Date
June 2, 2025, 2:10 p.m.
Environment | |
---|---|
qemu-arm64 | |
qemu-x86_64 |
[ 22.937218] ================================================================== [ 22.937719] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f8/0x49c8 [ 22.938468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.939036] [ 22.939793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.939999] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.940073] Hardware name: linux,dummy-virt (DT) [ 22.940158] Call trace: [ 22.940205] dump_backtrace+0x9c/0x128 [ 22.940339] show_stack+0x20/0x38 [ 22.940425] dump_stack_lvl+0x8c/0xd0 [ 22.940533] print_report+0x118/0x5f0 [ 22.940647] kasan_report+0xdc/0x128 [ 22.940754] kasan_check_range+0x100/0x1a8 [ 22.940858] __kasan_check_read+0x20/0x30 [ 22.940921] kasan_atomics_helper+0x1f8/0x49c8 [ 22.940976] kasan_atomics+0x1a0/0x2e8 [ 22.941028] kunit_try_run_case+0x170/0x3f0 [ 22.941080] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.941135] kthread+0x24c/0x2d0 [ 22.941182] ret_from_fork+0x10/0x20 [ 22.941253] [ 22.948528] Allocated by task 252: [ 22.948865] kasan_save_stack+0x3c/0x68 [ 22.949555] kasan_save_track+0x20/0x40 [ 22.950042] kasan_save_alloc_info+0x40/0x58 [ 22.950533] __kasan_kmalloc+0xd4/0xd8 [ 22.950976] __kmalloc_cache_noprof+0x154/0x320 [ 22.951804] kasan_atomics+0xb8/0x2e8 [ 22.952282] kunit_try_run_case+0x170/0x3f0 [ 22.952744] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.953218] kthread+0x24c/0x2d0 [ 22.953711] ret_from_fork+0x10/0x20 [ 22.954120] [ 22.954445] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.954445] which belongs to the cache kmalloc-64 of size 64 [ 22.956246] The buggy address is located 0 bytes to the right of [ 22.956246] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.957162] [ 22.957517] The buggy address belongs to the physical page: [ 22.958016] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.958744] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.959724] page_type: f5(slab) [ 22.960149] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.960724] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.961484] page dumped because: kasan: bad access detected [ 22.962021] [ 22.962290] Memory state around the buggy address: [ 22.962745] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.963572] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.965048] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.965675] ^ [ 22.966394] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.967143] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.967725] ================================================================== [ 23.829306] ================================================================== [ 23.829882] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f40/0x49c8 [ 23.830838] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.831925] [ 23.832675] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.832947] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.832992] Hardware name: linux,dummy-virt (DT) [ 23.833039] Call trace: [ 23.833073] dump_backtrace+0x9c/0x128 [ 23.833142] show_stack+0x20/0x38 [ 23.833188] dump_stack_lvl+0x8c/0xd0 [ 23.833261] print_report+0x118/0x5f0 [ 23.833316] kasan_report+0xdc/0x128 [ 23.833364] __asan_report_load4_noabort+0x20/0x30 [ 23.833418] kasan_atomics_helper+0x3f40/0x49c8 [ 23.833472] kasan_atomics+0x1a0/0x2e8 [ 23.833544] kunit_try_run_case+0x170/0x3f0 [ 23.833594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.833649] kthread+0x24c/0x2d0 [ 23.833695] ret_from_fork+0x10/0x20 [ 23.833747] [ 23.838596] Allocated by task 252: [ 23.839077] kasan_save_stack+0x3c/0x68 [ 23.839693] kasan_save_track+0x20/0x40 [ 23.840214] kasan_save_alloc_info+0x40/0x58 [ 23.840630] __kasan_kmalloc+0xd4/0xd8 [ 23.841112] __kmalloc_cache_noprof+0x154/0x320 [ 23.841688] kasan_atomics+0xb8/0x2e8 [ 23.842181] kunit_try_run_case+0x170/0x3f0 [ 23.842601] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.843096] kthread+0x24c/0x2d0 [ 23.843573] ret_from_fork+0x10/0x20 [ 23.844037] [ 23.844350] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.844350] which belongs to the cache kmalloc-64 of size 64 [ 23.845314] The buggy address is located 0 bytes to the right of [ 23.845314] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.846310] [ 23.846654] The buggy address belongs to the physical page: [ 23.847129] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.847946] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.848499] page_type: f5(slab) [ 23.848965] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.849691] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.850331] page dumped because: kasan: bad access detected [ 23.850797] [ 23.851086] Memory state around the buggy address: [ 23.851508] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.852082] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.852815] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.853363] ^ [ 23.853877] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.854548] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.855044] ================================================================== [ 23.794824] ================================================================== [ 23.795382] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd00/0x49c8 [ 23.796172] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.796895] [ 23.797255] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.797496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.797577] Hardware name: linux,dummy-virt (DT) [ 23.797661] Call trace: [ 23.797729] dump_backtrace+0x9c/0x128 [ 23.797856] show_stack+0x20/0x38 [ 23.797949] dump_stack_lvl+0x8c/0xd0 [ 23.798052] print_report+0x118/0x5f0 [ 23.798153] kasan_report+0xdc/0x128 [ 23.798264] kasan_check_range+0x100/0x1a8 [ 23.798369] __kasan_check_write+0x20/0x30 [ 23.798481] kasan_atomics_helper+0xd00/0x49c8 [ 23.798574] kasan_atomics+0x1a0/0x2e8 [ 23.798626] kunit_try_run_case+0x170/0x3f0 [ 23.798679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.798735] kthread+0x24c/0x2d0 [ 23.798783] ret_from_fork+0x10/0x20 [ 23.798836] [ 23.804130] Allocated by task 252: [ 23.804633] kasan_save_stack+0x3c/0x68 [ 23.805169] kasan_save_track+0x20/0x40 [ 23.805646] kasan_save_alloc_info+0x40/0x58 [ 23.806197] __kasan_kmalloc+0xd4/0xd8 [ 23.807121] __kmalloc_cache_noprof+0x154/0x320 [ 23.807535] kasan_atomics+0xb8/0x2e8 [ 23.807901] kunit_try_run_case+0x170/0x3f0 [ 23.808279] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.810317] kthread+0x24c/0x2d0 [ 23.810935] ret_from_fork+0x10/0x20 [ 23.811998] [ 23.812601] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.812601] which belongs to the cache kmalloc-64 of size 64 [ 23.814599] The buggy address is located 0 bytes to the right of [ 23.814599] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.816175] [ 23.817586] The buggy address belongs to the physical page: [ 23.818693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.819978] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.820616] page_type: f5(slab) [ 23.821012] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.821703] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.822306] page dumped because: kasan: bad access detected [ 23.822756] [ 23.823037] Memory state around the buggy address: [ 23.823599] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.824187] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.824928] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.825604] ^ [ 23.826001] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.826656] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.827303] ================================================================== [ 23.469306] ================================================================== [ 23.469875] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8d8/0x49c8 [ 23.470494] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.471201] [ 23.471531] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.471761] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.471843] Hardware name: linux,dummy-virt (DT) [ 23.471935] Call trace: [ 23.472004] dump_backtrace+0x9c/0x128 [ 23.472135] show_stack+0x20/0x38 [ 23.472232] dump_stack_lvl+0x8c/0xd0 [ 23.472317] print_report+0x118/0x5f0 [ 23.472368] kasan_report+0xdc/0x128 [ 23.472414] kasan_check_range+0x100/0x1a8 [ 23.472463] __kasan_check_write+0x20/0x30 [ 23.472512] kasan_atomics_helper+0x8d8/0x49c8 [ 23.472565] kasan_atomics+0x1a0/0x2e8 [ 23.472614] kunit_try_run_case+0x170/0x3f0 [ 23.472665] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.472720] kthread+0x24c/0x2d0 [ 23.472767] ret_from_fork+0x10/0x20 [ 23.472819] [ 23.477999] Allocated by task 252: [ 23.478494] kasan_save_stack+0x3c/0x68 [ 23.479048] kasan_save_track+0x20/0x40 [ 23.479559] kasan_save_alloc_info+0x40/0x58 [ 23.479969] __kasan_kmalloc+0xd4/0xd8 [ 23.480432] __kmalloc_cache_noprof+0x154/0x320 [ 23.480994] kasan_atomics+0xb8/0x2e8 [ 23.481471] kunit_try_run_case+0x170/0x3f0 [ 23.482011] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.482550] kthread+0x24c/0x2d0 [ 23.482944] ret_from_fork+0x10/0x20 [ 23.483434] [ 23.483745] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.483745] which belongs to the cache kmalloc-64 of size 64 [ 23.484587] The buggy address is located 0 bytes to the right of [ 23.484587] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.485592] [ 23.485911] The buggy address belongs to the physical page: [ 23.486454] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.487120] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.487644] page_type: f5(slab) [ 23.488107] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.488736] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.489402] page dumped because: kasan: bad access detected [ 23.489844] [ 23.490127] Memory state around the buggy address: [ 23.490600] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491172] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.491848] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.492417] ^ [ 23.492852] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.493533] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.494010] ================================================================== [ 23.768345] ================================================================== [ 23.769136] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f4c/0x49c8 [ 23.769853] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.770527] [ 23.770891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.771186] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.771287] Hardware name: linux,dummy-virt (DT) [ 23.771393] Call trace: [ 23.771459] dump_backtrace+0x9c/0x128 [ 23.771586] show_stack+0x20/0x38 [ 23.771687] dump_stack_lvl+0x8c/0xd0 [ 23.771791] print_report+0x118/0x5f0 [ 23.771893] kasan_report+0xdc/0x128 [ 23.771997] __asan_report_load4_noabort+0x20/0x30 [ 23.772087] kasan_atomics_helper+0x3f4c/0x49c8 [ 23.772145] kasan_atomics+0x1a0/0x2e8 [ 23.772195] kunit_try_run_case+0x170/0x3f0 [ 23.772278] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.772337] kthread+0x24c/0x2d0 [ 23.772387] ret_from_fork+0x10/0x20 [ 23.772444] [ 23.777342] Allocated by task 252: [ 23.777828] kasan_save_stack+0x3c/0x68 [ 23.778265] kasan_save_track+0x20/0x40 [ 23.778632] kasan_save_alloc_info+0x40/0x58 [ 23.779163] __kasan_kmalloc+0xd4/0xd8 [ 23.779681] __kmalloc_cache_noprof+0x154/0x320 [ 23.780278] kasan_atomics+0xb8/0x2e8 [ 23.780758] kunit_try_run_case+0x170/0x3f0 [ 23.781253] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.781853] kthread+0x24c/0x2d0 [ 23.782252] ret_from_fork+0x10/0x20 [ 23.782670] [ 23.783021] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.783021] which belongs to the cache kmalloc-64 of size 64 [ 23.783867] The buggy address is located 0 bytes to the right of [ 23.783867] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.784751] [ 23.784932] The buggy address belongs to the physical page: [ 23.785273] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.786135] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.786752] page_type: f5(slab) [ 23.787110] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.787921] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.788563] page dumped because: kasan: bad access detected [ 23.789052] [ 23.789306] Memory state around the buggy address: [ 23.789775] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.790438] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.791162] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.791788] ^ [ 23.792192] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.792745] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.793362] ================================================================== [ 23.911956] ================================================================== [ 23.912630] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe3c/0x49c8 [ 23.913297] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.913931] [ 23.914266] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.914490] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.914575] Hardware name: linux,dummy-virt (DT) [ 23.914670] Call trace: [ 23.914738] dump_backtrace+0x9c/0x128 [ 23.914865] show_stack+0x20/0x38 [ 23.914964] dump_stack_lvl+0x8c/0xd0 [ 23.915048] print_report+0x118/0x5f0 [ 23.915142] kasan_report+0xdc/0x128 [ 23.915191] kasan_check_range+0x100/0x1a8 [ 23.915262] __kasan_check_read+0x20/0x30 [ 23.915318] kasan_atomics_helper+0xe3c/0x49c8 [ 23.915372] kasan_atomics+0x1a0/0x2e8 [ 23.915422] kunit_try_run_case+0x170/0x3f0 [ 23.915476] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.915529] kthread+0x24c/0x2d0 [ 23.915576] ret_from_fork+0x10/0x20 [ 23.915630] [ 23.920822] Allocated by task 252: [ 23.922015] kasan_save_stack+0x3c/0x68 [ 23.922423] kasan_save_track+0x20/0x40 [ 23.923015] kasan_save_alloc_info+0x40/0x58 [ 23.923604] __kasan_kmalloc+0xd4/0xd8 [ 23.924218] __kmalloc_cache_noprof+0x154/0x320 [ 23.924868] kasan_atomics+0xb8/0x2e8 [ 23.925420] kunit_try_run_case+0x170/0x3f0 [ 23.926029] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.926652] kthread+0x24c/0x2d0 [ 23.927192] ret_from_fork+0x10/0x20 [ 23.927779] [ 23.928147] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.928147] which belongs to the cache kmalloc-64 of size 64 [ 23.928991] The buggy address is located 0 bytes to the right of [ 23.928991] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.929781] [ 23.930109] The buggy address belongs to the physical page: [ 23.930749] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.931381] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.932061] page_type: f5(slab) [ 23.932436] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.933151] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.933798] page dumped because: kasan: bad access detected [ 23.934259] [ 23.934552] Memory state around the buggy address: [ 23.935015] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.935652] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.936355] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.936937] ^ [ 23.937331] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.937901] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.938555] ================================================================== [ 23.441964] ================================================================== [ 23.442665] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x810/0x49c8 [ 23.443366] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.443984] [ 23.444335] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.444572] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.444650] Hardware name: linux,dummy-virt (DT) [ 23.444739] Call trace: [ 23.444808] dump_backtrace+0x9c/0x128 [ 23.444943] show_stack+0x20/0x38 [ 23.445043] dump_stack_lvl+0x8c/0xd0 [ 23.445115] print_report+0x118/0x5f0 [ 23.445166] kasan_report+0xdc/0x128 [ 23.445212] kasan_check_range+0x100/0x1a8 [ 23.445293] __kasan_check_write+0x20/0x30 [ 23.445351] kasan_atomics_helper+0x810/0x49c8 [ 23.445405] kasan_atomics+0x1a0/0x2e8 [ 23.445455] kunit_try_run_case+0x170/0x3f0 [ 23.445525] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.445582] kthread+0x24c/0x2d0 [ 23.445631] ret_from_fork+0x10/0x20 [ 23.445684] [ 23.450983] Allocated by task 252: [ 23.451390] kasan_save_stack+0x3c/0x68 [ 23.451878] kasan_save_track+0x20/0x40 [ 23.452402] kasan_save_alloc_info+0x40/0x58 [ 23.452948] __kasan_kmalloc+0xd4/0xd8 [ 23.453461] __kmalloc_cache_noprof+0x154/0x320 [ 23.454024] kasan_atomics+0xb8/0x2e8 [ 23.454473] kunit_try_run_case+0x170/0x3f0 [ 23.454982] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.455516] kthread+0x24c/0x2d0 [ 23.455856] ret_from_fork+0x10/0x20 [ 23.456341] [ 23.456643] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.456643] which belongs to the cache kmalloc-64 of size 64 [ 23.457586] The buggy address is located 0 bytes to the right of [ 23.457586] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.458496] [ 23.458828] The buggy address belongs to the physical page: [ 23.459344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.460020] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.460715] page_type: f5(slab) [ 23.461092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.461807] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.462447] page dumped because: kasan: bad access detected [ 23.462913] [ 23.463197] Memory state around the buggy address: [ 23.463652] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.464306] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.464907] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.465525] ^ [ 23.465962] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.466663] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.467295] ================================================================== [ 24.053702] ================================================================== [ 24.054296] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf94/0x49c8 [ 24.055226] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.055900] [ 24.056228] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.056430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.056491] Hardware name: linux,dummy-virt (DT) [ 24.056565] Call trace: [ 24.056618] dump_backtrace+0x9c/0x128 [ 24.056718] show_stack+0x20/0x38 [ 24.056790] dump_stack_lvl+0x8c/0xd0 [ 24.056874] print_report+0x118/0x5f0 [ 24.056960] kasan_report+0xdc/0x128 [ 24.057036] kasan_check_range+0x100/0x1a8 [ 24.057121] __kasan_check_write+0x20/0x30 [ 24.057267] kasan_atomics_helper+0xf94/0x49c8 [ 24.057384] kasan_atomics+0x1a0/0x2e8 [ 24.057493] kunit_try_run_case+0x170/0x3f0 [ 24.057617] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.057760] kthread+0x24c/0x2d0 [ 24.057835] ret_from_fork+0x10/0x20 [ 24.057891] [ 24.063839] Allocated by task 252: [ 24.064398] kasan_save_stack+0x3c/0x68 [ 24.064965] kasan_save_track+0x20/0x40 [ 24.065505] kasan_save_alloc_info+0x40/0x58 [ 24.065960] __kasan_kmalloc+0xd4/0xd8 [ 24.066484] __kmalloc_cache_noprof+0x154/0x320 [ 24.067105] kasan_atomics+0xb8/0x2e8 [ 24.067488] kunit_try_run_case+0x170/0x3f0 [ 24.068019] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.068546] kthread+0x24c/0x2d0 [ 24.068960] ret_from_fork+0x10/0x20 [ 24.069448] [ 24.070175] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.070175] which belongs to the cache kmalloc-64 of size 64 [ 24.071601] The buggy address is located 0 bytes to the right of [ 24.071601] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.072230] [ 24.073973] The buggy address belongs to the physical page: [ 24.075090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.076607] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.078021] page_type: f5(slab) [ 24.079067] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.080663] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.081907] page dumped because: kasan: bad access detected [ 24.082470] [ 24.082785] Memory state around the buggy address: [ 24.083184] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.084008] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.084738] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.085352] ^ [ 24.085870] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.086566] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.087192] ================================================================== [ 22.906969] ================================================================== [ 22.907729] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40e4/0x49c8 [ 22.908336] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.908979] [ 22.910664] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.910804] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.910843] Hardware name: linux,dummy-virt (DT) [ 22.910889] Call trace: [ 22.910921] dump_backtrace+0x9c/0x128 [ 22.910990] show_stack+0x20/0x38 [ 22.911036] dump_stack_lvl+0x8c/0xd0 [ 22.911086] print_report+0x118/0x5f0 [ 22.911202] kasan_report+0xdc/0x128 [ 22.911313] __asan_report_store4_noabort+0x20/0x30 [ 22.911417] kasan_atomics_helper+0x40e4/0x49c8 [ 22.911520] kasan_atomics+0x1a0/0x2e8 [ 22.911616] kunit_try_run_case+0x170/0x3f0 [ 22.911710] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.911768] kthread+0x24c/0x2d0 [ 22.911815] ret_from_fork+0x10/0x20 [ 22.911869] [ 22.916767] Allocated by task 252: [ 22.916945] kasan_save_stack+0x3c/0x68 [ 22.917141] kasan_save_track+0x20/0x40 [ 22.917846] kasan_save_alloc_info+0x40/0x58 [ 22.918506] __kasan_kmalloc+0xd4/0xd8 [ 22.919107] __kmalloc_cache_noprof+0x154/0x320 [ 22.919710] kasan_atomics+0xb8/0x2e8 [ 22.920611] kunit_try_run_case+0x170/0x3f0 [ 22.921077] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.921702] kthread+0x24c/0x2d0 [ 22.922096] ret_from_fork+0x10/0x20 [ 22.922523] [ 22.922790] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.922790] which belongs to the cache kmalloc-64 of size 64 [ 22.923926] The buggy address is located 0 bytes to the right of [ 22.923926] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.924971] [ 22.926084] The buggy address belongs to the physical page: [ 22.926535] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.927126] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.928035] page_type: f5(slab) [ 22.928454] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.929060] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.929651] page dumped because: kasan: bad access detected [ 22.930146] [ 22.930452] Memory state around the buggy address: [ 22.930934] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.932402] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.933020] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.933662] ^ [ 22.934085] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.934711] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.935306] ================================================================== [ 24.635768] ================================================================== [ 24.636513] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x49c8 [ 24.637678] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.638498] [ 24.638842] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.639120] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.639208] Hardware name: linux,dummy-virt (DT) [ 24.639317] Call trace: [ 24.639365] dump_backtrace+0x9c/0x128 [ 24.639438] show_stack+0x20/0x38 [ 24.639485] dump_stack_lvl+0x8c/0xd0 [ 24.639538] print_report+0x118/0x5f0 [ 24.639587] kasan_report+0xdc/0x128 [ 24.639633] kasan_check_range+0x100/0x1a8 [ 24.639682] __kasan_check_write+0x20/0x30 [ 24.639730] kasan_atomics_helper+0x1780/0x49c8 [ 24.639784] kasan_atomics+0x1a0/0x2e8 [ 24.639833] kunit_try_run_case+0x170/0x3f0 [ 24.639884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.639939] kthread+0x24c/0x2d0 [ 24.639986] ret_from_fork+0x10/0x20 [ 24.640038] [ 24.645316] Allocated by task 252: [ 24.645802] kasan_save_stack+0x3c/0x68 [ 24.646255] kasan_save_track+0x20/0x40 [ 24.646712] kasan_save_alloc_info+0x40/0x58 [ 24.647268] __kasan_kmalloc+0xd4/0xd8 [ 24.647670] __kmalloc_cache_noprof+0x154/0x320 [ 24.648215] kasan_atomics+0xb8/0x2e8 [ 24.648710] kunit_try_run_case+0x170/0x3f0 [ 24.649246] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.649677] kthread+0x24c/0x2d0 [ 24.650154] ret_from_fork+0x10/0x20 [ 24.650644] [ 24.650895] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.650895] which belongs to the cache kmalloc-64 of size 64 [ 24.651779] The buggy address is located 0 bytes to the right of [ 24.651779] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.652821] [ 24.653130] The buggy address belongs to the physical page: [ 24.653534] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.654249] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.654942] page_type: f5(slab) [ 24.655391] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.656032] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.656703] page dumped because: kasan: bad access detected [ 24.657139] [ 24.657446] Memory state around the buggy address: [ 24.657912] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.658608] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.659234] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.659869] ^ [ 24.660375] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.660995] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.661633] ================================================================== [ 24.173875] ================================================================== [ 24.174414] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1144/0x49c8 [ 24.175299] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.176080] [ 24.176455] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.176649] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.176706] Hardware name: linux,dummy-virt (DT) [ 24.176775] Call trace: [ 24.176827] dump_backtrace+0x9c/0x128 [ 24.176936] show_stack+0x20/0x38 [ 24.177019] dump_stack_lvl+0x8c/0xd0 [ 24.177117] print_report+0x118/0x5f0 [ 24.177201] kasan_report+0xdc/0x128 [ 24.177300] kasan_check_range+0x100/0x1a8 [ 24.177382] __kasan_check_write+0x20/0x30 [ 24.177510] kasan_atomics_helper+0x1144/0x49c8 [ 24.177617] kasan_atomics+0x1a0/0x2e8 [ 24.177727] kunit_try_run_case+0x170/0x3f0 [ 24.177839] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.177951] kthread+0x24c/0x2d0 [ 24.178039] ret_from_fork+0x10/0x20 [ 24.178175] [ 24.183910] Allocated by task 252: [ 24.184654] kasan_save_stack+0x3c/0x68 [ 24.185270] kasan_save_track+0x20/0x40 [ 24.185868] kasan_save_alloc_info+0x40/0x58 [ 24.186506] __kasan_kmalloc+0xd4/0xd8 [ 24.187183] __kmalloc_cache_noprof+0x154/0x320 [ 24.187757] kasan_atomics+0xb8/0x2e8 [ 24.188308] kunit_try_run_case+0x170/0x3f0 [ 24.188822] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.189323] kthread+0x24c/0x2d0 [ 24.189646] ret_from_fork+0x10/0x20 [ 24.189988] [ 24.190721] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.190721] which belongs to the cache kmalloc-64 of size 64 [ 24.191731] The buggy address is located 0 bytes to the right of [ 24.191731] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.192623] [ 24.192981] The buggy address belongs to the physical page: [ 24.193525] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.194307] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.194921] page_type: f5(slab) [ 24.195365] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.196066] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.196730] page dumped because: kasan: bad access detected [ 24.197233] [ 24.197519] Memory state around the buggy address: [ 24.198006] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.198741] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.199414] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.200012] ^ [ 24.200509] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.201180] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.201833] ================================================================== [ 24.689694] ================================================================== [ 24.690283] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1810/0x49c8 [ 24.691151] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.692175] [ 