 28.287990] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.288505] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.289223] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.289891] ^ [ 28.290370] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.290755] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.291188] ================================================================== [ 26.622366] ================================================================== [ 26.623153] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6a/0x5450 [ 26.623953] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.624446] [ 26.624745] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.624883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.624924] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.624989] Call Trace: [ 26.625028] <TASK> [ 26.625066] dump_stack_lvl+0x73/0xb0 [ 26.625174] print_report+0xd1/0x660 [ 26.625248] ? __virt_addr_valid+0x1db/0x2d0 [ 26.625375] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.625445] kasan_report+0x104/0x140 [ 26.625508] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.625618] ? kasan_atomics_helper+0xb6a/0x5450 [ 26.625760] kasan_check_range+0x10c/0x1c0 [ 26.625851] __kasan_check_write+0x18/0x20 [ 26.625915] kasan_atomics_helper+0xb6a/0x5450 [ 26.625990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.626063] ? kasan_save_alloc_info+0x3b/0x50 [ 26.626169] kasan_atomics+0x1dc/0x310 [ 26.626235] ? __pfx_kasan_atomics+0x10/0x10 [ 26.626305] ? __pfx_read_tsc+0x10/0x10 [ 26.626370] ? ktime_get_ts64+0x86/0x240 [ 26.626444] kunit_try_run_case+0x1b2/0x490 [ 26.626519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.626586] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.626653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.626742] ? __kthread_parkme+0x82/0x160 [ 26.626810] ? preempt_count_sub+0x50/0x80 [ 26.626890] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.626960] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.627033] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.627102] kthread+0x323/0x710 [ 26.627185] ? trace_preempt_on+0x20/0xc0 [ 26.627256] ? __pfx_kthread+0x10/0x10 [ 26.627321] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.627385] ? calculate_sigpending+0x7b/0xa0 [ 26.627449] ? __pfx_kthread+0x10/0x10 [ 26.627515] ret_from_fork+0x41/0x80 [ 26.627592] ? __pfx_kthread+0x10/0x10 [ 26.627680] ret_from_fork_asm+0x1a/0x30 [ 26.627778] </TASK> [ 26.627814] [ 26.640378] Allocated by task 286: [ 26.640776] kasan_save_stack+0x3d/0x60 [ 26.641261] kasan_save_track+0x18/0x40 [ 26.641688] kasan_save_alloc_info+0x3b/0x50 [ 26.642227] __kasan_kmalloc+0xb7/0xc0 [ 26.642589] __kmalloc_cache_noprof+0x183/0x410 [ 26.644079] kasan_atomics+0x95/0x310 [ 26.644513] kunit_try_run_case+0x1b2/0x490 [ 26.645532] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.646563] kthread+0x323/0x710 [ 26.647191] ret_from_fork+0x41/0x80 [ 26.647478] ret_from_fork_asm+0x1a/0x30 [ 26.647811] [ 26.648149] The buggy address belongs to the object at ffff888103231c00 [ 26.648149] which belongs to the cache kmalloc-64 of size 64 [ 26.649222] The buggy address is located 0 bytes to the right of [ 26.649222] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.650320] [ 26.650494] The buggy address belongs to the physical page: [ 26.650895] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.651527] flags: 0x200000000000000(node=0|zone=2) [ 26.652131] page_type: f5(slab) [ 26.652500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.653244] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.653826] page dumped because: kasan: bad access detected [ 26.654168] [ 26.654327] Memory state around the buggy address: [ 26.654603] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.655306] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.656036] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.656695] ^ [ 26.657064] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.657684] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.658076] ================================================================== [ 27.789980] ================================================================== [ 27.790655] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194a/0x5450 [ 27.791421] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.792185] [ 27.792384] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.792516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.792555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.792618] Call Trace: [ 27.792657] <TASK> [ 27.792694] dump_stack_lvl+0x73/0xb0 [ 27.792832] print_report+0xd1/0x660 [ 27.792906] ? __virt_addr_valid+0x1db/0x2d0 [ 27.793038] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.793139] kasan_report+0x104/0x140 [ 27.793210] ? kasan_atomics_helper+0x194a/0x5450 [ 27.793282] ? kasan_atomics_helper+0x194a/0x5450 [ 27.793368] kasan_check_range+0x10c/0x1c0 [ 27.793444] __kasan_check_write+0x18/0x20 [ 27.793509] kasan_atomics_helper+0x194a/0x5450 [ 27.793583] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.793660] ? kasan_save_alloc_info+0x3b/0x50 [ 27.793804] kasan_atomics+0x1dc/0x310 [ 27.793890] ? __pfx_kasan_atomics+0x10/0x10 [ 27.793969] ? __pfx_read_tsc+0x10/0x10 [ 27.794036] ? ktime_get_ts64+0x86/0x240 [ 27.794189] kunit_try_run_case+0x1b2/0x490 [ 27.794291] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.794629] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.794839] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.796417] ? __kthread_parkme+0x82/0x160 [ 27.796493] ? preempt_count_sub+0x50/0x80 [ 27.796574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.796649] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.797091] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.798004] kthread+0x323/0x710 [ 27.798077] ? trace_preempt_on+0x20/0xc0 [ 27.798179] ? __pfx_kthread+0x10/0x10 [ 27.798251] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.798315] ? calculate_sigpending+0x7b/0xa0 [ 27.798384] ? __pfx_kthread+0x10/0x10 [ 27.798451] ret_from_fork+0x41/0x80 [ 27.798518] ? __pfx_kthread+0x10/0x10 [ 27.798587] ret_from_fork_asm+0x1a/0x30 [ 27.798681] </TASK> [ 27.798715] [ 27.816303] Allocated by task 286: [ 27.816546] kasan_save_stack+0x3d/0x60 [ 27.816851] kasan_save_track+0x18/0x40 [ 27.817332] kasan_save_alloc_info+0x3b/0x50 [ 27.818078] __kasan_kmalloc+0xb7/0xc0 [ 27.819147] __kmalloc_cache_noprof+0x183/0x410 [ 27.819663] kasan_atomics+0x95/0x310 [ 27.821132] kunit_try_run_case+0x1b2/0x490 [ 27.822392] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.823054] kthread+0x323/0x710 [ 27.823766] ret_from_fork+0x41/0x80 [ 27.824521] ret_from_fork_asm+0x1a/0x30 [ 27.824987] [ 27.825188] The buggy address belongs to the object at ffff888103231c00 [ 27.825188] which belongs to the cache kmalloc-64 of size 64 [ 27.826776] The buggy address is located 0 bytes to the right of [ 27.826776] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.827740] [ 27.828072] The buggy address belongs to the physical page: [ 27.828603] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.829409] flags: 0x200000000000000(node=0|zone=2) [ 27.830105] page_type: f5(slab) [ 27.830454] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.831049] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.831832] page dumped because: kasan: bad access detected [ 27.832438] [ 27.832738] Memory state around the buggy address: [ 27.833035] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.833769] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.834255] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.835191] ^ [ 27.835681] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.837131] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.837997] ================================================================== [ 26.415214] ================================================================== [ 26.415980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x860/0x5450 [ 26.416560] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.417238] [ 26.417517] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.417672] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.417755] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.417824] Call Trace: [ 26.417863] <TASK> [ 26.417901] dump_stack_lvl+0x73/0xb0 [ 26.417986] print_report+0xd1/0x660 [ 26.418061] ? __virt_addr_valid+0x1db/0x2d0 [ 26.418218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.418347] kasan_report+0x104/0x140 [ 26.418418] ? kasan_atomics_helper+0x860/0x5450 [ 26.418493] ? kasan_atomics_helper+0x860/0x5450 [ 26.418578] kasan_check_range+0x10c/0x1c0 [ 26.418653] __kasan_check_write+0x18/0x20 [ 26.418764] kasan_atomics_helper+0x860/0x5450 [ 26.418850] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.418922] ? kasan_save_alloc_info+0x3b/0x50 [ 26.419015] kasan_atomics+0x1dc/0x310 [ 26.419088] ? __pfx_kasan_atomics+0x10/0x10 [ 26.419183] ? __pfx_read_tsc+0x10/0x10 [ 26.419250] ? ktime_get_ts64+0x86/0x240 [ 26.419324] kunit_try_run_case+0x1b2/0x490 [ 26.419448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.419521] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.419582] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.419680] ? __kthread_parkme+0x82/0x160 [ 26.419824] ? preempt_count_sub+0x50/0x80 [ 26.419949] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.420028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.420080] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.420143] kthread+0x323/0x710 [ 26.420180] ? trace_preempt_on+0x20/0xc0 [ 26.420215] ? __pfx_kthread+0x10/0x10 [ 26.420249] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.420281] ? calculate_sigpending+0x7b/0xa0 [ 26.420313] ? __pfx_kthread+0x10/0x10 [ 26.420347] ret_from_fork+0x41/0x80 [ 26.420381] ? __pfx_kthread+0x10/0x10 [ 26.420415] ret_from_fork_asm+0x1a/0x30 [ 26.420464] </TASK> [ 26.420481] [ 26.433397] Allocated by task 286: [ 26.433638] kasan_save_stack+0x3d/0x60 [ 26.433928] kasan_save_track+0x18/0x40 [ 26.434367] kasan_save_alloc_info+0x3b/0x50 [ 26.434916] __kasan_kmalloc+0xb7/0xc0 [ 26.435359] __kmalloc_cache_noprof+0x183/0x410 [ 26.435913] kasan_atomics+0x95/0x310 [ 26.436445] kunit_try_run_case+0x1b2/0x490 [ 26.436980] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.437559] kthread+0x323/0x710 [ 26.438035] ret_from_fork+0x41/0x80 [ 26.438424] ret_from_fork_asm+0x1a/0x30 [ 26.438974] [ 26.439186] The buggy address belongs to the object at ffff888103231c00 [ 26.439186] which belongs to the cache kmalloc-64 of size 64 [ 26.440302] The buggy address is located 0 bytes to the right of [ 26.440302] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.441303] [ 26.441468] The buggy address belongs to the physical page: [ 26.441772] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.442592] flags: 0x200000000000000(node=0|zone=2) [ 26.443288] page_type: f5(slab) [ 26.443641] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.444068] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.444795] page dumped because: kasan: bad access detected [ 26.445387] [ 26.445682] Memory state around the buggy address: [ 26.446098] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.446505] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.446958] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.447745] ^ [ 26.448508] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.449394] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.449902] ================================================================== [ 26.699448] ================================================================== [ 26.700181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a84/0x5450 [ 26.700589] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.701064] [ 26.701342] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.701476] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.701514] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.701576] Call Trace: [ 26.701616] <TASK> [ 26.701653] dump_stack_lvl+0x73/0xb0 [ 26.701793] print_report+0xd1/0x660 [ 26.701877] ? __virt_addr_valid+0x1db/0x2d0 [ 26.702008] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.702088] kasan_report+0x104/0x140 [ 26.702174] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.702243] ? kasan_atomics_helper+0x4a84/0x5450 [ 26.702320] __asan_report_load4_noabort+0x18/0x20 [ 26.702384] kasan_atomics_helper+0x4a84/0x5450 [ 26.702456] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.702526] ? kasan_save_alloc_info+0x3b/0x50 [ 26.702614] kasan_atomics+0x1dc/0x310 [ 26.702691] ? __pfx_kasan_atomics+0x10/0x10 [ 26.702829] ? __pfx_read_tsc+0x10/0x10 [ 26.702899] ? ktime_get_ts64+0x86/0x240 [ 26.702975] kunit_try_run_case+0x1b2/0x490 [ 26.703046] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.703135] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.703198] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.703264] ? __kthread_parkme+0x82/0x160 [ 26.703332] ? preempt_count_sub+0x50/0x80 [ 26.703410] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.703481] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.703555] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.703657] kthread+0x323/0x710 [ 26.703773] ? trace_preempt_on+0x20/0xc0 [ 26.703858] ? __pfx_kthread+0x10/0x10 [ 26.703937] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.704001] ? calculate_sigpending+0x7b/0xa0 [ 26.704068] ? __pfx_kthread+0x10/0x10 [ 26.704162] ret_from_fork+0x41/0x80 [ 26.704236] ? __pfx_kthread+0x10/0x10 [ 26.704302] ret_from_fork_asm+0x1a/0x30 [ 26.704398] </TASK> [ 26.704433] [ 26.717357] Allocated by task 286: [ 26.717748] kasan_save_stack+0x3d/0x60 [ 26.718131] kasan_save_track+0x18/0x40 [ 26.718453] kasan_save_alloc_info+0x3b/0x50 [ 26.718821] __kasan_kmalloc+0xb7/0xc0 [ 26.719098] __kmalloc_cache_noprof+0x183/0x410 [ 26.719571] kasan_atomics+0x95/0x310 [ 26.720075] kunit_try_run_case+0x1b2/0x490 [ 26.720550] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.721077] kthread+0x323/0x710 [ 26.721364] ret_from_fork+0x41/0x80 [ 26.721751] ret_from_fork_asm+0x1a/0x30 [ 26.722204] [ 26.722427] The buggy address belongs to the object at ffff888103231c00 [ 26.722427] which belongs to the cache kmalloc-64 of size 64 [ 26.723478] The buggy address is located 0 bytes to the right of [ 26.723478] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.724499] [ 26.724769] The buggy address belongs to the physical page: [ 26.725225] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.725887] flags: 0x200000000000000(node=0|zone=2) [ 26.726392] page_type: f5(slab) [ 26.726702] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.727279] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.727855] page dumped because: kasan: bad access detected [ 26.728259] [ 26.728426] Memory state around the buggy address: [ 26.728759] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.729201] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.729881] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.730530] ^ [ 26.731079] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.731807] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.732427] ================================================================== [ 26.368637] ================================================================== [ 26.369263] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c7/0x5450 [ 26.369987] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.371299] [ 26.371567] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.371722] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.371764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.371824] Call Trace: [ 26.371863] <TASK> [ 26.371901] dump_stack_lvl+0x73/0xb0 [ 26.372025] print_report+0xd1/0x660 [ 26.372136] ? __virt_addr_valid+0x1db/0x2d0 [ 26.372272] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.372352] kasan_report+0x104/0x140 [ 26.372414] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.372479] ? kasan_atomics_helper+0x7c7/0x5450 [ 26.372526] kasan_check_range+0x10c/0x1c0 [ 26.372565] __kasan_check_write+0x18/0x20 [ 26.372597] kasan_atomics_helper+0x7c7/0x5450 [ 26.372634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.372672] ? kasan_save_alloc_info+0x3b/0x50 [ 26.372760] kasan_atomics+0x1dc/0x310 [ 26.372803] ? __pfx_kasan_atomics+0x10/0x10 [ 26.372841] ? __pfx_read_tsc+0x10/0x10 [ 26.372876] ? ktime_get_ts64+0x86/0x240 [ 26.372916] kunit_try_run_case+0x1b2/0x490 [ 26.372953] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.372987] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.373022] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.373056] ? __kthread_parkme+0x82/0x160 [ 26.373090] ? preempt_count_sub+0x50/0x80 [ 26.373152] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.373191] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.373228] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.373264] kthread+0x323/0x710 [ 26.373297] ? trace_preempt_on+0x20/0xc0 [ 26.373332] ? __pfx_kthread+0x10/0x10 [ 26.373365] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.373397] ? calculate_sigpending+0x7b/0xa0 [ 26.373430] ? __pfx_kthread+0x10/0x10 [ 26.373464] ret_from_fork+0x41/0x80 [ 26.373499] ? __pfx_kthread+0x10/0x10 [ 26.373532] ret_from_fork_asm+0x1a/0x30 [ 26.373582] </TASK> [ 26.373599] [ 26.394910] Allocated by task 286: [ 26.395195] kasan_save_stack+0x3d/0x60 [ 26.396207] kasan_save_track+0x18/0x40 [ 26.396585] kasan_save_alloc_info+0x3b/0x50 [ 26.397009] __kasan_kmalloc+0xb7/0xc0 [ 26.397376] __kmalloc_cache_noprof+0x183/0x410 [ 26.398707] kasan_atomics+0x95/0x310 [ 26.398980] kunit_try_run_case+0x1b2/0x490 [ 26.399704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.400907] kthread+0x323/0x710 [ 26.401259] ret_from_fork+0x41/0x80 [ 26.401583] ret_from_fork_asm+0x1a/0x30 [ 26.402271] [ 26.402436] The buggy address belongs to the object at ffff888103231c00 [ 26.402436] which belongs to the cache kmalloc-64 of size 64 [ 26.403568] The buggy address is located 0 bytes to the right of [ 26.403568] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.404759] [ 26.405010] The buggy address belongs to the physical page: [ 26.405548] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.406285] flags: 0x200000000000000(node=0|zone=2) [ 26.407026] page_type: f5(slab) [ 26.407569] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.408321] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.408905] page dumped because: kasan: bad access detected [ 26.409443] [ 26.409681] Memory state around the buggy address: [ 26.410250] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.410673] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.411286] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.411894] ^ [ 26.412280] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.413012] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.413766] ================================================================== [ 26.733224] ================================================================== [ 26.734090] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd47/0x5450 [ 26.734817] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.735496] [ 26.735835] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.735978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.736016] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.736075] Call Trace: [ 26.736129] <TASK> [ 26.736168] dump_stack_lvl+0x73/0xb0 [ 26.736249] print_report+0xd1/0x660 [ 26.736318] ? __virt_addr_valid+0x1db/0x2d0 [ 26.736445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.736527] kasan_report+0x104/0x140 [ 26.736592] ? kasan_atomics_helper+0xd47/0x5450 [ 26.736666] ? kasan_atomics_helper+0xd47/0x5450 [ 26.736810] kasan_check_range+0x10c/0x1c0 [ 26.736898] __kasan_check_write+0x18/0x20 [ 26.736965] kasan_atomics_helper+0xd47/0x5450 [ 26.737040] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.737137] ? kasan_save_alloc_info+0x3b/0x50 [ 26.737230] kasan_atomics+0x1dc/0x310 [ 26.737303] ? __pfx_kasan_atomics+0x10/0x10 [ 26.737376] ? __pfx_read_tsc+0x10/0x10 [ 26.737442] ? ktime_get_ts64+0x86/0x240 [ 26.737518] kunit_try_run_case+0x1b2/0x490 [ 26.737591] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.737654] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.737760] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.737838] ? __kthread_parkme+0x82/0x160 [ 26.737908] ? preempt_count_sub+0x50/0x80 [ 26.737983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.738056] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.738153] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.738229] kthread+0x323/0x710 [ 26.738295] ? trace_preempt_on+0x20/0xc0 [ 26.738365] ? __pfx_kthread+0x10/0x10 [ 26.738433] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.738499] ? calculate_sigpending+0x7b/0xa0 [ 26.738563] ? __pfx_kthread+0x10/0x10 [ 26.738629] ret_from_fork+0x41/0x80 [ 26.738697] ? __pfx_kthread+0x10/0x10 [ 26.738817] ret_from_fork_asm+0x1a/0x30 [ 26.738914] </TASK> [ 26.738951] [ 26.751390] Allocated by task 286: [ 26.751653] kasan_save_stack+0x3d/0x60 [ 26.752179] kasan_save_track+0x18/0x40 [ 26.752613] kasan_save_alloc_info+0x3b/0x50 [ 26.753172] __kasan_kmalloc+0xb7/0xc0 [ 26.753599] __kmalloc_cache_noprof+0x183/0x410 [ 26.754784] kasan_atomics+0x95/0x310 [ 26.755202] kunit_try_run_case+0x1b2/0x490 [ 26.755657] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.758573] kthread+0x323/0x710 [ 26.759296] ret_from_fork+0x41/0x80 [ 26.760540] ret_from_fork_asm+0x1a/0x30 [ 26.761904] [ 26.762077] The buggy address belongs to the object at ffff888103231c00 [ 26.762077] which belongs to the cache kmalloc-64 of size 64 [ 26.762684] The buggy address is located 0 bytes to the right of [ 26.762684] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.764064] [ 26.764907] The buggy address belongs to the physical page: [ 26.765447] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.766584] flags: 0x200000000000000(node=0|zone=2) [ 26.768215] page_type: f5(slab) [ 26.768465] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.770303] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.771596] page dumped because: kasan: bad access detected [ 26.772173] [ 26.772400] Memory state around the buggy address: [ 26.772849] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.773544] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.774017] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.774675] ^ [ 26.775103] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.775696] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.776669] ================================================================== [ 28.641896] ================================================================== [ 28.642832] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5115/0x5450 [ 28.643235] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.644384] [ 28.645494] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.645697] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.645757] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.645794] Call Trace: [ 28.645814] <TASK> [ 28.645836] dump_stack_lvl+0x73/0xb0 [ 28.645880] print_report+0xd1/0x660 [ 28.645916] ? __virt_addr_valid+0x1db/0x2d0 [ 28.645983] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.646021] kasan_report+0x104/0x140 [ 28.646053] ? kasan_atomics_helper+0x5115/0x5450 [ 28.646089] ? kasan_atomics_helper+0x5115/0x5450 [ 28.646153] __asan_report_load8_noabort+0x18/0x20 [ 28.646188] kasan_atomics_helper+0x5115/0x5450 [ 28.646225] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.646262] ? kasan_save_alloc_info+0x3b/0x50 [ 28.646306] kasan_atomics+0x1dc/0x310 [ 28.646342] ? __pfx_kasan_atomics+0x10/0x10 [ 28.646379] ? __pfx_read_tsc+0x10/0x10 [ 28.646411] ? ktime_get_ts64+0x86/0x240 [ 28.646451] kunit_try_run_case+0x1b2/0x490 [ 28.646487] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.646520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.646552] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.646586] ? __kthread_parkme+0x82/0x160 [ 28.646619] ? preempt_count_sub+0x50/0x80 [ 28.646657] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.646693] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.646761] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.646800] kthread+0x323/0x710 [ 28.646831] ? trace_preempt_on+0x20/0xc0 [ 28.646867] ? __pfx_kthread+0x10/0x10 [ 28.646900] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.646931] ? calculate_sigpending+0x7b/0xa0 [ 28.646964] ? __pfx_kthread+0x10/0x10 [ 28.646997] ret_from_fork+0x41/0x80 [ 28.647031] ? __pfx_kthread+0x10/0x10 [ 28.647066] ret_from_fork_asm+0x1a/0x30 [ 28.647134] </TASK> [ 28.647153] [ 28.659348] Allocated by task 286: [ 28.659773] kasan_save_stack+0x3d/0x60 [ 28.660179] kasan_save_track+0x18/0x40 [ 28.660590] kasan_save_alloc_info+0x3b/0x50 [ 28.661034] __kasan_kmalloc+0xb7/0xc0 [ 28.661431] __kmalloc_cache_noprof+0x183/0x410 [ 28.661784] kasan_atomics+0x95/0x310 [ 28.662141] kunit_try_run_case+0x1b2/0x490 [ 28.662642] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.663272] kthread+0x323/0x710 [ 28.663765] ret_from_fork+0x41/0x80 [ 28.664227] ret_from_fork_asm+0x1a/0x30 [ 28.664604] [ 28.664843] The buggy address belongs to the object at ffff888103231c00 [ 28.664843] which belongs to the cache kmalloc-64 of size 64 [ 28.665655] The buggy address is located 0 bytes to the right of [ 28.665655] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.666462] [ 28.666635] The buggy address belongs to the physical page: [ 