24.692532] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.692789] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.692873] Hardware name: linux,dummy-virt (DT) [ 24.692931] Call trace: [ 24.692965] dump_backtrace+0x9c/0x128 [ 24.693033] show_stack+0x20/0x38 [ 24.693080] dump_stack_lvl+0x8c/0xd0 [ 24.693129] print_report+0x118/0x5f0 [ 24.693178] kasan_report+0xdc/0x128 [ 24.693224] kasan_check_range+0x100/0x1a8 [ 24.693300] __kasan_check_write+0x20/0x30 [ 24.693351] kasan_atomics_helper+0x1810/0x49c8 [ 24.693405] kasan_atomics+0x1a0/0x2e8 [ 24.693455] kunit_try_run_case+0x170/0x3f0 [ 24.693527] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.693584] kthread+0x24c/0x2d0 [ 24.693634] ret_from_fork+0x10/0x20 [ 24.693689] [ 24.699090] Allocated by task 252: [ 24.699487] kasan_save_stack+0x3c/0x68 [ 24.700042] kasan_save_track+0x20/0x40 [ 24.700579] kasan_save_alloc_info+0x40/0x58 [ 24.700996] __kasan_kmalloc+0xd4/0xd8 [ 24.701399] __kmalloc_cache_noprof+0x154/0x320 [ 24.701874] kasan_atomics+0xb8/0x2e8 [ 24.702431] kunit_try_run_case+0x170/0x3f0 [ 24.702854] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.703502] kthread+0x24c/0x2d0 [ 24.703871] ret_from_fork+0x10/0x20 [ 24.704375] [ 24.704668] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.704668] which belongs to the cache kmalloc-64 of size 64 [ 24.705594] The buggy address is located 0 bytes to the right of [ 24.705594] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.706782] [ 24.707137] The buggy address belongs to the physical page: [ 24.707674] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.708432] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.709059] page_type: f5(slab) [ 24.709565] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.710257] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.710997] page dumped because: kasan: bad access detected [ 24.711536] [ 24.711828] Memory state around the buggy address: [ 24.712300] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.713019] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.713701] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.714374] ^ [ 24.714846] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.715515] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.716123] ================================================================== [ 23.260494] ================================================================== [ 23.260899] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x578/0x49c8 [ 23.261939] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.262783] [ 23.263181] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.263430] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.263534] Hardware name: linux,dummy-virt (DT) [ 23.263620] Call trace: [ 23.263674] dump_backtrace+0x9c/0x128 [ 23.263805] show_stack+0x20/0x38 [ 23.263906] dump_stack_lvl+0x8c/0xd0 [ 23.264022] print_report+0x118/0x5f0 [ 23.264137] kasan_report+0xdc/0x128 [ 23.264233] kasan_check_range+0x100/0x1a8 [ 23.264333] __kasan_check_write+0x20/0x30 [ 23.264422] kasan_atomics_helper+0x578/0x49c8 [ 23.264524] kasan_atomics+0x1a0/0x2e8 [ 23.264652] kunit_try_run_case+0x170/0x3f0 [ 23.264771] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.264873] kthread+0x24c/0x2d0 [ 23.264975] ret_from_fork+0x10/0x20 [ 23.265090] [ 23.271859] Allocated by task 252: [ 23.272348] kasan_save_stack+0x3c/0x68 [ 23.272865] kasan_save_track+0x20/0x40 [ 23.273596] kasan_save_alloc_info+0x40/0x58 [ 23.274126] __kasan_kmalloc+0xd4/0xd8 [ 23.274480] __kmalloc_cache_noprof+0x154/0x320 [ 23.274828] kasan_atomics+0xb8/0x2e8 [ 23.276141] kunit_try_run_case+0x170/0x3f0 [ 23.276547] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.276938] kthread+0x24c/0x2d0 [ 23.277256] ret_from_fork+0x10/0x20 [ 23.277584] [ 23.277789] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.277789] which belongs to the cache kmalloc-64 of size 64 [ 23.280425] The buggy address is located 0 bytes to the right of [ 23.280425] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.282392] [ 23.282709] The buggy address belongs to the physical page: [ 23.283287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.284006] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.285808] page_type: f5(slab) [ 23.286438] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.288081] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.288832] page dumped because: kasan: bad access detected [ 23.289663] [ 23.290137] Memory state around the buggy address: [ 23.290697] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.293563] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.294064] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.294773] ^ [ 23.295673] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.296326] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.296767] ================================================================== [ 23.329607] ================================================================== [ 23.330271] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x650/0x49c8 [ 23.330859] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.332276] [ 23.332857] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.333099] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.333150] Hardware name: linux,dummy-virt (DT) [ 23.333196] Call trace: [ 23.333230] dump_backtrace+0x9c/0x128 [ 23.333324] show_stack+0x20/0x38 [ 23.333372] dump_stack_lvl+0x8c/0xd0 [ 23.333424] print_report+0x118/0x5f0 [ 23.333473] kasan_report+0xdc/0x128 [ 23.333534] kasan_check_range+0x100/0x1a8 [ 23.333584] __kasan_check_write+0x20/0x30 [ 23.333634] kasan_atomics_helper+0x650/0x49c8 [ 23.333685] kasan_atomics+0x1a0/0x2e8 [ 23.333734] kunit_try_run_case+0x170/0x3f0 [ 23.333784] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.333837] kthread+0x24c/0x2d0 [ 23.333885] ret_from_fork+0x10/0x20 [ 23.333937] [ 23.339769] Allocated by task 252: [ 23.340316] kasan_save_stack+0x3c/0x68 [ 23.340905] kasan_save_track+0x20/0x40 [ 23.341452] kasan_save_alloc_info+0x40/0x58 [ 23.341916] __kasan_kmalloc+0xd4/0xd8 [ 23.342516] __kmalloc_cache_noprof+0x154/0x320 [ 23.343137] kasan_atomics+0xb8/0x2e8 [ 23.343637] kunit_try_run_case+0x170/0x3f0 [ 23.344168] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.344799] kthread+0x24c/0x2d0 [ 23.345280] ret_from_fork+0x10/0x20 [ 23.345769] [ 23.346102] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.346102] which belongs to the cache kmalloc-64 of size 64 [ 23.347067] The buggy address is located 0 bytes to the right of [ 23.347067] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.348147] [ 23.348536] The buggy address belongs to the physical page: [ 23.349085] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.349823] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.350457] page_type: f5(slab) [ 23.350956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.351774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.352577] page dumped because: kasan: bad access detected [ 23.353221] [ 23.353529] Memory state around the buggy address: [ 23.354034] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.354753] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.355452] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.356108] ^ [ 23.356709] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.357404] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.358046] ================================================================== [ 23.940313] ================================================================== [ 23.940887] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40c0/0x49c8 [ 23.941510] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.942080] [ 23.942603] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.942806] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.942874] Hardware name: linux,dummy-virt (DT) [ 23.943097] Call trace: [ 23.943169] dump_backtrace+0x9c/0x128 [ 23.943318] show_stack+0x20/0x38 [ 23.943419] dump_stack_lvl+0x8c/0xd0 [ 23.943525] print_report+0x118/0x5f0 [ 23.943622] kasan_report+0xdc/0x128 [ 23.943724] __asan_report_load8_noabort+0x20/0x30 [ 23.943835] kasan_atomics_helper+0x40c0/0x49c8 [ 23.943949] kasan_atomics+0x1a0/0x2e8 [ 23.944060] kunit_try_run_case+0x170/0x3f0 [ 23.944164] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.944301] kthread+0x24c/0x2d0 [ 23.944423] ret_from_fork+0x10/0x20 [ 23.944541] [ 23.949726] Allocated by task 252: [ 23.950130] kasan_save_stack+0x3c/0x68 [ 23.951265] kasan_save_track+0x20/0x40 [ 23.951690] kasan_save_alloc_info+0x40/0x58 [ 23.952112] __kasan_kmalloc+0xd4/0xd8 [ 23.952531] __kmalloc_cache_noprof+0x154/0x320 [ 23.953003] kasan_atomics+0xb8/0x2e8 [ 23.953405] kunit_try_run_case+0x170/0x3f0 [ 23.953950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.954496] kthread+0x24c/0x2d0 [ 23.954977] ret_from_fork+0x10/0x20 [ 23.955354] [ 23.955661] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.955661] which belongs to the cache kmalloc-64 of size 64 [ 23.956582] The buggy address is located 0 bytes to the right of [ 23.956582] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.957564] [ 23.957903] The buggy address belongs to the physical page: [ 23.958344] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.959112] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.959767] page_type: f5(slab) [ 23.960142] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.960817] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.961417] page dumped because: kasan: bad access detected [ 23.961941] [ 23.962247] Memory state around the buggy address: [ 23.962707] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.963272] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.963942] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.964524] ^ [ 23.964902] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.965604] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.966154] ================================================================== [ 24.117509] ================================================================== [ 24.118066] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x106c/0x49c8 [ 24.118780] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.119412] [ 24.119815] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.120068] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.120174] Hardware name: linux,dummy-virt (DT) [ 24.120282] Call trace: [ 24.120361] dump_backtrace+0x9c/0x128 [ 24.120509] show_stack+0x20/0x38 [ 24.120566] dump_stack_lvl+0x8c/0xd0 [ 24.120622] print_report+0x118/0x5f0 [ 24.120709] kasan_report+0xdc/0x128 [ 24.120759] kasan_check_range+0x100/0x1a8 [ 24.120810] __kasan_check_write+0x20/0x30 [ 24.120860] kasan_atomics_helper+0x106c/0x49c8 [ 24.120915] kasan_atomics+0x1a0/0x2e8 [ 24.120963] kunit_try_run_case+0x170/0x3f0 [ 24.121015] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.121069] kthread+0x24c/0x2d0 [ 24.121117] ret_from_fork+0x10/0x20 [ 24.121169] [ 24.126809] Allocated by task 252: [ 24.127363] kasan_save_stack+0x3c/0x68 [ 24.127926] kasan_save_track+0x20/0x40 [ 24.128456] kasan_save_alloc_info+0x40/0x58 [ 24.129028] __kasan_kmalloc+0xd4/0xd8 [ 24.129571] __kmalloc_cache_noprof+0x154/0x320 [ 24.130095] kasan_atomics+0xb8/0x2e8 [ 24.130632] kunit_try_run_case+0x170/0x3f0 [ 24.131159] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.131726] kthread+0x24c/0x2d0 [ 24.132151] ret_from_fork+0x10/0x20 [ 24.132557] [ 24.132889] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.132889] which belongs to the cache kmalloc-64 of size 64 [ 24.133705] The buggy address is located 0 bytes to the right of [ 24.133705] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.134763] [ 24.135126] The buggy address belongs to the physical page: [ 24.135706] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.136428] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.137061] page_type: f5(slab) [ 24.137513] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.138234] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.138877] page dumped because: kasan: bad access detected [ 24.139425] [ 24.139690] Memory state around the buggy address: [ 24.140107] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.140843] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.141447] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.142117] ^ [ 24.142569] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.143256] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.143863] ================================================================== [ 23.496626] ================================================================== [ 23.497270] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4440/0x49c8 [ 23.497869] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.498474] [ 23.498809] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.499038] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.499142] Hardware name: linux,dummy-virt (DT) [ 23.499264] Call trace: [ 23.499338] dump_backtrace+0x9c/0x128 [ 23.499472] show_stack+0x20/0x38 [ 23.499580] dump_stack_lvl+0x8c/0xd0 [ 23.499709] print_report+0x118/0x5f0 [ 23.499803] kasan_report+0xdc/0x128 [ 23.499880] __asan_report_load4_noabort+0x20/0x30 [ 23.499973] kasan_atomics_helper+0x4440/0x49c8 [ 23.500053] kasan_atomics+0x1a0/0x2e8 [ 23.500130] kunit_try_run_case+0x170/0x3f0 [ 23.500216] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.500323] kthread+0x24c/0x2d0 [ 23.500411] ret_from_fork+0x10/0x20 [ 23.500498] [ 23.506049] Allocated by task 252: [ 23.506551] kasan_save_stack+0x3c/0x68 [ 23.507023] kasan_save_track+0x20/0x40 [ 23.507478] kasan_save_alloc_info+0x40/0x58 [ 23.507946] __kasan_kmalloc+0xd4/0xd8 [ 23.508449] __kmalloc_cache_noprof+0x154/0x320 [ 23.509021] kasan_atomics+0xb8/0x2e8 [ 23.509469] kunit_try_run_case+0x170/0x3f0 [ 23.509925] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.510390] kthread+0x24c/0x2d0 [ 23.510866] ret_from_fork+0x10/0x20 [ 23.511303] [ 23.511596] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.511596] which belongs to the cache kmalloc-64 of size 64 [ 23.512466] The buggy address is located 0 bytes to the right of [ 23.512466] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.513359] [ 23.513707] The buggy address belongs to the physical page: [ 23.514255] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.515059] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.515636] page_type: f5(slab) [ 23.516105] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.516774] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.517446] page dumped because: kasan: bad access detected [ 23.517879] [ 23.518183] Memory state around the buggy address: [ 23.518686] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.519315] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.519933] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.520618] ^ [ 23.521072] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.521734] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.522277] ================================================================== [ 23.415559] ================================================================== [ 23.416941] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7a0/0x49c8 [ 23.417563] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.417944] [ 23.418124] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.418233] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.418293] Hardware name: linux,dummy-virt (DT) [ 23.418338] Call trace: [ 23.418369] dump_backtrace+0x9c/0x128 [ 23.418432] show_stack+0x20/0x38 [ 23.418480] dump_stack_lvl+0x8c/0xd0 [ 23.418532] print_report+0x118/0x5f0 [ 23.418581] kasan_report+0xdc/0x128 [ 23.418627] kasan_check_range+0x100/0x1a8 [ 23.418676] __kasan_check_write+0x20/0x30 [ 23.418725] kasan_atomics_helper+0x7a0/0x49c8 [ 23.418777] kasan_atomics+0x1a0/0x2e8 [ 23.418825] kunit_try_run_case+0x170/0x3f0 [ 23.418875] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.418929] kthread+0x24c/0x2d0 [ 23.418976] ret_from_fork+0x10/0x20 [ 23.419031] [ 23.423662] Allocated by task 252: [ 23.424164] kasan_save_stack+0x3c/0x68 [ 23.424704] kasan_save_track+0x20/0x40 [ 23.425192] kasan_save_alloc_info+0x40/0x58 [ 23.425755] __kasan_kmalloc+0xd4/0xd8 [ 23.426149] __kmalloc_cache_noprof+0x154/0x320 [ 23.426642] kasan_atomics+0xb8/0x2e8 [ 23.427059] kunit_try_run_case+0x170/0x3f0 [ 23.427587] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.428232] kthread+0x24c/0x2d0 [ 23.428687] ret_from_fork+0x10/0x20 [ 23.429035] [ 23.429373] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.429373] which belongs to the cache kmalloc-64 of size 64 [ 23.430401] The buggy address is located 0 bytes to the right of [ 23.430401] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.431566] [ 23.431910] The buggy address belongs to the physical page: [ 23.432364] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.433190] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.433828] page_type: f5(slab) [ 23.434190] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.434930] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.435595] page dumped because: kasan: bad access detected [ 23.436115] [ 23.436376] Memory state around the buggy address: [ 23.436923] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.437469] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.438165] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.438753] ^ [ 23.439178] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.439827] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.440407] ================================================================== [ 23.524381] ================================================================== [ 23.524942] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x978/0x49c8 [ 23.525604] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.526171] [ 23.526527] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.526748] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.526830] Hardware name: linux,dummy-virt (DT) [ 23.526922] Call trace: [ 23.526987] dump_backtrace+0x9c/0x128 [ 23.527123] show_stack+0x20/0x38 [ 23.527226] dump_stack_lvl+0x8c/0xd0 [ 23.527328] print_report+0x118/0x5f0 [ 23.527381] kasan_report+0xdc/0x128 [ 23.527429] kasan_check_range+0x100/0x1a8 [ 23.527476] __kasan_check_write+0x20/0x30 [ 23.527526] kasan_atomics_helper+0x978/0x49c8 [ 23.527579] kasan_atomics+0x1a0/0x2e8 [ 23.527627] kunit_try_run_case+0x170/0x3f0 [ 23.527679] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.527733] kthread+0x24c/0x2d0 [ 23.527783] ret_from_fork+0x10/0x20 [ 23.527839] [ 23.533150] Allocated by task 252: [ 23.533672] kasan_save_stack+0x3c/0x68 [ 23.534220] kasan_save_track+0x20/0x40 [ 23.534723] kasan_save_alloc_info+0x40/0x58 [ 23.535177] __kasan_kmalloc+0xd4/0xd8 [ 23.535638] __kmalloc_cache_noprof+0x154/0x320 [ 23.536164] kasan_atomics+0xb8/0x2e8 [ 23.536681] kunit_try_run_case+0x170/0x3f0 [ 23.537166] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.537683] kthread+0x24c/0x2d0 [ 23.538027] ret_from_fork+0x10/0x20 [ 23.538502] [ 23.538807] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.538807] which belongs to the cache kmalloc-64 of size 64 [ 23.539763] The buggy address is located 0 bytes to the right of [ 23.539763] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.540766] [ 23.541088] The buggy address belongs to the physical page: [ 23.541576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.542315] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.542915] page_type: f5(slab) [ 23.543804] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.544499] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.544952] page dumped because: kasan: bad access detected [ 23.545325] [ 23.545536] Memory state around the buggy address: [ 23.545850] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.547619] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.548802] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.550069] ^ [ 23.550901] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.552502] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.554028] ================================================================== [ 23.583968] ================================================================== [ 23.584458] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa50/0x49c8 [ 23.585125] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.585620] [ 23.585979] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.586191] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.586282] Hardware name: linux,dummy-virt (DT) [ 23.586369] Call trace: [ 23.586430] dump_backtrace+0x9c/0x128 [ 23.586556] show_stack+0x20/0x38 [ 23.586652] dump_stack_lvl+0x8c/0xd0 [ 23.586736] print_report+0x118/0x5f0 [ 23.586789] kasan_report+0xdc/0x128 [ 23.586836] kasan_check_range+0x100/0x1a8 [ 23.586886] __kasan_check_write+0x20/0x30 [ 23.586933] kasan_atomics_helper+0xa50/0x49c8 [ 23.586987] kasan_atomics+0x1a0/0x2e8 [ 23.587036] kunit_try_run_case+0x170/0x3f0 [ 23.587126] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.587182] kthread+0x24c/0x2d0 [ 23.587231] ret_from_fork+0x10/0x20 [ 23.587312] [ 23.593038] Allocated by task 252: [ 23.593414] kasan_save_stack+0x3c/0x68 [ 23.593724] kasan_save_track+0x20/0x40 [ 23.593966] kasan_save_alloc_info+0x40/0x58 [ 23.594213] __kasan_kmalloc+0xd4/0xd8 [ 23.594901] __kmalloc_cache_noprof+0x154/0x320 [ 23.595336] kasan_atomics+0xb8/0x2e8 [ 23.595580] kunit_try_run_case+0x170/0x3f0 [ 23.595835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.596121] kthread+0x24c/0x2d0 [ 23.597070] ret_from_fork+0x10/0x20 [ 23.597631] [ 23.597904] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.597904] which belongs to the cache kmalloc-64 of size 64 [ 23.598839] The buggy address is located 0 bytes to the right of [ 23.598839] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.599874] [ 23.600223] The buggy address belongs to the physical page: [ 23.600796] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.601076] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.601535] page_type: f5(slab) [ 23.602089] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.602857] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.603544] page dumped because: kasan: bad access detected [ 23.603755] [ 23.603870] Memory state around the buggy address: [ 23.604055] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.604312] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.604542] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.604762] ^ [ 23.604942] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.605169] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.605640] ================================================================== [ 23.556251] ================================================================== [ 23.556891] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x9e4/0x49c8 [ 23.557501] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.558310] [ 23.558659] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.558883] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.558962] Hardware name: linux,dummy-virt (DT) [ 23.559052] Call trace: [ 23.559252] dump_backtrace+0x9c/0x128 [ 23.559407] show_stack+0x20/0x38 [ 23.559502] dump_stack_lvl+0x8c/0xd0 [ 23.559561] print_report+0x118/0x5f0 [ 23.559611] kasan_report+0xdc/0x128 [ 23.559656] kasan_check_range+0x100/0x1a8 [ 23.559705] __kasan_check_write+0x20/0x30 [ 23.559753] kasan_atomics_helper+0x9e4/0x49c8 [ 23.559806] kasan_atomics+0x1a0/0x2e8 [ 23.559853] kunit_try_run_case+0x170/0x3f0 [ 23.559904] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.559958] kthread+0x24c/0x2d0 [ 23.560004] ret_from_fork+0x10/0x20 [ 23.560059] [ 23.564872] Allocated by task 252: [ 23.565309] kasan_save_stack+0x3c/0x68 [ 23.565883] kasan_save_track+0x20/0x40 [ 23.566293] kasan_save_alloc_info+0x40/0x58 [ 23.566977] __kasan_kmalloc+0xd4/0xd8 [ 23.567376] __kmalloc_cache_noprof+0x154/0x320 [ 23.568099] kasan_atomics+0xb8/0x2e8 [ 23.568608] kunit_try_run_case+0x170/0x3f0 [ 23.569147] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.569742] kthread+0x24c/0x2d0 [ 23.570180] ret_from_fork+0x10/0x20 [ 23.570563] [ 23.570893] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.570893] which belongs to the cache kmalloc-64 of size 64 [ 23.571862] The buggy address is located 0 bytes to the right of [ 23.571862] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.572792] [ 23.573152] The buggy address belongs to the physical page: [ 23.573736] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.574471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.575089] page_type: f5(slab) [ 23.575494] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.576120] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.576764] page dumped because: kasan: bad access detected [ 23.577345] [ 23.577656] Memory state around the buggy address: [ 23.578131] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.578828] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.579465] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.580054] ^ [ 23.580510] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.581234] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.581756] ================================================================== [ 23.069953] ================================================================== [ 23.070710] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x344/0x49c8 [ 23.071296] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.072042] [ 23.072413] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.072652] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.072728] Hardware name: linux,dummy-virt (DT) [ 23.072814] Call trace: [ 23.072877] dump_backtrace+0x9c/0x128 [ 23.073002] show_stack+0x20/0x38 [ 23.073098] dump_stack_lvl+0x8c/0xd0 [ 23.073207] print_report+0x118/0x5f0 [ 23.073336] kasan_report+0xdc/0x128 [ 23.073432] kasan_check_range+0x100/0x1a8 [ 23.073537] __kasan_check_write+0x20/0x30 [ 23.073620] kasan_atomics_helper+0x344/0x49c8 [ 23.073746] kasan_atomics+0x1a0/0x2e8 [ 23.073832] kunit_try_run_case+0x170/0x3f0 [ 23.073911] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.074005] kthread+0x24c/0x2d0 [ 23.074093] ret_from_fork+0x10/0x20 [ 23.074177] [ 23.081201] Allocated by task 252: [ 23.081618] kasan_save_stack+0x3c/0x68 [ 23.081995] kasan_save_track+0x20/0x40 [ 23.082843] kasan_save_alloc_info+0x40/0x58 [ 23.083306] __kasan_kmalloc+0xd4/0xd8 [ 23.083633] __kmalloc_cache_noprof+0x154/0x320 [ 23.084786] kasan_atomics+0xb8/0x2e8 [ 23.085112] kunit_try_run_case+0x170/0x3f0 [ 23.085623] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.086293] kthread+0x24c/0x2d0 [ 23.086706] ret_from_fork+0x10/0x20 [ 23.087190] [ 23.087496] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.087496] which belongs to the cache kmalloc-64 of size 64 [ 23.088775] The buggy address is located 0 bytes to the right of [ 23.088775] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.089959] [ 23.090421] The buggy address belongs to the physical page: [ 23.091013] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.091814] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.093114] page_type: f5(slab) [ 23.093673] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.094651] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.095470] page dumped because: kasan: bad access detected [ 23.096361] [ 23.096650] Memory state around the buggy address: [ 23.097115] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.097700] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.098694] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.099424] ^ [ 23.099839] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.100200] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.101324] ================================================================== [ 23.883385] ================================================================== [ 23.883937] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f6c/0x49c8 [ 23.884753] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.885522] [ 23.885811] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.886047] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.886133] Hardware name: linux,dummy-virt (DT) [ 23.886232] Call trace: [ 23.886300] dump_backtrace+0x9c/0x128 [ 23.886372] show_stack+0x20/0x38 [ 23.886462] dump_stack_lvl+0x8c/0xd0 [ 23.886570] print_report+0x118/0x5f0 [ 23.886666] kasan_report+0xdc/0x128 [ 23.886764] __asan_report_load4_noabort+0x20/0x30 [ 23.886876] kasan_atomics_helper+0x3f6c/0x49c8 [ 23.886988] kasan_atomics+0x1a0/0x2e8 [ 23.887144] kunit_try_run_case+0x170/0x3f0 [ 23.887211] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.887298] kthread+0x24c/0x2d0 [ 23.887350] ret_from_fork+0x10/0x20 [ 23.887406] [ 23.894287] Allocated by task 252: [ 23.894650] kasan_save_stack+0x3c/0x68 [ 23.895018] kasan_save_track+0x20/0x40 [ 23.895641] kasan_save_alloc_info+0x40/0x58 [ 23.896088] __kasan_kmalloc+0xd4/0xd8 [ 23.896588] __kmalloc_cache_noprof+0x154/0x320 [ 23.896967] kasan_atomics+0xb8/0x2e8 [ 23.897498] kunit_try_run_case+0x170/0x3f0 [ 23.897955] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.898558] kthread+0x24c/0x2d0 [ 23.898887] ret_from_fork+0x10/0x20 [ 23.899364] [ 23.899629] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.899629] which belongs to the cache kmalloc-64 of size 64 [ 23.900446] The buggy address is located 0 bytes to the right of [ 23.900446] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.901461] [ 23.901792] The buggy address belongs to the physical page: [ 23.902293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.902991] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.903589] page_type: f5(slab) [ 23.903998] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.904723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.905405] page dumped because: kasan: bad access detected [ 23.905908] [ 23.906173] Memory state around the buggy address: [ 23.906663] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.907285] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.907949] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.908588] ^ [ 23.909040] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.909673] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.910248] ================================================================== [ 23.994841] ================================================================== [ 23.995383] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3fc4/0x49c8 [ 23.996005] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.996593] [ 23.996949] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.997193] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.997293] Hardware name: linux,dummy-virt (DT) [ 23.997387] Call trace: [ 23.997462] dump_backtrace+0x9c/0x128 [ 23.997601] show_stack+0x20/0x38 [ 23.997673] dump_stack_lvl+0x8c/0xd0 [ 23.997729] print_report+0x118/0x5f0 [ 23.997779] kasan_report+0xdc/0x128 [ 23.997826] __asan_report_store8_noabort+0x20/0x30 [ 23.997880] kasan_atomics_helper+0x3fc4/0x49c8 [ 23.997933] kasan_atomics+0x1a0/0x2e8 [ 23.997982] kunit_try_run_case+0x170/0x3f0 [ 23.998033] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.998087] kthread+0x24c/0x2d0 [ 23.998135] ret_from_fork+0x10/0x20 [ 23.998189] [ 24.003175] Allocated by task 252: [ 24.003633] kasan_save_stack+0x3c/0x68 [ 24.004115] kasan_save_track+0x20/0x40 [ 24.004608] kasan_save_alloc_info+0x40/0x58 [ 24.005165] __kasan_kmalloc+0xd4/0xd8 [ 24.005644] __kmalloc_cache_noprof+0x154/0x320 [ 24.006189] kasan_atomics+0xb8/0x2e8 [ 24.006714] kunit_try_run_case+0x170/0x3f0 [ 24.007212] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.007752] kthread+0x24c/0x2d0 [ 24.008122] ret_from_fork+0x10/0x20 [ 24.008625] [ 24.008864] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.008864] which belongs to the cache kmalloc-64 of size 64 [ 24.009788] The buggy address is located 0 bytes to the right of [ 24.009788] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.010764] [ 24.011084] The buggy address belongs to the physical page: [ 24.011608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.012408] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.012981] page_type: f5(slab) [ 24.013428] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.014132] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.014750] page dumped because: kasan: bad access detected [ 24.015191] [ 24.015491] Memory state around the buggy address: [ 24.015897] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.016560] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.017261] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.017877] ^ [ 24.018392] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.018965] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.019552] ================================================================== [ 23.635606] ================================================================== [ 23.636070] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb28/0x49c8 [ 23.636493] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.637210] [ 23.637607] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.637835] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.637919] Hardware name: linux,dummy-virt (DT) [ 23.638035] Call trace: [ 23.638098] dump_backtrace+0x9c/0x128 [ 23.638253] show_stack+0x20/0x38 [ 23.638356] dump_stack_lvl+0x8c/0xd0 [ 23.638460] print_report+0x118/0x5f0 [ 23.638579] kasan_report+0xdc/0x128 [ 23.638675] kasan_check_range+0x100/0x1a8 [ 23.638782] __kasan_check_write+0x20/0x30 [ 23.638897] kasan_atomics_helper+0xb28/0x49c8 [ 23.639007] kasan_atomics+0x1a0/0x2e8 [ 23.639138] kunit_try_run_case+0x170/0x3f0 [ 23.639214] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.639297] kthread+0x24c/0x2d0 [ 23.639351] ret_from_fork+0x10/0x20 [ 23.639404] [ 23.646471] Allocated by task 252: [ 23.646934] kasan_save_stack+0x3c/0x68 [ 23.647386] kasan_save_track+0x20/0x40 [ 23.647874] kasan_save_alloc_info+0x40/0x58 [ 23.648367] __kasan_kmalloc+0xd4/0xd8 [ 23.648778] __kmalloc_cache_noprof+0x154/0x320 [ 23.649294] kasan_atomics+0xb8/0x2e8 [ 23.649756] kunit_try_run_case+0x170/0x3f0 [ 23.650228] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.650774] kthread+0x24c/0x2d0 [ 23.651181] ret_from_fork+0x10/0x20 [ 23.651671] [ 23.651946] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.651946] which belongs to the cache kmalloc-64 of size 64 [ 23.652837] The buggy address is located 0 bytes to the right of [ 23.652837] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.653891] [ 23.654223] The buggy address belongs to the physical page: [ 23.654787] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.655226] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.655964] page_type: f5(slab) [ 23.656463] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.657168] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.657828] page dumped because: kasan: bad access detected [ 23.658360] [ 23.658603] Memory state around the buggy address: [ 23.659174] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.659831] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.660474] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.661086] ^ [ 23.661589] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.662206] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.662836] ================================================================== [ 23.716282] ================================================================== [ 23.716790] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f24/0x49c8 [ 23.717328] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.718608] [ 23.719108] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.719335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.719423] Hardware name: linux,dummy-virt (DT) [ 23.719504] Call trace: [ 23.719542] dump_backtrace+0x9c/0x128 [ 23.719614] show_stack+0x20/0x38 [ 23.719662] dump_stack_lvl+0x8c/0xd0 [ 23.719711] print_report+0x118/0x5f0 [ 23.719759] kasan_report+0xdc/0x128 [ 23.719804] __asan_report_load4_noabort+0x20/0x30 [ 23.719855] kasan_atomics_helper+0x3f24/0x49c8 [ 23.719905] kasan_atomics+0x1a0/0x2e8 [ 23.719953] kunit_try_run_case+0x170/0x3f0 [ 23.720001] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.720052] kthread+0x24c/0x2d0 [ 23.720102] ret_from_fork+0x10/0x20 [ 23.720152] [ 23.724957] Allocated by task 252: [ 23.725450] kasan_save_stack+0x3c/0x68 [ 23.725984] kasan_save_track+0x20/0x40 [ 23.726422] kasan_save_alloc_info+0x40/0x58 [ 23.726936] __kasan_kmalloc+0xd4/0xd8 [ 23.727451] __kmalloc_cache_noprof+0x154/0x320 [ 23.727977] kasan_atomics+0xb8/0x2e8 [ 23.728410] kunit_try_run_case+0x170/0x3f0 [ 23.728950] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.729567] kthread+0x24c/0x2d0 [ 23.730041] ret_from_fork+0x10/0x20 [ 23.730527] [ 23.730843] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.730843] which belongs to the cache kmalloc-64 of size 64 [ 23.731746] The buggy address is located 0 bytes to the right of [ 23.731746] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.732667] [ 23.733006] The buggy address belongs to the physical page: [ 23.733463] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.734252] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.734856] page_type: f5(slab) [ 23.735293] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.735925] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.736587] page dumped because: kasan: bad access detected [ 23.737049] [ 23.737351] Memory state around the buggy address: [ 23.737792] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.738410] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.739018] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.739454] ^ [ 23.739882] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.740458] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.741122] ================================================================== [ 24.549555] ================================================================== [ 24.550181] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f18/0x49c8 [ 24.550960] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.552340] [ 24.552714] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.552943] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.553005] Hardware name: linux,dummy-virt (DT) [ 24.553088] Call trace: [ 24.553146] dump_backtrace+0x9c/0x128 [ 24.553269] show_stack+0x20/0x38 [ 24.553345] dump_stack_lvl+0x8c/0xd0 [ 24.553426] print_report+0x118/0x5f0 [ 24.553520] kasan_report+0xdc/0x128 [ 24.553601] __asan_report_load8_noabort+0x20/0x30 [ 24.553696] kasan_atomics_helper+0x3f18/0x49c8 [ 24.553792] kasan_atomics+0x1a0/0x2e8 [ 24.553885] kunit_try_run_case+0x170/0x3f0 [ 24.554004] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.554136] kthread+0x24c/0x2d0 [ 24.554213] ret_from_fork+0x10/0x20 [ 24.554299] [ 24.559081] Allocated by task 252: [ 24.559555] kasan_save_stack+0x3c/0x68 [ 24.559974] kasan_save_track+0x20/0x40 [ 24.560511] kasan_save_alloc_info+0x40/0x58 [ 24.561055] __kasan_kmalloc+0xd4/0xd8 [ 24.561568] __kmalloc_cache_noprof+0x154/0x320 [ 24.561939] kasan_atomics+0xb8/0x2e8 [ 24.562377] kunit_try_run_case+0x170/0x3f0 [ 24.562882] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.563434] kthread+0x24c/0x2d0 [ 24.563792] ret_from_fork+0x10/0x20 [ 24.564199] [ 24.564522] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.564522] which belongs to the cache kmalloc-64 of size 64 [ 24.565396] The buggy address is located 0 bytes to the right of [ 24.565396] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.566327] [ 24.566645] The buggy address belongs to the physical page: [ 24.567246] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.567875] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.568507] page_type: f5(slab) [ 24.568901] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.569714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.570472] page dumped because: kasan: bad access detected [ 24.571134] [ 24.571583] Memory state around the buggy address: [ 24.572017] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.572616] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.573202] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.574110] ^ [ 24.574568] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.575118] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.575947] ================================================================== [ 23.102833] ================================================================== [ 23.103415] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x40fc/0x49c8 [ 23.104661] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.105762] [ 23.106097] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.106294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.106364] Hardware name: linux,dummy-virt (DT) [ 23.106416] Call trace: [ 23.106452] dump_backtrace+0x9c/0x128 [ 23.106522] show_stack+0x20/0x38 [ 23.106570] dump_stack_lvl+0x8c/0xd0 [ 23.106622] print_report+0x118/0x5f0 [ 23.106671] kasan_report+0xdc/0x128 [ 23.106716] __asan_report_store4_noabort+0x20/0x30 [ 23.106769] kasan_atomics_helper+0x40fc/0x49c8 [ 23.106824] kasan_atomics+0x1a0/0x2e8 [ 23.106872] kunit_try_run_case+0x170/0x3f0 [ 23.106924] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.106978] kthread+0x24c/0x2d0 [ 23.107028] ret_from_fork+0x10/0x20 [ 23.107148] [ 23.113614] Allocated by task 252: [ 23.114141] kasan_save_stack+0x3c/0x68 [ 23.114725] kasan_save_track+0x20/0x40 [ 23.115419] kasan_save_alloc_info+0x40/0x58 [ 23.115966] __kasan_kmalloc+0xd4/0xd8 [ 23.116651] __kmalloc_cache_noprof+0x154/0x320 [ 23.116988] kasan_atomics+0xb8/0x2e8 [ 23.117283] kunit_try_run_case+0x170/0x3f0 [ 23.117816] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.118473] kthread+0x24c/0x2d0 [ 23.118986] ret_from_fork+0x10/0x20 [ 23.119969] [ 23.120324] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.120324] which belongs to the cache kmalloc-64 of size 64 [ 23.121431] The buggy address is located 0 bytes to the right of [ 23.121431] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.122476] [ 23.122809] The buggy address belongs to the physical page: [ 23.123440] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.124072] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.125254] page_type: f5(slab) [ 23.125954] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.126656] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.127076] page dumped because: kasan: bad access detected [ 23.128025] [ 23.128345] Memory state around the buggy address: [ 23.128852] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.129387] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.130103] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.130669] ^ [ 23.131467] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132286] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.132888] ================================================================== [ 24.203756] ================================================================== [ 24.204389] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x11b0/0x49c8 [ 24.205037] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.205657] [ 24.206030] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.206264] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.206361] Hardware name: linux,dummy-virt (DT) [ 24.206459] Call trace: [ 24.206530] dump_backtrace+0x9c/0x128 [ 24.206678] show_stack+0x20/0x38 [ 24.206778] dump_stack_lvl+0x8c/0xd0 [ 24.206865] print_report+0x118/0x5f0 [ 24.206918] kasan_report+0xdc/0x128 [ 24.206971] kasan_check_range+0x100/0x1a8 [ 24.207051] __kasan_check_write+0x20/0x30 [ 24.207154] kasan_atomics_helper+0x11b0/0x49c8 [ 24.207211] kasan_atomics+0x1a0/0x2e8 [ 24.207284] kunit_try_run_case+0x170/0x3f0 [ 24.207339] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.207396] kthread+0x24c/0x2d0 [ 24.207443] ret_from_fork+0x10/0x20 [ 24.207498] [ 24.212555] Allocated by task 252: [ 24.212964] kasan_save_stack+0x3c/0x68 [ 24.213549] kasan_save_track+0x20/0x40 [ 24.214721] kasan_save_alloc_info+0x40/0x58 [ 24.215293] __kasan_kmalloc+0xd4/0xd8 [ 24.215985] __kmalloc_cache_noprof+0x154/0x320 [ 24.216521] kasan_atomics+0xb8/0x2e8 [ 24.217141] kunit_try_run_case+0x170/0x3f0 [ 24.217751] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.218330] kthread+0x24c/0x2d0 [ 24.218687] ret_from_fork+0x10/0x20 [ 24.219221] [ 24.219483] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.219483] which belongs to the cache kmalloc-64 of size 64 [ 24.220564] The buggy address is located 0 bytes to the right of [ 24.220564] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.221915] [ 24.222338] The buggy address belongs to the physical page: [ 24.222689] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.223480] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.224151] page_type: f5(slab) [ 24.224800] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.225515] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.226312] page dumped because: kasan: bad access detected [ 24.226775] [ 24.227030] Memory state around the buggy address: [ 24.227454] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.228265] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.228996] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.229675] ^ [ 24.230284] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.230921] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.231555] ================================================================== [ 23.689845] ================================================================== [ 23.690934] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xbc8/0x49c8 [ 23.691504] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.691873] [ 23.692053] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.692167] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.692204] Hardware name: linux,dummy-virt (DT) [ 23.692267] Call trace: [ 23.692305] dump_backtrace+0x9c/0x128 [ 23.692368] show_stack+0x20/0x38 [ 23.692416] dump_stack_lvl+0x8c/0xd0 [ 23.692467] print_report+0x118/0x5f0 [ 23.692514] kasan_report+0xdc/0x128 [ 23.692561] kasan_check_range+0x100/0x1a8 [ 23.692608] __kasan_check_write+0x20/0x30 [ 23.692655] kasan_atomics_helper+0xbc8/0x49c8 [ 23.692707] kasan_atomics+0x1a0/0x2e8 [ 23.692754] kunit_try_run_case+0x170/0x3f0 [ 23.692803] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.692858] kthread+0x24c/0x2d0 [ 23.692905] ret_from_fork+0x10/0x20 [ 23.692956] [ 23.698073] Allocated by task 252: [ 23.698487] kasan_save_stack+0x3c/0x68 [ 23.698949] kasan_save_track+0x20/0x40 [ 23.699363] kasan_save_alloc_info+0x40/0x58 [ 23.699841] __kasan_kmalloc+0xd4/0xd8 [ 23.700194] __kmalloc_cache_noprof+0x154/0x320 [ 23.700761] kasan_atomics+0xb8/0x2e8 [ 23.701278] kunit_try_run_case+0x170/0x3f0 [ 23.701810] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.702390] kthread+0x24c/0x2d0 [ 23.702824] ret_from_fork+0x10/0x20 [ 23.703307] [ 23.703614] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.703614] which belongs to the cache kmalloc-64 of size 64 [ 23.704537] The buggy address is located 0 bytes to the right of [ 23.704537] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.705486] [ 23.705803] The buggy address belongs to the physical page: [ 23.706282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.706894] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.707514] page_type: f5(slab) [ 23.707851] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.708654] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.709396] page dumped because: kasan: bad access detected [ 23.709877] [ 23.710183] Memory state around the buggy address: [ 23.710622] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.711258] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.711838] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.712520] ^ [ 23.712966] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.713548] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.714103] ================================================================== [ 23.000105] ================================================================== [ 23.000765] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2c4/0x49c8 [ 23.001508] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.002478] [ 23.002848] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.003201] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.003855] Hardware name: linux,dummy-virt (DT) [ 23.003971] Call trace: [ 23.004025] dump_backtrace+0x9c/0x128 [ 23.004147] show_stack+0x20/0x38 [ 23.004254] dump_stack_lvl+0x8c/0xd0 [ 23.004354] print_report+0x118/0x5f0 [ 23.004444] kasan_report+0xdc/0x128 [ 23.004523] kasan_check_range+0x100/0x1a8 [ 23.004603] __kasan_check_read+0x20/0x30 [ 23.004692] kasan_atomics_helper+0x2c4/0x49c8 [ 23.004791] kasan_atomics+0x1a0/0x2e8 [ 23.004872] kunit_try_run_case+0x170/0x3f0 [ 23.004965] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.005063] kthread+0x24c/0x2d0 [ 23.005195] ret_from_fork+0x10/0x20 [ 23.005346] [ 23.015644] Allocated by task 252: [ 23.016716] kasan_save_stack+0x3c/0x68 [ 23.017815] kasan_save_track+0x20/0x40 [ 23.018984] kasan_save_alloc_info+0x40/0x58 [ 23.020129] __kasan_kmalloc+0xd4/0xd8 [ 23.021259] __kmalloc_cache_noprof+0x154/0x320 [ 23.022173] kasan_atomics+0xb8/0x2e8 [ 23.022768] kunit_try_run_case+0x170/0x3f0 [ 23.023430] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.024333] kthread+0x24c/0x2d0 [ 23.024878] ret_from_fork+0x10/0x20 [ 23.025467] [ 23.025912] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.025912] which belongs to the cache kmalloc-64 of size 64 [ 23.027319] The buggy address is located 0 bytes to the right of [ 23.027319] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.028145] [ 23.028396] The buggy address belongs to the physical page: [ 23.028880] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.029926] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.030682] page_type: f5(slab) [ 23.031313] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.032362] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.033000] page dumped because: kasan: bad access detected [ 23.033440] [ 23.033745] Memory state around the buggy address: [ 23.034153] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.034859] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.035744] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.036150] ^ [ 23.036552] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.037355] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.038153] ================================================================== [ 23.742769] ================================================================== [ 23.743397] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc64/0x49c8 [ 23.744180] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.744684] [ 23.745035] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.745272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.745357] Hardware name: linux,dummy-virt (DT) [ 23.745454] Call trace: [ 23.745536] dump_backtrace+0x9c/0x128 [ 23.745656] show_stack+0x20/0x38 [ 23.745756] dump_stack_lvl+0x8c/0xd0 [ 23.745830] print_report+0x118/0x5f0 [ 23.745881] kasan_report+0xdc/0x128 [ 23.745927] kasan_check_range+0x100/0x1a8 [ 23.745977] __kasan_check_write+0x20/0x30 [ 23.746025] kasan_atomics_helper+0xc64/0x49c8 [ 23.746076] kasan_atomics+0x1a0/0x2e8 [ 23.746125] kunit_try_run_case+0x170/0x3f0 [ 23.746174] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.746228] kthread+0x24c/0x2d0 [ 23.746309] ret_from_fork+0x10/0x20 [ 23.746364] [ 23.751398] Allocated by task 252: [ 23.751870] kasan_save_stack+0x3c/0x68 [ 23.752396] kasan_save_track+0x20/0x40 [ 23.752823] kasan_save_alloc_info+0x40/0x58 [ 23.753268] __kasan_kmalloc+0xd4/0xd8 [ 23.753648] __kmalloc_cache_noprof+0x154/0x320 [ 23.754196] kasan_atomics+0xb8/0x2e8 [ 23.754724] kunit_try_run_case+0x170/0x3f0 [ 23.755247] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.755749] kthread+0x24c/0x2d0 [ 23.756121] ret_from_fork+0x10/0x20 [ 23.756596] [ 23.756910] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.756910] which belongs to the cache kmalloc-64 of size 64 [ 23.757773] The buggy address is located 0 bytes to the right of [ 23.757773] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.758723] [ 23.759044] The buggy address belongs to the physical page: [ 23.759577] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.760349] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.760918] page_type: f5(slab) [ 23.761328] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.762010] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.762626] page dumped because: kasan: bad access detected [ 23.763104] [ 23.763345] Memory state around the buggy address: [ 23.763679] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.764407] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.764889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.765434] ^ [ 23.765792] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.766508] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.767104] ================================================================== [ 23.967667] ================================================================== [ 23.968350] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xeb0/0x49c8 [ 23.968973] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.969664] [ 23.970014] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.970249] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.970332] Hardware name: linux,dummy-virt (DT) [ 23.970426] Call trace: [ 23.970489] dump_backtrace+0x9c/0x128 [ 23.970615] show_stack+0x20/0x38 [ 23.970719] dump_stack_lvl+0x8c/0xd0 [ 23.970825] print_report+0x118/0x5f0 [ 23.970926] kasan_report+0xdc/0x128 [ 23.971024] kasan_check_range+0x100/0x1a8 [ 23.971118] __kasan_check_write+0x20/0x30 [ 23.971182] kasan_atomics_helper+0xeb0/0x49c8 [ 23.971252] kasan_atomics+0x1a0/0x2e8 [ 23.971317] kunit_try_run_case+0x170/0x3f0 [ 23.971374] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.971430] kthread+0x24c/0x2d0 [ 23.971480] ret_from_fork+0x10/0x20 [ 23.971532] [ 23.976757] Allocated by task 252: [ 23.977227] kasan_save_stack+0x3c/0x68 [ 23.977784] kasan_save_track+0x20/0x40 [ 23.978265] kasan_save_alloc_info+0x40/0x58 [ 23.978727] __kasan_kmalloc+0xd4/0xd8 [ 23.979148] __kmalloc_cache_noprof+0x154/0x320 [ 23.979627] kasan_atomics+0xb8/0x2e8 [ 23.980128] kunit_try_run_case+0x170/0x3f0 [ 23.980622] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.981150] kthread+0x24c/0x2d0 [ 23.981542] ret_from_fork+0x10/0x20 [ 23.982024] [ 23.982354] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.982354] which belongs to the cache kmalloc-64 of size 64 [ 23.983150] The buggy address is located 0 bytes to the right of [ 23.983150] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.984090] [ 23.984429] The buggy address belongs to the physical page: [ 23.985032] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.985700] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.986383] page_type: f5(slab) [ 23.986787] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.987382] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.988086] page dumped because: kasan: bad access detected [ 23.988589] [ 23.988870] Memory state around the buggy address: [ 23.989386] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.989985] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.990642] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.991247] ^ [ 23.991659] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992313] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.992922] ================================================================== [ 24.434292] ================================================================== [ 24.434998] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1518/0x49c8 [ 24.435945] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.436726] [ 24.437080] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.437326] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.437402] Hardware name: linux,dummy-virt (DT) [ 24.437499] Call trace: [ 24.437569] dump_backtrace+0x9c/0x128 [ 24.437690] show_stack+0x20/0x38 [ 24.437786] dump_stack_lvl+0x8c/0xd0 [ 24.437865] print_report+0x118/0x5f0 [ 24.437933] kasan_report+0xdc/0x128 [ 24.437997] kasan_check_range+0x100/0x1a8 [ 24.438048] __kasan_check_write+0x20/0x30 [ 24.438097] kasan_atomics_helper+0x1518/0x49c8 [ 24.438151] kasan_atomics+0x1a0/0x2e8 [ 24.438200] kunit_try_run_case+0x170/0x3f0 [ 24.438277] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.438337] kthread+0x24c/0x2d0 [ 24.438386] ret_from_fork+0x10/0x20 [ 24.438441] [ 24.445532] Allocated by task 252: [ 24.446059] kasan_save_stack+0x3c/0x68 [ 24.446595] kasan_save_track+0x20/0x40 [ 24.446990] kasan_save_alloc_info+0x40/0x58 [ 24.447588] __kasan_kmalloc+0xd4/0xd8 [ 24.448018] __kmalloc_cache_noprof+0x154/0x320 [ 24.448560] kasan_atomics+0xb8/0x2e8 [ 24.449021] kunit_try_run_case+0x170/0x3f0 [ 24.449413] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.450068] kthread+0x24c/0x2d0 [ 24.450509] ret_from_fork+0x10/0x20 [ 24.450978] [ 24.451319] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.451319] which belongs to the cache kmalloc-64 of size 64 [ 24.452268] The buggy address is located 0 bytes to the right of [ 24.452268] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.453260] [ 24.453602] The buggy address belongs to the physical page: [ 24.454166] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.454888] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.455518] page_type: f5(slab) [ 24.455911] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.456571] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.457193] page dumped because: kasan: bad access detected [ 24.457708] [ 24.457974] Memory state around the buggy address: [ 24.458484] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.459173] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.460615] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.461173] ^ [ 24.461683] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462305] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.462863] ================================================================== [ 23.608604] ================================================================== [ 23.609183] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xabc/0x49c8 [ 23.610024] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.610555] [ 23.610769] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.610944] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.611000] Hardware name: linux,dummy-virt (DT) [ 23.611072] Call trace: [ 23.611128] dump_backtrace+0x9c/0x128 [ 23.611281] show_stack+0x20/0x38 [ 23.611404] dump_stack_lvl+0x8c/0xd0 [ 23.612027] print_report+0x118/0x5f0 [ 23.612177] kasan_report+0xdc/0x128 [ 23.612284] kasan_check_range+0x100/0x1a8 [ 23.612396] __kasan_check_write+0x20/0x30 [ 23.612496] kasan_atomics_helper+0xabc/0x49c8 [ 23.612601] kasan_atomics+0x1a0/0x2e8 [ 23.612654] kunit_try_run_case+0x170/0x3f0 [ 23.612711] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.612768] kthread+0x24c/0x2d0 [ 23.612815] ret_from_fork+0x10/0x20 [ 23.612870] [ 23.617935] Allocated by task 252: [ 23.618415] kasan_save_stack+0x3c/0x68 [ 23.618944] kasan_save_track+0x20/0x40 [ 23.619440] kasan_save_alloc_info+0x40/0x58 [ 23.619892] __kasan_kmalloc+0xd4/0xd8 [ 23.620264] __kmalloc_cache_noprof+0x154/0x320 [ 23.620829] kasan_atomics+0xb8/0x2e8 [ 23.621294] kunit_try_run_case+0x170/0x3f0 [ 23.621840] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.622386] kthread+0x24c/0x2d0 [ 23.622708] ret_from_fork+0x10/0x20 [ 23.623154] [ 23.623818] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.623818] which belongs to the cache kmalloc-64 of size 64 [ 23.624639] The buggy address is located 0 bytes to the right of [ 23.624639] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.625567] [ 23.625879] The buggy address belongs to the physical page: [ 23.626282] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.627054] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.627698] page_type: f5(slab) [ 23.628095] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.628776] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.629430] page dumped because: kasan: bad access detected [ 23.629874] [ 23.630153] Memory state around the buggy address: [ 23.630565] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631223] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.631732] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.632425] ^ [ 23.632844] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.633511] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.634086] ================================================================== [ 24.578078] ================================================================== [ 24.578621] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16f0/0x49c8 [ 24.579426] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.580129] [ 24.580495] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.580676] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.580717] Hardware name: linux,dummy-virt (DT) [ 24.580789] Call trace: [ 24.580842] dump_backtrace+0x9c/0x128 [ 24.580969] show_stack+0x20/0x38 [ 24.581077] dump_stack_lvl+0x8c/0xd0 [ 24.581177] print_report+0x118/0x5f0 [ 24.581300] kasan_report+0xdc/0x128 [ 24.581362] kasan_check_range+0x100/0x1a8 [ 24.581414] __kasan_check_write+0x20/0x30 [ 24.581464] kasan_atomics_helper+0x16f0/0x49c8 [ 24.581534] kasan_atomics+0x1a0/0x2e8 [ 24.581584] kunit_try_run_case+0x170/0x3f0 [ 24.581637] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.581692] kthread+0x24c/0x2d0 [ 24.581740] ret_from_fork+0x10/0x20 [ 24.581794] [ 24.586956] Allocated by task 252: [ 24.587438] kasan_save_stack+0x3c/0x68 [ 24.587950] kasan_save_track+0x20/0x40 [ 24.588335] kasan_save_alloc_info+0x40/0x58 [ 24.588812] __kasan_kmalloc+0xd4/0xd8 [ 24.589308] __kmalloc_cache_noprof+0x154/0x320 [ 24.589822] kasan_atomics+0xb8/0x2e8 [ 24.590217] kunit_try_run_case+0x170/0x3f0 [ 24.590677] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.591193] kthread+0x24c/0x2d0 [ 24.591681] ret_from_fork+0x10/0x20 [ 24.592171] [ 24.592482] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.592482] which belongs to the cache kmalloc-64 of size 64 [ 24.593344] The buggy address is located 0 bytes to the right of [ 24.593344] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.594206] [ 24.594538] The buggy address belongs to the physical page: [ 24.595075] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.595795] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.596389] page_type: f5(slab) [ 24.596817] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.597371] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.599317] page dumped because: kasan: bad access detected [ 24.599912] [ 24.600156] Memory state around the buggy address: [ 24.600624] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.601180] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.601746] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.602172] ^ [ 24.602531] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.602937] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.603336] ================================================================== [ 23.228878] ================================================================== [ 23.229686] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50c/0x49c8 [ 23.230473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.231275] [ 23.231667] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.231905] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.231987] Hardware name: linux,dummy-virt (DT) [ 23.232077] Call trace: [ 23.232143] dump_backtrace+0x9c/0x128 [ 23.232283] show_stack+0x20/0x38 [ 23.232381] dump_stack_lvl+0x8c/0xd0 [ 23.232494] print_report+0x118/0x5f0 [ 23.232592] kasan_report+0xdc/0x128 [ 23.232703] kasan_check_range+0x100/0x1a8 [ 23.232816] __kasan_check_write+0x20/0x30 [ 23.232913] kasan_atomics_helper+0x50c/0x49c8 [ 23.233042] kasan_atomics+0x1a0/0x2e8 [ 23.233157] kunit_try_run_case+0x170/0x3f0 [ 23.233275] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.233380] kthread+0x24c/0x2d0 [ 23.233458] ret_from_fork+0x10/0x20 [ 23.233599] [ 23.240379] Allocated by task 252: [ 23.240830] kasan_save_stack+0x3c/0x68 [ 23.241278] kasan_save_track+0x20/0x40 [ 23.241781] kasan_save_alloc_info+0x40/0x58 [ 23.242254] __kasan_kmalloc+0xd4/0xd8 [ 23.242659] __kmalloc_cache_noprof+0x154/0x320 [ 23.244040] kasan_atomics+0xb8/0x2e8 [ 23.244429] kunit_try_run_case+0x170/0x3f0 [ 23.244719] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.245343] kthread+0x24c/0x2d0 [ 23.245777] ret_from_fork+0x10/0x20 [ 23.246293] [ 23.246604] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.246604] which belongs to the cache kmalloc-64 of size 64 [ 23.247762] The buggy address is located 0 bytes to the right of [ 23.247762] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.248669] [ 23.248994] The buggy address belongs to the physical page: [ 23.249612] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.250434] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.251892] page_type: f5(slab) [ 23.252378] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.253123] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.253924] page dumped because: kasan: bad access detected [ 23.254428] [ 23.254675] Memory state around the buggy address: [ 23.255110] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.255631] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.256171] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.257347] ^ [ 23.257832] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.258692] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.259477] ================================================================== [ 24.318009] ================================================================== [ 24.318450] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1370/0x49c8 [ 24.319274] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.319895] [ 24.320694] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.320949] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.321018] Hardware name: linux,dummy-virt (DT) [ 24.321068] Call trace: [ 24.321103] dump_backtrace+0x9c/0x128 [ 24.321173] show_stack+0x20/0x38 [ 24.321220] dump_stack_lvl+0x8c/0xd0 [ 24.321299] print_report+0x118/0x5f0 [ 24.321349] kasan_report+0xdc/0x128 [ 24.321395] kasan_check_range+0x100/0x1a8 [ 24.321444] __kasan_check_write+0x20/0x30 [ 24.321507] kasan_atomics_helper+0x1370/0x49c8 [ 24.321563] kasan_atomics+0x1a0/0x2e8 [ 24.321613] kunit_try_run_case+0x170/0x3f0 [ 24.321667] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.321723] kthread+0x24c/0x2d0 [ 24.321769] ret_from_fork+0x10/0x20 [ 24.321823] [ 24.327339] Allocated by task 252: [ 24.327832] kasan_save_stack+0x3c/0x68 [ 24.328314] kasan_save_track+0x20/0x40 [ 24.328844] kasan_save_alloc_info+0x40/0x58 [ 24.329347] __kasan_kmalloc+0xd4/0xd8 [ 24.329896] __kmalloc_cache_noprof+0x154/0x320 [ 24.330366] kasan_atomics+0xb8/0x2e8 [ 24.330876] kunit_try_run_case+0x170/0x3f0 [ 24.331468] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.331995] kthread+0x24c/0x2d0 [ 24.332295] ret_from_fork+0x10/0x20 [ 24.334479] [ 24.334724] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.334724] which belongs to the cache kmalloc-64 of size 64 [ 24.335388] The buggy address is located 0 bytes to the right of [ 24.335388] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.336324] [ 24.336677] The buggy address belongs to the physical page: [ 24.337102] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.337670] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.338846] page_type: f5(slab) [ 24.340092] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.341271] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.341732] page dumped because: kasan: bad access detected [ 24.342071] [ 24.343005] Memory state around the buggy address: [ 24.343917] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.345151] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.346368] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.346789] ^ [ 24.347197] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.347987] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.348773] ================================================================== [ 22.970627] ================================================================== [ 22.971400] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x25c/0x49c8 [ 22.972654] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.973170] [ 22.973545] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.973753] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.973832] Hardware name: linux,dummy-virt (DT) [ 22.973929] Call trace: [ 22.973980] dump_backtrace+0x9c/0x128 [ 22.974054] show_stack+0x20/0x38 [ 22.974100] dump_stack_lvl+0x8c/0xd0 [ 22.974154] print_report+0x118/0x5f0 [ 22.974202] kasan_report+0xdc/0x128 [ 22.974273] kasan_check_range+0x100/0x1a8 [ 22.974329] __kasan_check_write+0x20/0x30 [ 22.974380] kasan_atomics_helper+0x25c/0x49c8 [ 22.974434] kasan_atomics+0x1a0/0x2e8 [ 22.974484] kunit_try_run_case+0x170/0x3f0 [ 22.974536] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.974590] kthread+0x24c/0x2d0 [ 22.974638] ret_from_fork+0x10/0x20 [ 22.974689] [ 22.981270] Allocated by task 252: [ 22.981749] kasan_save_stack+0x3c/0x68 [ 22.982203] kasan_save_track+0x20/0x40 [ 22.982499] kasan_save_alloc_info+0x40/0x58 [ 22.982991] __kasan_kmalloc+0xd4/0xd8 [ 22.983818] __kmalloc_cache_noprof+0x154/0x320 [ 22.984551] kasan_atomics+0xb8/0x2e8 [ 22.984966] kunit_try_run_case+0x170/0x3f0 [ 22.985398] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.985912] kthread+0x24c/0x2d0 [ 22.986305] ret_from_fork+0x10/0x20 [ 22.986754] [ 22.987022] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.987022] which belongs to the cache kmalloc-64 of size 64 [ 22.987846] The buggy address is located 0 bytes to the right of [ 22.987846] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.989209] [ 22.989449] The buggy address belongs to the physical page: [ 22.989779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.990342] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.990980] page_type: f5(slab) [ 22.991907] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.992570] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.993163] page dumped because: kasan: bad access detected [ 22.993739] [ 22.994041] Memory state around the buggy address: [ 22.994545] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.995123] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.996134] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.996647] ^ [ 22.997014] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.997954] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.998546] ================================================================== [ 24.290146] ================================================================== [ 24.290796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1300/0x49c8 [ 24.291733] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.292524] [ 24.292793] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.292953] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.292993] Hardware name: linux,dummy-virt (DT) [ 24.293066] Call trace: [ 24.293135] dump_backtrace+0x9c/0x128 [ 24.293285] show_stack+0x20/0x38 [ 24.293388] dump_stack_lvl+0x8c/0xd0 [ 24.293450] print_report+0x118/0x5f0 [ 24.293522] kasan_report+0xdc/0x128 [ 24.293572] kasan_check_range+0x100/0x1a8 [ 24.293623] __kasan_check_write+0x20/0x30 [ 24.293674] kasan_atomics_helper+0x1300/0x49c8 [ 24.293728] kasan_atomics+0x1a0/0x2e8 [ 24.293777] kunit_try_run_case+0x170/0x3f0 [ 24.293832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.293888] kthread+0x24c/0x2d0 [ 24.293935] ret_from_fork+0x10/0x20 [ 24.293988] [ 24.299414] Allocated by task 252: [ 24.299928] kasan_save_stack+0x3c/0x68 [ 24.300488] kasan_save_track+0x20/0x40 [ 24.301044] kasan_save_alloc_info+0x40/0x58 [ 24.301587] __kasan_kmalloc+0xd4/0xd8 [ 24.302091] __kmalloc_cache_noprof+0x154/0x320 [ 24.302699] kasan_atomics+0xb8/0x2e8 [ 24.303211] kunit_try_run_case+0x170/0x3f0 [ 24.303780] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.304316] kthread+0x24c/0x2d0 [ 24.304702] ret_from_fork+0x10/0x20 [ 24.305197] [ 24.305493] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.305493] which belongs to the cache kmalloc-64 of size 64 [ 24.306366] The buggy address is located 0 bytes to the right of [ 24.306366] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.307387] [ 24.307736] The buggy address belongs to the physical page: [ 24.308266] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.308981] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.309630] page_type: f5(slab) [ 24.310049] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.310714] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.311353] page dumped because: kasan: bad access detected [ 24.311875] [ 24.312163] Memory state around the buggy address: [ 24.312654] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.313267] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.313911] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.314603] ^ [ 24.315068] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.315712] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.316324] ================================================================== [ 23.039864] ================================================================== [ 23.040643] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4264/0x49c8 [ 23.041468] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.042162] [ 23.042553] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.042836] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.042924] Hardware name: linux,dummy-virt (DT) [ 23.043028] Call trace: [ 23.043171] dump_backtrace+0x9c/0x128 [ 23.043305] show_stack+0x20/0x38 [ 23.043394] dump_stack_lvl+0x8c/0xd0 [ 23.043485] print_report+0x118/0x5f0 [ 23.043564] kasan_report+0xdc/0x128 [ 23.043657] __asan_report_load4_noabort+0x20/0x30 [ 23.043759] kasan_atomics_helper+0x4264/0x49c8 [ 23.043853] kasan_atomics+0x1a0/0x2e8 [ 23.043950] kunit_try_run_case+0x170/0x3f0 [ 23.044047] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.044141] kthread+0x24c/0x2d0 [ 23.044230] ret_from_fork+0x10/0x20 [ 23.044314] [ 23.049967] Allocated by task 252: [ 23.050471] kasan_save_stack+0x3c/0x68 [ 23.051038] kasan_save_track+0x20/0x40 [ 23.051449] kasan_save_alloc_info+0x40/0x58 [ 23.051882] __kasan_kmalloc+0xd4/0xd8 [ 23.052252] __kmalloc_cache_noprof+0x154/0x320 [ 23.052650] kasan_atomics+0xb8/0x2e8 [ 23.052979] kunit_try_run_case+0x170/0x3f0 [ 23.054451] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.054847] kthread+0x24c/0x2d0 [ 23.055754] ret_from_fork+0x10/0x20 [ 23.056324] [ 23.056661] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.056661] which belongs to the cache kmalloc-64 of size 64 [ 23.057744] The buggy address is located 0 bytes to the right of [ 23.057744] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.059004] [ 23.059275] The buggy address belongs to the physical page: [ 23.059968] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.061163] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.061906] page_type: f5(slab) [ 23.062158] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.062646] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.063801] page dumped because: kasan: bad access detected [ 23.064251] [ 23.064413] Memory state around the buggy address: [ 23.064678] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.065019] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.065821] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.066601] ^ [ 23.067016] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.068017] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.068657] ================================================================== [ 23.856518] ================================================================== [ 23.857171] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xda0/0x49c8 [ 23.857792] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.858540] [ 23.858845] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.859140] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.859223] Hardware name: linux,dummy-virt (DT) [ 23.859314] Call trace: [ 23.859376] dump_backtrace+0x9c/0x128 [ 23.859506] show_stack+0x20/0x38 [ 23.859617] dump_stack_lvl+0x8c/0xd0 [ 23.859722] print_report+0x118/0x5f0 [ 23.859787] kasan_report+0xdc/0x128 [ 23.859835] kasan_check_range+0x100/0x1a8 [ 23.859885] __kasan_check_write+0x20/0x30 [ 23.859935] kasan_atomics_helper+0xda0/0x49c8 [ 23.859990] kasan_atomics+0x1a0/0x2e8 [ 23.860041] kunit_try_run_case+0x170/0x3f0 [ 23.860091] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.860144] kthread+0x24c/0x2d0 [ 23.860191] ret_from_fork+0x10/0x20 [ 23.860266] [ 23.865532] Allocated by task 252: [ 23.866017] kasan_save_stack+0x3c/0x68 [ 23.866583] kasan_save_track+0x20/0x40 [ 23.866974] kasan_save_alloc_info+0x40/0x58 [ 23.867412] __kasan_kmalloc+0xd4/0xd8 [ 23.867888] __kmalloc_cache_noprof+0x154/0x320 [ 23.868434] kasan_atomics+0xb8/0x2e8 [ 23.868935] kunit_try_run_case+0x170/0x3f0 [ 23.869364] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.870002] kthread+0x24c/0x2d0 [ 23.870394] ret_from_fork+0x10/0x20 [ 23.870775] [ 23.871082] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.871082] which belongs to the cache kmalloc-64 of size 64 [ 23.872026] The buggy address is located 0 bytes to the right of [ 23.872026] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.872978] [ 23.873261] The buggy address belongs to the physical page: [ 23.873802] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.874471] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.875143] page_type: f5(slab) [ 23.875622] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.876198] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.876901] page dumped because: kasan: bad access detected [ 23.877433] [ 23.877733] Memory state around the buggy address: [ 23.878199] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.878776] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.879459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.880018] ^ [ 23.880450] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.881095] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.881762] ================================================================== [ 24.464310] ================================================================== [ 24.464854] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1584/0x49c8 [ 24.465551] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.466102] [ 24.466453] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.466675] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.466754] Hardware name: linux,dummy-virt (DT) [ 24.466842] Call trace: [ 24.466901] dump_backtrace+0x9c/0x128 [ 24.467023] show_stack+0x20/0x38 [ 24.467118] dump_stack_lvl+0x8c/0xd0 [ 24.467220] print_report+0x118/0x5f0 [ 24.467384] kasan_report+0xdc/0x128 [ 24.467481] kasan_check_range+0x100/0x1a8 [ 24.467564] __kasan_check_write+0x20/0x30 [ 24.467617] kasan_atomics_helper+0x1584/0x49c8 [ 24.467672] kasan_atomics+0x1a0/0x2e8 [ 24.467722] kunit_try_run_case+0x170/0x3f0 [ 24.467779] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.467835] kthread+0x24c/0x2d0 [ 24.467883] ret_from_fork+0x10/0x20 [ 24.467937] [ 24.473497] Allocated by task 252: [ 24.473971] kasan_save_stack+0x3c/0x68 [ 24.474432] kasan_save_track+0x20/0x40 [ 24.474950] kasan_save_alloc_info+0x40/0x58 [ 24.475867] __kasan_kmalloc+0xd4/0xd8 [ 24.476265] __kmalloc_cache_noprof+0x154/0x320 [ 24.476673] kasan_atomics+0xb8/0x2e8 [ 24.477017] kunit_try_run_case+0x170/0x3f0 [ 24.477995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.478637] kthread+0x24c/0x2d0 [ 24.479006] ret_from_fork+0x10/0x20 [ 24.479376] [ 24.479633] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.479633] which belongs to the cache kmalloc-64 of size 64 [ 24.480514] The buggy address is located 0 bytes to the right of [ 24.480514] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.481522] [ 24.481886] The buggy address belongs to the physical page: [ 24.482464] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.483192] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.483777] page_type: f5(slab) [ 24.484305] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.484971] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.485688] page dumped because: kasan: bad access detected [ 24.486218] [ 24.486504] Memory state around the buggy address: [ 24.486992] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.487670] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.488301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.488926] ^ [ 24.489411] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.490081] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.490719] ================================================================== [ 24.405756] ================================================================== [ 24.406332] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x14ac/0x49c8 [ 24.408002] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.408848] [ 24.409247] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.409509] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.409581] Hardware name: linux,dummy-virt (DT) [ 24.409631] Call trace: [ 24.409666] dump_backtrace+0x9c/0x128 [ 24.409734] show_stack+0x20/0x38 [ 24.409781] dump_stack_lvl+0x8c/0xd0 [ 24.409833] print_report+0x118/0x5f0 [ 24.409881] kasan_report+0xdc/0x128 [ 24.409927] kasan_check_range+0x100/0x1a8 [ 24.409977] __kasan_check_write+0x20/0x30 [ 24.410027] kasan_atomics_helper+0x14ac/0x49c8 [ 24.410079] kasan_atomics+0x1a0/0x2e8 [ 24.410129] kunit_try_run_case+0x170/0x3f0 [ 24.410180] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.410235] kthread+0x24c/0x2d0 [ 24.410314] ret_from_fork+0x10/0x20 [ 24.410370] [ 24.415875] Allocated by task 252: [ 24.416430] kasan_save_stack+0x3c/0x68 [ 24.416960] kasan_save_track+0x20/0x40 [ 24.417515] kasan_save_alloc_info+0x40/0x58 [ 24.418024] __kasan_kmalloc+0xd4/0xd8 [ 24.418560] __kmalloc_cache_noprof+0x154/0x320 [ 24.419019] kasan_atomics+0xb8/0x2e8 [ 24.419560] kunit_try_run_case+0x170/0x3f0 [ 24.419966] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.420606] kthread+0x24c/0x2d0 [ 24.421031] ret_from_fork+0x10/0x20 [ 24.421501] [ 24.421828] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.421828] which belongs to the cache kmalloc-64 of size 64 [ 24.422801] The buggy address is located 0 bytes to the right of [ 24.422801] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.423758] [ 24.424072] The buggy address belongs to the physical page: [ 24.424676] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.425387] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.426005] page_type: f5(slab) [ 24.426431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.427103] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.427727] page dumped because: kasan: bad access detected [ 24.428180] [ 24.428510] Memory state around the buggy address: [ 24.428973] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.429634] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.430377] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.430966] ^ [ 24.431470] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.432132] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.432689] ================================================================== [ 24.521235] ================================================================== [ 24.521833] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x165c/0x49c8 [ 24.522431] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.523109] [ 24.523492] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.523716] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.523801] Hardware name: linux,dummy-virt (DT) [ 24.523891] Call trace: [ 24.523934] dump_backtrace+0x9c/0x128 [ 24.524007] show_stack+0x20/0x38 [ 24.524056] dump_stack_lvl+0x8c/0xd0 [ 24.524114] print_report+0x118/0x5f0 [ 24.524164] kasan_report+0xdc/0x128 [ 24.524210] kasan_check_range+0x100/0x1a8 [ 24.524304] __kasan_check_write+0x20/0x30 [ 24.524398] kasan_atomics_helper+0x165c/0x49c8 [ 24.524510] kasan_atomics+0x1a0/0x2e8 [ 24.524622] kunit_try_run_case+0x170/0x3f0 [ 24.524684] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.524741] kthread+0x24c/0x2d0 [ 24.524790] ret_from_fork+0x10/0x20 [ 24.524845] [ 24.530058] Allocated by task 252: [ 24.530503] kasan_save_stack+0x3c/0x68 [ 24.530965] kasan_save_track+0x20/0x40 [ 24.531465] kasan_save_alloc_info+0x40/0x58 [ 24.531890] __kasan_kmalloc+0xd4/0xd8 [ 24.532324] __kmalloc_cache_noprof+0x154/0x320 [ 24.532853] kasan_atomics+0xb8/0x2e8 [ 24.533362] kunit_try_run_case+0x170/0x3f0 [ 24.533891] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.534343] kthread+0x24c/0x2d0 [ 24.534794] ret_from_fork+0x10/0x20 [ 24.535280] [ 24.535581] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.535581] which belongs to the cache kmalloc-64 of size 64 [ 24.536472] The buggy address is located 0 bytes to the right of [ 24.536472] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.537963] [ 24.538227] The buggy address belongs to the physical page: [ 24.538693] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.539601] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.540267] page_type: f5(slab) [ 24.540685] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.541352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.541920] page dumped because: kasan: bad access detected [ 24.542441] [ 24.542740] Memory state around the buggy address: [ 24.543396] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.544214] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.544895] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.545602] ^ [ 24.546018] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.546880] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.547554] ================================================================== [ 24.145418] ================================================================== [ 24.146179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x10d8/0x49c8 [ 24.147036] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.148094] [ 24.148448] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.148579] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.148634] Hardware name: linux,dummy-virt (DT) [ 24.148689] Call trace: [ 24.148726] dump_backtrace+0x9c/0x128 [ 24.148800] show_stack+0x20/0x38 [ 24.148847] dump_stack_lvl+0x8c/0xd0 [ 24.148896] print_report+0x118/0x5f0 [ 24.148945] kasan_report+0xdc/0x128 [ 24.148991] kasan_check_range+0x100/0x1a8 [ 24.149041] __kasan_check_write+0x20/0x30 [ 24.149091] kasan_atomics_helper+0x10d8/0x49c8 [ 24.149144] kasan_atomics+0x1a0/0x2e8 [ 24.149193] kunit_try_run_case+0x170/0x3f0 [ 24.149258] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.149319] kthread+0x24c/0x2d0 [ 24.149367] ret_from_fork+0x10/0x20 [ 24.149420] [ 24.154964] Allocated by task 252: [ 24.155466] kasan_save_stack+0x3c/0x68 [ 24.155985] kasan_save_track+0x20/0x40 [ 24.156422] kasan_save_alloc_info+0x40/0x58 [ 24.157010] __kasan_kmalloc+0xd4/0xd8 [ 24.157559] __kmalloc_cache_noprof+0x154/0x320 [ 24.158137] kasan_atomics+0xb8/0x2e8 [ 24.158568] kunit_try_run_case+0x170/0x3f0 [ 24.158995] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.159645] kthread+0x24c/0x2d0 [ 24.160113] ret_from_fork+0x10/0x20 [ 24.160575] [ 24.160882] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.160882] which belongs to the cache kmalloc-64 of size 64 [ 24.161824] The buggy address is located 0 bytes to the right of [ 24.161824] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.162935] [ 24.163296] The buggy address belongs to the physical page: [ 24.163779] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.164592] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.165213] page_type: f5(slab) [ 24.165636] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.166334] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.166984] page dumped because: kasan: bad access detected [ 24.167495] [ 24.167760] Memory state around the buggy address: [ 24.168202] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.168943] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.169622] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.170194] ^ [ 24.170562] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171201] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.171849] ================================================================== [ 23.388540] ================================================================== [ 23.389328] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x728/0x49c8 [ 23.390187] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.390941] [ 23.391380] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.391622] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.391724] Hardware name: linux,dummy-virt (DT) [ 23.391781] Call trace: [ 23.391815] dump_backtrace+0x9c/0x128 [ 23.391903] show_stack+0x20/0x38 [ 23.391966] dump_stack_lvl+0x8c/0xd0 [ 23.392020] print_report+0x118/0x5f0 [ 23.392068] kasan_report+0xdc/0x128 [ 23.392114] kasan_check_range+0x100/0x1a8 [ 23.392164] __kasan_check_write+0x20/0x30 [ 23.392213] kasan_atomics_helper+0x728/0x49c8 [ 23.392290] kasan_atomics+0x1a0/0x2e8 [ 23.392342] kunit_try_run_case+0x170/0x3f0 [ 23.392396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.392452] kthread+0x24c/0x2d0 [ 23.392500] ret_from_fork+0x10/0x20 [ 23.392552] [ 23.397236] Allocated by task 252: [ 23.397776] kasan_save_stack+0x3c/0x68 [ 23.398352] kasan_save_track+0x20/0x40 [ 23.398882] kasan_save_alloc_info+0x40/0x58 [ 23.399490] __kasan_kmalloc+0xd4/0xd8 [ 23.399925] __kmalloc_cache_noprof+0x154/0x320 [ 23.400215] kasan_atomics+0xb8/0x2e8 [ 23.400809] kunit_try_run_case+0x170/0x3f0 [ 23.401435] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.402109] kthread+0x24c/0x2d0 [ 23.402613] ret_from_fork+0x10/0x20 [ 23.403125] [ 23.403458] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.403458] which belongs to the cache kmalloc-64 of size 64 [ 23.404487] The buggy address is located 0 bytes to the right of [ 23.404487] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.405384] [ 23.405723] The buggy address belongs to the physical page: [ 23.406293] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.406985] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.407545] page_type: f5(slab) [ 23.407990] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.408582] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.409318] page dumped because: kasan: bad access detected [ 23.409747] [ 23.410039] Memory state around the buggy address: [ 23.410543] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.411159] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.411762] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.412364] ^ [ 23.412826] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.413473] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.414110] ================================================================== [ 24.377766] ================================================================== [ 24.378879] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x406c/0x49c8 [ 24.379585] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.380184] [ 24.380582] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.380846] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.380935] Hardware name: linux,dummy-virt (DT) [ 24.381040] Call trace: [ 24.381102] dump_backtrace+0x9c/0x128 [ 24.381183] show_stack+0x20/0x38 [ 24.381233] dump_stack_lvl+0x8c/0xd0 [ 24.381317] print_report+0x118/0x5f0 [ 24.381369] kasan_report+0xdc/0x128 [ 24.381417] __asan_report_load8_noabort+0x20/0x30 [ 24.381473] kasan_atomics_helper+0x406c/0x49c8 [ 24.381542] kasan_atomics+0x1a0/0x2e8 [ 24.381593] kunit_try_run_case+0x170/0x3f0 [ 24.381645] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.381701] kthread+0x24c/0x2d0 [ 24.381749] ret_from_fork+0x10/0x20 [ 24.381803] [ 24.387079] Allocated by task 252: [ 24.387625] kasan_save_stack+0x3c/0x68 [ 24.388087] kasan_save_track+0x20/0x40 [ 24.388604] kasan_save_alloc_info+0x40/0x58 [ 24.389150] __kasan_kmalloc+0xd4/0xd8 [ 24.389582] __kmalloc_cache_noprof+0x154/0x320 [ 24.390193] kasan_atomics+0xb8/0x2e8 [ 24.390607] kunit_try_run_case+0x170/0x3f0 [ 24.391194] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.391780] kthread+0x24c/0x2d0 [ 24.392274] ret_from_fork+0x10/0x20 [ 24.392699] [ 24.393005] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.393005] which belongs to the cache kmalloc-64 of size 64 [ 24.393896] The buggy address is located 0 bytes to the right of [ 24.393896] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.394939] [ 24.395254] The buggy address belongs to the physical page: [ 24.395865] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.396462] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.397058] page_type: f5(slab) [ 24.397488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.398212] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.398857] page dumped because: kasan: bad access detected [ 24.399390] [ 24.399707] Memory state around the buggy address: [ 24.400182] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.400917] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.401459] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.402108] ^ [ 24.402598] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.403192] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.403824] ================================================================== [ 23.166080] ================================================================== [ 23.166581] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x434/0x49c8 [ 23.168266] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.168960] [ 23.169290] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.169529] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.169611] Hardware name: linux,dummy-virt (DT) [ 23.169692] Call trace: [ 23.169759] dump_backtrace+0x9c/0x128 [ 23.169838] show_stack+0x20/0x38 [ 23.169886] dump_stack_lvl+0x8c/0xd0 [ 23.169942] print_report+0x118/0x5f0 [ 23.169992] kasan_report+0xdc/0x128 [ 23.170038] kasan_check_range+0x100/0x1a8 [ 23.170086] __kasan_check_write+0x20/0x30 [ 23.170136] kasan_atomics_helper+0x434/0x49c8 [ 23.170187] kasan_atomics+0x1a0/0x2e8 [ 23.170254] kunit_try_run_case+0x170/0x3f0 [ 23.170320] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.170375] kthread+0x24c/0x2d0 [ 23.170423] ret_from_fork+0x10/0x20 [ 23.170478] [ 23.176609] Allocated by task 252: [ 23.177106] kasan_save_stack+0x3c/0x68 [ 23.178742] kasan_save_track+0x20/0x40 [ 23.179921] kasan_save_alloc_info+0x40/0x58 [ 23.180378] __kasan_kmalloc+0xd4/0xd8 [ 23.180713] __kmalloc_cache_noprof+0x154/0x320 [ 23.181298] kasan_atomics+0xb8/0x2e8 [ 23.181737] kunit_try_run_case+0x170/0x3f0 [ 23.182210] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.182728] kthread+0x24c/0x2d0 [ 23.183511] ret_from_fork+0x10/0x20 [ 23.184027] [ 23.184287] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.184287] which belongs to the cache kmalloc-64 of size 64 [ 23.185183] The buggy address is located 0 bytes to the right of [ 23.185183] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.186191] [ 23.186471] The buggy address belongs to the physical page: [ 23.187036] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.188087] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.188584] page_type: f5(slab) [ 23.189380] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.190225] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.190869] page dumped because: kasan: bad access detected [ 23.191654] [ 23.191927] Memory state around the buggy address: [ 23.192674] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.193334] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.194168] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.194912] ^ [ 23.195712] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.196922] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.197558] ================================================================== [ 24.604934] ================================================================== [ 24.607420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f5c/0x49c8 [ 24.608461] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.609938] [ 24.610328] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.610567] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.610649] Hardware name: linux,dummy-virt (DT) [ 24.610745] Call trace: [ 24.610814] dump_backtrace+0x9c/0x128 [ 24.610941] show_stack+0x20/0x38 [ 24.611039] dump_stack_lvl+0x8c/0xd0 [ 24.611130] print_report+0x118/0x5f0 [ 24.611213] kasan_report+0xdc/0x128 [ 24.611315] __asan_report_load8_noabort+0x20/0x30 [ 24.611422] kasan_atomics_helper+0x3f5c/0x49c8 [ 24.611530] kasan_atomics+0x1a0/0x2e8 [ 24.611627] kunit_try_run_case+0x170/0x3f0 [ 24.611789] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.611906] kthread+0x24c/0x2d0 [ 24.611994] ret_from_fork+0x10/0x20 [ 24.612089] [ 24.617290] Allocated by task 252: [ 24.617862] kasan_save_stack+0x3c/0x68 [ 24.618458] kasan_save_track+0x20/0x40 [ 24.619035] kasan_save_alloc_info+0x40/0x58 [ 24.619529] __kasan_kmalloc+0xd4/0xd8 [ 24.620007] __kmalloc_cache_noprof+0x154/0x320 [ 24.620534] kasan_atomics+0xb8/0x2e8 [ 24.620814] kunit_try_run_case+0x170/0x3f0 [ 24.621396] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.621946] kthread+0x24c/0x2d0 [ 24.622359] ret_from_fork+0x10/0x20 [ 24.622781] [ 24.623089] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.623089] which belongs to the cache kmalloc-64 of size 64 [ 24.623894] The buggy address is located 0 bytes to the right of [ 24.623894] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.624832] [ 24.625172] The buggy address belongs to the physical page: [ 24.625652] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.626344] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.627031] page_type: f5(slab) [ 24.627431] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.628135] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.628773] page dumped because: kasan: bad access detected [ 24.629282] [ 24.629529] Memory state around the buggy address: [ 24.629969] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.630620] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.631000] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.631728] ^ [ 24.632213] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.632693] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.633425] ================================================================== [ 24.088761] ================================================================== [ 24.089429] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1000/0x49c8 [ 24.090124] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.090773] [ 24.091210] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.091473] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.091563] Hardware name: linux,dummy-virt (DT) [ 24.091649] Call trace: [ 24.091685] dump_backtrace+0x9c/0x128 [ 24.091760] show_stack+0x20/0x38 [ 24.091805] dump_stack_lvl+0x8c/0xd0 [ 24.091857] print_report+0x118/0x5f0 [ 24.091906] kasan_report+0xdc/0x128 [ 24.091952] kasan_check_range+0x100/0x1a8 [ 24.092003] __kasan_check_write+0x20/0x30 [ 24.092053] kasan_atomics_helper+0x1000/0x49c8 [ 24.092105] kasan_atomics+0x1a0/0x2e8 [ 24.092154] kunit_try_run_case+0x170/0x3f0 [ 24.092207] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.092293] kthread+0x24c/0x2d0 [ 24.092346] ret_from_fork+0x10/0x20 [ 24.092400] [ 24.098116] Allocated by task 252: [ 24.098662] kasan_save_stack+0x3c/0x68 [ 24.099253] kasan_save_track+0x20/0x40 [ 24.099763] kasan_save_alloc_info+0x40/0x58 [ 24.100256] __kasan_kmalloc+0xd4/0xd8 [ 24.100765] __kmalloc_cache_noprof+0x154/0x320 [ 24.101404] kasan_atomics+0xb8/0x2e8 [ 24.101839] kunit_try_run_case+0x170/0x3f0 [ 24.102368] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.102907] kthread+0x24c/0x2d0 [ 24.103252] ret_from_fork+0x10/0x20 [ 24.103727] [ 24.103969] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.103969] which belongs to the cache kmalloc-64 of size 64 [ 24.104925] The buggy address is located 0 bytes to the right of [ 24.104925] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.106018] [ 24.106366] The buggy address belongs to the physical page: [ 24.106924] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.107584] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.108195] page_type: f5(slab) [ 24.108642] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.109352] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.110010] page dumped because: kasan: bad access detected [ 24.110557] [ 24.110857] Memory state around the buggy address: [ 24.111368] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.112009] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.112683] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.113306] ^ [ 24.113818] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.114457] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.115073] ================================================================== [ 24.022678] ================================================================== [ 24.023453] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf28/0x49c8 [ 24.023848] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.024204] [ 24.024422] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.024588] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.024661] Hardware name: linux,dummy-virt (DT) [ 24.024752] Call trace: [ 24.024819] dump_backtrace+0x9c/0x128 [ 24.024933] show_stack+0x20/0x38 [ 24.024987] dump_stack_lvl+0x8c/0xd0 [ 24.025042] print_report+0x118/0x5f0 [ 24.025121] kasan_report+0xdc/0x128 [ 24.025223] kasan_check_range+0x100/0x1a8 [ 24.025497] __kasan_check_write+0x20/0x30 [ 24.025621] kasan_atomics_helper+0xf28/0x49c8 [ 24.025752] kasan_atomics+0x1a0/0x2e8 [ 24.025874] kunit_try_run_case+0x170/0x3f0 [ 24.025994] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.026078] kthread+0x24c/0x2d0 [ 24.026134] ret_from_fork+0x10/0x20 [ 24.026190] [ 24.033311] Allocated by task 252: [ 24.033951] kasan_save_stack+0x3c/0x68 [ 24.034395] kasan_save_track+0x20/0x40 [ 24.035019] kasan_save_alloc_info+0x40/0x58 [ 24.035645] __kasan_kmalloc+0xd4/0xd8 [ 24.036035] __kmalloc_cache_noprof+0x154/0x320 [ 24.036706] kasan_atomics+0xb8/0x2e8 [ 24.037088] kunit_try_run_case+0x170/0x3f0 [ 24.037734] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.038307] kthread+0x24c/0x2d0 [ 24.038674] ret_from_fork+0x10/0x20 [ 24.039217] [ 24.039472] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.039472] which belongs to the cache kmalloc-64 of size 64 [ 24.040488] The buggy address is located 0 bytes to the right of [ 24.040488] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.041851] [ 24.042360] The buggy address belongs to the physical page: [ 24.042835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.043485] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.044025] page_type: f5(slab) [ 24.044459] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.045331] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.046127] page dumped because: kasan: bad access detected [ 24.046740] [ 24.047051] Memory state around the buggy address: [ 24.047648] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.048352] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.049044] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.049740] ^ [ 24.050399] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.051082] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.051755] ================================================================== [ 24.350732] ================================================================== [ 24.351396] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x141c/0x49c8 [ 24.351989] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.352700] [ 24.353075] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.353344] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.353442] Hardware name: linux,dummy-virt (DT) [ 24.353543] Call trace: [ 24.353608] dump_backtrace+0x9c/0x128 [ 24.353763] show_stack+0x20/0x38 [ 24.353837] dump_stack_lvl+0x8c/0xd0 [ 24.353893] print_report+0x118/0x5f0 [ 24.353950] kasan_report+0xdc/0x128 [ 24.354021] kasan_check_range+0x100/0x1a8 [ 24.354073] __kasan_check_write+0x20/0x30 [ 24.354122] kasan_atomics_helper+0x141c/0x49c8 [ 24.354175] kasan_atomics+0x1a0/0x2e8 [ 24.354224] kunit_try_run_case+0x170/0x3f0 [ 24.354303] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.354359] kthread+0x24c/0x2d0 [ 24.354408] ret_from_fork+0x10/0x20 [ 24.354462] [ 24.359922] Allocated by task 252: [ 24.360391] kasan_save_stack+0x3c/0x68 [ 24.360939] kasan_save_track+0x20/0x40 [ 24.361509] kasan_save_alloc_info+0x40/0x58 [ 24.361972] __kasan_kmalloc+0xd4/0xd8 [ 24.362508] __kmalloc_cache_noprof+0x154/0x320 [ 24.362997] kasan_atomics+0xb8/0x2e8 [ 24.363500] kunit_try_run_case+0x170/0x3f0 [ 24.363941] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.364543] kthread+0x24c/0x2d0 [ 24.364975] ret_from_fork+0x10/0x20 [ 24.365420] [ 24.365755] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.365755] which belongs to the cache kmalloc-64 of size 64 [ 24.366683] The buggy address is located 0 bytes to the right of [ 24.366683] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.367642] [ 24.367974] The buggy address belongs to the physical page: [ 24.368450] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.369184] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.369784] page_type: f5(slab) [ 24.370151] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.370910] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.371480] page dumped because: kasan: bad access detected [ 24.371988] [ 24.372281] Memory state around the buggy address: [ 24.372759] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.373438] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.374082] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.374686] ^ [ 24.375170] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.375821] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.376439] ================================================================== [ 24.492714] ================================================================== [ 24.493304] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15f0/0x49c8 [ 24.494188] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.495280] [ 24.495616] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.495825] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.495868] Hardware name: linux,dummy-virt (DT) [ 24.495913] Call trace: [ 24.495961] dump_backtrace+0x9c/0x128 [ 24.496068] show_stack+0x20/0x38 [ 24.496167] dump_stack_lvl+0x8c/0xd0 [ 24.496273] print_report+0x118/0x5f0 [ 24.496333] kasan_report+0xdc/0x128 [ 24.496381] kasan_check_range+0x100/0x1a8 [ 24.496432] __kasan_check_write+0x20/0x30 [ 24.496482] kasan_atomics_helper+0x15f0/0x49c8 [ 24.496535] kasan_atomics+0x1a0/0x2e8 [ 24.496585] kunit_try_run_case+0x170/0x3f0 [ 24.496641] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.496701] kthread+0x24c/0x2d0 [ 24.496750] ret_from_fork+0x10/0x20 [ 24.496804] [ 24.501918] Allocated by task 252: [ 24.502411] kasan_save_stack+0x3c/0x68 [ 24.502894] kasan_save_track+0x20/0x40 [ 24.503314] kasan_save_alloc_info+0x40/0x58 [ 24.503778] __kasan_kmalloc+0xd4/0xd8 [ 24.504267] __kmalloc_cache_noprof+0x154/0x320 [ 24.504817] kasan_atomics+0xb8/0x2e8 [ 24.505307] kunit_try_run_case+0x170/0x3f0 [ 24.505742] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.506286] kthread+0x24c/0x2d0 [ 24.506624] ret_from_fork+0x10/0x20 [ 24.506982] [ 24.507228] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.507228] which belongs to the cache kmalloc-64 of size 64 [ 24.508566] The buggy address is located 0 bytes to the right of [ 24.508566] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.509595] [ 24.510091] The buggy address belongs to the physical page: [ 24.510422] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.511178] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.511816] page_type: f5(slab) [ 24.512182] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.512937] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.513632] page dumped because: kasan: bad access detected [ 24.514103] [ 24.514386] Memory state around the buggy address: [ 24.514853] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.515491] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.516127] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.516767] ^ [ 24.517086] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.517803] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.518306] ================================================================== [ 24.233155] ================================================================== [ 24.233774] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x121c/0x49c8 [ 24.234482] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.235182] [ 24.235481] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.235734] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.235823] Hardware name: linux,dummy-virt (DT) [ 24.235916] Call trace: [ 24.235986] dump_backtrace+0x9c/0x128 [ 24.236132] show_stack+0x20/0x38 [ 24.236231] dump_stack_lvl+0x8c/0xd0 [ 24.236353] print_report+0x118/0x5f0 [ 24.236488] kasan_report+0xdc/0x128 [ 24.236577] kasan_check_range+0x100/0x1a8 [ 24.236632] __kasan_check_write+0x20/0x30 [ 24.236686] kasan_atomics_helper+0x121c/0x49c8 [ 24.236776] kasan_atomics+0x1a0/0x2e8 [ 24.236828] kunit_try_run_case+0x170/0x3f0 [ 24.236884] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.236939] kthread+0x24c/0x2d0 [ 24.236988] ret_from_fork+0x10/0x20 [ 24.237043] [ 24.242624] Allocated by task 252: [ 24.243105] kasan_save_stack+0x3c/0x68 [ 24.243679] kasan_save_track+0x20/0x40 [ 24.244172] kasan_save_alloc_info+0x40/0x58 [ 24.244721] __kasan_kmalloc+0xd4/0xd8 [ 24.245150] __kmalloc_cache_noprof+0x154/0x320 [ 24.245737] kasan_atomics+0xb8/0x2e8 [ 24.246274] kunit_try_run_case+0x170/0x3f0 [ 24.246832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.247409] kthread+0x24c/0x2d0 [ 24.247815] ret_from_fork+0x10/0x20 [ 24.248167] [ 24.248479] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.248479] which belongs to the cache kmalloc-64 of size 64 [ 24.249373] The buggy address is located 0 bytes to the right of [ 24.249373] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.250460] [ 24.250819] The buggy address belongs to the physical page: [ 24.251327] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.252037] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.252742] page_type: f5(slab) [ 24.253116] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.253873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.254609] page dumped because: kasan: bad access detected [ 24.255142] [ 24.255434] Memory state around the buggy address: [ 24.255925] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.256639] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.257248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.257827] ^ [ 24.258220] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.258758] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.259316] ================================================================== [ 23.664437] ================================================================== [ 23.665095] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f34/0x49c8 [ 23.665758] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.666269] [ 23.666618] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.666852] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.666932] Hardware name: linux,dummy-virt (DT) [ 23.667027] Call trace: [ 23.667093] dump_backtrace+0x9c/0x128 [ 23.667269] show_stack+0x20/0x38 [ 23.667372] dump_stack_lvl+0x8c/0xd0 [ 23.667477] print_report+0x118/0x5f0 [ 23.667532] kasan_report+0xdc/0x128 [ 23.667581] __asan_report_load4_noabort+0x20/0x30 [ 23.667633] kasan_atomics_helper+0x3f34/0x49c8 [ 23.667688] kasan_atomics+0x1a0/0x2e8 [ 23.667736] kunit_try_run_case+0x170/0x3f0 [ 23.667788] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.667844] kthread+0x24c/0x2d0 [ 23.667890] ret_from_fork+0x10/0x20 [ 23.667945] [ 23.672653] Allocated by task 252: [ 23.673156] kasan_save_stack+0x3c/0x68 [ 23.673701] kasan_save_track+0x20/0x40 [ 23.674165] kasan_save_alloc_info+0x40/0x58 [ 23.674611] __kasan_kmalloc+0xd4/0xd8 [ 23.675056] __kmalloc_cache_noprof+0x154/0x320 [ 23.675489] kasan_atomics+0xb8/0x2e8 [ 23.675959] kunit_try_run_case+0x170/0x3f0 [ 23.676432] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.676854] kthread+0x24c/0x2d0 [ 23.677325] ret_from_fork+0x10/0x20 [ 23.677810] [ 