28.666986] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.667781] flags: 0x200000000000000(node=0|zone=2) [ 28.668303] page_type: f5(slab) [ 28.668671] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.669414] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.669951] page dumped because: kasan: bad access detected [ 28.670499] [ 28.670763] Memory state around the buggy address: [ 28.671244] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.671893] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.672316] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.672869] ^ [ 28.673354] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.674038] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.674682] ================================================================== [ 27.885188] ================================================================== [ 27.885835] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a7f/0x5450 [ 27.886460] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.886929] [ 27.887212] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.887352] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.887391] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.887453] Call Trace: [ 27.887490] <TASK> [ 27.887530] dump_stack_lvl+0x73/0xb0 [ 27.887641] print_report+0xd1/0x660 [ 27.887765] ? __virt_addr_valid+0x1db/0x2d0 [ 27.887903] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.888041] kasan_report+0x104/0x140 [ 27.888137] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.888212] ? kasan_atomics_helper+0x1a7f/0x5450 [ 27.888340] kasan_check_range+0x10c/0x1c0 [ 27.888420] __kasan_check_write+0x18/0x20 [ 27.888483] kasan_atomics_helper+0x1a7f/0x5450 [ 27.888553] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.888626] ? kasan_save_alloc_info+0x3b/0x50 [ 27.888755] kasan_atomics+0x1dc/0x310 [ 27.888807] ? __pfx_kasan_atomics+0x10/0x10 [ 27.888848] ? __pfx_read_tsc+0x10/0x10 [ 27.888883] ? ktime_get_ts64+0x86/0x240 [ 27.888923] kunit_try_run_case+0x1b2/0x490 [ 27.888960] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.888994] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.889027] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.889062] ? __kthread_parkme+0x82/0x160 [ 27.889095] ? preempt_count_sub+0x50/0x80 [ 27.889160] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.889198] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.889235] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.889271] kthread+0x323/0x710 [ 27.889302] ? trace_preempt_on+0x20/0xc0 [ 27.889338] ? __pfx_kthread+0x10/0x10 [ 27.889371] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.889403] ? calculate_sigpending+0x7b/0xa0 [ 27.889436] ? __pfx_kthread+0x10/0x10 [ 27.889470] ret_from_fork+0x41/0x80 [ 27.889505] ? __pfx_kthread+0x10/0x10 [ 27.889540] ret_from_fork_asm+0x1a/0x30 [ 27.889589] </TASK> [ 27.889607] [ 27.909612] Allocated by task 286: [ 27.910021] kasan_save_stack+0x3d/0x60 [ 27.911572] kasan_save_track+0x18/0x40 [ 27.912027] kasan_save_alloc_info+0x3b/0x50 [ 27.912545] __kasan_kmalloc+0xb7/0xc0 [ 27.912963] __kmalloc_cache_noprof+0x183/0x410 [ 27.913424] kasan_atomics+0x95/0x310 [ 27.913786] kunit_try_run_case+0x1b2/0x490 [ 27.914826] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.915442] kthread+0x323/0x710 [ 27.916101] ret_from_fork+0x41/0x80 [ 27.916518] ret_from_fork_asm+0x1a/0x30 [ 27.917260] [ 27.917486] The buggy address belongs to the object at ffff888103231c00 [ 27.917486] which belongs to the cache kmalloc-64 of size 64 [ 27.918697] The buggy address is located 0 bytes to the right of [ 27.918697] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.920197] [ 27.920429] The buggy address belongs to the physical page: [ 27.921284] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.921544] flags: 0x200000000000000(node=0|zone=2) [ 27.921752] page_type: f5(slab) [ 27.922184] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.923566] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.924983] page dumped because: kasan: bad access detected [ 27.925418] [ 27.925638] Memory state around the buggy address: [ 27.926374] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.926793] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.928292] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.930186] ^ [ 27.930583] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.931181] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.931711] ================================================================== [ 26.191546] ================================================================== [ 26.192269] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x565/0x5450 [ 26.193215] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.193783] [ 26.193977] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.194104] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.194165] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.194226] Call Trace: [ 26.194263] <TASK> [ 26.194297] dump_stack_lvl+0x73/0xb0 [ 26.194379] print_report+0xd1/0x660 [ 26.194451] ? __virt_addr_valid+0x1db/0x2d0 [ 26.194575] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.194652] kasan_report+0x104/0x140 [ 26.194766] ? kasan_atomics_helper+0x565/0x5450 [ 26.194852] ? kasan_atomics_helper+0x565/0x5450 [ 26.194936] kasan_check_range+0x10c/0x1c0 [ 26.195010] __kasan_check_write+0x18/0x20 [ 26.195071] kasan_atomics_helper+0x565/0x5450 [ 26.195164] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.195238] ? kasan_save_alloc_info+0x3b/0x50 [ 26.195329] kasan_atomics+0x1dc/0x310 [ 26.195400] ? __pfx_kasan_atomics+0x10/0x10 [ 26.195476] ? __pfx_read_tsc+0x10/0x10 [ 26.195537] ? ktime_get_ts64+0x86/0x240 [ 26.195641] kunit_try_run_case+0x1b2/0x490 [ 26.195751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.195831] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.195904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.195977] ? __kthread_parkme+0x82/0x160 [ 26.196041] ? preempt_count_sub+0x50/0x80 [ 26.196134] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.196206] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.196278] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.196341] kthread+0x323/0x710 [ 26.196402] ? trace_preempt_on+0x20/0xc0 [ 26.196469] ? __pfx_kthread+0x10/0x10 [ 26.196533] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.196595] ? calculate_sigpending+0x7b/0xa0 [ 26.196652] ? __pfx_kthread+0x10/0x10 [ 26.196765] ret_from_fork+0x41/0x80 [ 26.196847] ? __pfx_kthread+0x10/0x10 [ 26.196914] ret_from_fork_asm+0x1a/0x30 [ 26.197009] </TASK> [ 26.197039] [ 26.211294] Allocated by task 286: [ 26.211698] kasan_save_stack+0x3d/0x60 [ 26.212228] kasan_save_track+0x18/0x40 [ 26.212629] kasan_save_alloc_info+0x3b/0x50 [ 26.212952] __kasan_kmalloc+0xb7/0xc0 [ 26.213456] __kmalloc_cache_noprof+0x183/0x410 [ 26.214045] kasan_atomics+0x95/0x310 [ 26.214494] kunit_try_run_case+0x1b2/0x490 [ 26.215032] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.215531] kthread+0x323/0x710 [ 26.215950] ret_from_fork+0x41/0x80 [ 26.216397] ret_from_fork_asm+0x1a/0x30 [ 26.216851] [ 26.217064] The buggy address belongs to the object at ffff888103231c00 [ 26.217064] which belongs to the cache kmalloc-64 of size 64 [ 26.217978] The buggy address is located 0 bytes to the right of [ 26.217978] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.218906] [ 26.219161] The buggy address belongs to the physical page: [ 26.219746] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.220432] flags: 0x200000000000000(node=0|zone=2) [ 26.220944] page_type: f5(slab) [ 26.221380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.222033] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.222533] page dumped because: kasan: bad access detected [ 26.223150] [ 26.223382] Memory state around the buggy address: [ 26.223821] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.224536] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.225088] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.225780] ^ [ 26.226177] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.226909] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.227528] ================================================================== [ 28.424972] ================================================================== [ 28.425646] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c8/0x5450 [ 28.426388] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.427089] [ 28.427392] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.427601] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.427665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.427767] Call Trace: [ 28.427810] <TASK> [ 28.427849] dump_stack_lvl+0x73/0xb0 [ 28.427942] print_report+0xd1/0x660 [ 28.428010] ? __virt_addr_valid+0x1db/0x2d0 [ 28.428156] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.428295] kasan_report+0x104/0x140 [ 28.428446] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.428562] ? kasan_atomics_helper+0x20c8/0x5450 [ 28.428654] kasan_check_range+0x10c/0x1c0 [ 28.428773] __kasan_check_write+0x18/0x20 [ 28.428849] kasan_atomics_helper+0x20c8/0x5450 [ 28.428914] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.428981] ? kasan_save_alloc_info+0x3b/0x50 [ 28.429140] kasan_atomics+0x1dc/0x310 [ 28.429235] ? __pfx_kasan_atomics+0x10/0x10 [ 28.429311] ? __pfx_read_tsc+0x10/0x10 [ 28.429376] ? ktime_get_ts64+0x86/0x240 [ 28.429502] kunit_try_run_case+0x1b2/0x490 [ 28.429617] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.429687] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.429804] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.429960] ? __kthread_parkme+0x82/0x160 [ 28.430039] ? preempt_count_sub+0x50/0x80 [ 28.430150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.430284] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.430393] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.430464] kthread+0x323/0x710 [ 28.430524] ? trace_preempt_on+0x20/0xc0 [ 28.430593] ? __pfx_kthread+0x10/0x10 [ 28.430769] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.430930] ? calculate_sigpending+0x7b/0xa0 [ 28.431006] ? __pfx_kthread+0x10/0x10 [ 28.431078] ret_from_fork+0x41/0x80 [ 28.431171] ? __pfx_kthread+0x10/0x10 [ 28.431239] ret_from_fork_asm+0x1a/0x30 [ 28.431293] </TASK> [ 28.431313] [ 28.445241] Allocated by task 286: [ 28.445695] kasan_save_stack+0x3d/0x60 [ 28.446267] kasan_save_track+0x18/0x40 [ 28.446739] kasan_save_alloc_info+0x3b/0x50 [ 28.447309] __kasan_kmalloc+0xb7/0xc0 [ 28.447801] __kmalloc_cache_noprof+0x183/0x410 [ 28.448236] kasan_atomics+0x95/0x310 [ 28.448635] kunit_try_run_case+0x1b2/0x490 [ 28.449175] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.449751] kthread+0x323/0x710 [ 28.450160] ret_from_fork+0x41/0x80 [ 28.450573] ret_from_fork_asm+0x1a/0x30 [ 28.451029] [ 28.451281] The buggy address belongs to the object at ffff888103231c00 [ 28.451281] which belongs to the cache kmalloc-64 of size 64 [ 28.452368] The buggy address is located 0 bytes to the right of [ 28.452368] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.453283] [ 28.453580] The buggy address belongs to the physical page: [ 28.454258] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.455040] flags: 0x200000000000000(node=0|zone=2) [ 28.455530] page_type: f5(slab) [ 28.456031] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.456767] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.457234] page dumped because: kasan: bad access detected [ 28.457554] [ 28.457732] Memory state around the buggy address: [ 28.458023] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.458688] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.459576] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.460333] ^ [ 28.460867] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.461607] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.462251] ================================================================== [ 28.328614] ================================================================== [ 28.329350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2006/0x5450 [ 28.329776] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.330489] [ 28.330798] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.330983] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.331022] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.331081] Call Trace: [ 28.331138] <TASK> [ 28.331178] dump_stack_lvl+0x73/0xb0 [ 28.331301] print_report+0xd1/0x660 [ 28.331381] ? __virt_addr_valid+0x1db/0x2d0 [ 28.331501] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.331577] kasan_report+0x104/0x140 [ 28.331671] ? kasan_atomics_helper+0x2006/0x5450 [ 28.331796] ? kasan_atomics_helper+0x2006/0x5450 [ 28.331891] kasan_check_range+0x10c/0x1c0 [ 28.331979] __kasan_check_write+0x18/0x20 [ 28.332037] kasan_atomics_helper+0x2006/0x5450 [ 28.332128] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.332205] ? kasan_save_alloc_info+0x3b/0x50 [ 28.332293] kasan_atomics+0x1dc/0x310 [ 28.332369] ? __pfx_kasan_atomics+0x10/0x10 [ 28.332447] ? __pfx_read_tsc+0x10/0x10 [ 28.332513] ? ktime_get_ts64+0x86/0x240 [ 28.332592] kunit_try_run_case+0x1b2/0x490 [ 28.332667] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.332786] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.332864] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.332933] ? __kthread_parkme+0x82/0x160 [ 28.333004] ? preempt_count_sub+0x50/0x80 [ 28.333083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.333200] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.333306] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.333382] kthread+0x323/0x710 [ 28.333446] ? trace_preempt_on+0x20/0xc0 [ 28.333517] ? __pfx_kthread+0x10/0x10 [ 28.333585] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.333648] ? calculate_sigpending+0x7b/0xa0 [ 28.333760] ? __pfx_kthread+0x10/0x10 [ 28.333840] ret_from_fork+0x41/0x80 [ 28.333912] ? __pfx_kthread+0x10/0x10 [ 28.333981] ret_from_fork_asm+0x1a/0x30 [ 28.334077] </TASK> [ 28.334132] [ 28.347405] Allocated by task 286: [ 28.347780] kasan_save_stack+0x3d/0x60 [ 28.348289] kasan_save_track+0x18/0x40 [ 28.348747] kasan_save_alloc_info+0x3b/0x50 [ 28.349138] __kasan_kmalloc+0xb7/0xc0 [ 28.349519] __kmalloc_cache_noprof+0x183/0x410 [ 28.350066] kasan_atomics+0x95/0x310 [ 28.350428] kunit_try_run_case+0x1b2/0x490 [ 28.350774] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.351398] kthread+0x323/0x710 [ 28.351833] ret_from_fork+0x41/0x80 [ 28.352280] ret_from_fork_asm+0x1a/0x30 [ 28.352704] [ 28.352905] The buggy address belongs to the object at ffff888103231c00 [ 28.352905] which belongs to the cache kmalloc-64 of size 64 [ 28.353680] The buggy address is located 0 bytes to the right of [ 28.353680] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.354546] [ 28.354846] The buggy address belongs to the physical page: [ 28.355407] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.356287] flags: 0x200000000000000(node=0|zone=2) [ 28.357074] page_type: f5(slab) [ 28.358321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.359376] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.361575] page dumped because: kasan: bad access detected [ 28.362259] [ 28.364283] Memory state around the buggy address: [ 28.364641] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.365409] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.367250] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.369015] ^ [ 28.369460] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.371046] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.372030] ================================================================== [ 28.292311] ================================================================== [ 28.293102] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f71/0x5450 [ 28.293807] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.294342] [ 28.294532] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.294662] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.294696] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.294759] Call Trace: [ 28.294793] <TASK> [ 28.294831] dump_stack_lvl+0x73/0xb0 [ 28.294908] print_report+0xd1/0x660 [ 28.295004] ? __virt_addr_valid+0x1db/0x2d0 [ 28.295159] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.295244] kasan_report+0x104/0x140 [ 28.295306] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.295379] ? kasan_atomics_helper+0x4f71/0x5450 [ 28.295462] __asan_report_load8_noabort+0x18/0x20 [ 28.295528] kasan_atomics_helper+0x4f71/0x5450 [ 28.295630] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.295711] ? kasan_save_alloc_info+0x3b/0x50 [ 28.295809] kasan_atomics+0x1dc/0x310 [ 28.295886] ? __pfx_kasan_atomics+0x10/0x10 [ 28.295975] ? __pfx_read_tsc+0x10/0x10 [ 28.296042] ? ktime_get_ts64+0x86/0x240 [ 28.296142] kunit_try_run_case+0x1b2/0x490 [ 28.296221] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.296290] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.296359] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.296429] ? __kthread_parkme+0x82/0x160 [ 28.296497] ? preempt_count_sub+0x50/0x80 [ 28.296572] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.296646] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.296721] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.296795] kthread+0x323/0x710 [ 28.296861] ? trace_preempt_on+0x20/0xc0 [ 28.296930] ? __pfx_kthread+0x10/0x10 [ 28.296999] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.297061] ? calculate_sigpending+0x7b/0xa0 [ 28.297167] ? __pfx_kthread+0x10/0x10 [ 28.297243] ret_from_fork+0x41/0x80 [ 28.297316] ? __pfx_kthread+0x10/0x10 [ 28.297381] ret_from_fork_asm+0x1a/0x30 [ 28.297478] </TASK> [ 28.297511] [ 28.310577] Allocated by task 286: [ 28.310909] kasan_save_stack+0x3d/0x60 [ 28.311501] kasan_save_track+0x18/0x40 [ 28.312182] kasan_save_alloc_info+0x3b/0x50 [ 28.312649] __kasan_kmalloc+0xb7/0xc0 [ 28.313094] __kmalloc_cache_noprof+0x183/0x410 [ 28.313475] kasan_atomics+0x95/0x310 [ 28.314062] kunit_try_run_case+0x1b2/0x490 [ 28.314422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.314761] kthread+0x323/0x710 [ 28.315015] ret_from_fork+0x41/0x80 [ 28.315443] ret_from_fork_asm+0x1a/0x30 [ 28.315970] [ 28.316323] The buggy address belongs to the object at ffff888103231c00 [ 28.316323] which belongs to the cache kmalloc-64 of size 64 [ 28.317700] The buggy address is located 0 bytes to the right of [ 28.317700] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.318470] [ 28.318637] The buggy address belongs to the physical page: [ 28.318942] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.319725] flags: 0x200000000000000(node=0|zone=2) [ 28.320289] page_type: f5(slab) [ 28.320810] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.321542] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.322445] page dumped because: kasan: bad access detected [ 28.322769] [ 28.322926] Memory state around the buggy address: [ 28.323457] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.324406] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.324840] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.325520] ^ [ 28.326066] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.326671] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.327318] ================================================================== [ 26.319192] ================================================================== [ 26.320081] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x72f/0x5450 [ 26.321221] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.323417] [ 26.323635] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.325282] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.325334] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.325400] Call Trace: [ 26.325437] <TASK> [ 26.325476] dump_stack_lvl+0x73/0xb0 [ 26.325557] print_report+0xd1/0x660 [ 26.325629] ? __virt_addr_valid+0x1db/0x2d0 [ 26.326192] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.326284] kasan_report+0x104/0x140 [ 26.326322] ? kasan_atomics_helper+0x72f/0x5450 [ 26.326359] ? kasan_atomics_helper+0x72f/0x5450 [ 26.326402] kasan_check_range+0x10c/0x1c0 [ 26.326440] __kasan_check_write+0x18/0x20 [ 26.326472] kasan_atomics_helper+0x72f/0x5450 [ 26.326509] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.326546] ? kasan_save_alloc_info+0x3b/0x50 [ 26.326591] kasan_atomics+0x1dc/0x310 [ 26.326627] ? __pfx_kasan_atomics+0x10/0x10 [ 26.326664] ? __pfx_read_tsc+0x10/0x10 [ 26.326698] ? ktime_get_ts64+0x86/0x240 [ 26.327314] kunit_try_run_case+0x1b2/0x490 [ 26.327401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.327467] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.327531] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.327624] ? __kthread_parkme+0x82/0x160 [ 26.327690] ? preempt_count_sub+0x50/0x80 [ 26.327767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.327838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.327910] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.327990] kthread+0x323/0x710 [ 26.328050] ? trace_preempt_on+0x20/0xc0 [ 26.328144] ? __pfx_kthread+0x10/0x10 [ 26.328212] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.328274] ? calculate_sigpending+0x7b/0xa0 [ 26.328335] ? __pfx_kthread+0x10/0x10 [ 26.328398] ret_from_fork+0x41/0x80 [ 26.328463] ? __pfx_kthread+0x10/0x10 [ 26.328525] ret_from_fork_asm+0x1a/0x30 [ 26.328619] </TASK> [ 26.328650] [ 26.348425] Allocated by task 286: [ 26.348745] kasan_save_stack+0x3d/0x60 [ 26.349400] kasan_save_track+0x18/0x40 [ 26.349789] kasan_save_alloc_info+0x3b/0x50 [ 26.350238] __kasan_kmalloc+0xb7/0xc0 [ 26.351020] __kmalloc_cache_noprof+0x183/0x410 [ 26.351417] kasan_atomics+0x95/0x310 [ 26.352042] kunit_try_run_case+0x1b2/0x490 [ 26.352757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.353192] kthread+0x323/0x710 [ 26.353584] ret_from_fork+0x41/0x80 [ 26.354331] ret_from_fork_asm+0x1a/0x30 [ 26.354656] [ 26.355051] The buggy address belongs to the object at ffff888103231c00 [ 26.355051] which belongs to the cache kmalloc-64 of size 64 [ 26.356201] The buggy address is located 0 bytes to the right of [ 26.356201] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.357292] [ 26.357524] The buggy address belongs to the physical page: [ 26.357882] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.358670] flags: 0x200000000000000(node=0|zone=2) [ 26.359212] page_type: f5(slab) [ 26.359459] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.360098] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.361209] page dumped because: kasan: bad access detected [ 26.361823] [ 26.362194] Memory state around the buggy address: [ 26.362615] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.363362] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.364091] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.364891] ^ [ 26.365391] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.366034] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.366859] ================================================================== [ 26.779051] ================================================================== [ 26.779598] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde0/0x5450 [ 26.780594] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.781308] [ 26.781555] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.781686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.781727] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.781827] Call Trace: [ 26.781867] <TASK> [ 26.781901] dump_stack_lvl+0x73/0xb0 [ 26.781980] print_report+0xd1/0x660 [ 26.782046] ? __virt_addr_valid+0x1db/0x2d0 [ 26.782196] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.782277] kasan_report+0x104/0x140 [ 26.782341] ? kasan_atomics_helper+0xde0/0x5450 [ 26.782414] ? kasan_atomics_helper+0xde0/0x5450 [ 26.782495] kasan_check_range+0x10c/0x1c0 [ 26.782539] __kasan_check_write+0x18/0x20 [ 26.782572] kasan_atomics_helper+0xde0/0x5450 [ 26.782609] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.782646] ? kasan_save_alloc_info+0x3b/0x50 [ 26.782691] kasan_atomics+0x1dc/0x310 [ 26.782759] ? __pfx_kasan_atomics+0x10/0x10 [ 26.782801] ? __pfx_read_tsc+0x10/0x10 [ 26.782836] ? ktime_get_ts64+0x86/0x240 [ 26.782876] kunit_try_run_case+0x1b2/0x490 [ 26.782912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.782946] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.782979] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.783014] ? __kthread_parkme+0x82/0x160 [ 26.783047] ? preempt_count_sub+0x50/0x80 [ 26.783086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.783145] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.783181] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.783217] kthread+0x323/0x710 [ 26.783261] ? trace_preempt_on+0x20/0xc0 [ 26.783319] ? __pfx_kthread+0x10/0x10 [ 26.783370] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.783424] ? calculate_sigpending+0x7b/0xa0 [ 26.783481] ? __pfx_kthread+0x10/0x10 [ 26.783539] ret_from_fork+0x41/0x80 [ 26.783626] ? __pfx_kthread+0x10/0x10 [ 26.783687] ret_from_fork_asm+0x1a/0x30 [ 26.783790] </TASK> [ 26.783820] [ 26.797958] Allocated by task 286: [ 26.798347] kasan_save_stack+0x3d/0x60 [ 26.798819] kasan_save_track+0x18/0x40 [ 26.799189] kasan_save_alloc_info+0x3b/0x50 [ 26.799523] __kasan_kmalloc+0xb7/0xc0 [ 26.800039] __kmalloc_cache_noprof+0x183/0x410 [ 26.800387] kasan_atomics+0x95/0x310 [ 26.800666] kunit_try_run_case+0x1b2/0x490 [ 26.801099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.801647] kthread+0x323/0x710 [ 26.802075] ret_from_fork+0x41/0x80 [ 