23.678055] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.678055] which belongs to the cache kmalloc-64 of size 64 [ 23.678968] The buggy address is located 0 bytes to the right of [ 23.678968] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.679890] [ 23.680208] The buggy address belongs to the physical page: [ 23.680823] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.681445] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.682092] page_type: f5(slab) [ 23.682491] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.683277] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.683854] page dumped because: kasan: bad access detected [ 23.684403] [ 23.684651] Memory state around the buggy address: [ 23.685009] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.685740] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.686301] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.686908] ^ [ 23.687355] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.687973] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.688469] ================================================================== [ 23.360454] ================================================================== [ 23.361022] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x6bc/0x49c8 [ 23.361761] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.362515] [ 23.362891] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.363075] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.363155] Hardware name: linux,dummy-virt (DT) [ 23.363213] Call trace: [ 23.363266] dump_backtrace+0x9c/0x128 [ 23.363400] show_stack+0x20/0x38 [ 23.363502] dump_stack_lvl+0x8c/0xd0 [ 23.363598] print_report+0x118/0x5f0 [ 23.363650] kasan_report+0xdc/0x128 [ 23.363702] kasan_check_range+0x100/0x1a8 [ 23.363752] __kasan_check_write+0x20/0x30 [ 23.363798] kasan_atomics_helper+0x6bc/0x49c8 [ 23.363849] kasan_atomics+0x1a0/0x2e8 [ 23.363895] kunit_try_run_case+0x170/0x3f0 [ 23.363944] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.364000] kthread+0x24c/0x2d0 [ 23.364047] ret_from_fork+0x10/0x20 [ 23.364098] [ 23.369565] Allocated by task 252: [ 23.370099] kasan_save_stack+0x3c/0x68 [ 23.370676] kasan_save_track+0x20/0x40 [ 23.371163] kasan_save_alloc_info+0x40/0x58 [ 23.371594] __kasan_kmalloc+0xd4/0xd8 [ 23.372113] __kmalloc_cache_noprof+0x154/0x320 [ 23.372541] kasan_atomics+0xb8/0x2e8 [ 23.373056] kunit_try_run_case+0x170/0x3f0 [ 23.373594] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.374169] kthread+0x24c/0x2d0 [ 23.374662] ret_from_fork+0x10/0x20 [ 23.375182] [ 23.375493] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.375493] which belongs to the cache kmalloc-64 of size 64 [ 23.376358] The buggy address is located 0 bytes to the right of [ 23.376358] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.377394] [ 23.377746] The buggy address belongs to the physical page: [ 23.378221] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.378961] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.379558] page_type: f5(slab) [ 23.379956] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.380617] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.381296] page dumped because: kasan: bad access detected [ 23.381745] [ 23.381997] Memory state around the buggy address: [ 23.382720] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.383356] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.383889] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.384550] ^ [ 23.385071] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.385721] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.386334] ================================================================== [ 24.744935] ================================================================== [ 24.745761] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18a4/0x49c8 [ 24.746295] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.746731] [ 24.746945] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.747136] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.747200] Hardware name: linux,dummy-virt (DT) [ 24.747572] Call trace: [ 24.747655] dump_backtrace+0x9c/0x128 [ 24.747814] show_stack+0x20/0x38 [ 24.747934] dump_stack_lvl+0x8c/0xd0 [ 24.748049] print_report+0x118/0x5f0 [ 24.748162] kasan_report+0xdc/0x128 [ 24.748287] kasan_check_range+0x100/0x1a8 [ 24.748392] __kasan_check_write+0x20/0x30 [ 24.748499] kasan_atomics_helper+0x18a4/0x49c8 [ 24.748608] kasan_atomics+0x1a0/0x2e8 [ 24.748717] kunit_try_run_case+0x170/0x3f0 [ 24.748835] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.748953] kthread+0x24c/0x2d0 [ 24.749052] ret_from_fork+0x10/0x20 [ 24.749139] [ 24.754291] Allocated by task 252: [ 24.754792] kasan_save_stack+0x3c/0x68 [ 24.755344] kasan_save_track+0x20/0x40 [ 24.755857] kasan_save_alloc_info+0x40/0x58 [ 24.756339] __kasan_kmalloc+0xd4/0xd8 [ 24.756820] __kmalloc_cache_noprof+0x154/0x320 [ 24.757402] kasan_atomics+0xb8/0x2e8 [ 24.757817] kunit_try_run_case+0x170/0x3f0 [ 24.758290] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.758752] kthread+0x24c/0x2d0 [ 24.759213] ret_from_fork+0x10/0x20 [ 24.759622] [ 24.759918] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.759918] which belongs to the cache kmalloc-64 of size 64 [ 24.760808] The buggy address is located 0 bytes to the right of [ 24.760808] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.762271] [ 24.762792] The buggy address belongs to the physical page: [ 24.763477] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.764133] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.764576] page_type: f5(slab) [ 24.765043] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.765685] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.766274] page dumped because: kasan: bad access detected [ 24.766852] [ 24.767131] Memory state around the buggy address: [ 24.767566] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768110] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.768840] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.769410] ^ [ 24.769873] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.770545] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.771107] ================================================================== [ 24.260745] ================================================================== [ 24.261838] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1288/0x49c8 [ 24.262554] Write of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.263403] [ 24.263759] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.264015] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.264097] Hardware name: linux,dummy-virt (DT) [ 24.264216] Call trace: [ 24.264301] dump_backtrace+0x9c/0x128 [ 24.264407] show_stack+0x20/0x38 [ 24.264459] dump_stack_lvl+0x8c/0xd0 [ 24.264513] print_report+0x118/0x5f0 [ 24.264560] kasan_report+0xdc/0x128 [ 24.264606] kasan_check_range+0x100/0x1a8 [ 24.264655] __kasan_check_write+0x20/0x30 [ 24.264705] kasan_atomics_helper+0x1288/0x49c8 [ 24.264757] kasan_atomics+0x1a0/0x2e8 [ 24.264806] kunit_try_run_case+0x170/0x3f0 [ 24.264856] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.264911] kthread+0x24c/0x2d0 [ 24.264959] ret_from_fork+0x10/0x20 [ 24.265014] [ 24.270440] Allocated by task 252: [ 24.270823] kasan_save_stack+0x3c/0x68 [ 24.271406] kasan_save_track+0x20/0x40 [ 24.271949] kasan_save_alloc_info+0x40/0x58 [ 24.272429] __kasan_kmalloc+0xd4/0xd8 [ 24.272959] __kmalloc_cache_noprof+0x154/0x320 [ 24.273497] kasan_atomics+0xb8/0x2e8 [ 24.273881] kunit_try_run_case+0x170/0x3f0 [ 24.274483] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.274999] kthread+0x24c/0x2d0 [ 24.275376] ret_from_fork+0x10/0x20 [ 24.275825] [ 24.276102] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.276102] which belongs to the cache kmalloc-64 of size 64 [ 24.277006] The buggy address is located 0 bytes to the right of [ 24.277006] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.278061] [ 24.278413] The buggy address belongs to the physical page: [ 24.278862] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.279654] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.280316] page_type: f5(slab) [ 24.280776] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.281514] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.282132] page dumped because: kasan: bad access detected [ 24.282686] [ 24.282998] Memory state around the buggy address: [ 24.283450] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.284163] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.284835] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.285595] ^ [ 24.286227] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.286984] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.287703] ================================================================== [ 23.198766] ================================================================== [ 23.199515] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a0/0x49c8 [ 23.200158] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.201093] [ 23.201389] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.201621] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.201702] Hardware name: linux,dummy-virt (DT) [ 23.201799] Call trace: [ 23.201862] dump_backtrace+0x9c/0x128 [ 23.201989] show_stack+0x20/0x38 [ 23.202081] dump_stack_lvl+0x8c/0xd0 [ 23.202189] print_report+0x118/0x5f0 [ 23.202307] kasan_report+0xdc/0x128 [ 23.202404] kasan_check_range+0x100/0x1a8 [ 23.202513] __kasan_check_write+0x20/0x30 [ 23.202617] kasan_atomics_helper+0x4a0/0x49c8 [ 23.202732] kasan_atomics+0x1a0/0x2e8 [ 23.202785] kunit_try_run_case+0x170/0x3f0 [ 23.202843] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.202898] kthread+0x24c/0x2d0 [ 23.202946] ret_from_fork+0x10/0x20 [ 23.202999] [ 23.209555] Allocated by task 252: [ 23.209797] kasan_save_stack+0x3c/0x68 [ 23.210058] kasan_save_track+0x20/0x40 [ 23.210301] kasan_save_alloc_info+0x40/0x58 [ 23.210782] __kasan_kmalloc+0xd4/0xd8 [ 23.211336] __kmalloc_cache_noprof+0x154/0x320 [ 23.212505] kasan_atomics+0xb8/0x2e8 [ 23.212848] kunit_try_run_case+0x170/0x3f0 [ 23.213284] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.214063] kthread+0x24c/0x2d0 [ 23.214607] ret_from_fork+0x10/0x20 [ 23.215317] [ 23.215695] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.215695] which belongs to the cache kmalloc-64 of size 64 [ 23.216581] The buggy address is located 0 bytes to the right of [ 23.216581] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.217367] [ 23.217729] The buggy address belongs to the physical page: [ 23.218287] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.219153] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.219829] page_type: f5(slab) [ 23.220218] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.220756] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.221809] page dumped because: kasan: bad access detected [ 23.222802] [ 23.223019] Memory state around the buggy address: [ 23.223634] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.224539] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.225229] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.225827] ^ [ 23.226365] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.227116] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.227728] ================================================================== [ 23.298396] ================================================================== [ 23.299344] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5e4/0x49c8 [ 23.300478] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.301151] [ 23.301497] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.301974] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.302051] Hardware name: linux,dummy-virt (DT) [ 23.302141] Call trace: [ 23.302185] dump_backtrace+0x9c/0x128 [ 23.302281] show_stack+0x20/0x38 [ 23.302333] dump_stack_lvl+0x8c/0xd0 [ 23.302383] print_report+0x118/0x5f0 [ 23.302432] kasan_report+0xdc/0x128 [ 23.302476] kasan_check_range+0x100/0x1a8 [ 23.302526] __kasan_check_write+0x20/0x30 [ 23.302574] kasan_atomics_helper+0x5e4/0x49c8 [ 23.302628] kasan_atomics+0x1a0/0x2e8 [ 23.302678] kunit_try_run_case+0x170/0x3f0 [ 23.302730] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.302785] kthread+0x24c/0x2d0 [ 23.302831] ret_from_fork+0x10/0x20 [ 23.302884] [ 23.309507] Allocated by task 252: [ 23.310084] kasan_save_stack+0x3c/0x68 [ 23.310787] kasan_save_track+0x20/0x40 [ 23.311257] kasan_save_alloc_info+0x40/0x58 [ 23.311904] __kasan_kmalloc+0xd4/0xd8 [ 23.312744] __kmalloc_cache_noprof+0x154/0x320 [ 23.313177] kasan_atomics+0xb8/0x2e8 [ 23.313525] kunit_try_run_case+0x170/0x3f0 [ 23.313894] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.314526] kthread+0x24c/0x2d0 [ 23.314893] ret_from_fork+0x10/0x20 [ 23.315638] [ 23.316040] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.316040] which belongs to the cache kmalloc-64 of size 64 [ 23.317382] The buggy address is located 0 bytes to the right of [ 23.317382] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.318755] [ 23.319020] The buggy address belongs to the physical page: [ 23.319616] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.320668] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.321279] page_type: f5(slab) [ 23.321488] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.321742] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.321973] page dumped because: kasan: bad access detected [ 23.322161] [ 23.322346] Memory state around the buggy address: [ 23.323072] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.324328] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.325041] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.325842] ^ [ 23.326437] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.327067] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.327926] ================================================================== [ 22.874336] ================================================================== [ 22.876573] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4210/0x49c8 [ 22.877284] Read of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 22.877831] [ 22.878191] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 22.878436] Tainted: [B]=BAD_PAGE, [N]=TEST [ 22.878512] Hardware name: linux,dummy-virt (DT) [ 22.878617] Call trace: [ 22.878691] dump_backtrace+0x9c/0x128 [ 22.878822] show_stack+0x20/0x38 [ 22.878895] dump_stack_lvl+0x8c/0xd0 [ 22.878956] print_report+0x118/0x5f0 [ 22.879008] kasan_report+0xdc/0x128 [ 22.879078] __asan_report_load4_noabort+0x20/0x30 [ 22.879176] kasan_atomics_helper+0x4210/0x49c8 [ 22.879281] kasan_atomics+0x1a0/0x2e8 [ 22.879371] kunit_try_run_case+0x170/0x3f0 [ 22.879491] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.879598] kthread+0x24c/0x2d0 [ 22.879682] ret_from_fork+0x10/0x20 [ 22.879778] [ 22.886033] Allocated by task 252: [ 22.886587] kasan_save_stack+0x3c/0x68 [ 22.887422] kasan_save_track+0x20/0x40 [ 22.887919] kasan_save_alloc_info+0x40/0x58 [ 22.888348] __kasan_kmalloc+0xd4/0xd8 [ 22.888853] __kmalloc_cache_noprof+0x154/0x320 [ 22.889434] kasan_atomics+0xb8/0x2e8 [ 22.889878] kunit_try_run_case+0x170/0x3f0 [ 22.890308] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 22.890914] kthread+0x24c/0x2d0 [ 22.891307] ret_from_fork+0x10/0x20 [ 22.891808] [ 22.892054] The buggy address belongs to the object at fff00000c6cc9e00 [ 22.892054] which belongs to the cache kmalloc-64 of size 64 [ 22.892908] The buggy address is located 0 bytes to the right of [ 22.892908] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 22.893892] [ 22.894223] The buggy address belongs to the physical page: [ 22.894759] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 22.895499] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 22.896325] page_type: f5(slab) [ 22.896799] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 22.897435] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 22.898102] page dumped because: kasan: bad access detected [ 22.898830] [ 22.899478] Memory state around the buggy address: [ 22.899997] fff00000c6cc9d00: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 22.900619] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 22.901248] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 22.901871] ^ [ 22.902415] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.903065] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 22.903950] ================================================================== [ 23.134508] ================================================================== [ 23.135769] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3c8/0x49c8 [ 23.136473] Write of size 4 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 23.137282] [ 23.137649] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 23.137885] Tainted: [B]=BAD_PAGE, [N]=TEST [ 23.137976] Hardware name: linux,dummy-virt (DT) [ 23.138070] Call trace: [ 23.138136] dump_backtrace+0x9c/0x128 [ 23.138276] show_stack+0x20/0x38 [ 23.138387] dump_stack_lvl+0x8c/0xd0 [ 23.138478] print_report+0x118/0x5f0 [ 23.138536] kasan_report+0xdc/0x128 [ 23.138585] kasan_check_range+0x100/0x1a8 [ 23.138633] __kasan_check_write+0x20/0x30 [ 23.138683] kasan_atomics_helper+0x3c8/0x49c8 [ 23.138734] kasan_atomics+0x1a0/0x2e8 [ 23.138783] kunit_try_run_case+0x170/0x3f0 [ 23.138832] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.138886] kthread+0x24c/0x2d0 [ 23.138934] ret_from_fork+0x10/0x20 [ 23.138986] [ 23.145260] Allocated by task 252: [ 23.145770] kasan_save_stack+0x3c/0x68 [ 23.146899] kasan_save_track+0x20/0x40 [ 23.147510] kasan_save_alloc_info+0x40/0x58 [ 23.148298] __kasan_kmalloc+0xd4/0xd8 [ 23.148614] __kmalloc_cache_noprof+0x154/0x320 [ 23.149289] kasan_atomics+0xb8/0x2e8 [ 23.149656] kunit_try_run_case+0x170/0x3f0 [ 23.150338] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 23.150879] kthread+0x24c/0x2d0 [ 23.151744] ret_from_fork+0x10/0x20 [ 23.152125] [ 23.152444] The buggy address belongs to the object at fff00000c6cc9e00 [ 23.152444] which belongs to the cache kmalloc-64 of size 64 [ 23.153318] The buggy address is located 0 bytes to the right of [ 23.153318] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 23.154315] [ 23.154585] The buggy address belongs to the physical page: [ 23.155573] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 23.156334] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 23.156752] page_type: f5(slab) [ 23.157582] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 23.158390] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 23.159310] page dumped because: kasan: bad access detected [ 23.160029] [ 23.160311] Memory state around the buggy address: [ 23.160727] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.161342] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 23.161983] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 23.162589] ^ [ 23.163521] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.164219] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 23.164535] ================================================================== [ 24.717797] ================================================================== [ 24.718420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f88/0x49c8 [ 24.719161] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.719628] [ 24.720017] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.720272] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.720359] Hardware name: linux,dummy-virt (DT) [ 24.720460] Call trace: [ 24.720553] dump_backtrace+0x9c/0x128 [ 24.720684] show_stack+0x20/0x38 [ 24.720775] dump_stack_lvl+0x8c/0xd0 [ 24.720835] print_report+0x118/0x5f0 [ 24.720884] kasan_report+0xdc/0x128 [ 24.720931] __asan_report_load8_noabort+0x20/0x30 [ 24.720984] kasan_atomics_helper+0x3f88/0x49c8 [ 24.721038] kasan_atomics+0x1a0/0x2e8 [ 24.721091] kunit_try_run_case+0x170/0x3f0 [ 24.721143] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.721200] kthread+0x24c/0x2d0 [ 24.721273] ret_from_fork+0x10/0x20 [ 24.721331] [ 24.726641] Allocated by task 252: [ 24.727065] kasan_save_stack+0x3c/0x68 [ 24.727619] kasan_save_track+0x20/0x40 [ 24.728073] kasan_save_alloc_info+0x40/0x58 [ 24.728515] __kasan_kmalloc+0xd4/0xd8 [ 24.729051] __kmalloc_cache_noprof+0x154/0x320 [ 24.729537] kasan_atomics+0xb8/0x2e8 [ 24.730068] kunit_try_run_case+0x170/0x3f0 [ 24.730563] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.731146] kthread+0x24c/0x2d0 [ 24.731542] ret_from_fork+0x10/0x20 [ 24.732026] [ 24.732365] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.732365] which belongs to the cache kmalloc-64 of size 64 [ 24.733305] The buggy address is located 0 bytes to the right of [ 24.733305] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.734322] [ 24.734661] The buggy address belongs to the physical page: [ 24.735154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.735933] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.736550] page_type: f5(slab) [ 24.736970] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.737708] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.738355] page dumped because: kasan: bad access detected [ 24.738833] [ 24.739160] Memory state around the buggy address: [ 24.739647] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.740266] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.740930] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.741590] ^ [ 24.742003] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.742557] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.743072] ================================================================== [ 24.662916] ================================================================== [ 24.663620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3f78/0x49c8 [ 24.664311] Read of size 8 at addr fff00000c6cc9e30 by task kunit_try_catch/252 [ 24.664904] [ 24.665261] CPU: 1 UID: 0 PID: 252 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 24.665515] Tainted: [B]=BAD_PAGE, [N]=TEST [ 24.665605] Hardware name: linux,dummy-virt (DT) [ 24.665695] Call trace: [ 24.665767] dump_backtrace+0x9c/0x128 [ 24.665910] show_stack+0x20/0x38 [ 24.666012] dump_stack_lvl+0x8c/0xd0 [ 24.666096] print_report+0x118/0x5f0 [ 24.666148] kasan_report+0xdc/0x128 [ 24.666196] __asan_report_load8_noabort+0x20/0x30 [ 24.666277] kasan_atomics_helper+0x3f78/0x49c8 [ 24.666336] kasan_atomics+0x1a0/0x2e8 [ 24.666388] kunit_try_run_case+0x170/0x3f0 [ 24.666444] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.666501] kthread+0x24c/0x2d0 [ 24.666550] ret_from_fork+0x10/0x20 [ 24.666605] [ 24.671523] Allocated by task 252: [ 24.672040] kasan_save_stack+0x3c/0x68 [ 24.672537] kasan_save_track+0x20/0x40 [ 24.672948] kasan_save_alloc_info+0x40/0x58 [ 24.673535] __kasan_kmalloc+0xd4/0xd8 [ 24.674040] __kmalloc_cache_noprof+0x154/0x320 [ 24.674548] kasan_atomics+0xb8/0x2e8 [ 24.675052] kunit_try_run_case+0x170/0x3f0 [ 24.675598] kunit_generic_run_threadfn_adapter+0x88/0x100 [ 24.676117] kthread+0x24c/0x2d0 [ 24.676551] ret_from_fork+0x10/0x20 [ 24.676901] [ 24.677203] The buggy address belongs to the object at fff00000c6cc9e00 [ 24.677203] which belongs to the cache kmalloc-64 of size 64 [ 24.678105] The buggy address is located 0 bytes to the right of [ 24.678105] allocated 48-byte region [fff00000c6cc9e00, fff00000c6cc9e30) [ 24.679085] [ 24.679427] The buggy address belongs to the physical page: [ 24.679998] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x106cc9 [ 24.680707] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff) [ 24.681315] page_type: f5(slab) [ 24.681699] raw: 0bfffe0000000000 fff00000c00018c0 dead000000000122 0000000000000000 [ 24.682394] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 24.682966] page dumped because: kasan: bad access detected [ 24.683408] [ 24.683709] Memory state around the buggy address: [ 24.684157] fff00000c6cc9d00: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.684819] fff00000c6cc9d80: fa fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 24.685445] >fff00000c6cc9e00: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 24.685992] ^ [ 24.686484] fff00000c6cc9e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.687202] fff00000c6cc9f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 24.687746] ==================================================================
[ 15.435142] ================================================================== [ 15.435538] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x16e8/0x5450 [ 15.436304] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.436870] [ 15.437021] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.437109] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.437135] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.437175] Call Trace: [ 15.437214] <TASK> [ 15.437251] dump_stack_lvl+0x73/0xb0 [ 15.437306] print_report+0xd1/0x640 [ 15.437582] ? __virt_addr_valid+0x1db/0x2d0 [ 15.437636] ? kasan_atomics_helper+0x16e8/0x5450 [ 15.437696] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.437745] ? kasan_atomics_helper+0x16e8/0x5450 [ 15.437786] kasan_report+0x140/0x180 [ 15.437836] ? kasan_atomics_helper+0x16e8/0x5450 [ 15.437890] kasan_check_range+0x10c/0x1c0 [ 15.437952] __kasan_check_write+0x18/0x20 [ 15.438005] kasan_atomics_helper+0x16e8/0x5450 [ 15.438085] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.438126] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.438155] kasan_atomics+0x1dd/0x310 [ 15.438179] ? __pfx_kasan_atomics+0x10/0x10 [ 15.438203] ? __pfx_read_tsc+0x10/0x10 [ 15.438225] ? ktime_get_ts64+0x84/0x230 [ 15.438256] kunit_try_run_case+0x1a6/0x480 [ 15.438282] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.438305] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.438329] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.438357] ? __kthread_parkme+0x82/0x160 [ 15.438380] ? preempt_count_sub+0x50/0x80 [ 15.438405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.438428] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.438456] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.438486] kthread+0x257/0x310 [ 15.438506] ? __pfx_kthread+0x10/0x10 [ 15.438528] ret_from_fork+0x41/0x80 [ 15.438551] ? __pfx_kthread+0x10/0x10 [ 15.438572] ret_from_fork_asm+0x1a/0x30 [ 15.438605] </TASK> [ 15.438620] [ 15.448163] Allocated by task 270: [ 15.448457] kasan_save_stack+0x45/0x70 [ 15.449679] kasan_save_track+0x18/0x40 [ 15.450290] kasan_save_alloc_info+0x3b/0x50 [ 15.450732] __kasan_kmalloc+0xb7/0xc0 [ 15.451295] __kmalloc_cache_noprof+0x168/0x350 [ 15.451651] kasan_atomics+0x96/0x310 [ 15.451937] kunit_try_run_case+0x1a6/0x480 [ 15.452734] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.452958] kthread+0x257/0x310 [ 15.453474] ret_from_fork+0x41/0x80 [ 15.453642] ret_from_fork_asm+0x1a/0x30 [ 15.454168] [ 15.454276] The buggy address belongs to the object at ffff888102635000 [ 15.454276] which belongs to the cache kmalloc-64 of size 64 [ 15.454876] The buggy address is located 0 bytes to the right of [ 15.454876] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.455607] [ 15.456085] The buggy address belongs to the physical page: [ 15.456768] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.457236] flags: 0x200000000000000(node=0|zone=2) [ 15.457475] page_type: f5(slab) [ 15.457750] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.458171] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.458495] page dumped because: kasan: bad access detected [ 15.458815] [ 15.458928] Memory state around the buggy address: [ 15.459331] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.459745] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.460265] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.460703] ^ [ 15.461027] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.461347] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.461794] ================================================================== [ 14.822255] ================================================================== [ 14.822920] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xac8/0x5450 [ 14.823454] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.823955] [ 14.824160] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.824242] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.824269] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.824310] Call Trace: [ 14.824342] <TASK> [ 14.824374] dump_stack_lvl+0x73/0xb0 [ 14.824431] print_report+0xd1/0x640 [ 14.824478] ? __virt_addr_valid+0x1db/0x2d0 [ 14.824525] ? kasan_atomics_helper+0xac8/0x5450 [ 14.824568] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.824616] ? kasan_atomics_helper+0xac8/0x5450 [ 14.824674] kasan_report+0x140/0x180 [ 14.824724] ? kasan_atomics_helper+0xac8/0x5450 [ 14.824784] kasan_check_range+0x10c/0x1c0 [ 14.824829] __kasan_check_write+0x18/0x20 [ 14.824872] kasan_atomics_helper+0xac8/0x5450 [ 14.824920] ? kasan_save_alloc_info+0x3b/0x50 [ 14.824964] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.825015] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.825102] kasan_atomics+0x1dd/0x310 [ 14.825150] ? __pfx_kasan_atomics+0x10/0x10 [ 14.825196] ? __pfx_read_tsc+0x10/0x10 [ 14.825238] ? ktime_get_ts64+0x84/0x230 [ 14.825294] kunit_try_run_case+0x1a6/0x480 [ 14.825340] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825382] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.825426] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.825476] ? __kthread_parkme+0x82/0x160 [ 14.825511] ? preempt_count_sub+0x50/0x80 [ 14.825553] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.825588] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.825628] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.825687] kthread+0x257/0x310 [ 14.825737] ? __pfx_kthread+0x10/0x10 [ 14.825777] ret_from_fork+0x41/0x80 [ 14.825826] ? __pfx_kthread+0x10/0x10 [ 14.825877] ret_from_fork_asm+0x1a/0x30 [ 14.825960] </TASK> [ 14.825989] [ 14.836039] Allocated by task 270: [ 14.836364] kasan_save_stack+0x45/0x70 [ 14.836719] kasan_save_track+0x18/0x40 [ 14.837042] kasan_save_alloc_info+0x3b/0x50 [ 14.837436] __kasan_kmalloc+0xb7/0xc0 [ 14.837788] __kmalloc_cache_noprof+0x168/0x350 [ 14.838256] kasan_atomics+0x96/0x310 [ 14.838554] kunit_try_run_case+0x1a6/0x480 [ 14.838898] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.839333] kthread+0x257/0x310 [ 14.839525] ret_from_fork+0x41/0x80 [ 14.839743] ret_from_fork_asm+0x1a/0x30 [ 14.840109] [ 14.840265] The buggy address belongs to the object at ffff888102635000 [ 14.840265] which belongs to the cache kmalloc-64 of size 64 [ 14.841213] The buggy address is located 0 bytes to the right of [ 14.841213] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.841921] [ 14.842033] The buggy address belongs to the physical page: [ 14.842492] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.843024] flags: 0x200000000000000(node=0|zone=2) [ 14.843289] page_type: f5(slab) [ 14.843583] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.844021] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.844389] page dumped because: kasan: bad access detected [ 14.844717] [ 14.844881] Memory state around the buggy address: [ 14.845200] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.845580] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.846006] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.846471] ^ [ 14.846856] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847261] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.847611] ================================================================== [ 15.382726] ================================================================== [ 15.384313] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x15b7/0x5450 [ 15.384866] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.385405] [ 15.385590] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.385686] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.385715] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.385759] Call Trace: [ 15.385796] <TASK> [ 15.385831] dump_stack_lvl+0x73/0xb0 [ 15.385888] print_report+0xd1/0x640 [ 15.385947] ? __virt_addr_valid+0x1db/0x2d0 [ 15.386002] ? kasan_atomics_helper+0x15b7/0x5450 [ 15.386086] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.386139] ? kasan_atomics_helper+0x15b7/0x5450 [ 15.386193] kasan_report+0x140/0x180 [ 15.386247] ? kasan_atomics_helper+0x15b7/0x5450 [ 15.386303] kasan_check_range+0x10c/0x1c0 [ 15.386343] __kasan_check_write+0x18/0x20 [ 15.386382] kasan_atomics_helper+0x15b7/0x5450 [ 15.386453] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.386500] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.386554] kasan_atomics+0x1dd/0x310 [ 15.386609] ? __pfx_kasan_atomics+0x10/0x10 [ 15.386672] ? __pfx_read_tsc+0x10/0x10 [ 15.386709] ? ktime_get_ts64+0x84/0x230 [ 15.386765] kunit_try_run_case+0x1a6/0x480 [ 15.386824] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.386877] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.386924] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.386978] ? __kthread_parkme+0x82/0x160 [ 15.387016] ? preempt_count_sub+0x50/0x80 [ 15.387085] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.387130] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.387185] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.387240] kthread+0x257/0x310 [ 15.387284] ? __pfx_kthread+0x10/0x10 [ 15.387328] ret_from_fork+0x41/0x80 [ 15.387372] ? __pfx_kthread+0x10/0x10 [ 15.387413] ret_from_fork_asm+0x1a/0x30 [ 15.387478] </TASK> [ 15.387506] [ 15.396234] Allocated by task 270: [ 15.396543] kasan_save_stack+0x45/0x70 [ 15.396880] kasan_save_track+0x18/0x40 [ 15.397156] kasan_save_alloc_info+0x3b/0x50 [ 15.397370] __kasan_kmalloc+0xb7/0xc0 [ 15.397562] __kmalloc_cache_noprof+0x168/0x350 [ 15.397792] kasan_atomics+0x96/0x310 [ 15.397997] kunit_try_run_case+0x1a6/0x480 [ 15.398358] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.398777] kthread+0x257/0x310 [ 15.399099] ret_from_fork+0x41/0x80 [ 15.399410] ret_from_fork_asm+0x1a/0x30 [ 15.399734] [ 15.399901] The buggy address belongs to the object at ffff888102635000 [ 15.399901] which belongs to the cache kmalloc-64 of size 64 [ 15.400722] The buggy address is located 0 bytes to the right of [ 15.400722] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.401545] [ 15.401736] The buggy address belongs to the physical page: [ 15.402120] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.402541] flags: 0x200000000000000(node=0|zone=2) [ 15.402867] page_type: f5(slab) [ 15.403165] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.403539] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.403954] page dumped because: kasan: bad access detected [ 15.404364] [ 15.404526] Memory state around the buggy address: [ 15.404830] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.405153] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.405429] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.405936] ^ [ 15.406344] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.406822] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.407339] ================================================================== [ 14.516451] ================================================================== [ 14.516906] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b56/0x5450 [ 14.517198] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.517700] [ 14.517888] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.517984] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.518011] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.518087] Call Trace: [ 14.518149] <TASK> [ 14.518176] dump_stack_lvl+0x73/0xb0 [ 14.518230] print_report+0xd1/0x640 [ 14.518272] ? __virt_addr_valid+0x1db/0x2d0 [ 14.518307] ? kasan_atomics_helper+0x4b56/0x5450 [ 14.518342] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.518381] ? kasan_atomics_helper+0x4b56/0x5450 [ 14.518426] kasan_report+0x140/0x180 [ 14.518474] ? kasan_atomics_helper+0x4b56/0x5450 [ 14.518526] __asan_report_load4_noabort+0x18/0x20 [ 14.518568] kasan_atomics_helper+0x4b56/0x5450 [ 14.518613] ? kasan_save_alloc_info+0x3b/0x50 [ 14.518646] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.518718] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.518770] kasan_atomics+0x1dd/0x310 [ 14.518802] ? __pfx_kasan_atomics+0x10/0x10 [ 14.518834] ? __pfx_read_tsc+0x10/0x10 [ 14.518864] ? ktime_get_ts64+0x84/0x230 [ 14.518903] kunit_try_run_case+0x1a6/0x480 [ 14.518939] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.518973] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.519013] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.519054] ? __kthread_parkme+0x82/0x160 [ 14.519084] ? preempt_count_sub+0x50/0x80 [ 14.519177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.519218] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.519266] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.519315] kthread+0x257/0x310 [ 14.519352] ? __pfx_kthread+0x10/0x10 [ 14.519392] ret_from_fork+0x41/0x80 [ 14.519432] ? __pfx_kthread+0x10/0x10 [ 14.519472] ret_from_fork_asm+0x1a/0x30 [ 14.519529] </TASK> [ 14.519562] [ 14.529224] Allocated by task 270: [ 14.529401] kasan_save_stack+0x45/0x70 [ 14.532189] kasan_save_track+0x18/0x40 [ 14.532546] kasan_save_alloc_info+0x3b/0x50 [ 14.533588] __kasan_kmalloc+0xb7/0xc0 [ 14.533910] __kmalloc_cache_noprof+0x168/0x350 [ 14.534114] kasan_atomics+0x96/0x310 [ 14.534269] kunit_try_run_case+0x1a6/0x480 [ 14.534427] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.534602] kthread+0x257/0x310 [ 14.536136] ret_from_fork+0x41/0x80 [ 14.536541] ret_from_fork_asm+0x1a/0x30 [ 14.537353] [ 14.538487] The buggy address belongs to the object at ffff888102635000 [ 14.538487] which belongs to the cache kmalloc-64 of size 64 [ 14.540339] The buggy address is located 0 bytes to the right of [ 14.540339] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.541409] [ 14.541530] The buggy address belongs to the physical page: [ 14.541882] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.542300] flags: 0x200000000000000(node=0|zone=2) [ 14.542613] page_type: f5(slab) [ 14.542908] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.544005] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.544850] page dumped because: kasan: bad access detected [ 14.545533] [ 14.545699] Memory state around the buggy address: [ 14.545877] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546277] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.546600] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.546983] ^ [ 14.547331] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.547561] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.548443] ================================================================== [ 14.799526] ================================================================== [ 14.800439] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xa2c/0x5450 [ 14.800785] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.801177] [ 14.801309] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.801389] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.801416] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.801459] Call Trace: [ 14.801490] <TASK> [ 14.801523] dump_stack_lvl+0x73/0xb0 [ 14.801579] print_report+0xd1/0x640 [ 14.801628] ? __virt_addr_valid+0x1db/0x2d0 [ 14.801690] ? kasan_atomics_helper+0xa2c/0x5450 [ 14.801734] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.801775] ? kasan_atomics_helper+0xa2c/0x5450 [ 14.801816] kasan_report+0x140/0x180 [ 14.801858] ? kasan_atomics_helper+0xa2c/0x5450 [ 14.801917] kasan_check_range+0x10c/0x1c0 [ 14.801959] __kasan_check_write+0x18/0x20 [ 14.801996] kasan_atomics_helper+0xa2c/0x5450 [ 14.802037] ? kasan_save_alloc_info+0x3b/0x50 [ 14.802107] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.802154] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.802203] kasan_atomics+0x1dd/0x310 [ 14.802240] ? __pfx_kasan_atomics+0x10/0x10 [ 14.802282] ? __pfx_read_tsc+0x10/0x10 [ 14.802317] ? ktime_get_ts64+0x84/0x230 [ 14.802364] kunit_try_run_case+0x1a6/0x480 [ 14.802405] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.802442] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.802482] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.802526] ? __kthread_parkme+0x82/0x160 [ 14.802562] ? preempt_count_sub+0x50/0x80 [ 14.802598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.802693] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.802757] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.802810] kthread+0x257/0x310 [ 14.802851] ? __pfx_kthread+0x10/0x10 [ 14.802894] ret_from_fork+0x41/0x80 [ 14.802934] ? __pfx_kthread+0x10/0x10 [ 14.802976] ret_from_fork_asm+0x1a/0x30 [ 14.803040] </TASK> [ 14.803097] [ 14.811397] Allocated by task 270: [ 14.811576] kasan_save_stack+0x45/0x70 [ 14.811793] kasan_save_track+0x18/0x40 [ 14.811964] kasan_save_alloc_info+0x3b/0x50 [ 14.812176] __kasan_kmalloc+0xb7/0xc0 [ 14.812340] __kmalloc_cache_noprof+0x168/0x350 [ 14.812700] kasan_atomics+0x96/0x310 [ 14.813006] kunit_try_run_case+0x1a6/0x480 [ 14.813370] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.813764] kthread+0x257/0x310 [ 14.814083] ret_from_fork+0x41/0x80 [ 14.814380] ret_from_fork_asm+0x1a/0x30 [ 14.814710] [ 14.814869] The buggy address belongs to the object at ffff888102635000 [ 14.814869] which belongs to the cache kmalloc-64 of size 64 [ 14.815689] The buggy address is located 0 bytes to the right of [ 14.815689] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.816551] [ 14.816725] The buggy address belongs to the physical page: [ 14.816986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.817273] flags: 0x200000000000000(node=0|zone=2) [ 14.817460] page_type: f5(slab) [ 14.817615] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.818172] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.818713] page dumped because: kasan: bad access detected [ 14.819127] [ 14.819288] Memory state around the buggy address: [ 14.819627] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820045] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.820430] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.820734] ^ [ 14.821075] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821316] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.821543] ================================================================== [ 14.602338] ================================================================== [ 14.602742] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x566/0x5450 [ 14.603629] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.604013] [ 14.604205] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.604283] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.604304] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.604344] Call Trace: [ 14.604379] <TASK> [ 14.604411] dump_stack_lvl+0x73/0xb0 [ 14.604682] print_report+0xd1/0x640 [ 14.604732] ? __virt_addr_valid+0x1db/0x2d0 [ 14.604780] ? kasan_atomics_helper+0x566/0x5450 [ 14.604830] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.604866] ? kasan_atomics_helper+0x566/0x5450 [ 14.604906] kasan_report+0x140/0x180 [ 14.604947] ? kasan_atomics_helper+0x566/0x5450 [ 14.604991] kasan_check_range+0x10c/0x1c0 [ 14.605024] __kasan_check_write+0x18/0x20 [ 14.605060] kasan_atomics_helper+0x566/0x5450 [ 14.605251] ? kasan_save_alloc_info+0x3b/0x50 [ 14.605297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.605335] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.605378] kasan_atomics+0x1dd/0x310 [ 14.605414] ? __pfx_kasan_atomics+0x10/0x10 [ 14.605453] ? __pfx_read_tsc+0x10/0x10 [ 14.605490] ? ktime_get_ts64+0x84/0x230 [ 14.605538] kunit_try_run_case+0x1a6/0x480 [ 14.605579] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.605616] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.605656] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.605715] ? __kthread_parkme+0x82/0x160 [ 14.605752] ? preempt_count_sub+0x50/0x80 [ 14.605798] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.605836] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.605864] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.605891] kthread+0x257/0x310 [ 14.605922] ? __pfx_kthread+0x10/0x10 [ 14.605944] ret_from_fork+0x41/0x80 [ 14.605965] ? __pfx_kthread+0x10/0x10 [ 14.605984] ret_from_fork_asm+0x1a/0x30 [ 14.606016] </TASK> [ 14.606030] [ 14.616099] Allocated by task 270: [ 14.616291] kasan_save_stack+0x45/0x70 [ 14.616686] kasan_save_track+0x18/0x40 [ 14.616961] kasan_save_alloc_info+0x3b/0x50 [ 14.617374] __kasan_kmalloc+0xb7/0xc0 [ 14.617678] __kmalloc_cache_noprof+0x168/0x350 [ 14.617934] kasan_atomics+0x96/0x310 [ 14.618443] kunit_try_run_case+0x1a6/0x480 [ 14.618728] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.618953] kthread+0x257/0x310 [ 14.619203] ret_from_fork+0x41/0x80 [ 14.619897] ret_from_fork_asm+0x1a/0x30 [ 14.620088] [ 14.620193] The buggy address belongs to the object at ffff888102635000 [ 14.620193] which belongs to the cache kmalloc-64 of size 64 [ 14.620798] The buggy address is located 0 bytes to the right of [ 14.620798] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.621571] [ 14.621747] The buggy address belongs to the physical page: [ 14.622002] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.622340] flags: 0x200000000000000(node=0|zone=2) [ 14.622657] page_type: f5(slab) [ 14.623471] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.624203] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.624540] page dumped because: kasan: bad access detected [ 14.624874] [ 14.625026] Memory state around the buggy address: [ 14.625483] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.625973] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.626686] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.627008] ^ [ 14.627596] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.627945] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.628575] ================================================================== [ 15.162323] ================================================================== [ 15.162672] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1218/0x5450 [ 15.163094] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.163425] [ 15.163605] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.163696] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.163722] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.163760] Call Trace: [ 15.163791] <TASK> [ 15.163819] dump_stack_lvl+0x73/0xb0 [ 15.163873] print_report+0xd1/0x640 [ 15.163917] ? __virt_addr_valid+0x1db/0x2d0 [ 15.163961] ? kasan_atomics_helper+0x1218/0x5450 [ 15.164001] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.164045] ? kasan_atomics_helper+0x1218/0x5450 [ 15.164126] kasan_report+0x140/0x180 [ 15.164171] ? kasan_atomics_helper+0x1218/0x5450 [ 15.164224] kasan_check_range+0x10c/0x1c0 [ 15.164266] __kasan_check_write+0x18/0x20 [ 15.164302] kasan_atomics_helper+0x1218/0x5450 [ 15.164348] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.164392] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.164446] kasan_atomics+0x1dd/0x310 [ 15.164489] ? __pfx_kasan_atomics+0x10/0x10 [ 15.164530] ? __pfx_read_tsc+0x10/0x10 [ 15.164566] ? ktime_get_ts64+0x84/0x230 [ 15.164616] kunit_try_run_case+0x1a6/0x480 [ 15.164661] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164715] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.164758] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.164801] ? __kthread_parkme+0x82/0x160 [ 15.164842] ? preempt_count_sub+0x50/0x80 [ 15.164885] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.164925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.164973] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.165020] kthread+0x257/0x310 [ 15.165086] ? __pfx_kthread+0x10/0x10 [ 15.165129] ret_from_fork+0x41/0x80 [ 15.165168] ? __pfx_kthread+0x10/0x10 [ 15.165196] ret_from_fork_asm+0x1a/0x30 [ 15.165246] </TASK> [ 15.165267] [ 15.172569] Allocated by task 270: [ 15.172859] kasan_save_stack+0x45/0x70 [ 15.173214] kasan_save_track+0x18/0x40 [ 15.173508] kasan_save_alloc_info+0x3b/0x50 [ 15.173822] __kasan_kmalloc+0xb7/0xc0 [ 15.174154] __kmalloc_cache_noprof+0x168/0x350 [ 15.174480] kasan_atomics+0x96/0x310 [ 15.174723] kunit_try_run_case+0x1a6/0x480 [ 15.174949] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.175310] kthread+0x257/0x310 [ 15.175505] ret_from_fork+0x41/0x80 [ 15.175733] ret_from_fork_asm+0x1a/0x30 [ 15.175915] [ 15.176022] The buggy address belongs to the object at ffff888102635000 [ 15.176022] which belongs to the cache kmalloc-64 of size 64 [ 15.176748] The buggy address is located 0 bytes to the right of [ 15.176748] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.177609] [ 15.177790] The buggy address belongs to the physical page: [ 15.178231] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.178568] flags: 0x200000000000000(node=0|zone=2) [ 15.179798] page_type: f5(slab) [ 15.180598] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.180924] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.181218] page dumped because: kasan: bad access detected [ 15.181417] [ 15.181527] Memory state around the buggy address: [ 15.181888] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182448] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.182942] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.183463] ^ [ 15.183789] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184114] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.184511] ================================================================== [ 15.305643] ================================================================== [ 15.306276] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1468/0x5450 [ 15.306820] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.307328] [ 15.307526] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.307618] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.307654] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.307737] Call Trace: [ 15.307769] <TASK> [ 15.307798] dump_stack_lvl+0x73/0xb0 [ 15.307858] print_report+0xd1/0x640 [ 15.307930] ? __virt_addr_valid+0x1db/0x2d0 [ 15.307974] ? kasan_atomics_helper+0x1468/0x5450 [ 15.308017] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.308084] ? kasan_atomics_helper+0x1468/0x5450 [ 15.308131] kasan_report+0x140/0x180 [ 15.308211] ? kasan_atomics_helper+0x1468/0x5450 [ 15.308285] kasan_check_range+0x10c/0x1c0 [ 15.308351] __kasan_check_write+0x18/0x20 [ 15.308396] kasan_atomics_helper+0x1468/0x5450 [ 15.308441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.308489] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.308545] kasan_atomics+0x1dd/0x310 [ 15.308588] ? __pfx_kasan_atomics+0x10/0x10 [ 15.308628] ? __pfx_read_tsc+0x10/0x10 [ 15.308661] ? ktime_get_ts64+0x84/0x230 [ 15.308721] kunit_try_run_case+0x1a6/0x480 [ 15.308767] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.308808] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.308853] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.308904] ? __kthread_parkme+0x82/0x160 [ 15.308948] ? preempt_count_sub+0x50/0x80 [ 15.308997] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.309040] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.309104] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.309159] kthread+0x257/0x310 [ 15.309201] ? __pfx_kthread+0x10/0x10 [ 15.309244] ret_from_fork+0x41/0x80 [ 15.309286] ? __pfx_kthread+0x10/0x10 [ 15.309327] ret_from_fork_asm+0x1a/0x30 [ 15.309386] </TASK> [ 15.309410] [ 15.318229] Allocated by task 270: [ 15.318549] kasan_save_stack+0x45/0x70 [ 15.318903] kasan_save_track+0x18/0x40 [ 15.319247] kasan_save_alloc_info+0x3b/0x50 [ 15.319562] __kasan_kmalloc+0xb7/0xc0 [ 15.319882] __kmalloc_cache_noprof+0x168/0x350 [ 15.320232] kasan_atomics+0x96/0x310 [ 15.320506] kunit_try_run_case+0x1a6/0x480 [ 15.320810] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.321169] kthread+0x257/0x310 [ 15.321458] ret_from_fork+0x41/0x80 [ 15.321683] ret_from_fork_asm+0x1a/0x30 [ 15.321986] [ 15.322213] The buggy address belongs to the object at ffff888102635000 [ 15.322213] which belongs to the cache kmalloc-64 of size 64 [ 15.322947] The buggy address is located 0 bytes to the right of [ 15.322947] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.323303] [ 15.323391] The buggy address belongs to the physical page: [ 15.323552] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.326379] flags: 0x200000000000000(node=0|zone=2) [ 15.327100] page_type: f5(slab) [ 15.327370] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.328660] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.330003] page dumped because: kasan: bad access detected [ 15.330774] [ 15.330960] Memory state around the buggy address: [ 15.332234] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.332998] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.333977] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.334415] ^ [ 15.334728] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335010] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.335354] ================================================================== [ 15.846605] ================================================================== [ 15.847352] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f9a/0x5450 [ 15.847930] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.848471] [ 15.848627] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.848714] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.848734] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.848765] Call Trace: [ 15.848799] <TASK> [ 15.848827] dump_stack_lvl+0x73/0xb0 [ 15.848876] print_report+0xd1/0x640 [ 15.848913] ? __virt_addr_valid+0x1db/0x2d0 [ 15.848952] ? kasan_atomics_helper+0x4f9a/0x5450 [ 15.848986] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.849023] ? kasan_atomics_helper+0x4f9a/0x5450 [ 15.849069] kasan_report+0x140/0x180 [ 15.849106] ? kasan_atomics_helper+0x4f9a/0x5450 [ 15.849147] __asan_report_load8_noabort+0x18/0x20 [ 15.849177] kasan_atomics_helper+0x4f9a/0x5450 [ 15.849210] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.849247] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.849285] kasan_atomics+0x1dd/0x310 [ 15.849318] ? __pfx_kasan_atomics+0x10/0x10 [ 15.849359] ? __pfx_read_tsc+0x10/0x10 [ 15.849393] ? ktime_get_ts64+0x84/0x230 [ 15.849432] kunit_try_run_case+0x1a6/0x480 [ 15.849467] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849497] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.849534] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.849582] ? __kthread_parkme+0x82/0x160 [ 15.849621] ? preempt_count_sub+0x50/0x80 [ 15.849663] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.849719] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.849768] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.849817] kthread+0x257/0x310 [ 15.849855] ? __pfx_kthread+0x10/0x10 [ 15.849898] ret_from_fork+0x41/0x80 [ 15.849954] ? __pfx_kthread+0x10/0x10 [ 15.849999] ret_from_fork_asm+0x1a/0x30 [ 15.850068] </TASK> [ 15.850093] [ 15.864564] Allocated by task 270: [ 15.864800] kasan_save_stack+0x45/0x70 [ 15.865381] kasan_save_track+0x18/0x40 [ 15.866088] kasan_save_alloc_info+0x3b/0x50 [ 15.866498] __kasan_kmalloc+0xb7/0xc0 [ 15.866690] __kmalloc_cache_noprof+0x168/0x350 [ 15.867018] kasan_atomics+0x96/0x310 [ 15.867372] kunit_try_run_case+0x1a6/0x480 [ 15.867611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.867853] kthread+0x257/0x310 [ 15.868166] ret_from_fork+0x41/0x80 [ 15.868374] ret_from_fork_asm+0x1a/0x30 [ 15.868691] [ 15.868808] The buggy address belongs to the object at ffff888102635000 [ 15.868808] which belongs to the cache kmalloc-64 of size 64 [ 15.869408] The buggy address is located 0 bytes to the right of [ 15.869408] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.869920] [ 15.870146] The buggy address belongs to the physical page: [ 15.870576] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.870944] flags: 0x200000000000000(node=0|zone=2) [ 15.871383] page_type: f5(slab) [ 15.871595] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.872116] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.872533] page dumped because: kasan: bad access detected [ 15.872861] [ 15.873047] Memory state around the buggy address: [ 15.873266] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.873796] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.874184] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.874695] ^ [ 15.875000] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.875446] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.875833] ================================================================== [ 