26.802460] ret_from_fork_asm+0x1a/0x30 [ 26.802892] [ 26.803060] The buggy address belongs to the object at ffff888103231c00 [ 26.803060] which belongs to the cache kmalloc-64 of size 64 [ 26.804172] The buggy address is located 0 bytes to the right of [ 26.804172] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.804961] [ 26.805202] The buggy address belongs to the physical page: [ 26.805749] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.806210] flags: 0x200000000000000(node=0|zone=2) [ 26.806737] page_type: f5(slab) [ 26.807131] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.807685] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.808287] page dumped because: kasan: bad access detected [ 26.808652] [ 26.808868] Memory state around the buggy address: [ 26.809183] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.809567] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.810004] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.810647] ^ [ 26.811155] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.811875] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.812532] ================================================================== [ 26.938739] ================================================================== [ 26.939591] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a36/0x5450 [ 26.940437] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.941625] [ 26.941847] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.941976] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.942015] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.942073] Call Trace: [ 26.942107] <TASK> [ 26.942328] dump_stack_lvl+0x73/0xb0 [ 26.942580] print_report+0xd1/0x660 [ 26.942680] ? __virt_addr_valid+0x1db/0x2d0 [ 26.943020] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.943067] kasan_report+0x104/0x140 [ 26.943102] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.943186] ? kasan_atomics_helper+0x4a36/0x5450 [ 26.943233] __asan_report_load4_noabort+0x18/0x20 [ 26.943267] kasan_atomics_helper+0x4a36/0x5450 [ 26.943304] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.943341] ? kasan_save_alloc_info+0x3b/0x50 [ 26.943387] kasan_atomics+0x1dc/0x310 [ 26.943422] ? __pfx_kasan_atomics+0x10/0x10 [ 26.943507] ? __pfx_read_tsc+0x10/0x10 [ 26.943544] ? ktime_get_ts64+0x86/0x240 [ 26.943592] kunit_try_run_case+0x1b2/0x490 [ 26.943649] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.943684] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.943779] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.943856] ? __kthread_parkme+0x82/0x160 [ 26.943898] ? preempt_count_sub+0x50/0x80 [ 26.943952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.943989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.944026] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.944063] kthread+0x323/0x710 [ 26.944094] ? trace_preempt_on+0x20/0xc0 [ 26.944154] ? __pfx_kthread+0x10/0x10 [ 26.944188] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.944219] ? calculate_sigpending+0x7b/0xa0 [ 26.944252] ? __pfx_kthread+0x10/0x10 [ 26.944287] ret_from_fork+0x41/0x80 [ 26.944321] ? __pfx_kthread+0x10/0x10 [ 26.944354] ret_from_fork_asm+0x1a/0x30 [ 26.944402] </TASK> [ 26.944420] [ 26.960039] Allocated by task 286: [ 26.960448] kasan_save_stack+0x3d/0x60 [ 26.961101] kasan_save_track+0x18/0x40 [ 26.961496] kasan_save_alloc_info+0x3b/0x50 [ 26.961808] __kasan_kmalloc+0xb7/0xc0 [ 26.962080] __kmalloc_cache_noprof+0x183/0x410 [ 26.962810] kasan_atomics+0x95/0x310 [ 26.963379] kunit_try_run_case+0x1b2/0x490 [ 26.963982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.964607] kthread+0x323/0x710 [ 26.965099] ret_from_fork+0x41/0x80 [ 26.965493] ret_from_fork_asm+0x1a/0x30 [ 26.966190] [ 26.966381] The buggy address belongs to the object at ffff888103231c00 [ 26.966381] which belongs to the cache kmalloc-64 of size 64 [ 26.967666] The buggy address is located 0 bytes to the right of [ 26.967666] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.968380] [ 26.968629] The buggy address belongs to the physical page: [ 26.969037] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.969760] flags: 0x200000000000000(node=0|zone=2) [ 26.970358] page_type: f5(slab) [ 26.970730] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.971706] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.972544] page dumped because: kasan: bad access detected [ 26.973251] [ 26.973553] Memory state around the buggy address: [ 26.974195] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.974741] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.975384] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.975798] ^ [ 26.976101] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.976927] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.977733] ================================================================== [ 26.110250] ================================================================== [ 26.111175] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x5450 [ 26.112137] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.113465] [ 26.113964] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.114141] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.114185] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.114221] Call Trace: [ 26.114244] <TASK> [ 26.114266] dump_stack_lvl+0x73/0xb0 [ 26.114312] print_report+0xd1/0x660 [ 26.114348] ? __virt_addr_valid+0x1db/0x2d0 [ 26.114415] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.114453] kasan_report+0x104/0x140 [ 26.114485] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.114520] ? kasan_atomics_helper+0x4a0/0x5450 [ 26.114564] kasan_check_range+0x10c/0x1c0 [ 26.114600] __kasan_check_write+0x18/0x20 [ 26.114631] kasan_atomics_helper+0x4a0/0x5450 [ 26.114666] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.114707] ? kasan_save_alloc_info+0x3b/0x50 [ 26.114815] kasan_atomics+0x1dc/0x310 [ 26.114858] ? __pfx_kasan_atomics+0x10/0x10 [ 26.114896] ? __pfx_read_tsc+0x10/0x10 [ 26.114931] ? ktime_get_ts64+0x86/0x240 [ 26.114970] kunit_try_run_case+0x1b2/0x490 [ 26.115007] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.115041] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.115075] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.115131] ? __kthread_parkme+0x82/0x160 [ 26.115166] ? preempt_count_sub+0x50/0x80 [ 26.115206] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.115241] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.115277] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.115314] kthread+0x323/0x710 [ 26.115345] ? trace_preempt_on+0x20/0xc0 [ 26.115380] ? __pfx_kthread+0x10/0x10 [ 26.115414] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.115446] ? calculate_sigpending+0x7b/0xa0 [ 26.115479] ? __pfx_kthread+0x10/0x10 [ 26.115513] ret_from_fork+0x41/0x80 [ 26.115547] ? __pfx_kthread+0x10/0x10 [ 26.115580] ret_from_fork_asm+0x1a/0x30 [ 26.115660] </TASK> [ 26.115677] [ 26.130158] Allocated by task 286: [ 26.130561] kasan_save_stack+0x3d/0x60 [ 26.131077] kasan_save_track+0x18/0x40 [ 26.131570] kasan_save_alloc_info+0x3b/0x50 [ 26.132096] __kasan_kmalloc+0xb7/0xc0 [ 26.132535] __kmalloc_cache_noprof+0x183/0x410 [ 26.132911] kasan_atomics+0x95/0x310 [ 26.133350] kunit_try_run_case+0x1b2/0x490 [ 26.133698] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.134267] kthread+0x323/0x710 [ 26.134772] ret_from_fork+0x41/0x80 [ 26.135216] ret_from_fork_asm+0x1a/0x30 [ 26.135680] [ 26.135896] The buggy address belongs to the object at ffff888103231c00 [ 26.135896] which belongs to the cache kmalloc-64 of size 64 [ 26.136923] The buggy address is located 0 bytes to the right of [ 26.136923] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.137749] [ 26.137923] The buggy address belongs to the physical page: [ 26.138325] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.139128] flags: 0x200000000000000(node=0|zone=2) [ 26.139671] page_type: f5(slab) [ 26.140154] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.140876] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.141421] page dumped because: kasan: bad access detected [ 26.142016] [ 26.142272] Memory state around the buggy address: [ 26.142740] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.143204] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.144397] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.146091] ^ [ 26.147466] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.148312] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.149757] ================================================================== [ 27.496239] ================================================================== [ 27.496989] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151d/0x5450 [ 27.497677] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.498398] [ 27.498657] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.498826] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.498868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.498929] Call Trace: [ 27.498964] <TASK> [ 27.499003] dump_stack_lvl+0x73/0xb0 [ 27.499081] print_report+0xd1/0x660 [ 27.499178] ? __virt_addr_valid+0x1db/0x2d0 [ 27.499308] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.499382] kasan_report+0x104/0x140 [ 27.499441] ? kasan_atomics_helper+0x151d/0x5450 [ 27.499512] ? kasan_atomics_helper+0x151d/0x5450 [ 27.499618] kasan_check_range+0x10c/0x1c0 [ 27.499696] __kasan_check_write+0x18/0x20 [ 27.499820] kasan_atomics_helper+0x151d/0x5450 [ 27.499900] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.499986] ? kasan_save_alloc_info+0x3b/0x50 [ 27.500063] kasan_atomics+0x1dc/0x310 [ 27.500155] ? __pfx_kasan_atomics+0x10/0x10 [ 27.500233] ? __pfx_read_tsc+0x10/0x10 [ 27.500298] ? ktime_get_ts64+0x86/0x240 [ 27.500376] kunit_try_run_case+0x1b2/0x490 [ 27.500451] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.500520] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.500590] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.500661] ? __kthread_parkme+0x82/0x160 [ 27.500784] ? preempt_count_sub+0x50/0x80 [ 27.500910] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.500989] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.501059] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.502270] kthread+0x323/0x710 [ 27.502366] ? trace_preempt_on+0x20/0xc0 [ 27.502438] ? __pfx_kthread+0x10/0x10 [ 27.502509] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.502572] ? calculate_sigpending+0x7b/0xa0 [ 27.502639] ? __pfx_kthread+0x10/0x10 [ 27.502752] ret_from_fork+0x41/0x80 [ 27.502836] ? __pfx_kthread+0x10/0x10 [ 27.502906] ret_from_fork_asm+0x1a/0x30 [ 27.503000] </TASK> [ 27.503036] [ 27.521334] Allocated by task 286: [ 27.521698] kasan_save_stack+0x3d/0x60 [ 27.522588] kasan_save_track+0x18/0x40 [ 27.522970] kasan_save_alloc_info+0x3b/0x50 [ 27.523398] __kasan_kmalloc+0xb7/0xc0 [ 27.524138] __kmalloc_cache_noprof+0x183/0x410 [ 27.524677] kasan_atomics+0x95/0x310 [ 27.525222] kunit_try_run_case+0x1b2/0x490 [ 27.525571] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.526299] kthread+0x323/0x710 [ 27.526523] ret_from_fork+0x41/0x80 [ 27.526684] ret_from_fork_asm+0x1a/0x30 [ 27.527060] [ 27.527342] The buggy address belongs to the object at ffff888103231c00 [ 27.527342] which belongs to the cache kmalloc-64 of size 64 [ 27.528600] The buggy address is located 0 bytes to the right of [ 27.528600] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.529274] [ 27.529544] The buggy address belongs to the physical page: [ 27.529972] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.530420] flags: 0x200000000000000(node=0|zone=2) [ 27.530891] page_type: f5(slab) [ 27.531419] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.532347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.532848] page dumped because: kasan: bad access detected [ 27.533366] [ 27.533527] Memory state around the buggy address: [ 27.533809] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.534268] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.534957] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.535962] ^ [ 27.536364] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.536749] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.537409] ================================================================== [ 28.214002] ================================================================== [ 28.214822] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eaa/0x5450 [ 28.215753] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.216624] [ 28.216974] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.217107] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.217282] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.217361] Call Trace: [ 28.217395] <TASK> [ 28.217433] dump_stack_lvl+0x73/0xb0 [ 28.217509] print_report+0xd1/0x660 [ 28.217570] ? __virt_addr_valid+0x1db/0x2d0 [ 28.217884] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.217993] kasan_report+0x104/0x140 [ 28.218060] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.218159] ? kasan_atomics_helper+0x1eaa/0x5450 [ 28.218249] kasan_check_range+0x10c/0x1c0 [ 28.218326] __kasan_check_write+0x18/0x20 [ 28.218389] kasan_atomics_helper+0x1eaa/0x5450 [ 28.218462] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.218534] ? kasan_save_alloc_info+0x3b/0x50 [ 28.218624] kasan_atomics+0x1dc/0x310 [ 28.218695] ? __pfx_kasan_atomics+0x10/0x10 [ 28.218832] ? __pfx_read_tsc+0x10/0x10 [ 28.218897] ? ktime_get_ts64+0x86/0x240 [ 28.218964] kunit_try_run_case+0x1b2/0x490 [ 28.219035] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.219218] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.219454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.219666] ? __kthread_parkme+0x82/0x160 [ 28.219979] ? preempt_count_sub+0x50/0x80 [ 28.220187] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.220274] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.220349] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.220420] kthread+0x323/0x710 [ 28.220488] ? trace_preempt_on+0x20/0xc0 [ 28.220558] ? __pfx_kthread+0x10/0x10 [ 28.220623] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.220687] ? calculate_sigpending+0x7b/0xa0 [ 28.220814] ? __pfx_kthread+0x10/0x10 [ 28.220891] ret_from_fork+0x41/0x80 [ 28.220961] ? __pfx_kthread+0x10/0x10 [ 28.221029] ret_from_fork_asm+0x1a/0x30 [ 28.221100] </TASK> [ 28.221150] [ 28.236416] Allocated by task 286: [ 28.236842] kasan_save_stack+0x3d/0x60 [ 28.237298] kasan_save_track+0x18/0x40 [ 28.237760] kasan_save_alloc_info+0x3b/0x50 [ 28.238423] __kasan_kmalloc+0xb7/0xc0 [ 28.238818] __kmalloc_cache_noprof+0x183/0x410 [ 28.239143] kasan_atomics+0x95/0x310 [ 28.239419] kunit_try_run_case+0x1b2/0x490 [ 28.240296] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.240945] kthread+0x323/0x710 [ 28.241541] ret_from_fork+0x41/0x80 [ 28.242326] ret_from_fork_asm+0x1a/0x30 [ 28.242818] [ 28.243050] The buggy address belongs to the object at ffff888103231c00 [ 28.243050] which belongs to the cache kmalloc-64 of size 64 [ 28.244266] The buggy address is located 0 bytes to the right of [ 28.244266] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.245516] [ 28.246034] The buggy address belongs to the physical page: [ 28.246781] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.247510] flags: 0x200000000000000(node=0|zone=2) [ 28.248086] page_type: f5(slab) [ 28.249424] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.250202] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.251407] page dumped because: kasan: bad access detected [ 28.251849] [ 28.252136] Memory state around the buggy address: [ 28.252608] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.253296] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.253831] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.254476] ^ [ 28.255018] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.255774] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.256287] ================================================================== [ 27.585012] ================================================================== [ 27.585528] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x164f/0x5450 [ 27.587794] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.588670] [ 27.589018] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.589175] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.589214] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.589531] Call Trace: [ 27.589569] <TASK> [ 27.589593] dump_stack_lvl+0x73/0xb0 [ 27.589641] print_report+0xd1/0x660 [ 27.589676] ? __virt_addr_valid+0x1db/0x2d0 [ 27.589765] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.589806] kasan_report+0x104/0x140 [ 27.589838] ? kasan_atomics_helper+0x164f/0x5450 [ 27.589875] ? kasan_atomics_helper+0x164f/0x5450 [ 27.589918] kasan_check_range+0x10c/0x1c0 [ 27.589955] __kasan_check_write+0x18/0x20 [ 27.589986] kasan_atomics_helper+0x164f/0x5450 [ 27.590022] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.590058] ? kasan_save_alloc_info+0x3b/0x50 [ 27.590103] kasan_atomics+0x1dc/0x310 [ 27.590161] ? __pfx_kasan_atomics+0x10/0x10 [ 27.590199] ? __pfx_read_tsc+0x10/0x10 [ 27.590232] ? ktime_get_ts64+0x86/0x240 [ 27.590271] kunit_try_run_case+0x1b2/0x490 [ 27.590307] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.590340] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.590375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.590408] ? __kthread_parkme+0x82/0x160 [ 27.590441] ? preempt_count_sub+0x50/0x80 [ 27.590478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.590514] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.590549] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.590584] kthread+0x323/0x710 [ 27.590615] ? trace_preempt_on+0x20/0xc0 [ 27.590650] ? __pfx_kthread+0x10/0x10 [ 27.590683] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.590744] ? calculate_sigpending+0x7b/0xa0 [ 27.590782] ? __pfx_kthread+0x10/0x10 [ 27.590817] ret_from_fork+0x41/0x80 [ 27.590881] ? __pfx_kthread+0x10/0x10 [ 27.590916] ret_from_fork_asm+0x1a/0x30 [ 27.590965] </TASK> [ 27.590982] [ 27.608800] Allocated by task 286: [ 27.609197] kasan_save_stack+0x3d/0x60 [ 27.609583] kasan_save_track+0x18/0x40 [ 27.609987] kasan_save_alloc_info+0x3b/0x50 [ 27.610456] __kasan_kmalloc+0xb7/0xc0 [ 27.610935] __kmalloc_cache_noprof+0x183/0x410 [ 27.611305] kasan_atomics+0x95/0x310 [ 27.611852] kunit_try_run_case+0x1b2/0x490 [ 27.612218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.612783] kthread+0x323/0x710 [ 27.613058] ret_from_fork+0x41/0x80 [ 27.613408] ret_from_fork_asm+0x1a/0x30 [ 27.613929] [ 27.614183] The buggy address belongs to the object at ffff888103231c00 [ 27.614183] which belongs to the cache kmalloc-64 of size 64 [ 27.615074] The buggy address is located 0 bytes to the right of [ 27.615074] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.616149] [ 27.616402] The buggy address belongs to the physical page: [ 27.616997] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.617620] flags: 0x200000000000000(node=0|zone=2) [ 27.618069] page_type: f5(slab) [ 27.618342] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.618937] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.619697] page dumped because: kasan: bad access detected [ 27.620327] [ 27.620554] Memory state around the buggy address: [ 27.621045] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.621651] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.622222] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.622914] ^ [ 27.623374] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.623974] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.624536] ================================================================== [ 26.852076] ================================================================== [ 26.853650] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf10/0x5450 [ 26.854585] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.855430] [ 26.855758] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.855892] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.855939] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.855998] Call Trace: [ 26.856036] <TASK> [ 26.856073] dump_stack_lvl+0x73/0xb0 [ 26.856188] print_report+0xd1/0x660 [ 26.856260] ? __virt_addr_valid+0x1db/0x2d0 [ 26.856384] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.856461] kasan_report+0x104/0x140 [ 26.856523] ? kasan_atomics_helper+0xf10/0x5450 [ 26.856595] ? kasan_atomics_helper+0xf10/0x5450 [ 26.856676] kasan_check_range+0x10c/0x1c0 [ 26.856783] __kasan_check_write+0x18/0x20 [ 26.856853] kasan_atomics_helper+0xf10/0x5450 [ 26.856927] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.856998] ? kasan_save_alloc_info+0x3b/0x50 [ 26.857079] kasan_atomics+0x1dc/0x310 [ 26.857177] ? __pfx_kasan_atomics+0x10/0x10 [ 26.857252] ? __pfx_read_tsc+0x10/0x10 [ 26.857318] ? ktime_get_ts64+0x86/0x240 [ 26.857390] kunit_try_run_case+0x1b2/0x490 [ 26.857461] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.857523] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.857586] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.857652] ? __kthread_parkme+0x82/0x160 [ 26.857721] ? preempt_count_sub+0x50/0x80 [ 26.857829] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.857882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.857922] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.857959] kthread+0x323/0x710 [ 26.857993] ? trace_preempt_on+0x20/0xc0 [ 26.858029] ? __pfx_kthread+0x10/0x10 [ 26.858063] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.858095] ? calculate_sigpending+0x7b/0xa0 [ 26.858153] ? __pfx_kthread+0x10/0x10 [ 26.858191] ret_from_fork+0x41/0x80 [ 26.858226] ? __pfx_kthread+0x10/0x10 [ 26.858260] ret_from_fork_asm+0x1a/0x30 [ 26.858309] </TASK> [ 26.858326] [ 26.883675] Allocated by task 286: [ 26.884173] kasan_save_stack+0x3d/0x60 [ 26.884660] kasan_save_track+0x18/0x40 [ 26.885219] kasan_save_alloc_info+0x3b/0x50 [ 26.885759] __kasan_kmalloc+0xb7/0xc0 [ 26.886285] __kmalloc_cache_noprof+0x183/0x410 [ 26.886856] kasan_atomics+0x95/0x310 [ 26.887343] kunit_try_run_case+0x1b2/0x490 [ 26.887795] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.888432] kthread+0x323/0x710 [ 26.888921] ret_from_fork+0x41/0x80 [ 26.889362] ret_from_fork_asm+0x1a/0x30 [ 26.889636] [ 26.889806] The buggy address belongs to the object at ffff888103231c00 [ 26.889806] which belongs to the cache kmalloc-64 of size 64 [ 26.890387] The buggy address is located 0 bytes to the right of [ 26.890387] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.891006] [ 26.891196] The buggy address belongs to the physical page: [ 26.891505] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.892003] flags: 0x200000000000000(node=0|zone=2) [ 26.892340] page_type: f5(slab) [ 26.892582] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.893026] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.893438] page dumped because: kasan: bad access detected [ 26.893750] [ 26.893909] Memory state around the buggy address: [ 26.894218] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.894551] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.894866] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.895251] ^ [ 26.895547] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.896261] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.896636] ================================================================== [ 25.822158] ================================================================== [ 25.823701] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbc/0x5450 [ 25.824870] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 25.825467] [ 25.825921] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 25.826063] Tainted: [B]=BAD_PAGE, [N]=TEST [ 25.826103] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 25.826189] Call Trace: [ 25.826225] <TASK> [ 25.826321] dump_stack_lvl+0x73/0xb0 [ 25.826445] print_report+0xd1/0x660 [ 25.826522] ? __virt_addr_valid+0x1db/0x2d0 [ 25.826650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 25.826724] kasan_report+0x104/0x140 [ 25.826785] ? kasan_atomics_helper+0x4bbc/0x5450 [ 25.826854] ? kasan_atomics_helper+0x4bbc/0x5450 [ 25.827166] __asan_report_load4_noabort+0x18/0x20 [ 25.827254] kasan_atomics_helper+0x4bbc/0x5450 [ 25.827314] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 25.827352] ? kasan_save_alloc_info+0x3b/0x50 [ 25.827396] kasan_atomics+0x1dc/0x310 [ 25.827432] ? __pfx_kasan_atomics+0x10/0x10 [ 25.827468] ? __pfx_read_tsc+0x10/0x10 [ 25.827498] ? ktime_get_ts64+0x86/0x240 [ 25.827536] kunit_try_run_case+0x1b2/0x490 [ 25.827575] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.827639] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 25.827671] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 25.827782] ? __kthread_parkme+0x82/0x160 [ 25.827872] ? preempt_count_sub+0x50/0x80 [ 25.827912] ? __pfx_kunit_try_run_case+0x10/0x10 [ 25.827950] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.827986] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 25.828032] kthread+0x323/0x710 [ 25.828062] ? trace_preempt_on+0x20/0xc0 [ 25.828098] ? __pfx_kthread+0x10/0x10 [ 25.828152] ? _raw_spin_unlock_irq+0x47/0x80 [ 25.828183] ? calculate_sigpending+0x7b/0xa0 [ 25.828215] ? __pfx_kthread+0x10/0x10 [ 25.828248] ret_from_fork+0x41/0x80 [ 25.828280] ? __pfx_kthread+0x10/0x10 [ 25.828313] ret_from_fork_asm+0x1a/0x30 [ 25.828362] </TASK> [ 25.828379] [ 25.846920] Allocated by task 286: [ 25.847343] kasan_save_stack+0x3d/0x60 [ 25.847659] kasan_save_track+0x18/0x40 [ 25.848294] kasan_save_alloc_info+0x3b/0x50 [ 25.848886] __kasan_kmalloc+0xb7/0xc0 [ 25.849447] __kmalloc_cache_noprof+0x183/0x410 [ 25.850177] kasan_atomics+0x95/0x310 [ 25.850765] kunit_try_run_case+0x1b2/0x490 [ 25.851480] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 25.852254] kthread+0x323/0x710 [ 25.852725] ret_from_fork+0x41/0x80 [ 25.853253] ret_from_fork_asm+0x1a/0x30 [ 25.853906] [ 25.854199] The buggy address belongs to the object at ffff888103231c00 [ 25.854199] which belongs to the cache kmalloc-64 of size 64 [ 25.855512] The buggy address is located 0 bytes to the right of [ 25.855512] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 25.856580] [ 25.857157] The buggy address belongs to the physical page: [ 25.858095] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 25.858850] flags: 0x200000000000000(node=0|zone=2) [ 25.859531] page_type: f5(slab) [ 25.859971] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 25.861464] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 25.862052] page dumped because: kasan: bad access detected [ 25.862751] [ 25.863131] Memory state around the buggy address: [ 25.863675] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.864560] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 25.865904] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 25.866664] ^ [ 25.867183] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.868155] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 25.868701] ================================================================== [ 26.450964] ================================================================== [ 26.451396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8f9/0x5450 [ 26.451840] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.453062] [ 26.453348] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.453482] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.453520] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.453578] Call Trace: [ 26.453615] <TASK> [ 26.453654] dump_stack_lvl+0x73/0xb0 [ 26.453783] print_report+0xd1/0x660 [ 26.453874] ? __virt_addr_valid+0x1db/0x2d0 [ 26.454004] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.454083] kasan_report+0x104/0x140 [ 26.454172] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.454245] ? kasan_atomics_helper+0x8f9/0x5450 [ 26.454331] kasan_check_range+0x10c/0x1c0 [ 26.454406] __kasan_check_write+0x18/0x20 [ 26.454473] kasan_atomics_helper+0x8f9/0x5450 [ 26.454547] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.454621] ? kasan_save_alloc_info+0x3b/0x50 [ 26.454712] kasan_atomics+0x1dc/0x310 [ 26.454818] ? __pfx_kasan_atomics+0x10/0x10 [ 26.454892] ? __pfx_read_tsc+0x10/0x10 [ 26.454985] ? ktime_get_ts64+0x86/0x240 [ 26.455093] kunit_try_run_case+0x1b2/0x490 [ 26.455237] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.455313] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.455423] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.455499] ? __kthread_parkme+0x82/0x160 [ 26.455634] ? preempt_count_sub+0x50/0x80 [ 26.455751] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.455834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.455911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.455996] kthread+0x323/0x710 [ 26.456061] ? trace_preempt_on+0x20/0xc0 [ 26.456160] ? __pfx_kthread+0x10/0x10 [ 26.456233] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.456295] ? calculate_sigpending+0x7b/0xa0 [ 26.456359] ? __pfx_kthread+0x10/0x10 [ 26.456424] ret_from_fork+0x41/0x80 [ 26.456494] ? __pfx_kthread+0x10/0x10 [ 26.456559] ret_from_fork_asm+0x1a/0x30 [ 26.456655] </TASK> [ 26.456690] [ 26.470543] Allocated by task 286: [ 26.470970] kasan_save_stack+0x3d/0x60 [ 26.471294] kasan_save_track+0x18/0x40 [ 26.471574] kasan_save_alloc_info+0x3b/0x50 [ 26.472066] __kasan_kmalloc+0xb7/0xc0 [ 26.472499] __kmalloc_cache_noprof+0x183/0x410 [ 26.473170] kasan_atomics+0x95/0x310 [ 26.473589] kunit_try_run_case+0x1b2/0x490 [ 26.474204] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.474606] kthread+0x323/0x710 [ 26.474873] ret_from_fork+0x41/0x80 [ 26.475162] ret_from_fork_asm+0x1a/0x30 [ 26.475446] [ 26.475630] The buggy address belongs to the object at ffff888103231c00 [ 26.475630] which belongs to the cache kmalloc-64 of size 64 [ 26.476708] The buggy address is located 0 bytes to the right of [ 26.476708] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.477877] [ 26.478177] The buggy address belongs to the physical page: [ 26.478830] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.479657] flags: 0x200000000000000(node=0|zone=2) [ 26.480219] page_type: f5(slab) [ 26.480596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.481106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.481524] page dumped because: kasan: bad access detected [ 26.481921] [ 26.482165] Memory state around the buggy address: [ 26.482620] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.483675] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.484378] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.484814] ^ [ 26.485373] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.485825] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.486469] ================================================================== [ 28.030408] ================================================================== [ 28.031037] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f30/0x5450 [ 28.032391] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.033692] [ 28.034477] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.034563] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.034584] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.034616] Call Trace: [ 28.034637] <TASK> [ 28.034658] dump_stack_lvl+0x73/0xb0 [ 28.034704] print_report+0xd1/0x660 [ 28.034784] ? __virt_addr_valid+0x1db/0x2d0 [ 28.034853] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.034894] kasan_report+0x104/0x140 [ 28.034925] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.034962] ? kasan_atomics_helper+0x4f30/0x5450 [ 28.035007] __asan_report_load8_noabort+0x18/0x20 [ 28.035041] kasan_atomics_helper+0x4f30/0x5450 [ 28.035078] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.035137] ? kasan_save_alloc_info+0x3b/0x50 [ 28.035184] kasan_atomics+0x1dc/0x310 [ 28.035221] ? __pfx_kasan_atomics+0x10/0x10 [ 28.035258] ? __pfx_read_tsc+0x10/0x10 [ 28.035290] ? ktime_get_ts64+0x86/0x240 [ 28.035328] kunit_try_run_case+0x1b2/0x490 [ 28.035365] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.035398] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.035431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.035465] ? __kthread_parkme+0x82/0x160 [ 28.035497] ? preempt_count_sub+0x50/0x80 [ 28.035536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.035572] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.035637] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.035674] kthread+0x323/0x710 [ 28.035710] ? trace_preempt_on+0x20/0xc0 [ 28.035780] ? __pfx_kthread+0x10/0x10 [ 28.035816] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.035848] ? calculate_sigpending+0x7b/0xa0 [ 28.035883] ? __pfx_kthread+0x10/0x10 [ 28.035919] ret_from_fork+0x41/0x80 [ 28.035965] ? __pfx_kthread+0x10/0x10 [ 28.035999] ret_from_fork_asm+0x1a/0x30 [ 28.036048] </TASK> [ 28.036065] [ 28.056588] Allocated by task 286: [ 28.057488] kasan_save_stack+0x3d/0x60 [ 28.057888] kasan_save_track+0x18/0x40 [ 28.058780] kasan_save_alloc_info+0x3b/0x50 [ 28.059223] __kasan_kmalloc+0xb7/0xc0 [ 28.060015] __kmalloc_cache_noprof+0x183/0x410 [ 28.060460] kasan_atomics+0x95/0x310 [ 28.060938] kunit_try_run_case+0x1b2/0x490 [ 28.061730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.062161] kthread+0x323/0x710 [ 28.062573] ret_from_fork+0x41/0x80 [ 28.063430] ret_from_fork_asm+0x1a/0x30 [ 28.064132] [ 28.064364] The buggy address belongs to the object at ffff888103231c00 [ 28.064364] which belongs to the cache kmalloc-64 of size 64 [ 28.065693] The buggy address is located 0 bytes to the right of [ 28.065693] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.066662] [ 28.067482] The buggy address belongs to the physical page: [ 28.067932] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.068662] flags: 0x200000000000000(node=0|zone=2) [ 28.069462] page_type: f5(slab) [ 28.069798] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.070789] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.071719] page dumped because: kasan: bad access detected [ 28.072254] [ 28.072877] Memory state around the buggy address: [ 28.073300] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.073981] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.074559] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.075621] ^ [ 28.076386] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.077345] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.077790] ================================================================== [ 28.463187] ================================================================== [ 28.463818] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb2/0x5450 [ 28.464419] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.464873] [ 28.465063] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.465279] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.465353] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.465422] Call Trace: [ 28.465485] <TASK> [ 28.465525] dump_stack_lvl+0x73/0xb0 [ 28.465634] print_report+0xd1/0x660 [ 28.465780] ? __virt_addr_valid+0x1db/0x2d0 [ 28.465980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.466095] kasan_report+0x104/0x140 [ 28.466210] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.466314] ? kasan_atomics_helper+0x4fb2/0x5450 [ 28.466402] __asan_report_load8_noabort+0x18/0x20 [ 28.466470] kasan_atomics_helper+0x4fb2/0x5450 [ 28.466542] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.466616] ? kasan_save_alloc_info+0x3b/0x50 [ 28.466748] kasan_atomics+0x1dc/0x310 [ 28.466835] ? __pfx_kasan_atomics+0x10/0x10 [ 28.466912] ? __pfx_read_tsc+0x10/0x10 [ 28.466977] ? ktime_get_ts64+0x86/0x240 [ 28.467053] kunit_try_run_case+0x1b2/0x490 [ 28.467150] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.467221] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.467282] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.467436] ? __kthread_parkme+0x82/0x160 [ 28.467515] ? preempt_count_sub+0x50/0x80 [ 28.467618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.467690] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.468294] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.468514] kthread+0x323/0x710 [ 28.468599] ? trace_preempt_on+0x20/0xc0 [ 28.469795] ? __pfx_kthread+0x10/0x10 [ 28.469892] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.469959] ? calculate_sigpending+0x7b/0xa0 [ 28.470022] ? __pfx_kthread+0x10/0x10 [ 28.470088] ret_from_fork+0x41/0x80 [ 28.470951] ? __pfx_kthread+0x10/0x10 [ 28.471073] ret_from_fork_asm+0x1a/0x30 [ 28.471276] </TASK> [ 28.471319] [ 28.486820] Allocated by task 286: [ 28.487356] kasan_save_stack+0x3d/0x60 [ 28.487736] kasan_save_track+0x18/0x40 [ 28.488142] kasan_save_alloc_info+0x3b/0x50 [ 28.488613] __kasan_kmalloc+0xb7/0xc0 [ 28.490465] __kmalloc_cache_noprof+0x183/0x410 [ 28.491553] kasan_atomics+0x95/0x310 [ 28.492142] kunit_try_run_case+0x1b2/0x490 [ 28.492538] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.493262] kthread+0x323/0x710 [ 28.493568] ret_from_fork+0x41/0x80 [ 28.493854] ret_from_fork_asm+0x1a/0x30 [ 28.494163] [ 28.494460] The buggy address belongs to the object at ffff888103231c00 [ 28.494460] which belongs to the cache kmalloc-64 of size 64 [ 28.495948] The buggy address is located 0 bytes to the right of [ 28.495948] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.497184] [ 28.497424] The buggy address belongs to the physical page: [ 28.497761] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.498422] flags: 0x200000000000000(node=0|zone=2) [ 28.498897] page_type: f5(slab) [ 28.499291] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.500156] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.500749] page dumped because: kasan: bad access detected [ 28.501170] [ 28.501401] Memory state around the buggy address: [ 28.501797] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.502211] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.502588] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.502985] ^ [ 28.503522] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.504463] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.505087] ================================================================== [ 27.018632] ================================================================== [ 27.019371] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1c/0x5450 [ 27.020293] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.020885] [ 27.021085] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.021240] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.021277] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.021335] Call Trace: [ 27.021372] <TASK> [ 27.021407] dump_stack_lvl+0x73/0xb0 [ 27.021577] print_report+0xd1/0x660 [ 27.021789] ? __virt_addr_valid+0x1db/0x2d0 [ 27.021980] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.022061] kasan_report+0x104/0x140 [ 27.022150] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.022225] ? kasan_atomics_helper+0x4a1c/0x5450 [ 27.022305] __asan_report_load4_noabort+0x18/0x20 [ 27.022371] kasan_atomics_helper+0x4a1c/0x5450 [ 27.022531] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.022619] ? kasan_save_alloc_info+0x3b/0x50 [ 27.022745] kasan_atomics+0x1dc/0x310 [ 27.022913] ? __pfx_kasan_atomics+0x10/0x10 [ 27.022998] ? __pfx_read_tsc+0x10/0x10 [ 27.023064] ? ktime_get_ts64+0x86/0x240 [ 27.023163] kunit_try_run_case+0x1b2/0x490 [ 27.023329] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.023405] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.023474] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.023538] ? __kthread_parkme+0x82/0x160 [ 27.023760] ? preempt_count_sub+0x50/0x80 [ 27.023854] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.023939] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.024095] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.024198] kthread+0x323/0x710 [ 27.024263] ? trace_preempt_on+0x20/0xc0 [ 27.024332] ? __pfx_kthread+0x10/0x10 [ 27.024486] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.024585] ? calculate_sigpending+0x7b/0xa0 [ 27.024676] ? __pfx_kthread+0x10/0x10 [ 27.024867] ret_from_fork+0x41/0x80 [ 27.024971] ? __pfx_kthread+0x10/0x10 [ 27.025070] ret_from_fork_asm+0x1a/0x30 [ 27.025253] </TASK> [ 27.025300] [ 27.039679] Allocated by task 286: [ 27.040058] kasan_save_stack+0x3d/0x60 [ 27.040533] kasan_save_track+0x18/0x40 [ 27.041066] kasan_save_alloc_info+0x3b/0x50 [ 27.042373] __kasan_kmalloc+0xb7/0xc0 [ 27.042896] __kmalloc_cache_noprof+0x183/0x410 [ 27.043862] kasan_atomics+0x95/0x310 [ 27.044149] kunit_try_run_case+0x1b2/0x490 [ 27.045527] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.046461] kthread+0x323/0x710 [ 27.046842] ret_from_fork+0x41/0x80 [ 27.047286] ret_from_fork_asm+0x1a/0x30 [ 27.047674] [ 27.047916] The buggy address belongs to the object at ffff888103231c00 [ 27.047916] which belongs to the cache kmalloc-64 of size 64 [ 27.052624] The buggy address is located 0 bytes to the right of [ 27.052624] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.053292] [ 27.053597] The buggy address belongs to the physical page: [ 27.054183] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.054844] flags: 0x200000000000000(node=0|zone=2) [ 27.055338] page_type: f5(slab) [ 27.055807] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.056437] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.057014] page dumped because: kasan: bad access detected [ 27.057486] [ 27.057801] Memory state around the buggy address: [ 27.058202] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.058923] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.059430] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.059897] ^ [ 27.060401] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.061132] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.061820] ================================================================== [ 27.456217] ================================================================== [ 27.457145] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d4/0x5450 [ 27.457905] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.458589] [ 27.458901] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.459032] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.459071] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.459153] Call Trace: [ 27.459192] <TASK> [ 27.459231] dump_stack_lvl+0x73/0xb0 [ 27.459312] print_report+0xd1/0x660 [ 27.459384] ? __virt_addr_valid+0x1db/0x2d0 [ 27.459512] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.459619] kasan_report+0x104/0x140 [ 27.459688] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.459827] ? kasan_atomics_helper+0x50d4/0x5450 [ 27.459920] __asan_report_store8_noabort+0x1b/0x30 [ 27.459999] kasan_atomics_helper+0x50d4/0x5450 [ 27.460072] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.460169] ? kasan_save_alloc_info+0x3b/0x50 [ 27.460261] kasan_atomics+0x1dc/0x310 [ 27.460334] ? __pfx_kasan_atomics+0x10/0x10 [ 27.460442] ? __pfx_read_tsc+0x10/0x10 [ 27.460564] ? ktime_get_ts64+0x86/0x240 [ 27.460641] kunit_try_run_case+0x1b2/0x490 [ 27.460734] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.460801] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.460904] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.460976] ? __kthread_parkme+0x82/0x160 [ 27.461044] ? preempt_count_sub+0x50/0x80 [ 27.461145] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.461226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.461301] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.461374] kthread+0x323/0x710 [ 27.461436] ? trace_preempt_on+0x20/0xc0 [ 27.461510] ? __pfx_kthread+0x10/0x10 [ 27.461575] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.461640] ? calculate_sigpending+0x7b/0xa0 [ 27.461709] ? __pfx_kthread+0x10/0x10 [ 27.461778] ret_from_fork+0x41/0x80 [ 27.461844] ? __pfx_kthread+0x10/0x10 [ 27.461910] ret_from_fork_asm+0x1a/0x30 [ 27.462005] </TASK> [ 27.462039] [ 27.480246] Allocated by task 286: [ 27.480623] kasan_save_stack+0x3d/0x60 [ 27.480977] kasan_save_track+0x18/0x40 [ 27.481426] kasan_save_alloc_info+0x3b/0x50 [ 27.481790] __kasan_kmalloc+0xb7/0xc0 [ 27.482177] __kmalloc_cache_noprof+0x183/0x410 [ 27.482491] kasan_atomics+0x95/0x310 [ 27.482954] kunit_try_run_case+0x1b2/0x490 [ 27.483417] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.484045] kthread+0x323/0x710 [ 27.484453] ret_from_fork+0x41/0x80 [ 27.484911] ret_from_fork_asm+0x1a/0x30 [ 27.485265] [ 27.485425] The buggy address belongs to the object at ffff888103231c00 [ 27.485425] which belongs to the cache kmalloc-64 of size 64 [ 27.486353] The buggy address is located 0 bytes to the right of [ 27.486353] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.487326] [ 27.487493] The buggy address belongs to the physical page: [ 27.487886] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.488519] flags: 0x200000000000000(node=0|zone=2) [ 27.489054] page_type: f5(slab) [ 27.489440] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.490193] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.490931] page dumped because: kasan: bad access detected [ 27.491440] [ 27.491696] Memory state around the buggy address: [ 27.492240] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.492742] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.493157] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.493842] ^ [ 27.494332] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.494863] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.495263] ================================================================== [ 27.419198] ================================================================== [ 27.420031] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1467/0x5450 [ 27.420691] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.421232] [ 27.421529] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.421689] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.421773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.421837] Call Trace: [ 27.421876] <TASK> [ 27.421912] dump_stack_lvl+0x73/0xb0 [ 27.421995] print_report+0xd1/0x660 [ 27.422065] ? __virt_addr_valid+0x1db/0x2d0 [ 27.422218] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.422297] kasan_report+0x104/0x140 [ 27.422361] ? kasan_atomics_helper+0x1467/0x5450 [ 27.422433] ? kasan_atomics_helper+0x1467/0x5450 [ 27.422567] kasan_check_range+0x10c/0x1c0 [ 27.422648] __kasan_check_write+0x18/0x20 [ 27.422758] kasan_atomics_helper+0x1467/0x5450 [ 27.422836] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.422954] ? kasan_save_alloc_info+0x3b/0x50 [ 27.423045] kasan_atomics+0x1dc/0x310 [ 27.423142] ? __pfx_kasan_atomics+0x10/0x10 [ 27.423221] ? __pfx_read_tsc+0x10/0x10 [ 27.423321] ? ktime_get_ts64+0x86/0x240 [ 27.423409] kunit_try_run_case+0x1b2/0x490 [ 27.423486] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.423548] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.423618] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.423656] ? __kthread_parkme+0x82/0x160 [ 27.423739] ? preempt_count_sub+0x50/0x80 [ 27.423821] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.423886] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.423968] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.424075] kthread+0x323/0x710 [ 27.424172] ? trace_preempt_on+0x20/0xc0 [ 27.424246] ? __pfx_kthread+0x10/0x10 [ 27.424309] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.424370] ? calculate_sigpending+0x7b/0xa0 [ 27.424432] ? __pfx_kthread+0x10/0x10 [ 27.424547] ret_from_fork+0x41/0x80 [ 27.424616] ? __pfx_kthread+0x10/0x10 [ 27.424683] ret_from_fork_asm+0x1a/0x30 [ 27.424829] </TASK> [ 27.424905] [ 27.438043] Allocated by task 286: [ 27.438433] kasan_save_stack+0x3d/0x60 [ 27.438919] kasan_save_track+0x18/0x40 [ 27.439377] kasan_save_alloc_info+0x3b/0x50 [ 27.440657] __kasan_kmalloc+0xb7/0xc0 [ 27.441521] __kmalloc_cache_noprof+0x183/0x410 [ 27.441917] kasan_atomics+0x95/0x310 [ 27.442400] kunit_try_run_case+0x1b2/0x490 [ 27.442892] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.443416] kthread+0x323/0x710 [ 27.443896] ret_from_fork+0x41/0x80 [ 27.444271] ret_from_fork_asm+0x1a/0x30 [ 27.444564] [ 27.444765] The buggy address belongs to the object at ffff888103231c00 [ 27.444765] which belongs to the cache kmalloc-64 of size 64 [ 27.445571] The buggy address is located 0 bytes to the right of [ 27.445571] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.446764] [ 27.447019] The buggy address belongs to the physical page: [ 27.447618] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.448444] flags: 0x200000000000000(node=0|zone=2) [ 27.449005] page_type: f5(slab) [ 27.449399] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.450084] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.450497] page dumped because: kasan: bad access detected [ 27.450885] [ 27.451051] Memory state around the buggy address: [ 27.451532] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.452298] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.453026] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.453778] ^ [ 27.454288] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.454850] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.455252] ================================================================== [ 26.897331] ================================================================== [ 26.897908] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfa9/0x5450 [ 26.898691] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.899503] [ 26.899862] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.900008] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.900046] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.900129] Call Trace: [ 26.900168] <TASK> [ 26.900204] dump_stack_lvl+0x73/0xb0 [ 26.900282] print_report+0xd1/0x660 [ 26.900350] ? __virt_addr_valid+0x1db/0x2d0 [ 26.900475] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.900547] kasan_report+0x104/0x140 [ 26.900608] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.900677] ? kasan_atomics_helper+0xfa9/0x5450 [ 26.900771] kasan_check_range+0x10c/0x1c0 [ 26.900857] __kasan_check_write+0x18/0x20 [ 26.900923] kasan_atomics_helper+0xfa9/0x5450 [ 26.900991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.901061] ? kasan_save_alloc_info+0x3b/0x50 [ 26.901167] kasan_atomics+0x1dc/0x310 [ 26.901224] ? __pfx_kasan_atomics+0x10/0x10 [ 26.901265] ? __pfx_read_tsc+0x10/0x10 [ 26.901300] ? ktime_get_ts64+0x86/0x240 [ 26.901352] kunit_try_run_case+0x1b2/0x490 [ 26.901423] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.901481] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.901542] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.901606] ? __kthread_parkme+0x82/0x160 [ 26.901665] ? preempt_count_sub+0x50/0x80 [ 26.901762] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.901836] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.901902] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.901973] kthread+0x323/0x710 [ 26.902030] ? trace_preempt_on+0x20/0xc0 [ 26.902094] ? __pfx_kthread+0x10/0x10 [ 26.902189] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.902250] ? calculate_sigpending+0x7b/0xa0 [ 26.902309] ? __pfx_kthread+0x10/0x10 [ 26.902370] ret_from_fork+0x41/0x80 [ 26.902437] ? __pfx_kthread+0x10/0x10 [ 26.902503] ret_from_fork_asm+0x1a/0x30 [ 26.902592] </TASK> [ 26.902622] [ 26.919994] Allocated by task 286: [ 26.920347] kasan_save_stack+0x3d/0x60 [ 26.920622] kasan_save_track+0x18/0x40 [ 26.921147] kasan_save_alloc_info+0x3b/0x50 [ 26.921604] __kasan_kmalloc+0xb7/0xc0 [ 26.922144] __kmalloc_cache_noprof+0x183/0x410 [ 26.922455] kasan_atomics+0x95/0x310 [ 26.922735] kunit_try_run_case+0x1b2/0x490 [ 26.923210] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.923745] kthread+0x323/0x710 [ 26.924074] ret_from_fork+0x41/0x80 [ 26.924423] ret_from_fork_asm+0x1a/0x30 [ 26.924713] [ 26.924874] The buggy address belongs to the object at ffff888103231c00 [ 26.924874] which belongs to the cache kmalloc-64 of size 64 [ 26.925893] The buggy address is located 0 bytes to the right of [ 26.925893] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.926807] [ 26.927001] The buggy address belongs to the physical page: [ 26.927552] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.929063] flags: 0x200000000000000(node=0|zone=2) [ 26.929562] page_type: f5(slab) [ 26.930500] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.930980] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.931399] page dumped because: kasan: bad access detected [ 26.931746] [ 26.931906] Memory state around the buggy address: [ 26.932412] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.933452] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.934391] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.935221] ^ [ 26.935986] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.936840] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.937276] ================================================================== [ 27.675066] ================================================================== [ 27.675970] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x177f/0x5450 [ 27.676859] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.677645] [ 27.678009] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.678198] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.678243] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.678305] Call Trace: [ 27.678339] <TASK> [ 27.678378] dump_stack_lvl+0x73/0xb0 [ 27.678458] print_report+0xd1/0x660 [ 27.678524] ? __virt_addr_valid+0x1db/0x2d0 [ 27.678650] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.678813] kasan_report+0x104/0x140 [ 27.678902] ? kasan_atomics_helper+0x177f/0x5450 [ 27.678978] ? kasan_atomics_helper+0x177f/0x5450 [ 27.679064] kasan_check_range+0x10c/0x1c0 [ 27.679164] __kasan_check_write+0x18/0x20 [ 27.679233] kasan_atomics_helper+0x177f/0x5450 [ 27.679357] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.679436] ? kasan_save_alloc_info+0x3b/0x50 [ 27.679563] kasan_atomics+0x1dc/0x310 [ 27.679673] ? __pfx_kasan_atomics+0x10/0x10 [ 27.679811] ? __pfx_read_tsc+0x10/0x10 [ 27.679936] ? ktime_get_ts64+0x86/0x240 [ 27.680047] kunit_try_run_case+0x1b2/0x490 [ 27.680178] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.680254] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.680322] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.680388] ? __kthread_parkme+0x82/0x160 [ 27.680455] ? preempt_count_sub+0x50/0x80 [ 27.680531] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.680599] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.680672] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.680796] kthread+0x323/0x710 [ 27.680900] ? trace_preempt_on+0x20/0xc0 [ 27.680968] ? __pfx_kthread+0x10/0x10 [ 27.681005] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.681038] ? calculate_sigpending+0x7b/0xa0 [ 27.681072] ? __pfx_kthread+0x10/0x10 [ 27.681129] ret_from_fork+0x41/0x80 [ 27.681174] ? __pfx_kthread+0x10/0x10 [ 27.681208] ret_from_fork_asm+0x1a/0x30 [ 27.681258] </TASK> [ 27.681275] [ 27.694696] Allocated by task 286: [ 27.695167] kasan_save_stack+0x3d/0x60 [ 27.695549] kasan_save_track+0x18/0x40 [ 27.696094] kasan_save_alloc_info+0x3b/0x50 [ 27.696524] __kasan_kmalloc+0xb7/0xc0 [ 27.696952] __kmalloc_cache_noprof+0x183/0x410 [ 27.697381] kasan_atomics+0x95/0x310 [ 27.697795] kunit_try_run_case+0x1b2/0x490 [ 27.698196] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.698774] kthread+0x323/0x710 [ 27.699181] ret_from_fork+0x41/0x80 [ 27.699618] ret_from_fork_asm+0x1a/0x30 [ 27.700126] [ 27.700349] The buggy address belongs to the object at ffff888103231c00 [ 27.700349] which belongs to the cache kmalloc-64 of size 64 [ 27.701454] The buggy address is located 0 bytes to the right of [ 27.701454] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.702568] [ 27.702895] The buggy address belongs to the physical page: [ 27.703364] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.704038] flags: 0x200000000000000(node=0|zone=2) [ 27.704376] page_type: f5(slab) [ 27.704619] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.705416] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.706153] page dumped because: kasan: bad access detected [ 27.706768] [ 27.707031] Memory state around the buggy address: [ 27.707519] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.708137] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.708835] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.709483] ^ [ 27.710010] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.710667] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.711301] ================================================================== [ 27.932977] ================================================================== [ 27.933610] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b22/0x5450 [ 27.935693] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.939815] [ 27.940471] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.940609] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.940646] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.940723] Call Trace: [ 27.940761] <TASK> [ 27.940798] dump_stack_lvl+0x73/0xb0 [ 27.940883] print_report+0xd1/0x660 [ 27.940950] ? __virt_addr_valid+0x1db/0x2d0 [ 27.941069] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.941954] kasan_report+0x104/0x140 [ 27.942034] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.942106] ? kasan_atomics_helper+0x1b22/0x5450 [ 27.942205] kasan_check_range+0x10c/0x1c0 [ 27.942280] __kasan_check_write+0x18/0x20 [ 27.942341] kasan_atomics_helper+0x1b22/0x5450 [ 27.942413] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.942485] ? kasan_save_alloc_info+0x3b/0x50 [ 27.942572] kasan_atomics+0x1dc/0x310 [ 27.942641] ? __pfx_kasan_atomics+0x10/0x10 [ 27.942752] ? __pfx_read_tsc+0x10/0x10 [ 27.942819] ? ktime_get_ts64+0x86/0x240 [ 27.942896] kunit_try_run_case+0x1b2/0x490 [ 27.942962] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.943025] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.943082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.943166] ? __kthread_parkme+0x82/0x160 [ 27.943231] ? preempt_count_sub+0x50/0x80 [ 27.943305] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.943376] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.943445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.943516] kthread+0x323/0x710 [ 27.943575] ? trace_preempt_on+0x20/0xc0 [ 27.943671] ? __pfx_kthread+0x10/0x10 [ 27.943782] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.943849] ? calculate_sigpending+0x7b/0xa0 [ 27.943911] ? __pfx_kthread+0x10/0x10 [ 27.943985] ret_from_fork+0x41/0x80 [ 27.944049] ? __pfx_kthread+0x10/0x10 [ 27.944130] ret_from_fork_asm+0x1a/0x30 [ 27.944202] </TASK> [ 27.944224] [ 27.964625] Allocated by task 286: [ 27.964912] kasan_save_stack+0x3d/0x60 [ 27.965487] kasan_save_track+0x18/0x40 [ 27.965908] kasan_save_alloc_info+0x3b/0x50 [ 27.966468] __kasan_kmalloc+0xb7/0xc0 [ 27.966894] __kmalloc_cache_noprof+0x183/0x410 [ 27.967231] kasan_atomics+0x95/0x310 [ 27.967506] kunit_try_run_case+0x1b2/0x490 [ 27.968099] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.968687] kthread+0x323/0x710 [ 27.969276] ret_from_fork+0x41/0x80 [ 27.969896] ret_from_fork_asm+0x1a/0x30 [ 27.970435] [ 27.970667] The buggy address belongs to the object at ffff888103231c00 [ 27.970667] which belongs to the cache kmalloc-64 of size 64 [ 27.971779] The buggy address is located 0 bytes to the right of [ 27.971779] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.972787] [ 27.973093] The buggy address belongs to the physical page: [ 27.973432] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.973907] flags: 0x200000000000000(node=0|zone=2) [ 27.974433] page_type: f5(slab) [ 27.974935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.975830] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.976677] page dumped because: kasan: bad access detected [ 27.977142] [ 27.977312] Memory state around the buggy address: [ 27.977589] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.978027] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.978808] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.979481] ^ [ 27.980126] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.980806] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.981524] ================================================================== [ 28.079160] ================================================================== [ 28.080087] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce1/0x5450 [ 28.080967] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.082090] [ 28.082333] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.082498] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.082544] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.082608] Call Trace: [ 28.082676] <TASK> [ 28.082702] dump_stack_lvl+0x73/0xb0 [ 28.082801] print_report+0xd1/0x660 [ 28.082862] ? __virt_addr_valid+0x1db/0x2d0 [ 28.082933] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.082973] kasan_report+0x104/0x140 [ 28.083005] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.083042] ? kasan_atomics_helper+0x1ce1/0x5450 [ 28.083085] kasan_check_range+0x10c/0x1c0 [ 28.083144] __kasan_check_write+0x18/0x20 [ 28.083177] kasan_atomics_helper+0x1ce1/0x5450 [ 28.083215] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.083251] ? kasan_save_alloc_info+0x3b/0x50 [ 28.083297] kasan_atomics+0x1dc/0x310 [ 28.083333] ? __pfx_kasan_atomics+0x10/0x10 [ 28.083370] ? __pfx_read_tsc+0x10/0x10 [ 28.083403] ? ktime_get_ts64+0x86/0x240 [ 28.083441] kunit_try_run_case+0x1b2/0x490 [ 28.083478] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.083512] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.083546] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.083580] ? __kthread_parkme+0x82/0x160 [ 28.083641] ? preempt_count_sub+0x50/0x80 [ 28.083682] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.083761] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.083851] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.083938] kthread+0x323/0x710 [ 28.084003] ? trace_preempt_on+0x20/0xc0 [ 28.084069] ? __pfx_kthread+0x10/0x10 [ 28.084107] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.084168] ? calculate_sigpending+0x7b/0xa0 [ 28.084202] ? __pfx_kthread+0x10/0x10 [ 28.084238] ret_from_fork+0x41/0x80 [ 28.084275] ? __pfx_kthread+0x10/0x10 [ 28.084310] ret_from_fork_asm+0x1a/0x30 [ 28.084360] </TASK> [ 28.084377] [ 28.105568] Allocated by task 286: [ 28.105887] kasan_save_stack+0x3d/0x60 [ 28.106191] kasan_save_track+0x18/0x40 [ 28.106451] kasan_save_alloc_info+0x3b/0x50 [ 28.106737] __kasan_kmalloc+0xb7/0xc0 [ 28.106995] __kmalloc_cache_noprof+0x183/0x410 [ 28.108904] kasan_atomics+0x95/0x310 [ 28.109350] kunit_try_run_case+0x1b2/0x490 [ 28.110539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.111526] kthread+0x323/0x710 [ 28.112579] ret_from_fork+0x41/0x80 [ 28.113018] ret_from_fork_asm+0x1a/0x30 [ 28.113478] [ 28.113798] The buggy address belongs to the object at ffff888103231c00 [ 28.113798] which belongs to the cache kmalloc-64 of size 64 [ 28.114866] The buggy address is located 0 bytes to the right of [ 28.114866] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.115908] [ 28.116088] The buggy address belongs to the physical page: [ 28.116800] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.117339] flags: 0x200000000000000(node=0|zone=2) [ 28.117925] page_type: f5(slab) [ 28.118336] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.119076] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.119871] page dumped because: kasan: bad access detected [ 28.120317] [ 28.120637] Memory state around the buggy address: [ 28.121174] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.121611] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.122385] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.123176] ^ [ 28.123765] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.124492] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.124930] ================================================================== [ 27.152426] ================================================================== [ 27.153171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1217/0x5450 [ 27.153892] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.154527] [ 27.154763] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.155434] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.155481] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.155542] Call Trace: [ 27.155582] <TASK> [ 27.155651] dump_stack_lvl+0x73/0xb0 [ 27.156522] print_report+0xd1/0x660 [ 27.156595] ? __virt_addr_valid+0x1db/0x2d0 [ 27.156665] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.156713] kasan_report+0x104/0x140 [ 27.156817] ? kasan_atomics_helper+0x1217/0x5450 [ 27.156893] ? kasan_atomics_helper+0x1217/0x5450 [ 27.156983] kasan_check_range+0x10c/0x1c0 [ 27.157060] __kasan_check_write+0x18/0x20 [ 27.157107] kasan_atomics_helper+0x1217/0x5450 [ 27.157187] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.157226] ? kasan_save_alloc_info+0x3b/0x50 [ 27.157272] kasan_atomics+0x1dc/0x310 [ 27.157308] ? __pfx_kasan_atomics+0x10/0x10 [ 27.157346] ? __pfx_read_tsc+0x10/0x10 [ 27.157379] ? ktime_get_ts64+0x86/0x240 [ 27.157418] kunit_try_run_case+0x1b2/0x490 [ 27.157455] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.157489] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.157523] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.157557] ? __kthread_parkme+0x82/0x160 [ 27.157591] ? preempt_count_sub+0x50/0x80 [ 27.157629] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.157665] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.157702] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.157776] kthread+0x323/0x710 [ 27.157811] ? trace_preempt_on+0x20/0xc0 [ 27.157847] ? __pfx_kthread+0x10/0x10 [ 27.157880] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.157913] ? calculate_sigpending+0x7b/0xa0 [ 27.157945] ? __pfx_kthread+0x10/0x10 [ 27.157979] ret_from_fork+0x41/0x80 [ 27.158013] ? __pfx_kthread+0x10/0x10 [ 27.158046] ret_from_fork_asm+0x1a/0x30 [ 27.158094] </TASK> [ 27.158131] [ 27.174016] Allocated by task 286: [ 27.174383] kasan_save_stack+0x3d/0x60 [ 27.174857] kasan_save_track+0x18/0x40 [ 27.175389] kasan_save_alloc_info+0x3b/0x50 [ 27.175841] __kasan_kmalloc+0xb7/0xc0 [ 27.176359] __kmalloc_cache_noprof+0x183/0x410 [ 27.176838] kasan_atomics+0x95/0x310 [ 27.177252] kunit_try_run_case+0x1b2/0x490 [ 27.177782] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.178249] kthread+0x323/0x710 [ 27.178697] ret_from_fork+0x41/0x80 [ 27.179275] ret_from_fork_asm+0x1a/0x30 [ 27.179921] [ 27.180106] The buggy address belongs to the object at ffff888103231c00 [ 27.180106] which belongs to the cache kmalloc-64 of size 64 [ 27.181072] The buggy address is located 0 bytes to the right of [ 27.181072] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.182424] [ 27.182596] The buggy address belongs to the physical page: [ 27.182913] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.183363] flags: 0x200000000000000(node=0|zone=2) [ 27.183705] page_type: f5(slab) [ 27.184086] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.185016] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.185705] page dumped because: kasan: bad access detected [ 27.186257] [ 27.186484] Memory state around the buggy address: [ 27.187033] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.187716] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.188487] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.190881] ^ [ 27.192154] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.194104] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.194510] ================================================================== [ 27.756407] ================================================================== [ 27.757873] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b1/0x5450 [ 27.758487] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.758979] [ 27.759271] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.759396] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.759432] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.759492] Call Trace: [ 27.759528] <TASK> [ 27.759566] dump_stack_lvl+0x73/0xb0 [ 27.759677] print_report+0xd1/0x660 [ 27.759798] ? __virt_addr_valid+0x1db/0x2d0 [ 27.759942] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.760021] kasan_report+0x104/0x140 [ 27.760083] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.760181] ? kasan_atomics_helper+0x18b1/0x5450 [ 27.760265] kasan_check_range+0x10c/0x1c0 [ 27.760340] __kasan_check_write+0x18/0x20 [ 27.760401] kasan_atomics_helper+0x18b1/0x5450 [ 27.760471] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.760542] ? kasan_save_alloc_info+0x3b/0x50 [ 27.760630] kasan_atomics+0x1dc/0x310 [ 27.760744] ? __pfx_kasan_atomics+0x10/0x10 [ 27.760804] ? __pfx_read_tsc+0x10/0x10 [ 27.760859] ? ktime_get_ts64+0x86/0x240 [ 27.760902] kunit_try_run_case+0x1b2/0x490 [ 27.760941] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.760977] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.761012] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.761047] ? __kthread_parkme+0x82/0x160 [ 27.761082] ? preempt_count_sub+0x50/0x80 [ 27.761143] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.761182] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.761219] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.761256] kthread+0x323/0x710 [ 27.761290] ? trace_preempt_on+0x20/0xc0 [ 27.761326] ? __pfx_kthread+0x10/0x10 [ 27.761360] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.761391] ? calculate_sigpending+0x7b/0xa0 [ 27.761424] ? __pfx_kthread+0x10/0x10 [ 27.761458] ret_from_fork+0x41/0x80 [ 27.761492] ? __pfx_kthread+0x10/0x10 [ 27.761528] ret_from_fork_asm+0x1a/0x30 [ 27.761576] </TASK> [ 27.761594] [ 27.774318] Allocated by task 286: [ 27.774677] kasan_save_stack+0x3d/0x60 [ 27.775167] kasan_save_track+0x18/0x40 [ 27.775552] kasan_save_alloc_info+0x3b/0x50 [ 27.776053] __kasan_kmalloc+0xb7/0xc0 [ 27.776420] __kmalloc_cache_noprof+0x183/0x410 [ 27.776933] kasan_atomics+0x95/0x310 [ 27.777362] kunit_try_run_case+0x1b2/0x490 [ 27.777790] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.778302] kthread+0x323/0x710 [ 27.778613] ret_from_fork+0x41/0x80 [ 27.779059] ret_from_fork_asm+0x1a/0x30 [ 27.779506] [ 27.779750] The buggy address belongs to the object at ffff888103231c00 [ 27.779750] which belongs to the cache kmalloc-64 of size 64 [ 27.780430] The buggy address is located 0 bytes to the right of [ 27.780430] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.781472] [ 27.781697] The buggy address belongs to the physical page: [ 27.782185] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.782888] flags: 0x200000000000000(node=0|zone=2) [ 27.783242] page_type: f5(slab) [ 27.783491] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.784262] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.784940] page dumped because: kasan: bad access detected [ 27.785276] [ 27.785443] Memory state around the buggy address: [ 27.785774] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.786189] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.786574] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.786991] ^ [ 27.787451] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.788207] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.788882] ================================================================== [ 28.594216] ================================================================== [ 28.595061] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224c/0x5450 [ 28.595983] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.596850] [ 28.597198] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.597321] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.597358] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.597417] Call Trace: [ 28.597490] <TASK> [ 28.597532] dump_stack_lvl+0x73/0xb0 [ 28.597612] print_report+0xd1/0x660 [ 28.597682] ? __virt_addr_valid+0x1db/0x2d0 [ 28.597812] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.597854] kasan_report+0x104/0x140 [ 28.597904] ? kasan_atomics_helper+0x224c/0x5450 [ 28.597968] ? kasan_atomics_helper+0x224c/0x5450 [ 28.598046] kasan_check_range+0x10c/0x1c0 [ 28.598145] __kasan_check_write+0x18/0x20 [ 28.598211] kasan_atomics_helper+0x224c/0x5450 [ 28.598318] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.598405] ? kasan_save_alloc_info+0x3b/0x50 [ 28.598492] kasan_atomics+0x1dc/0x310 [ 28.598565] ? __pfx_kasan_atomics+0x10/0x10 [ 28.598631] ? __pfx_read_tsc+0x10/0x10 [ 28.598670] ? ktime_get_ts64+0x86/0x240 [ 28.598767] kunit_try_run_case+0x1b2/0x490 [ 28.598808] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.598843] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.598876] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.598910] ? __kthread_parkme+0x82/0x160 [ 28.598946] ? preempt_count_sub+0x50/0x80 [ 28.598984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.599020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.599056] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.599092] kthread+0x323/0x710 [ 28.599149] ? trace_preempt_on+0x20/0xc0 [ 28.599184] ? __pfx_kthread+0x10/0x10 [ 28.599217] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.599249] ? calculate_sigpending+0x7b/0xa0 [ 28.599282] ? __pfx_kthread+0x10/0x10 [ 28.599316] ret_from_fork+0x41/0x80 [ 28.599350] ? __pfx_kthread+0x10/0x10 [ 28.599385] ret_from_fork_asm+0x1a/0x30 [ 28.599435] </TASK> [ 28.599452] [ 28.617844] Allocated by task 286: [ 28.619080] kasan_save_stack+0x3d/0x60 [ 28.619504] kasan_save_track+0x18/0x40 [ 28.619966] kasan_save_alloc_info+0x3b/0x50 [ 28.620533] __kasan_kmalloc+0xb7/0xc0 [ 28.621509] __kmalloc_cache_noprof+0x183/0x410 [ 28.621885] kasan_atomics+0x95/0x310 [ 28.622324] kunit_try_run_case+0x1b2/0x490 [ 28.623140] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.623679] kthread+0x323/0x710 [ 28.624183] ret_from_fork+0x41/0x80 [ 28.624599] ret_from_fork_asm+0x1a/0x30 [ 28.625688] [ 28.625863] The buggy address belongs to the object at ffff888103231c00 [ 28.625863] which belongs to the cache kmalloc-64 of size 64 [ 28.627350] The buggy address is located 0 bytes to the right of [ 28.627350] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.628711] [ 28.629208] The buggy address belongs to the physical page: [ 28.629677] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.630407] flags: 0x200000000000000(node=0|zone=2) [ 28.631533] page_type: f5(slab) [ 28.631912] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.632611] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.633351] page dumped because: kasan: bad access detected [ 28.634099] [ 28.634284] Memory state around the buggy address: [ 28.634961] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.635817] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.636803] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.637505] ^ [ 28.638192] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.638620] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.639514] ================================================================== [ 26.228555] ================================================================== [ 26.229980] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5fe/0x5450 [ 26.232808] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.233425] [ 26.233619] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.234804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.234853] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.234916] Call Trace: [ 26.234952] <TASK> [ 26.234991] dump_stack_lvl+0x73/0xb0 [ 26.235073] print_report+0xd1/0x660 [ 26.235170] ? __virt_addr_valid+0x1db/0x2d0 [ 26.235297] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.235377] kasan_report+0x104/0x140 [ 26.235443] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.235516] ? kasan_atomics_helper+0x5fe/0x5450 [ 26.235628] kasan_check_range+0x10c/0x1c0 [ 26.235823] __kasan_check_write+0x18/0x20 [ 26.236463] kasan_atomics_helper+0x5fe/0x5450 [ 26.236556] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.236632] ? kasan_save_alloc_info+0x3b/0x50 [ 26.236847] kasan_atomics+0x1dc/0x310 [ 26.237031] ? __pfx_kasan_atomics+0x10/0x10 [ 26.237498] ? __pfx_read_tsc+0x10/0x10 [ 26.237574] ? ktime_get_ts64+0x86/0x240 [ 26.237649] kunit_try_run_case+0x1b2/0x490 [ 26.237768] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.237835] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.237873] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.237911] ? __kthread_parkme+0x82/0x160 [ 26.237946] ? preempt_count_sub+0x50/0x80 [ 26.237984] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.238020] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.238057] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.238092] kthread+0x323/0x710 [ 26.238149] ? trace_preempt_on+0x20/0xc0 [ 26.238186] ? __pfx_kthread+0x10/0x10 [ 26.238221] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.238252] ? calculate_sigpending+0x7b/0xa0 [ 26.238286] ? __pfx_kthread+0x10/0x10 [ 26.238320] ret_from_fork+0x41/0x80 [ 26.238354] ? __pfx_kthread+0x10/0x10 [ 26.238388] ret_from_fork_asm+0x1a/0x30 [ 26.238436] </TASK> [ 26.238453] [ 26.256227] Allocated by task 286: [ 26.257048] kasan_save_stack+0x3d/0x60 [ 26.257514] kasan_save_track+0x18/0x40 [ 26.258035] kasan_save_alloc_info+0x3b/0x50 [ 26.258361] __kasan_kmalloc+0xb7/0xc0 [ 26.258941] __kmalloc_cache_noprof+0x183/0x410 [ 26.259750] kasan_atomics+0x95/0x310 [ 26.260506] kunit_try_run_case+0x1b2/0x490 [ 26.261106] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.261542] kthread+0x323/0x710 [ 26.261847] ret_from_fork+0x41/0x80 [ 26.262430] ret_from_fork_asm+0x1a/0x30 [ 26.262865] [ 26.263354] The buggy address belongs to the object at ffff888103231c00 [ 26.263354] which belongs to the cache kmalloc-64 of size 64 [ 26.264548] The buggy address is located 0 bytes to the right of [ 26.264548] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.265807] [ 26.266189] The buggy address belongs to the physical page: [ 26.266935] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.267650] flags: 0x200000000000000(node=0|zone=2) [ 26.267982] page_type: f5(slab) [ 26.268309] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.269433] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.270332] page dumped because: kasan: bad access detected [ 26.270650] [ 26.271056] Memory state around the buggy address: [ 26.271681] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.272385] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.273064] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.273593] ^ [ 26.274310] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.275172] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.276060] ================================================================== [ 26.487688] ================================================================== [ 26.488237] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x992/0x5450 [ 26.489028] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.489457] [ 26.489651] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.489797] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.489839] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.489924] Call Trace: [ 26.489961] <TASK> [ 26.490000] dump_stack_lvl+0x73/0xb0 [ 26.490080] print_report+0xd1/0x660 [ 26.490174] ? __virt_addr_valid+0x1db/0x2d0 [ 26.490307] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.490386] kasan_report+0x104/0x140 [ 26.490449] ? kasan_atomics_helper+0x992/0x5450 [ 26.490522] ? kasan_atomics_helper+0x992/0x5450 [ 26.490607] kasan_check_range+0x10c/0x1c0 [ 26.490678] __kasan_check_write+0x18/0x20 [ 26.490767] kasan_atomics_helper+0x992/0x5450 [ 26.490886] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.490971] ? kasan_save_alloc_info+0x3b/0x50 [ 26.491056] kasan_atomics+0x1dc/0x310 [ 26.491154] ? __pfx_kasan_atomics+0x10/0x10 [ 26.491229] ? __pfx_read_tsc+0x10/0x10 [ 26.491340] ? ktime_get_ts64+0x86/0x240 [ 26.491424] kunit_try_run_case+0x1b2/0x490 [ 26.491493] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.491558] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.491651] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.491742] ? __kthread_parkme+0x82/0x160 [ 26.491838] ? preempt_count_sub+0x50/0x80 [ 26.491952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.492031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.492102] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.492223] kthread+0x323/0x710 [ 26.492316] ? trace_preempt_on+0x20/0xc0 [ 26.492386] ? __pfx_kthread+0x10/0x10 [ 26.492447] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.492510] ? calculate_sigpending+0x7b/0xa0 [ 26.492591] ? __pfx_kthread+0x10/0x10 [ 26.492689] ret_from_fork+0x41/0x80 [ 26.492789] ? __pfx_kthread+0x10/0x10 [ 26.492857] ret_from_fork_asm+0x1a/0x30 [ 26.492949] </TASK> [ 26.492983] [ 26.509132] Allocated by task 286: [ 26.509383] kasan_save_stack+0x3d/0x60 [ 26.509664] kasan_save_track+0x18/0x40 [ 26.509930] kasan_save_alloc_info+0x3b/0x50 [ 26.510380] __kasan_kmalloc+0xb7/0xc0 [ 26.510926] __kmalloc_cache_noprof+0x183/0x410 [ 26.511496] kasan_atomics+0x95/0x310 [ 26.512266] kunit_try_run_case+0x1b2/0x490 [ 26.512850] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.513545] kthread+0x323/0x710 [ 26.514141] ret_from_fork+0x41/0x80 [ 26.514647] ret_from_fork_asm+0x1a/0x30 [ 26.515189] [ 26.515486] The buggy address belongs to the object at ffff888103231c00 [ 26.515486] which belongs to the cache kmalloc-64 of size 64 [ 26.516836] The buggy address is located 0 bytes to the right of [ 26.516836] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.518290] [ 26.518550] The buggy address belongs to the physical page: [ 26.519466] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.520342] flags: 0x200000000000000(node=0|zone=2) [ 26.520904] page_type: f5(slab) [ 26.521404] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.522223] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.522991] page dumped because: kasan: bad access detected [ 26.523885] [ 26.524212] Memory state around the buggy address: [ 26.524765] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.525573] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.526429] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.527046] ^ [ 26.527455] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.528347] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.528978] ================================================================== [ 27.625609] ================================================================== [ 27.626339] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e7/0x5450 [ 27.626798] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.627579] [ 27.627953] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.628081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.628169] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.628234] Call Trace: [ 27.628270] <TASK> [ 27.628307] dump_stack_lvl+0x73/0xb0 [ 27.628388] print_report+0xd1/0x660 [ 27.628459] ? __virt_addr_valid+0x1db/0x2d0 [ 27.628585] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.628664] kasan_report+0x104/0x140 [ 27.628774] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.628848] ? kasan_atomics_helper+0x16e7/0x5450 [ 27.628928] kasan_check_range+0x10c/0x1c0 [ 27.629052] __kasan_check_write+0x18/0x20 [ 27.629143] kasan_atomics_helper+0x16e7/0x5450 [ 27.629214] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.629283] ? kasan_save_alloc_info+0x3b/0x50 [ 27.629385] kasan_atomics+0x1dc/0x310 [ 27.629485] ? __pfx_kasan_atomics+0x10/0x10 [ 27.629563] ? __pfx_read_tsc+0x10/0x10 [ 27.629627] ? ktime_get_ts64+0x86/0x240 [ 27.629699] kunit_try_run_case+0x1b2/0x490 [ 27.629835] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.629906] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.629975] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.630086] ? __kthread_parkme+0x82/0x160 [ 27.630178] ? preempt_count_sub+0x50/0x80 [ 27.630260] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.630333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.630406] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.630478] kthread+0x323/0x710 [ 27.630538] ? trace_preempt_on+0x20/0xc0 [ 27.630608] ? __pfx_kthread+0x10/0x10 [ 27.630664] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.630774] ? calculate_sigpending+0x7b/0xa0 [ 27.630870] ? __pfx_kthread+0x10/0x10 [ 27.630970] ret_from_fork+0x41/0x80 [ 27.631040] ? __pfx_kthread+0x10/0x10 [ 27.631100] ret_from_fork_asm+0x1a/0x30 [ 27.631217] </TASK> [ 27.631250] [ 27.648260] Allocated by task 286: [ 27.648674] kasan_save_stack+0x3d/0x60 [ 27.649145] kasan_save_track+0x18/0x40 [ 27.649770] kasan_save_alloc_info+0x3b/0x50 [ 27.650245] __kasan_kmalloc+0xb7/0xc0 [ 27.650635] __kmalloc_cache_noprof+0x183/0x410 [ 27.651351] kasan_atomics+0x95/0x310 [ 27.651664] kunit_try_run_case+0x1b2/0x490 [ 27.651982] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.652534] kthread+0x323/0x710 [ 27.653026] ret_from_fork+0x41/0x80 [ 27.653623] ret_from_fork_asm+0x1a/0x30 [ 27.654076] [ 27.654331] The buggy address belongs to the object at ffff888103231c00 [ 27.654331] which belongs to the cache kmalloc-64 of size 64 [ 27.655668] The buggy address is located 0 bytes to the right of [ 27.655668] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.656794] [ 27.658322] The buggy address belongs to the physical page: [ 27.658752] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.659716] flags: 0x200000000000000(node=0|zone=2) [ 27.662438] page_type: f5(slab) [ 27.663041] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.664640] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.666517] page dumped because: kasan: bad access detected [ 27.667277] [ 27.667837] Memory state around the buggy address: [ 27.668605] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.669938] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.670350] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.670710] ^ [ 27.671014] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.671945] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.672741] ================================================================== [ 27.372004] ================================================================== [ 27.372857] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eae/0x5450 [ 27.373706] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.374734] [ 27.374992] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.375147] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.375189] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.375228] Call Trace: [ 27.375248] <TASK> [ 27.375269] dump_stack_lvl+0x73/0xb0 [ 27.375314] print_report+0xd1/0x660 [ 27.375365] ? __virt_addr_valid+0x1db/0x2d0 [ 27.375484] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.375560] kasan_report+0x104/0x140 [ 27.375655] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.375730] ? kasan_atomics_helper+0x4eae/0x5450 [ 27.376263] __asan_report_load8_noabort+0x18/0x20 [ 27.376340] kasan_atomics_helper+0x4eae/0x5450 [ 27.376414] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.376489] ? kasan_save_alloc_info+0x3b/0x50 [ 27.376549] kasan_atomics+0x1dc/0x310 [ 27.376589] ? __pfx_kasan_atomics+0x10/0x10 [ 27.376628] ? __pfx_read_tsc+0x10/0x10 [ 27.376663] ? ktime_get_ts64+0x86/0x240 [ 27.376719] kunit_try_run_case+0x1b2/0x490 [ 27.376786] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.376821] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.376856] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.376892] ? __kthread_parkme+0x82/0x160 [ 27.376925] ? preempt_count_sub+0x50/0x80 [ 27.376965] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.377001] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.377037] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.377072] kthread+0x323/0x710 [ 27.377105] ? trace_preempt_on+0x20/0xc0 [ 27.377163] ? __pfx_kthread+0x10/0x10 [ 27.377198] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.377231] ? calculate_sigpending+0x7b/0xa0 [ 27.377265] ? __pfx_kthread+0x10/0x10 [ 27.377299] ret_from_fork+0x41/0x80 [ 27.377333] ? __pfx_kthread+0x10/0x10 [ 27.377367] ret_from_fork_asm+0x1a/0x30 [ 27.377416] </TASK> [ 27.377433] [ 27.397468] Allocated by task 286: [ 27.397700] kasan_save_stack+0x3d/0x60 [ 27.398275] kasan_save_track+0x18/0x40 [ 27.398712] kasan_save_alloc_info+0x3b/0x50 [ 27.399462] __kasan_kmalloc+0xb7/0xc0 [ 27.401015] __kmalloc_cache_noprof+0x183/0x410 [ 27.401386] kasan_atomics+0x95/0x310 [ 27.403106] kunit_try_run_case+0x1b2/0x490 [ 27.403444] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.403823] kthread+0x323/0x710 [ 27.404151] ret_from_fork+0x41/0x80 [ 27.404542] ret_from_fork_asm+0x1a/0x30 [ 27.404976] [ 27.405417] The buggy address belongs to the object at ffff888103231c00 [ 27.405417] which belongs to the cache kmalloc-64 of size 64 [ 27.405999] The buggy address is located 0 bytes to the right of [ 27.405999] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.406604] [ 27.406753] The buggy address belongs to the physical page: [ 27.408506] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.408924] flags: 0x200000000000000(node=0|zone=2) [ 27.411014] page_type: f5(slab) [ 27.411696] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.412475] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.413214] page dumped because: kasan: bad access detected [ 27.413807] [ 27.414039] Memory state around the buggy address: [ 27.414565] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.415212] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.415624] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.416333] ^ [ 27.416905] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.417644] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.418325] ================================================================== [ 27.244063] ================================================================== [ 27.244700] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e6/0x5450 [ 27.245227] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.246072] [ 27.246385] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.246516] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.246555] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.246617] Call Trace: [ 27.246652] <TASK> [ 27.246692] dump_stack_lvl+0x73/0xb0 [ 27.246832] print_report+0xd1/0x660 [ 27.246961] ? __virt_addr_valid+0x1db/0x2d0 [ 27.247183] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.247302] kasan_report+0x104/0x140 [ 27.247402] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.247529] ? kasan_atomics_helper+0x12e6/0x5450 [ 27.247648] kasan_check_range+0x10c/0x1c0 [ 27.247775] __kasan_check_write+0x18/0x20 [ 27.247850] kasan_atomics_helper+0x12e6/0x5450 [ 27.247937] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.248012] ? kasan_save_alloc_info+0x3b/0x50 [ 27.248087] kasan_atomics+0x1dc/0x310 [ 27.248154] ? __pfx_kasan_atomics+0x10/0x10 [ 27.248196] ? __pfx_read_tsc+0x10/0x10 [ 27.248231] ? ktime_get_ts64+0x86/0x240 [ 27.248271] kunit_try_run_case+0x1b2/0x490 [ 27.248308] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.248342] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.248375] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.248410] ? __kthread_parkme+0x82/0x160 [ 27.248444] ? preempt_count_sub+0x50/0x80 [ 27.248483] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.248519] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.248554] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.248590] kthread+0x323/0x710 [ 27.248623] ? trace_preempt_on+0x20/0xc0 [ 27.248658] ? __pfx_kthread+0x10/0x10 [ 27.248693] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.248769] ? calculate_sigpending+0x7b/0xa0 [ 27.248805] ? __pfx_kthread+0x10/0x10 [ 27.248840] ret_from_fork+0x41/0x80 [ 27.248874] ? __pfx_kthread+0x10/0x10 [ 27.248909] ret_from_fork_asm+0x1a/0x30 [ 27.248958] </TASK> [ 27.248975] [ 27.265226] Allocated by task 286: [ 27.265598] kasan_save_stack+0x3d/0x60 [ 27.266187] kasan_save_track+0x18/0x40 [ 27.266707] kasan_save_alloc_info+0x3b/0x50 [ 27.267287] __kasan_kmalloc+0xb7/0xc0 [ 27.267742] __kmalloc_cache_noprof+0x183/0x410 [ 27.268377] kasan_atomics+0x95/0x310 [ 27.268659] kunit_try_run_case+0x1b2/0x490 [ 27.269199] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.269951] kthread+0x323/0x710 [ 27.270497] ret_from_fork+0x41/0x80 [ 27.270975] ret_from_fork_asm+0x1a/0x30 [ 27.271386] [ 27.271551] The buggy address belongs to the object at ffff888103231c00 [ 27.271551] which belongs to the cache kmalloc-64 of size 64 [ 27.272190] The buggy address is located 0 bytes to the right of [ 27.272190] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.273444] [ 27.273946] The buggy address belongs to the physical page: [ 27.274676] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.275557] flags: 0x200000000000000(node=0|zone=2) [ 27.276249] page_type: f5(slab) [ 27.276749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.277332] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.278316] page dumped because: kasan: bad access detected [ 27.278833] [ 27.279158] Memory state around the buggy address: [ 27.279649] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.280356] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.281089] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.281999] ^ [ 27.282688] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.283375] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.284240] ================================================================== [ 26.060602] ================================================================== [ 26.064563] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b54/0x5450 [ 26.066625] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.067011] [ 26.067258] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.067382] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.067415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.068000] Call Trace: [ 26.068054] <TASK> [ 26.068092] dump_stack_lvl+0x73/0xb0 [ 26.068249] print_report+0xd1/0x660 [ 26.068319] ? __virt_addr_valid+0x1db/0x2d0 [ 26.068445] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.068519] kasan_report+0x104/0x140 [ 26.068578] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.068648] ? kasan_atomics_helper+0x4b54/0x5450 [ 26.068728] __asan_report_load4_noabort+0x18/0x20 [ 26.068793] kasan_atomics_helper+0x4b54/0x5450 [ 26.068851] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.068917] ? kasan_save_alloc_info+0x3b/0x50 [ 26.068999] kasan_atomics+0x1dc/0x310 [ 26.069064] ? __pfx_kasan_atomics+0x10/0x10 [ 26.069769] ? __pfx_read_tsc+0x10/0x10 [ 26.069855] ? ktime_get_ts64+0x86/0x240 [ 26.069928] kunit_try_run_case+0x1b2/0x490 [ 26.069996] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.070321] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.070393] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.070504] ? __kthread_parkme+0x82/0x160 [ 26.070569] ? preempt_count_sub+0x50/0x80 [ 26.070643] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.070712] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.070783] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.070884] kthread+0x323/0x710 [ 26.070947] ? trace_preempt_on+0x20/0xc0 [ 26.071015] ? __pfx_kthread+0x10/0x10 [ 26.071076] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.071163] ? calculate_sigpending+0x7b/0xa0 [ 26.071225] ? __pfx_kthread+0x10/0x10 [ 26.071287] ret_from_fork+0x41/0x80 [ 26.071352] ? __pfx_kthread+0x10/0x10 [ 26.071415] ret_from_fork_asm+0x1a/0x30 [ 26.071508] </TASK> [ 26.071541] [ 26.088035] Allocated by task 286: [ 26.088508] kasan_save_stack+0x3d/0x60 [ 26.089037] kasan_save_track+0x18/0x40 [ 26.089459] kasan_save_alloc_info+0x3b/0x50 [ 26.090036] __kasan_kmalloc+0xb7/0xc0 [ 26.090358] __kmalloc_cache_noprof+0x183/0x410 [ 26.091023] kasan_atomics+0x95/0x310 [ 26.091582] kunit_try_run_case+0x1b2/0x490 [ 26.092334] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.093133] kthread+0x323/0x710 [ 26.093746] ret_from_fork+0x41/0x80 [ 26.094365] ret_from_fork_asm+0x1a/0x30 [ 26.094917] [ 26.095173] The buggy address belongs to the object at ffff888103231c00 [ 26.095173] which belongs to the cache kmalloc-64 of size 64 [ 26.096039] The buggy address is located 0 bytes to the right of [ 26.096039] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.097386] [ 26.097691] The buggy address belongs to the physical page: [ 26.098345] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.099269] flags: 0x200000000000000(node=0|zone=2) [ 26.099926] page_type: f5(slab) [ 26.100658] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.101272] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.102213] page dumped because: kasan: bad access detected [ 26.102992] [ 26.103400] Memory state around the buggy address: [ 26.104067] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.104693] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.105974] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.106449] ^ [ 26.107254] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.108096] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.109227] ================================================================== [ 26.014375] ================================================================== [ 26.015254] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3df/0x5450 [ 26.015697] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.016462] [ 26.017571] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.017731] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.017770] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.017827] Call Trace: [ 26.017860] <TASK> [ 26.017892] dump_stack_lvl+0x73/0xb0 [ 26.018082] print_report+0xd1/0x660 [ 26.018187] ? __virt_addr_valid+0x1db/0x2d0 [ 26.018315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.018390] kasan_report+0x104/0x140 [ 26.018449] ? kasan_atomics_helper+0x3df/0x5450 [ 26.018517] ? kasan_atomics_helper+0x3df/0x5450 [ 26.018571] kasan_check_range+0x10c/0x1c0 [ 26.018608] __kasan_check_read+0x15/0x20 [ 26.018641] kasan_atomics_helper+0x3df/0x5450 [ 26.018675] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.018716] ? kasan_save_alloc_info+0x3b/0x50 [ 26.018830] kasan_atomics+0x1dc/0x310 [ 26.018866] ? __pfx_kasan_atomics+0x10/0x10 [ 26.018903] ? __pfx_read_tsc+0x10/0x10 [ 26.018936] ? ktime_get_ts64+0x86/0x240 [ 26.018973] kunit_try_run_case+0x1b2/0x490 [ 26.019008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.019040] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.019072] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.019104] ? __kthread_parkme+0x82/0x160 [ 26.019160] ? preempt_count_sub+0x50/0x80 [ 26.019197] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.019231] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.019265] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.019299] kthread+0x323/0x710 [ 26.019329] ? trace_preempt_on+0x20/0xc0 [ 26.019363] ? __pfx_kthread+0x10/0x10 [ 26.019393] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.019423] ? calculate_sigpending+0x7b/0xa0 [ 26.019454] ? __pfx_kthread+0x10/0x10 [ 26.019487] ret_from_fork+0x41/0x80 [ 26.019519] ? __pfx_kthread+0x10/0x10 [ 26.019550] ret_from_fork_asm+0x1a/0x30 [ 26.019623] </TASK> [ 26.019639] [ 26.039399] Allocated by task 286: [ 26.039717] kasan_save_stack+0x3d/0x60 [ 26.040737] kasan_save_track+0x18/0x40 [ 26.041355] kasan_save_alloc_info+0x3b/0x50 [ 26.041682] __kasan_kmalloc+0xb7/0xc0 [ 26.042389] __kmalloc_cache_noprof+0x183/0x410 [ 26.042777] kasan_atomics+0x95/0x310 [ 26.043744] kunit_try_run_case+0x1b2/0x490 [ 26.044141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.044621] kthread+0x323/0x710 [ 26.045260] ret_from_fork+0x41/0x80 [ 26.045684] ret_from_fork_asm+0x1a/0x30 [ 26.046029] [ 26.046270] The buggy address belongs to the object at ffff888103231c00 [ 26.046270] which belongs to the cache kmalloc-64 of size 64 [ 26.047143] The buggy address is located 0 bytes to the right of [ 26.047143] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.048790] [ 26.049627] The buggy address belongs to the physical page: [ 26.050319] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.051141] flags: 0x200000000000000(node=0|zone=2) [ 26.051527] page_type: f5(slab) [ 26.051926] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.053382] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.053826] page dumped because: kasan: bad access detected [ 26.054131] [ 26.054332] Memory state around the buggy address: [ 26.054599] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.057700] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.058350] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.058706] ^ [ 26.058969] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.059344] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.059715] ================================================================== [ 28.550094] ================================================================== [ 28.550807] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa5/0x5450 [ 28.551398] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.552270] [ 28.552717] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.552849] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.552890] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.552948] Call Trace: [ 28.552985] <TASK> [ 28.553024] dump_stack_lvl+0x73/0xb0 [ 28.553103] print_report+0xd1/0x660 [ 28.553192] ? __virt_addr_valid+0x1db/0x2d0 [ 28.553315] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.553392] kasan_report+0x104/0x140 [ 28.553456] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.553586] ? kasan_atomics_helper+0x4fa5/0x5450 [ 28.553747] __asan_report_load8_noabort+0x18/0x20 [ 28.553826] kasan_atomics_helper+0x4fa5/0x5450 [ 28.553904] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.553979] ? kasan_save_alloc_info+0x3b/0x50 [ 28.554067] kasan_atomics+0x1dc/0x310 [ 28.554157] ? __pfx_kasan_atomics+0x10/0x10 [ 28.554202] ? __pfx_read_tsc+0x10/0x10 [ 28.554237] ? ktime_get_ts64+0x86/0x240 [ 28.554278] kunit_try_run_case+0x1b2/0x490 [ 28.554314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.554348] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.554382] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.554417] ? __kthread_parkme+0x82/0x160 [ 28.554449] ? preempt_count_sub+0x50/0x80 [ 28.554488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.554525] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.554559] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.554595] kthread+0x323/0x710 [ 28.554626] ? trace_preempt_on+0x20/0xc0 [ 28.554662] ? __pfx_kthread+0x10/0x10 [ 28.554695] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.554774] ? calculate_sigpending+0x7b/0xa0 [ 28.554808] ? __pfx_kthread+0x10/0x10 [ 28.554843] ret_from_fork+0x41/0x80 [ 28.554878] ? __pfx_kthread+0x10/0x10 [ 28.554912] ret_from_fork_asm+0x1a/0x30 [ 28.554962] </TASK> [ 28.554979] [ 28.574270] Allocated by task 286: [ 28.574783] kasan_save_stack+0x3d/0x60 [ 28.575566] kasan_save_track+0x18/0x40 [ 28.576204] kasan_save_alloc_info+0x3b/0x50 [ 28.576659] __kasan_kmalloc+0xb7/0xc0 [ 28.577285] __kmalloc_cache_noprof+0x183/0x410 [ 28.577732] kasan_atomics+0x95/0x310 [ 28.578090] kunit_try_run_case+0x1b2/0x490 [ 28.578491] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.579563] kthread+0x323/0x710 [ 28.580021] ret_from_fork+0x41/0x80 [ 28.580790] ret_from_fork_asm+0x1a/0x30 [ 28.581156] [ 28.581551] The buggy address belongs to the object at ffff888103231c00 [ 28.581551] which belongs to the cache kmalloc-64 of size 64 [ 28.582709] The buggy address is located 0 bytes to the right of [ 28.582709] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.583601] [ 28.583932] The buggy address belongs to the physical page: [ 28.584501] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.584935] flags: 0x200000000000000(node=0|zone=2) [ 28.585458] page_type: f5(slab) [ 28.585973] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.586657] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.587351] page dumped because: kasan: bad access detected [ 28.587701] [ 28.587943] Memory state around the buggy address: [ 28.588591] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.589439] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.590047] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.590960] ^ [ 28.591554] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.592341] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.592762] ================================================================== [ 28.169595] ================================================================== [ 28.170203] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e12/0x5450 [ 28.170754] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.171426] [ 28.171745] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.171883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.171933] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.171992] Call Trace: [ 28.172028] <TASK> [ 28.172065] dump_stack_lvl+0x73/0xb0 [ 28.172201] print_report+0xd1/0x660 [ 28.172273] ? __virt_addr_valid+0x1db/0x2d0 [ 28.172380] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.172423] kasan_report+0x104/0x140 [ 28.172457] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.172503] ? kasan_atomics_helper+0x1e12/0x5450 [ 28.172587] kasan_check_range+0x10c/0x1c0 [ 28.172652] __kasan_check_write+0x18/0x20 [ 28.172758] kasan_atomics_helper+0x1e12/0x5450 [ 28.172866] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.172972] ? kasan_save_alloc_info+0x3b/0x50 [ 28.173058] kasan_atomics+0x1dc/0x310 [ 28.173153] ? __pfx_kasan_atomics+0x10/0x10 [ 28.173227] ? __pfx_read_tsc+0x10/0x10 [ 28.173294] ? ktime_get_ts64+0x86/0x240 [ 28.173370] kunit_try_run_case+0x1b2/0x490 [ 28.173444] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.173510] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.173575] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.173645] ? __kthread_parkme+0x82/0x160 [ 28.173763] ? preempt_count_sub+0x50/0x80 [ 28.173904] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.173987] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.174062] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.174155] kthread+0x323/0x710 [ 28.174224] ? trace_preempt_on+0x20/0xc0 [ 28.174295] ? __pfx_kthread+0x10/0x10 [ 28.174363] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.174426] ? calculate_sigpending+0x7b/0xa0 [ 28.174485] ? __pfx_kthread+0x10/0x10 [ 28.174524] ret_from_fork+0x41/0x80 [ 28.174562] ? __pfx_kthread+0x10/0x10 [ 28.174597] ret_from_fork_asm+0x1a/0x30 [ 28.174646] </TASK> [ 28.174664] [ 28.193868] Allocated by task 286: [ 28.194192] kasan_save_stack+0x3d/0x60 [ 28.195334] kasan_save_track+0x18/0x40 [ 28.195650] kasan_save_alloc_info+0x3b/0x50 [ 28.195966] __kasan_kmalloc+0xb7/0xc0 [ 28.196271] __kmalloc_cache_noprof+0x183/0x410 [ 28.196559] kasan_atomics+0x95/0x310 [ 28.196810] kunit_try_run_case+0x1b2/0x490 [ 28.197093] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.198501] kthread+0x323/0x710 [ 28.198964] ret_from_fork+0x41/0x80 [ 28.199429] ret_from_fork_asm+0x1a/0x30 [ 28.200027] [ 28.200321] The buggy address belongs to the object at ffff888103231c00 [ 28.200321] which belongs to the cache kmalloc-64 of size 64 [ 28.202057] The buggy address is located 0 bytes to the right of [ 28.202057] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.203655] [ 28.203973] The buggy address belongs to the physical page: [ 28.204669] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.205565] flags: 0x200000000000000(node=0|zone=2) [ 28.206214] page_type: f5(slab) [ 28.206634] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.207547] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.208439] page dumped because: kasan: bad access detected [ 28.209131] [ 28.209455] Memory state around the buggy address: [ 28.210100] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.210918] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.211393] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.211798] ^ [ 28.212105] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.212505] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.212878] ================================================================== [ 27.105310] ================================================================== [ 27.106186] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a02/0x5450 [ 27.106649] Read of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.107379] [ 27.107668] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.107800] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.107841] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.107905] Call Trace: [ 27.107954] <TASK> [ 27.107996] dump_stack_lvl+0x73/0xb0 [ 27.108077] print_report+0xd1/0x660 [ 27.108178] ? __virt_addr_valid+0x1db/0x2d0 [ 27.108304] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.108419] kasan_report+0x104/0x140 [ 27.108497] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.108572] ? kasan_atomics_helper+0x4a02/0x5450 [ 27.108652] __asan_report_load4_noabort+0x18/0x20 [ 27.108723] kasan_atomics_helper+0x4a02/0x5450 [ 27.108863] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.108953] ? kasan_save_alloc_info+0x3b/0x50 [ 27.109042] kasan_atomics+0x1dc/0x310 [ 27.109136] ? __pfx_kasan_atomics+0x10/0x10 [ 27.109216] ? __pfx_read_tsc+0x10/0x10 [ 27.109280] ? ktime_get_ts64+0x86/0x240 [ 27.109412] kunit_try_run_case+0x1b2/0x490 [ 27.109489] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.109555] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.109608] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.109646] ? __kthread_parkme+0x82/0x160 [ 27.109681] ? preempt_count_sub+0x50/0x80 [ 27.109765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.109842] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.109909] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.109976] kthread+0x323/0x710 [ 27.110036] ? trace_preempt_on+0x20/0xc0 [ 27.110107] ? __pfx_kthread+0x10/0x10 [ 27.110201] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.110270] ? calculate_sigpending+0x7b/0xa0 [ 27.110336] ? __pfx_kthread+0x10/0x10 [ 27.110406] ret_from_fork+0x41/0x80 [ 27.110475] ? __pfx_kthread+0x10/0x10 [ 27.110541] ret_from_fork_asm+0x1a/0x30 [ 27.110638] </TASK> [ 27.110673] [ 27.128511] Allocated by task 286: [ 27.128967] kasan_save_stack+0x3d/0x60 [ 27.129481] kasan_save_track+0x18/0x40 [ 27.130183] kasan_save_alloc_info+0x3b/0x50 [ 27.130868] __kasan_kmalloc+0xb7/0xc0 [ 27.132616] __kmalloc_cache_noprof+0x183/0x410 [ 27.134247] kasan_atomics+0x95/0x310 [ 27.135494] kunit_try_run_case+0x1b2/0x490 [ 27.136071] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.137470] kthread+0x323/0x710 [ 27.138461] ret_from_fork+0x41/0x80 [ 27.138855] ret_from_fork_asm+0x1a/0x30 [ 27.139149] [ 27.139303] The buggy address belongs to the object at ffff888103231c00 [ 27.139303] which belongs to the cache kmalloc-64 of size 64 [ 27.139905] The buggy address is located 0 bytes to the right of [ 27.139905] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.141173] [ 27.141545] The buggy address belongs to the physical page: [ 27.142307] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.143211] flags: 0x200000000000000(node=0|zone=2) [ 27.144000] page_type: f5(slab) [ 27.144515] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.145479] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.146363] page dumped because: kasan: bad access detected [ 27.146908] [ 27.147215] Memory state around the buggy address: [ 27.147835] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.148238] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.148894] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.149449] ^ [ 27.149959] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.150470] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.151174] ================================================================== [ 28.374342] ================================================================== [ 28.376214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f98/0x5450 [ 28.378324] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.380451] [ 28.381073] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.381205] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.381228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.381261] Call Trace: [ 28.381282] <TASK> [ 28.381303] dump_stack_lvl+0x73/0xb0 [ 28.381345] print_report+0xd1/0x660 [ 28.381381] ? __virt_addr_valid+0x1db/0x2d0 [ 28.381446] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.381485] kasan_report+0x104/0x140 [ 28.381516] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.381551] ? kasan_atomics_helper+0x4f98/0x5450 [ 28.381593] __asan_report_load8_noabort+0x18/0x20 [ 28.381626] kasan_atomics_helper+0x4f98/0x5450 [ 28.381661] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.381698] ? kasan_save_alloc_info+0x3b/0x50 [ 28.381838] kasan_atomics+0x1dc/0x310 [ 28.381910] ? __pfx_kasan_atomics+0x10/0x10 [ 28.382204] ? __pfx_read_tsc+0x10/0x10 [ 28.382248] ? ktime_get_ts64+0x86/0x240 [ 28.382289] kunit_try_run_case+0x1b2/0x490 [ 28.382328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.382363] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.382397] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.382432] ? __kthread_parkme+0x82/0x160 [ 28.382465] ? preempt_count_sub+0x50/0x80 [ 28.382504] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.382540] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.382575] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.382611] kthread+0x323/0x710 [ 28.382642] ? trace_preempt_on+0x20/0xc0 [ 28.382677] ? __pfx_kthread+0x10/0x10 [ 28.382759] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.382798] ? calculate_sigpending+0x7b/0xa0 [ 28.382830] ? __pfx_kthread+0x10/0x10 [ 28.382866] ret_from_fork+0x41/0x80 [ 28.382902] ? __pfx_kthread+0x10/0x10 [ 28.382936] ret_from_fork_asm+0x1a/0x30 [ 28.382985] </TASK> [ 28.383002] [ 28.404338] Allocated by task 286: [ 28.404932] kasan_save_stack+0x3d/0x60 [ 28.405310] kasan_save_track+0x18/0x40 [ 28.406065] kasan_save_alloc_info+0x3b/0x50 [ 28.406506] __kasan_kmalloc+0xb7/0xc0 [ 28.407349] __kmalloc_cache_noprof+0x183/0x410 [ 28.407762] kasan_atomics+0x95/0x310 [ 28.408648] kunit_try_run_case+0x1b2/0x490 [ 28.409246] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.410164] kthread+0x323/0x710 [ 28.410756] ret_from_fork+0x41/0x80 [ 28.411407] ret_from_fork_asm+0x1a/0x30 [ 28.412251] [ 28.412429] The buggy address belongs to the object at ffff888103231c00 [ 28.412429] which belongs to the cache kmalloc-64 of size 64 [ 28.413739] The buggy address is located 0 bytes to the right of [ 28.413739] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.414603] [ 28.414841] The buggy address belongs to the physical page: [ 28.415305] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.415957] flags: 0x200000000000000(node=0|zone=2) [ 28.416512] page_type: f5(slab) [ 28.416935] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.417556] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.418317] page dumped because: kasan: bad access detected [ 28.418822] [ 28.419082] Memory state around the buggy address: [ 28.419643] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.420291] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.421072] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.421472] ^ [ 28.422049] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.422898] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.423551] ================================================================== [ 27.064580] ================================================================== [ 27.065106] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1148/0x5450 [ 27.065886] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.066511] [ 27.066871] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.067004] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.067043] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.067104] Call Trace: [ 27.067164] <TASK> [ 27.067236] dump_stack_lvl+0x73/0xb0 [ 27.067331] print_report+0xd1/0x660 [ 27.067405] ? __virt_addr_valid+0x1db/0x2d0 [ 27.067527] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.067635] kasan_report+0x104/0x140 [ 27.067780] ? kasan_atomics_helper+0x1148/0x5450 [ 27.067878] ? kasan_atomics_helper+0x1148/0x5450 [ 27.067974] kasan_check_range+0x10c/0x1c0 [ 27.068051] __kasan_check_write+0x18/0x20 [ 27.068136] kasan_atomics_helper+0x1148/0x5450 [ 27.068262] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.068338] ? kasan_save_alloc_info+0x3b/0x50 [ 27.068423] kasan_atomics+0x1dc/0x310 [ 27.068496] ? __pfx_kasan_atomics+0x10/0x10 [ 27.068605] ? __pfx_read_tsc+0x10/0x10 [ 27.068688] ? ktime_get_ts64+0x86/0x240 [ 27.068818] kunit_try_run_case+0x1b2/0x490 [ 27.068897] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.068964] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.069082] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.069175] ? __kthread_parkme+0x82/0x160 [ 27.069241] ? preempt_count_sub+0x50/0x80 [ 27.069295] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.069335] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.069373] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.069422] kthread+0x323/0x710 [ 27.069478] ? trace_preempt_on+0x20/0xc0 [ 27.069544] ? __pfx_kthread+0x10/0x10 [ 27.069644] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.069763] ? calculate_sigpending+0x7b/0xa0 [ 27.069839] ? __pfx_kthread+0x10/0x10 [ 27.069904] ret_from_fork+0x41/0x80 [ 27.069976] ? __pfx_kthread+0x10/0x10 [ 27.070086] ret_from_fork_asm+0x1a/0x30 [ 27.070206] </TASK> [ 27.070247] [ 27.084031] Allocated by task 286: [ 27.085380] kasan_save_stack+0x3d/0x60 [ 27.085819] kasan_save_track+0x18/0x40 [ 27.086258] kasan_save_alloc_info+0x3b/0x50 [ 27.086657] __kasan_kmalloc+0xb7/0xc0 [ 27.087002] __kmalloc_cache_noprof+0x183/0x410 [ 27.090065] kasan_atomics+0x95/0x310 [ 27.090598] kunit_try_run_case+0x1b2/0x490 [ 27.091243] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.091777] kthread+0x323/0x710 [ 27.092161] ret_from_fork+0x41/0x80 [ 27.092972] ret_from_fork_asm+0x1a/0x30 [ 27.093590] [ 27.093823] The buggy address belongs to the object at ffff888103231c00 [ 27.093823] which belongs to the cache kmalloc-64 of size 64 [ 27.094847] The buggy address is located 0 bytes to the right of [ 27.094847] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.095708] [ 27.096009] The buggy address belongs to the physical page: [ 27.096601] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.097089] flags: 0x200000000000000(node=0|zone=2) [ 27.097680] page_type: f5(slab) [ 27.098130] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.098644] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.099245] page dumped because: kasan: bad access detected [ 27.099696] [ 27.100015] Memory state around the buggy address: [ 27.100513] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.101107] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.101523] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.102347] ^ [ 27.102853] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.103730] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.104186] ================================================================== [ 26.530096] ================================================================== [ 26.530749] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2b/0x5450 [ 26.531309] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.532153] [ 26.532457] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.532610] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.532651] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.532713] Call Trace: [ 26.532774] <TASK> [ 26.532813] dump_stack_lvl+0x73/0xb0 [ 26.532893] print_report+0xd1/0x660 [ 26.532961] ? __virt_addr_valid+0x1db/0x2d0 [ 26.533085] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.533193] kasan_report+0x104/0x140 [ 26.533260] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.533334] ? kasan_atomics_helper+0xa2b/0x5450 [ 26.533419] kasan_check_range+0x10c/0x1c0 [ 26.533496] __kasan_check_write+0x18/0x20 [ 26.533561] kasan_atomics_helper+0xa2b/0x5450 [ 26.533636] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.533712] ? kasan_save_alloc_info+0x3b/0x50 [ 26.533797] kasan_atomics+0x1dc/0x310 [ 26.533867] ? __pfx_kasan_atomics+0x10/0x10 [ 26.533991] ? __pfx_read_tsc+0x10/0x10 [ 26.534063] ? ktime_get_ts64+0x86/0x240 [ 26.534160] kunit_try_run_case+0x1b2/0x490 [ 26.534239] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.534304] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.534371] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.534439] ? __kthread_parkme+0x82/0x160 [ 26.534506] ? preempt_count_sub+0x50/0x80 [ 26.534583] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.534656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.534757] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.534838] kthread+0x323/0x710 [ 26.534950] ? trace_preempt_on+0x20/0xc0 [ 26.535031] ? __pfx_kthread+0x10/0x10 [ 26.535141] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.535214] ? calculate_sigpending+0x7b/0xa0 [ 26.535278] ? __pfx_kthread+0x10/0x10 [ 26.535341] ret_from_fork+0x41/0x80 [ 26.535409] ? __pfx_kthread+0x10/0x10 [ 26.535475] ret_from_fork_asm+0x1a/0x30 [ 26.535570] </TASK> [ 26.535636] [ 26.554969] Allocated by task 286: [ 26.555474] kasan_save_stack+0x3d/0x60 [ 26.556089] kasan_save_track+0x18/0x40 [ 26.556636] kasan_save_alloc_info+0x3b/0x50 [ 26.557254] __kasan_kmalloc+0xb7/0xc0 [ 26.557801] __kmalloc_cache_noprof+0x183/0x410 [ 26.558405] kasan_atomics+0x95/0x310 [ 26.558963] kunit_try_run_case+0x1b2/0x490 [ 26.559535] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.560071] kthread+0x323/0x710 [ 26.560383] ret_from_fork+0x41/0x80 [ 26.560895] ret_from_fork_asm+0x1a/0x30 [ 26.561293] [ 26.561455] The buggy address belongs to the object at ffff888103231c00 [ 26.561455] which belongs to the cache kmalloc-64 of size 64 [ 26.562519] The buggy address is located 0 bytes to the right of [ 26.562519] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.563375] [ 26.563669] The buggy address belongs to the physical page: [ 26.564292] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.565028] flags: 0x200000000000000(node=0|zone=2) [ 26.565524] page_type: f5(slab) [ 26.565932] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.566438] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.567174] page dumped because: kasan: bad access detected [ 26.567809] [ 26.568055] Memory state around the buggy address: [ 26.568485] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.569043] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.569729] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.570382] ^ [ 26.570884] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.571532] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.572199] ================================================================== [ 26.659411] ================================================================== [ 26.660166] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc70/0x5450 [ 26.660876] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.661306] [ 26.661505] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.661639] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.661682] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.661798] Call Trace: [ 26.661841] <TASK> [ 26.661879] dump_stack_lvl+0x73/0xb0 [ 26.661965] print_report+0xd1/0x660 [ 26.662037] ? __virt_addr_valid+0x1db/0x2d0 [ 26.662191] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.662275] kasan_report+0x104/0x140 [ 26.662338] ? kasan_atomics_helper+0xc70/0x5450 [ 26.662410] ? kasan_atomics_helper+0xc70/0x5450 [ 26.662492] kasan_check_range+0x10c/0x1c0 [ 26.662569] __kasan_check_write+0x18/0x20 [ 26.662632] kasan_atomics_helper+0xc70/0x5450 [ 26.662752] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.662841] ? kasan_save_alloc_info+0x3b/0x50 [ 26.662934] kasan_atomics+0x1dc/0x310 [ 26.663008] ? __pfx_kasan_atomics+0x10/0x10 [ 26.663084] ? __pfx_read_tsc+0x10/0x10 [ 26.663172] ? ktime_get_ts64+0x86/0x240 [ 26.663250] kunit_try_run_case+0x1b2/0x490 [ 26.663325] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.663390] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.663458] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.663525] ? __kthread_parkme+0x82/0x160 [ 26.663620] ? preempt_count_sub+0x50/0x80 [ 26.663748] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.663834] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.663911] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.663994] kthread+0x323/0x710 [ 26.664057] ? trace_preempt_on+0x20/0xc0 [ 26.664146] ? __pfx_kthread+0x10/0x10 [ 26.664186] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.664220] ? calculate_sigpending+0x7b/0xa0 [ 26.664259] ? __pfx_kthread+0x10/0x10 [ 26.664324] ret_from_fork+0x41/0x80 [ 26.664390] ? __pfx_kthread+0x10/0x10 [ 26.664447] ret_from_fork_asm+0x1a/0x30 [ 26.664538] </TASK> [ 26.664569] [ 26.682585] Allocated by task 286: [ 26.682863] kasan_save_stack+0x3d/0x60 [ 26.683210] kasan_save_track+0x18/0x40 [ 26.683657] kasan_save_alloc_info+0x3b/0x50 [ 26.684160] __kasan_kmalloc+0xb7/0xc0 [ 26.684517] __kmalloc_cache_noprof+0x183/0x410 [ 26.685020] kasan_atomics+0x95/0x310 [ 26.685384] kunit_try_run_case+0x1b2/0x490 [ 26.685851] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.686326] kthread+0x323/0x710 [ 26.686746] ret_from_fork+0x41/0x80 [ 26.687042] ret_from_fork_asm+0x1a/0x30 [ 26.687356] [ 26.687522] The buggy address belongs to the object at ffff888103231c00 [ 26.687522] which belongs to the cache kmalloc-64 of size 64 [ 26.688250] The buggy address is located 0 bytes to the right of [ 26.688250] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.689361] [ 26.689594] The buggy address belongs to the physical page: [ 26.690170] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.690956] flags: 0x200000000000000(node=0|zone=2) [ 26.691464] page_type: f5(slab) [ 26.691913] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.692413] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.693025] page dumped because: kasan: bad access detected [ 26.693513] [ 26.693677] Memory state around the buggy address: [ 26.694012] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.694679] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.695386] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.696107] ^ [ 26.696459] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.696906] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.697447] ================================================================== [ 27.538723] ================================================================== [ 27.539473] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b6/0x5450 [ 27.540077] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.540773] [ 27.541514] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.541651] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.541691] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.541779] Call Trace: [ 27.541819] <TASK> [ 27.541860] dump_stack_lvl+0x73/0xb0 [ 27.541939] print_report+0xd1/0x660 [ 27.542012] ? __virt_addr_valid+0x1db/0x2d0 [ 27.542168] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.542253] kasan_report+0x104/0x140 [ 27.542307] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.542376] ? kasan_atomics_helper+0x15b6/0x5450 [ 27.542494] kasan_check_range+0x10c/0x1c0 [ 27.542582] __kasan_check_write+0x18/0x20 [ 27.542650] kasan_atomics_helper+0x15b6/0x5450 [ 27.542803] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.543001] ? kasan_save_alloc_info+0x3b/0x50 [ 27.543262] kasan_atomics+0x1dc/0x310 [ 27.543466] ? __pfx_kasan_atomics+0x10/0x10 [ 27.543596] ? __pfx_read_tsc+0x10/0x10 [ 27.543687] ? ktime_get_ts64+0x86/0x240 [ 27.543769] kunit_try_run_case+0x1b2/0x490 [ 27.543847] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.543918] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.543994] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.544062] ? __kthread_parkme+0x82/0x160 [ 27.544152] ? preempt_count_sub+0x50/0x80 [ 27.544230] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.544305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.544377] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.544482] kthread+0x323/0x710 [ 27.544521] ? trace_preempt_on+0x20/0xc0 [ 27.544561] ? __pfx_kthread+0x10/0x10 [ 27.544596] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.544629] ? calculate_sigpending+0x7b/0xa0 [ 27.544662] ? __pfx_kthread+0x10/0x10 [ 27.544696] ret_from_fork+0x41/0x80 [ 27.544768] ? __pfx_kthread+0x10/0x10 [ 27.544803] ret_from_fork_asm+0x1a/0x30 [ 27.544855] </TASK> [ 27.544872] [ 27.563835] Allocated by task 286: [ 27.564416] kasan_save_stack+0x3d/0x60 [ 27.564690] kasan_save_track+0x18/0x40 [ 27.565597] kasan_save_alloc_info+0x3b/0x50 [ 27.566166] __kasan_kmalloc+0xb7/0xc0 [ 27.566678] __kmalloc_cache_noprof+0x183/0x410 [ 27.567306] kasan_atomics+0x95/0x310 [ 27.567696] kunit_try_run_case+0x1b2/0x490 [ 27.568656] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.569459] kthread+0x323/0x710 [ 27.570168] ret_from_fork+0x41/0x80 [ 27.570880] ret_from_fork_asm+0x1a/0x30 [ 27.571277] [ 27.571502] The buggy address belongs to the object at ffff888103231c00 [ 27.571502] which belongs to the cache kmalloc-64 of size 64 [ 27.572554] The buggy address is located 0 bytes to the right of [ 27.572554] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.574100] [ 27.574360] The buggy address belongs to the physical page: [ 27.574868] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.575553] flags: 0x200000000000000(node=0|zone=2) [ 27.576194] page_type: f5(slab) [ 27.576450] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.577484] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.578167] page dumped because: kasan: bad access detected [ 27.578638] [ 27.578806] Memory state around the buggy address: [ 27.579235] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.579636] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.581144] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.582082] ^ [ 27.582795] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.583429] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.584188] ================================================================== [ 28.506604] ================================================================== [ 28.507374] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218a/0x5450 [ 28.507967] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 28.508750] [ 28.509015] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 28.509172] Tainted: [B]=BAD_PAGE, [N]=TEST [ 28.509213] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 28.509275] Call Trace: [ 28.509313] <TASK> [ 28.509353] dump_stack_lvl+0x73/0xb0 [ 28.509431] print_report+0xd1/0x660 [ 28.509501] ? __virt_addr_valid+0x1db/0x2d0 [ 28.509631] ? kasan_complete_mode_report_info+0x2a/0x200 [ 28.509711] kasan_report+0x104/0x140 [ 28.509774] ? kasan_atomics_helper+0x218a/0x5450 [ 28.509844] ? kasan_atomics_helper+0x218a/0x5450 [ 28.509929] kasan_check_range+0x10c/0x1c0 [ 28.510003] __kasan_check_write+0x18/0x20 [ 28.510064] kasan_atomics_helper+0x218a/0x5450 [ 28.510208] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 28.510309] ? kasan_save_alloc_info+0x3b/0x50 [ 28.510392] kasan_atomics+0x1dc/0x310 [ 28.510458] ? __pfx_kasan_atomics+0x10/0x10 [ 28.510525] ? __pfx_read_tsc+0x10/0x10 [ 28.510579] ? ktime_get_ts64+0x86/0x240 [ 28.510655] kunit_try_run_case+0x1b2/0x490 [ 28.510797] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.510915] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 28.510986] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 28.511083] ? __kthread_parkme+0x82/0x160 [ 28.511217] ? preempt_count_sub+0x50/0x80 [ 28.511328] ? __pfx_kunit_try_run_case+0x10/0x10 [ 28.511431] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.511536] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 28.511670] kthread+0x323/0x710 [ 28.511821] ? trace_preempt_on+0x20/0xc0 [ 28.511946] ? __pfx_kthread+0x10/0x10 [ 28.512049] ? _raw_spin_unlock_irq+0x47/0x80 [ 28.512167] ? calculate_sigpending+0x7b/0xa0 [ 28.512243] ? __pfx_kthread+0x10/0x10 [ 28.512314] ret_from_fork+0x41/0x80 [ 28.512382] ? __pfx_kthread+0x10/0x10 [ 28.512449] ret_from_fork_asm+0x1a/0x30 [ 28.512542] </TASK> [ 28.512576] [ 28.525947] Allocated by task 286: [ 28.526337] kasan_save_stack+0x3d/0x60 [ 28.526925] kasan_save_track+0x18/0x40 [ 28.527333] kasan_save_alloc_info+0x3b/0x50 [ 28.527794] __kasan_kmalloc+0xb7/0xc0 [ 28.528258] __kmalloc_cache_noprof+0x183/0x410 [ 28.528768] kasan_atomics+0x95/0x310 [ 28.529197] kunit_try_run_case+0x1b2/0x490 [ 28.529586] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 28.530089] kthread+0x323/0x710 [ 28.530465] ret_from_fork+0x41/0x80 [ 28.530894] ret_from_fork_asm+0x1a/0x30 [ 28.531390] [ 28.531643] The buggy address belongs to the object at ffff888103231c00 [ 28.531643] which belongs to the cache kmalloc-64 of size 64 [ 28.532769] The buggy address is located 0 bytes to the right of [ 28.532769] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 28.533895] [ 28.534135] The buggy address belongs to the physical page: [ 28.534650] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 28.535476] flags: 0x200000000000000(node=0|zone=2) [ 28.536053] page_type: f5(slab) [ 28.536480] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 28.537106] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 28.537592] page dumped because: kasan: bad access detected [ 28.537965] [ 28.539168] Memory state around the buggy address: [ 28.539952] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.542430] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 28.543652] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 28.546838] ^ [ 28.547407] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.548496] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 28.549249] ================================================================== [ 26.277315] ================================================================== [ 26.278286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x697/0x5450 [ 26.279012] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.279641] [ 26.280018] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.280334] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.280475] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.280573] Call Trace: [ 26.280614] <TASK> [ 26.280653] dump_stack_lvl+0x73/0xb0 [ 26.280737] print_report+0xd1/0x660 [ 26.280838] ? __virt_addr_valid+0x1db/0x2d0 [ 26.280973] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.281053] kasan_report+0x104/0x140 [ 26.281139] ? kasan_atomics_helper+0x697/0x5450 [ 26.281217] ? kasan_atomics_helper+0x697/0x5450 [ 26.281302] kasan_check_range+0x10c/0x1c0 [ 26.281378] __kasan_check_write+0x18/0x20 [ 26.281441] kasan_atomics_helper+0x697/0x5450 [ 26.281544] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.281626] ? kasan_save_alloc_info+0x3b/0x50 [ 26.281790] kasan_atomics+0x1dc/0x310 [ 26.282075] ? __pfx_kasan_atomics+0x10/0x10 [ 26.282304] ? __pfx_read_tsc+0x10/0x10 [ 26.282383] ? ktime_get_ts64+0x86/0x240 [ 26.282461] kunit_try_run_case+0x1b2/0x490 [ 26.282536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.282603] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.282673] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.282756] ? __kthread_parkme+0x82/0x160 [ 26.282825] ? preempt_count_sub+0x50/0x80 [ 26.282870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.282908] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.282946] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.282983] kthread+0x323/0x710 [ 26.283015] ? trace_preempt_on+0x20/0xc0 [ 26.283050] ? __pfx_kthread+0x10/0x10 [ 26.283083] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.283138] ? calculate_sigpending+0x7b/0xa0 [ 26.283173] ? __pfx_kthread+0x10/0x10 [ 26.283208] ret_from_fork+0x41/0x80 [ 26.283243] ? __pfx_kthread+0x10/0x10 [ 26.283277] ret_from_fork_asm+0x1a/0x30 [ 26.283325] </TASK> [ 26.283342] [ 26.298611] Allocated by task 286: [ 26.299147] kasan_save_stack+0x3d/0x60 [ 26.299597] kasan_save_track+0x18/0x40 [ 26.300257] kasan_save_alloc_info+0x3b/0x50 [ 26.301289] __kasan_kmalloc+0xb7/0xc0 [ 26.301712] __kmalloc_cache_noprof+0x183/0x410 [ 26.302225] kasan_atomics+0x95/0x310 [ 26.302789] kunit_try_run_case+0x1b2/0x490 [ 26.303384] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.304211] kthread+0x323/0x710 [ 26.304478] ret_from_fork+0x41/0x80 [ 26.304743] ret_from_fork_asm+0x1a/0x30 [ 26.305016] [ 26.305216] The buggy address belongs to the object at ffff888103231c00 [ 26.305216] which belongs to the cache kmalloc-64 of size 64 [ 26.306641] The buggy address is located 0 bytes to the right of [ 26.306641] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.307961] [ 26.308309] The buggy address belongs to the physical page: [ 26.308847] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.309645] flags: 0x200000000000000(node=0|zone=2) [ 26.310268] page_type: f5(slab) [ 26.310635] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.311571] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.312431] page dumped because: kasan: bad access detected [ 26.312936] [ 26.313193] Memory state around the buggy address: [ 26.313585] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.314454] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.315050] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.315452] ^ [ 26.315777] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.316758] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.317636] ================================================================== [ 26.150719] ================================================================== [ 26.151171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3a/0x5450 [ 26.153514] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.154351] [ 26.155023] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.155144] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.155184] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.155244] Call Trace: [ 26.155277] <TASK> [ 26.155497] dump_stack_lvl+0x73/0xb0 [ 26.155570] print_report+0xd1/0x660 [ 26.155638] ? __virt_addr_valid+0x1db/0x2d0 [ 26.155713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.155788] kasan_report+0x104/0x140 [ 26.155821] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.155861] ? kasan_atomics_helper+0x4b3a/0x5450 [ 26.155905] __asan_report_store4_noabort+0x1b/0x30 [ 26.155950] kasan_atomics_helper+0x4b3a/0x5450 [ 26.155987] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.156023] ? kasan_save_alloc_info+0x3b/0x50 [ 26.156067] kasan_atomics+0x1dc/0x310 [ 26.156103] ? __pfx_kasan_atomics+0x10/0x10 [ 26.156175] ? __pfx_read_tsc+0x10/0x10 [ 26.156211] ? ktime_get_ts64+0x86/0x240 [ 26.156250] kunit_try_run_case+0x1b2/0x490 [ 26.156287] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.156320] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.156354] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.156388] ? __kthread_parkme+0x82/0x160 [ 26.156421] ? preempt_count_sub+0x50/0x80 [ 26.156459] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.156495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.156530] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.156566] kthread+0x323/0x710 [ 26.156597] ? trace_preempt_on+0x20/0xc0 [ 26.156632] ? __pfx_kthread+0x10/0x10 [ 26.156665] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.156696] ? calculate_sigpending+0x7b/0xa0 [ 26.156765] ? __pfx_kthread+0x10/0x10 [ 26.156801] ret_from_fork+0x41/0x80 [ 26.156836] ? __pfx_kthread+0x10/0x10 [ 26.156871] ret_from_fork_asm+0x1a/0x30 [ 26.156920] </TASK> [ 26.156937] [ 26.174045] Allocated by task 286: [ 26.174567] kasan_save_stack+0x3d/0x60 [ 26.175100] kasan_save_track+0x18/0x40 [ 26.175570] kasan_save_alloc_info+0x3b/0x50 [ 26.176388] __kasan_kmalloc+0xb7/0xc0 [ 26.176980] __kmalloc_cache_noprof+0x183/0x410 [ 26.177326] kasan_atomics+0x95/0x310 [ 26.177762] kunit_try_run_case+0x1b2/0x490 [ 26.178219] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.178587] kthread+0x323/0x710 [ 26.178977] ret_from_fork+0x41/0x80 [ 26.179404] ret_from_fork_asm+0x1a/0x30 [ 26.179773] [ 26.179969] The buggy address belongs to the object at ffff888103231c00 [ 26.179969] which belongs to the cache kmalloc-64 of size 64 [ 26.180740] The buggy address is located 0 bytes to the right of [ 26.180740] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.181776] [ 26.182000] The buggy address belongs to the physical page: [ 26.182535] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.183148] flags: 0x200000000000000(node=0|zone=2) [ 26.183461] page_type: f5(slab) [ 26.183911] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.184621] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.185326] page dumped because: kasan: bad access detected [ 26.185666] [ 26.185935] Memory state around the buggy address: [ 26.186329] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.186925] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.187341] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.187847] ^ [ 26.188338] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.189008] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.189660] ================================================================== [ 27.839637] ================================================================== [ 27.840578] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e3/0x5450 [ 27.842027] Write of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.842668] [ 27.843286] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.843703] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.844167] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.844208] Call Trace: [ 27.844232] <TASK> [ 27.844254] dump_stack_lvl+0x73/0xb0 [ 27.844301] print_report+0xd1/0x660 [ 27.844338] ? __virt_addr_valid+0x1db/0x2d0 [ 27.844406] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.844445] kasan_report+0x104/0x140 [ 27.844477] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.844514] ? kasan_atomics_helper+0x19e3/0x5450 [ 27.844557] kasan_check_range+0x10c/0x1c0 [ 27.844594] __kasan_check_write+0x18/0x20 [ 27.844625] kasan_atomics_helper+0x19e3/0x5450 [ 27.844663] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.844699] ? kasan_save_alloc_info+0x3b/0x50 [ 27.844788] kasan_atomics+0x1dc/0x310 [ 27.844827] ? __pfx_kasan_atomics+0x10/0x10 [ 27.844866] ? __pfx_read_tsc+0x10/0x10 [ 27.844900] ? ktime_get_ts64+0x86/0x240 [ 27.844939] kunit_try_run_case+0x1b2/0x490 [ 27.844977] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.845012] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.845045] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.845080] ? __kthread_parkme+0x82/0x160 [ 27.845133] ? preempt_count_sub+0x50/0x80 [ 27.845176] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.845212] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.845248] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.845285] kthread+0x323/0x710 [ 27.845317] ? trace_preempt_on+0x20/0xc0 [ 27.845353] ? __pfx_kthread+0x10/0x10 [ 27.845387] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.845418] ? calculate_sigpending+0x7b/0xa0 [ 27.845452] ? __pfx_kthread+0x10/0x10 [ 27.845486] ret_from_fork+0x41/0x80 [ 27.845521] ? __pfx_kthread+0x10/0x10 [ 27.845555] ret_from_fork_asm+0x1a/0x30 [ 27.845603] </TASK> [ 27.845619] [ 27.865215] Allocated by task 286: [ 27.865821] kasan_save_stack+0x3d/0x60 [ 27.866358] kasan_save_track+0x18/0x40 [ 27.866770] kasan_save_alloc_info+0x3b/0x50 [ 27.867441] __kasan_kmalloc+0xb7/0xc0 [ 27.868003] __kmalloc_cache_noprof+0x183/0x410 [ 27.868511] kasan_atomics+0x95/0x310 [ 27.869081] kunit_try_run_case+0x1b2/0x490 [ 27.869544] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.870184] kthread+0x323/0x710 [ 27.870574] ret_from_fork+0x41/0x80 [ 27.871037] ret_from_fork_asm+0x1a/0x30 [ 27.871624] [ 27.872033] The buggy address belongs to the object at ffff888103231c00 [ 27.872033] which belongs to the cache kmalloc-64 of size 64 [ 27.872902] The buggy address is located 0 bytes to the right of [ 27.872902] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.874061] [ 27.874315] The buggy address belongs to the physical page: [ 27.874995] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.875651] flags: 0x200000000000000(node=0|zone=2) [ 27.876242] page_type: f5(slab) [ 27.876623] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.877347] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.878071] page dumped because: kasan: bad access detected [ 27.878604] [ 27.878913] Memory state around the buggy address: [ 27.879408] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.880102] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.880589] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.881346] ^ [ 27.881937] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.882519] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.882941] ================================================================== [ 27.329055] ================================================================== [ 27.329977] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b5/0x5450 [ 27.331169] Read of size 8 at addr ffff888103231c30 by task kunit_try_catch/286 [ 27.331437] [ 27.331544] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 27.331644] Tainted: [B]=BAD_PAGE, [N]=TEST [ 27.331665] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 27.331697] Call Trace: [ 27.331717] <TASK> [ 27.331740] dump_stack_lvl+0x73/0xb0 [ 27.331783] print_report+0xd1/0x660 [ 27.331821] ? __virt_addr_valid+0x1db/0x2d0 [ 27.331889] ? kasan_complete_mode_report_info+0x2a/0x200 [ 27.331940] kasan_report+0x104/0x140 [ 27.331971] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.332008] ? kasan_atomics_helper+0x13b5/0x5450 [ 27.332050] kasan_check_range+0x10c/0x1c0 [ 27.332087] __kasan_check_read+0x15/0x20 [ 27.332221] kasan_atomics_helper+0x13b5/0x5450 [ 27.332308] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 27.332440] ? kasan_save_alloc_info+0x3b/0x50 [ 27.332548] kasan_atomics+0x1dc/0x310 [ 27.332699] ? __pfx_kasan_atomics+0x10/0x10 [ 27.332778] ? __pfx_read_tsc+0x10/0x10 [ 27.332920] ? ktime_get_ts64+0x86/0x240 [ 27.333008] kunit_try_run_case+0x1b2/0x490 [ 27.333086] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.333176] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 27.333247] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 27.333314] ? __kthread_parkme+0x82/0x160 [ 27.333381] ? preempt_count_sub+0x50/0x80 [ 27.333457] ? __pfx_kunit_try_run_case+0x10/0x10 [ 27.333529] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.333602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 27.333674] kthread+0x323/0x710 [ 27.333741] ? trace_preempt_on+0x20/0xc0 [ 27.333810] ? __pfx_kthread+0x10/0x10 [ 27.333876] ? _raw_spin_unlock_irq+0x47/0x80 [ 27.333935] ? calculate_sigpending+0x7b/0xa0 [ 27.333999] ? __pfx_kthread+0x10/0x10 [ 27.334066] ret_from_fork+0x41/0x80 [ 27.334220] ? __pfx_kthread+0x10/0x10 [ 27.334305] ret_from_fork_asm+0x1a/0x30 [ 27.334404] </TASK> [ 27.334441] [ 27.352161] Allocated by task 286: [ 27.352398] kasan_save_stack+0x3d/0x60 [ 27.352878] kasan_save_track+0x18/0x40 [ 27.353335] kasan_save_alloc_info+0x3b/0x50 [ 27.353866] __kasan_kmalloc+0xb7/0xc0 [ 27.354195] __kmalloc_cache_noprof+0x183/0x410 [ 27.354571] kasan_atomics+0x95/0x310 [ 27.355075] kunit_try_run_case+0x1b2/0x490 [ 27.355602] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 27.356127] kthread+0x323/0x710 [ 27.356439] ret_from_fork+0x41/0x80 [ 27.356912] ret_from_fork_asm+0x1a/0x30 [ 27.357400] [ 27.357630] The buggy address belongs to the object at ffff888103231c00 [ 27.357630] which belongs to the cache kmalloc-64 of size 64 [ 27.358383] The buggy address is located 0 bytes to the right of [ 27.358383] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 27.359419] [ 27.359681] The buggy address belongs to the physical page: [ 27.360288] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 27.362563] flags: 0x200000000000000(node=0|zone=2) [ 27.363042] page_type: f5(slab) [ 27.363432] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 27.364440] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 27.365193] page dumped because: kasan: bad access detected [ 27.365635] [ 27.366459] Memory state around the buggy address: [ 27.366840] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.367086] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 27.367996] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 27.368520] ^ [ 27.369080] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.369885] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 27.370563] ================================================================== [ 26.816978] ================================================================== [ 26.817647] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe78/0x5450 [ 26.818371] Write of size 4 at addr ffff888103231c30 by task kunit_try_catch/286 [ 26.819077] [ 26.819358] CPU: 1 UID: 0 PID: 286 Comm: kunit_try_catch Tainted: G B N 6.14.0-rc7-next-20250319 #1 PREEMPT(voluntary) [ 26.819494] Tainted: [B]=BAD_PAGE, [N]=TEST [ 26.819532] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 26.819617] Call Trace: [ 26.819657] <TASK> [ 26.819695] dump_stack_lvl+0x73/0xb0 [ 26.819978] print_report+0xd1/0x660 [ 26.820424] ? __virt_addr_valid+0x1db/0x2d0 [ 26.821065] ? kasan_complete_mode_report_info+0x2a/0x200 [ 26.821219] kasan_report+0x104/0x140 [ 26.821289] ? kasan_atomics_helper+0xe78/0x5450 [ 26.821363] ? kasan_atomics_helper+0xe78/0x5450 [ 26.821449] kasan_check_range+0x10c/0x1c0 [ 26.821523] __kasan_check_write+0x18/0x20 [ 26.821589] kasan_atomics_helper+0xe78/0x5450 [ 26.821660] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 26.822184] ? kasan_save_alloc_info+0x3b/0x50 [ 26.822297] kasan_atomics+0x1dc/0x310 [ 26.822376] ? __pfx_kasan_atomics+0x10/0x10 [ 26.822431] ? __pfx_read_tsc+0x10/0x10 [ 26.822469] ? ktime_get_ts64+0x86/0x240 [ 26.822509] kunit_try_run_case+0x1b2/0x490 [ 26.822547] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.822582] ? _raw_spin_lock_irqsave+0xa1/0x100 [ 26.822616] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 26.822650] ? __kthread_parkme+0x82/0x160 [ 26.822684] ? preempt_count_sub+0x50/0x80 [ 26.822776] ? __pfx_kunit_try_run_case+0x10/0x10 [ 26.822817] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.822855] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 26.822891] kthread+0x323/0x710 [ 26.822923] ? trace_preempt_on+0x20/0xc0 [ 26.822959] ? __pfx_kthread+0x10/0x10 [ 26.822994] ? _raw_spin_unlock_irq+0x47/0x80 [ 26.823025] ? calculate_sigpending+0x7b/0xa0 [ 26.823058] ? __pfx_kthread+0x10/0x10 [ 26.823093] ret_from_fork+0x41/0x80 [ 26.823150] ? __pfx_kthread+0x10/0x10 [ 26.823185] ret_from_fork_asm+0x1a/0x30 [ 26.823234] </TASK> [ 26.823251] [ 26.831973] Allocated by task 286: [ 26.832241] kasan_save_stack+0x3d/0x60 [ 26.832523] kasan_save_track+0x18/0x40 [ 26.832828] kasan_save_alloc_info+0x3b/0x50 [ 26.833155] __kasan_kmalloc+0xb7/0xc0 [ 26.833439] __kmalloc_cache_noprof+0x183/0x410 [ 26.833742] kasan_atomics+0x95/0x310 [ 26.834020] kunit_try_run_case+0x1b2/0x490 [ 26.834341] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 26.834679] kthread+0x323/0x710 [ 26.835152] ret_from_fork+0x41/0x80 [ 26.835657] ret_from_fork_asm+0x1a/0x30 [ 26.836216] [ 26.836470] The buggy address belongs to the object at ffff888103231c00 [ 26.836470] which belongs to the cache kmalloc-64 of size 64 [ 26.837681] The buggy address is located 0 bytes to the right of [ 26.837681] allocated 48-byte region [ffff888103231c00, ffff888103231c30) [ 26.839086] [ 26.839372] The buggy address belongs to the physical page: [ 26.840205] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103231 [ 26.841035] flags: 0x200000000000000(node=0|zone=2) [ 26.841627] page_type: f5(slab) [ 26.842237] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 26.843204] raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000 [ 26.844219] page dumped because: kasan: bad access detected [ 26.844854] [ 26.845133] Memory state around the buggy address: [ 26.845674] ffff888103231b00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.846427] ffff888103231b80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 26.847453] >ffff888103231c00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 26.848360] ^ [ 26.849002] ffff888103231c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.849767] ffff888103231d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 26.850530] ==================================================================