15.876780] ================================================================== [ 15.877349] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x20c9/0x5450 [ 15.877865] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.878306] [ 15.878532] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.878631] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.878662] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.878722] Call Trace: [ 15.878765] <TASK> [ 15.878806] dump_stack_lvl+0x73/0xb0 [ 15.878869] print_report+0xd1/0x640 [ 15.878916] ? __virt_addr_valid+0x1db/0x2d0 [ 15.878988] ? kasan_atomics_helper+0x20c9/0x5450 [ 15.879033] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.879116] ? kasan_atomics_helper+0x20c9/0x5450 [ 15.879170] kasan_report+0x140/0x180 [ 15.879222] ? kasan_atomics_helper+0x20c9/0x5450 [ 15.879279] kasan_check_range+0x10c/0x1c0 [ 15.879328] __kasan_check_write+0x18/0x20 [ 15.879372] kasan_atomics_helper+0x20c9/0x5450 [ 15.879426] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.879479] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.879539] kasan_atomics+0x1dd/0x310 [ 15.879579] ? __pfx_kasan_atomics+0x10/0x10 [ 15.879619] ? __pfx_read_tsc+0x10/0x10 [ 15.879656] ? ktime_get_ts64+0x84/0x230 [ 15.879743] kunit_try_run_case+0x1a6/0x480 [ 15.879793] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.879835] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.879877] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.879926] ? __kthread_parkme+0x82/0x160 [ 15.879967] ? preempt_count_sub+0x50/0x80 [ 15.880008] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.880097] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.880150] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.880185] kthread+0x257/0x310 [ 15.880208] ? __pfx_kthread+0x10/0x10 [ 15.880241] ret_from_fork+0x41/0x80 [ 15.880262] ? __pfx_kthread+0x10/0x10 [ 15.880281] ret_from_fork_asm+0x1a/0x30 [ 15.880312] </TASK> [ 15.880327] [ 15.888189] Allocated by task 270: [ 15.888415] kasan_save_stack+0x45/0x70 [ 15.888678] kasan_save_track+0x18/0x40 [ 15.888967] kasan_save_alloc_info+0x3b/0x50 [ 15.889288] __kasan_kmalloc+0xb7/0xc0 [ 15.889577] __kmalloc_cache_noprof+0x168/0x350 [ 15.889904] kasan_atomics+0x96/0x310 [ 15.890192] kunit_try_run_case+0x1a6/0x480 [ 15.890546] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.890995] kthread+0x257/0x310 [ 15.891313] ret_from_fork+0x41/0x80 [ 15.891616] ret_from_fork_asm+0x1a/0x30 [ 15.891946] [ 15.892143] The buggy address belongs to the object at ffff888102635000 [ 15.892143] which belongs to the cache kmalloc-64 of size 64 [ 15.892791] The buggy address is located 0 bytes to the right of [ 15.892791] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.893354] [ 15.893523] The buggy address belongs to the physical page: [ 15.893942] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.894591] flags: 0x200000000000000(node=0|zone=2) [ 15.895050] page_type: f5(slab) [ 15.895374] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.895950] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.896537] page dumped because: kasan: bad access detected [ 15.896964] [ 15.897179] Memory state around the buggy address: [ 15.897559] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.897887] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.898037] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.898544] ^ [ 15.898969] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.899626] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.899987] ================================================================== [ 15.257549] ================================================================== [ 15.258586] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x13b6/0x5450 [ 15.259677] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.260023] [ 15.260589] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.260684] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.260704] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.260737] Call Trace: [ 15.260764] <TASK> [ 15.260785] dump_stack_lvl+0x73/0xb0 [ 15.260834] print_report+0xd1/0x640 [ 15.260872] ? __virt_addr_valid+0x1db/0x2d0 [ 15.260908] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.260944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.260976] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.261008] kasan_report+0x140/0x180 [ 15.261041] ? kasan_atomics_helper+0x13b6/0x5450 [ 15.261376] kasan_check_range+0x10c/0x1c0 [ 15.261426] __kasan_check_read+0x15/0x20 [ 15.261529] kasan_atomics_helper+0x13b6/0x5450 [ 15.261584] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.261639] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.261691] kasan_atomics+0x1dd/0x310 [ 15.261734] ? __pfx_kasan_atomics+0x10/0x10 [ 15.261771] ? __pfx_read_tsc+0x10/0x10 [ 15.261804] ? ktime_get_ts64+0x84/0x230 [ 15.261834] kunit_try_run_case+0x1a6/0x480 [ 15.261857] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.261878] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.261907] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.261944] ? __kthread_parkme+0x82/0x160 [ 15.261965] ? preempt_count_sub+0x50/0x80 [ 15.261989] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.262012] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.262038] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.262082] kthread+0x257/0x310 [ 15.262133] ? __pfx_kthread+0x10/0x10 [ 15.262154] ret_from_fork+0x41/0x80 [ 15.262175] ? __pfx_kthread+0x10/0x10 [ 15.262194] ret_from_fork_asm+0x1a/0x30 [ 15.262225] </TASK> [ 15.262238] [ 15.270891] Allocated by task 270: [ 15.271139] kasan_save_stack+0x45/0x70 [ 15.271361] kasan_save_track+0x18/0x40 [ 15.271680] kasan_save_alloc_info+0x3b/0x50 [ 15.272011] __kasan_kmalloc+0xb7/0xc0 [ 15.272343] __kmalloc_cache_noprof+0x168/0x350 [ 15.272687] kasan_atomics+0x96/0x310 [ 15.272979] kunit_try_run_case+0x1a6/0x480 [ 15.273305] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.273604] kthread+0x257/0x310 [ 15.273777] ret_from_fork+0x41/0x80 [ 15.274138] ret_from_fork_asm+0x1a/0x30 [ 15.274457] [ 15.274626] The buggy address belongs to the object at ffff888102635000 [ 15.274626] which belongs to the cache kmalloc-64 of size 64 [ 15.275274] The buggy address is located 0 bytes to the right of [ 15.275274] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.275887] [ 15.276100] The buggy address belongs to the physical page: [ 15.276382] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.276947] flags: 0x200000000000000(node=0|zone=2) [ 15.277228] page_type: f5(slab) [ 15.277502] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.277873] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.278428] page dumped because: kasan: bad access detected [ 15.278814] [ 15.278923] Memory state around the buggy address: [ 15.279231] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.279605] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.280027] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.280370] ^ [ 15.280757] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.281130] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.281496] ================================================================== [ 15.062475] ================================================================== [ 15.062745] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x107a/0x5450 [ 15.062981] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.063206] [ 15.063317] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.063391] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.063415] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.063453] Call Trace: [ 15.063486] <TASK> [ 15.063514] dump_stack_lvl+0x73/0xb0 [ 15.063557] print_report+0xd1/0x640 [ 15.063596] ? __virt_addr_valid+0x1db/0x2d0 [ 15.063638] ? kasan_atomics_helper+0x107a/0x5450 [ 15.064608] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.064763] ? kasan_atomics_helper+0x107a/0x5450 [ 15.064805] kasan_report+0x140/0x180 [ 15.064848] ? kasan_atomics_helper+0x107a/0x5450 [ 15.064899] kasan_check_range+0x10c/0x1c0 [ 15.064936] __kasan_check_write+0x18/0x20 [ 15.064970] kasan_atomics_helper+0x107a/0x5450 [ 15.065010] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.065054] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.065870] kasan_atomics+0x1dd/0x310 [ 15.065955] ? __pfx_kasan_atomics+0x10/0x10 [ 15.066007] ? __pfx_read_tsc+0x10/0x10 [ 15.066052] ? ktime_get_ts64+0x84/0x230 [ 15.066569] kunit_try_run_case+0x1a6/0x480 [ 15.066624] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066683] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.066731] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.066779] ? __kthread_parkme+0x82/0x160 [ 15.066819] ? preempt_count_sub+0x50/0x80 [ 15.066862] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.066898] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.066942] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.066986] kthread+0x257/0x310 [ 15.067019] ? __pfx_kthread+0x10/0x10 [ 15.067091] ret_from_fork+0x41/0x80 [ 15.067131] ? __pfx_kthread+0x10/0x10 [ 15.067165] ret_from_fork_asm+0x1a/0x30 [ 15.067224] </TASK> [ 15.067246] [ 15.078086] Allocated by task 270: [ 15.078531] kasan_save_stack+0x45/0x70 [ 15.078932] kasan_save_track+0x18/0x40 [ 15.079256] kasan_save_alloc_info+0x3b/0x50 [ 15.079859] __kasan_kmalloc+0xb7/0xc0 [ 15.080272] __kmalloc_cache_noprof+0x168/0x350 [ 15.080488] kasan_atomics+0x96/0x310 [ 15.080720] kunit_try_run_case+0x1a6/0x480 [ 15.081031] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.081254] kthread+0x257/0x310 [ 15.081517] ret_from_fork+0x41/0x80 [ 15.081801] ret_from_fork_asm+0x1a/0x30 [ 15.082012] [ 15.082267] The buggy address belongs to the object at ffff888102635000 [ 15.082267] which belongs to the cache kmalloc-64 of size 64 [ 15.082981] The buggy address is located 0 bytes to the right of [ 15.082981] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.083900] [ 15.084073] The buggy address belongs to the physical page: [ 15.084569] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.084923] flags: 0x200000000000000(node=0|zone=2) [ 15.085419] page_type: f5(slab) [ 15.085712] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.085958] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.086500] page dumped because: kasan: bad access detected [ 15.086756] [ 15.086870] Memory state around the buggy address: [ 15.087310] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.087849] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.088327] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.088742] ^ [ 15.089090] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.089506] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.089980] ================================================================== [ 14.549535] ================================================================== [ 14.549935] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1/0x5450 [ 14.550476] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.550781] [ 14.550914] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.550996] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.551019] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.551061] Call Trace: [ 14.551102] <TASK> [ 14.551139] dump_stack_lvl+0x73/0xb0 [ 14.551195] print_report+0xd1/0x640 [ 14.551242] ? __virt_addr_valid+0x1db/0x2d0 [ 14.551279] ? kasan_atomics_helper+0x4a1/0x5450 [ 14.551312] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.551347] ? kasan_atomics_helper+0x4a1/0x5450 [ 14.551382] kasan_report+0x140/0x180 [ 14.551423] ? kasan_atomics_helper+0x4a1/0x5450 [ 14.551472] kasan_check_range+0x10c/0x1c0 [ 14.551508] __kasan_check_write+0x18/0x20 [ 14.551544] kasan_atomics_helper+0x4a1/0x5450 [ 14.551581] ? kasan_save_alloc_info+0x3b/0x50 [ 14.551620] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.551709] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.551771] kasan_atomics+0x1dd/0x310 [ 14.551817] ? __pfx_kasan_atomics+0x10/0x10 [ 14.551854] ? __pfx_read_tsc+0x10/0x10 [ 14.551887] ? ktime_get_ts64+0x84/0x230 [ 14.551940] kunit_try_run_case+0x1a6/0x480 [ 14.551976] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.552004] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.552035] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.552111] ? __kthread_parkme+0x82/0x160 [ 14.552144] ? preempt_count_sub+0x50/0x80 [ 14.552177] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.552209] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.552245] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.552286] kthread+0x257/0x310 [ 14.552313] ? __pfx_kthread+0x10/0x10 [ 14.552343] ret_from_fork+0x41/0x80 [ 14.552371] ? __pfx_kthread+0x10/0x10 [ 14.552400] ret_from_fork_asm+0x1a/0x30 [ 14.552448] </TASK> [ 14.552469] [ 14.560289] Allocated by task 270: [ 14.560631] kasan_save_stack+0x45/0x70 [ 14.560963] kasan_save_track+0x18/0x40 [ 14.561320] kasan_save_alloc_info+0x3b/0x50 [ 14.561506] __kasan_kmalloc+0xb7/0xc0 [ 14.561684] __kmalloc_cache_noprof+0x168/0x350 [ 14.561870] kasan_atomics+0x96/0x310 [ 14.562045] kunit_try_run_case+0x1a6/0x480 [ 14.562433] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.562822] kthread+0x257/0x310 [ 14.563149] ret_from_fork+0x41/0x80 [ 14.563434] ret_from_fork_asm+0x1a/0x30 [ 14.563701] [ 14.563852] The buggy address belongs to the object at ffff888102635000 [ 14.563852] which belongs to the cache kmalloc-64 of size 64 [ 14.564515] The buggy address is located 0 bytes to the right of [ 14.564515] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.565242] [ 14.565385] The buggy address belongs to the physical page: [ 14.565565] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.565838] flags: 0x200000000000000(node=0|zone=2) [ 14.566137] page_type: f5(slab) [ 14.566367] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.566882] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.567464] page dumped because: kasan: bad access detected [ 14.567833] [ 14.567934] Memory state around the buggy address: [ 14.568102] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.568545] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.568815] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.569143] ^ [ 14.569451] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.569925] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.570189] ================================================================== [ 14.405844] ================================================================== [ 14.406286] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4bbe/0x5450 [ 14.406477] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.406846] [ 14.406983] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.407043] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.407056] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.407088] Call Trace: [ 14.407102] <TASK> [ 14.407129] dump_stack_lvl+0x73/0xb0 [ 14.407158] print_report+0xd1/0x640 [ 14.407180] ? __virt_addr_valid+0x1db/0x2d0 [ 14.407203] ? kasan_atomics_helper+0x4bbe/0x5450 [ 14.407226] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.407248] ? kasan_atomics_helper+0x4bbe/0x5450 [ 14.407272] kasan_report+0x140/0x180 [ 14.407572] ? kasan_atomics_helper+0x4bbe/0x5450 [ 14.407602] __asan_report_load4_noabort+0x18/0x20 [ 14.407625] kasan_atomics_helper+0x4bbe/0x5450 [ 14.407647] ? kasan_save_alloc_info+0x3b/0x50 [ 14.407680] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.407708] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.407735] kasan_atomics+0x1dd/0x310 [ 14.407755] ? __pfx_kasan_atomics+0x10/0x10 [ 14.407776] ? __pfx_read_tsc+0x10/0x10 [ 14.407795] ? ktime_get_ts64+0x84/0x230 [ 14.407821] kunit_try_run_case+0x1a6/0x480 [ 14.407843] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.407862] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.407883] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.407907] ? __kthread_parkme+0x82/0x160 [ 14.407927] ? preempt_count_sub+0x50/0x80 [ 14.407950] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.407970] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.407995] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.408021] kthread+0x257/0x310 [ 14.408040] ? __pfx_kthread+0x10/0x10 [ 14.408059] ret_from_fork+0x41/0x80 [ 14.408078] ? __pfx_kthread+0x10/0x10 [ 14.408251] ret_from_fork_asm+0x1a/0x30 [ 14.408284] </TASK> [ 14.408297] [ 14.411879] Allocated by task 270: [ 14.411971] kasan_save_stack+0x45/0x70 [ 14.412085] kasan_save_track+0x18/0x40 [ 14.412358] kasan_save_alloc_info+0x3b/0x50 [ 14.413732] __kasan_kmalloc+0xb7/0xc0 [ 14.413840] __kmalloc_cache_noprof+0x168/0x350 [ 14.413953] kasan_atomics+0x96/0x310 [ 14.414047] kunit_try_run_case+0x1a6/0x480 [ 14.414452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.414803] kthread+0x257/0x310 [ 14.414962] ret_from_fork+0x41/0x80 [ 14.415052] ret_from_fork_asm+0x1a/0x30 [ 14.415433] [ 14.415547] The buggy address belongs to the object at ffff888102635000 [ 14.415547] which belongs to the cache kmalloc-64 of size 64 [ 14.415755] The buggy address is located 0 bytes to the right of [ 14.415755] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.415955] [ 14.416009] The buggy address belongs to the physical page: [ 14.416986] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.417227] flags: 0x200000000000000(node=0|zone=2) [ 14.417332] page_type: f5(slab) [ 14.417414] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.417588] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.418013] page dumped because: kasan: bad access detected [ 14.418554] [ 14.418748] Memory state around the buggy address: [ 14.418869] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.418996] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.419468] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.419960] ^ [ 14.420261] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.421013] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.421326] ================================================================== [ 15.706752] ================================================================== [ 15.707159] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1d7b/0x5450 [ 15.707545] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.707763] [ 15.707883] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.707959] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.707982] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.708019] Call Trace: [ 15.708056] <TASK> [ 15.708122] dump_stack_lvl+0x73/0xb0 [ 15.708183] print_report+0xd1/0x640 [ 15.708230] ? __virt_addr_valid+0x1db/0x2d0 [ 15.708277] ? kasan_atomics_helper+0x1d7b/0x5450 [ 15.708325] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.708373] ? kasan_atomics_helper+0x1d7b/0x5450 [ 15.708416] kasan_report+0x140/0x180 [ 15.708460] ? kasan_atomics_helper+0x1d7b/0x5450 [ 15.708513] kasan_check_range+0x10c/0x1c0 [ 15.708550] __kasan_check_write+0x18/0x20 [ 15.708587] kasan_atomics_helper+0x1d7b/0x5450 [ 15.708634] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.708694] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.708741] kasan_atomics+0x1dd/0x310 [ 15.708781] ? __pfx_kasan_atomics+0x10/0x10 [ 15.708821] ? __pfx_read_tsc+0x10/0x10 [ 15.708860] ? ktime_get_ts64+0x84/0x230 [ 15.708913] kunit_try_run_case+0x1a6/0x480 [ 15.708961] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709002] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.709046] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.709131] ? __kthread_parkme+0x82/0x160 [ 15.709175] ? preempt_count_sub+0x50/0x80 [ 15.709224] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.709259] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.709299] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.709345] kthread+0x257/0x310 [ 15.709381] ? __pfx_kthread+0x10/0x10 [ 15.709422] ret_from_fork+0x41/0x80 [ 15.709465] ? __pfx_kthread+0x10/0x10 [ 15.709507] ret_from_fork_asm+0x1a/0x30 [ 15.709572] </TASK> [ 15.709600] [ 15.717165] Allocated by task 270: [ 15.717469] kasan_save_stack+0x45/0x70 [ 15.717796] kasan_save_track+0x18/0x40 [ 15.718136] kasan_save_alloc_info+0x3b/0x50 [ 15.718423] __kasan_kmalloc+0xb7/0xc0 [ 15.718616] __kmalloc_cache_noprof+0x168/0x350 [ 15.718938] kasan_atomics+0x96/0x310 [ 15.719141] kunit_try_run_case+0x1a6/0x480 [ 15.719322] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.719634] kthread+0x257/0x310 [ 15.719870] ret_from_fork+0x41/0x80 [ 15.720155] ret_from_fork_asm+0x1a/0x30 [ 15.720461] [ 15.720615] The buggy address belongs to the object at ffff888102635000 [ 15.720615] which belongs to the cache kmalloc-64 of size 64 [ 15.721132] The buggy address is located 0 bytes to the right of [ 15.721132] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.721642] [ 15.721814] The buggy address belongs to the physical page: [ 15.722253] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.722812] flags: 0x200000000000000(node=0|zone=2) [ 15.723168] page_type: f5(slab) [ 15.723321] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.723569] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.723823] page dumped because: kasan: bad access detected [ 15.724018] [ 15.724144] Memory state around the buggy address: [ 15.724490] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.724962] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.725469] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.725963] ^ [ 15.726333] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.726796] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.727120] ================================================================== [ 15.971573] ================================================================== [ 15.972120] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x224d/0x5450 [ 15.972603] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.973098] [ 15.973339] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.973428] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.973455] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.973500] Call Trace: [ 15.973542] <TASK> [ 15.973579] dump_stack_lvl+0x73/0xb0 [ 15.973636] print_report+0xd1/0x640 [ 15.973694] ? __virt_addr_valid+0x1db/0x2d0 [ 15.973746] ? kasan_atomics_helper+0x224d/0x5450 [ 15.973795] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.973842] ? kasan_atomics_helper+0x224d/0x5450 [ 15.973892] kasan_report+0x140/0x180 [ 15.973944] ? kasan_atomics_helper+0x224d/0x5450 [ 15.974006] kasan_check_range+0x10c/0x1c0 [ 15.974056] __kasan_check_write+0x18/0x20 [ 15.974108] kasan_atomics_helper+0x224d/0x5450 [ 15.974145] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.974183] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.974223] kasan_atomics+0x1dd/0x310 [ 15.974255] ? __pfx_kasan_atomics+0x10/0x10 [ 15.974287] ? __pfx_read_tsc+0x10/0x10 [ 15.974318] ? ktime_get_ts64+0x84/0x230 [ 15.974358] kunit_try_run_case+0x1a6/0x480 [ 15.974392] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.974422] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.974454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.974490] ? __kthread_parkme+0x82/0x160 [ 15.974525] ? preempt_count_sub+0x50/0x80 [ 15.974567] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.974602] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.974647] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.974714] kthread+0x257/0x310 [ 15.974750] ? __pfx_kthread+0x10/0x10 [ 15.974791] ret_from_fork+0x41/0x80 [ 15.974831] ? __pfx_kthread+0x10/0x10 [ 15.974872] ret_from_fork_asm+0x1a/0x30 [ 15.974935] </TASK> [ 15.974964] [ 15.985553] Allocated by task 270: [ 15.985808] kasan_save_stack+0x45/0x70 [ 15.986375] kasan_save_track+0x18/0x40 [ 15.987834] kasan_save_alloc_info+0x3b/0x50 [ 15.988182] __kasan_kmalloc+0xb7/0xc0 [ 15.988349] __kmalloc_cache_noprof+0x168/0x350 [ 15.988878] kasan_atomics+0x96/0x310 [ 15.989190] kunit_try_run_case+0x1a6/0x480 [ 15.989639] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.989898] kthread+0x257/0x310 [ 15.990086] ret_from_fork+0x41/0x80 [ 15.990471] ret_from_fork_asm+0x1a/0x30 [ 15.990899] [ 15.991087] The buggy address belongs to the object at ffff888102635000 [ 15.991087] which belongs to the cache kmalloc-64 of size 64 [ 15.991751] The buggy address is located 0 bytes to the right of [ 15.991751] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.992681] [ 15.992880] The buggy address belongs to the physical page: [ 15.993283] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.993745] flags: 0x200000000000000(node=0|zone=2) [ 15.993980] page_type: f5(slab) [ 15.994281] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.994826] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.995688] page dumped because: kasan: bad access detected [ 15.995953] [ 15.996081] Memory state around the buggy address: [ 15.996481] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.996719] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.997528] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.997969] ^ [ 15.998439] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.998855] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.999370] ================================================================== [ 15.282745] ================================================================== [ 15.283150] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4eb0/0x5450 [ 15.283680] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.284010] [ 15.284224] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.284322] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.284349] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.284384] Call Trace: [ 15.284415] <TASK> [ 15.284443] dump_stack_lvl+0x73/0xb0 [ 15.284567] print_report+0xd1/0x640 [ 15.284616] ? __virt_addr_valid+0x1db/0x2d0 [ 15.284659] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.284713] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.284774] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.284821] kasan_report+0x140/0x180 [ 15.284867] ? kasan_atomics_helper+0x4eb0/0x5450 [ 15.284924] __asan_report_load8_noabort+0x18/0x20 [ 15.284982] kasan_atomics_helper+0x4eb0/0x5450 [ 15.285030] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.285107] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.285176] kasan_atomics+0x1dd/0x310 [ 15.285220] ? __pfx_kasan_atomics+0x10/0x10 [ 15.285259] ? __pfx_read_tsc+0x10/0x10 [ 15.285293] ? ktime_get_ts64+0x84/0x230 [ 15.285342] kunit_try_run_case+0x1a6/0x480 [ 15.285400] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.285450] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.285504] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.285553] ? __kthread_parkme+0x82/0x160 [ 15.285600] ? preempt_count_sub+0x50/0x80 [ 15.285644] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.285691] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.285739] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.285791] kthread+0x257/0x310 [ 15.285831] ? __pfx_kthread+0x10/0x10 [ 15.285872] ret_from_fork+0x41/0x80 [ 15.285920] ? __pfx_kthread+0x10/0x10 [ 15.285964] ret_from_fork_asm+0x1a/0x30 [ 15.286029] </TASK> [ 15.286080] [ 15.293970] Allocated by task 270: [ 15.294296] kasan_save_stack+0x45/0x70 [ 15.294516] kasan_save_track+0x18/0x40 [ 15.294809] kasan_save_alloc_info+0x3b/0x50 [ 15.295134] __kasan_kmalloc+0xb7/0xc0 [ 15.295406] __kmalloc_cache_noprof+0x168/0x350 [ 15.295685] kasan_atomics+0x96/0x310 [ 15.295888] kunit_try_run_case+0x1a6/0x480 [ 15.296157] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.296400] kthread+0x257/0x310 [ 15.296572] ret_from_fork+0x41/0x80 [ 15.296830] ret_from_fork_asm+0x1a/0x30 [ 15.297157] [ 15.297320] The buggy address belongs to the object at ffff888102635000 [ 15.297320] which belongs to the cache kmalloc-64 of size 64 [ 15.298143] The buggy address is located 0 bytes to the right of [ 15.298143] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.298881] [ 15.299040] The buggy address belongs to the physical page: [ 15.299323] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.299747] flags: 0x200000000000000(node=0|zone=2) [ 15.299967] page_type: f5(slab) [ 15.300187] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.300469] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.300767] page dumped because: kasan: bad access detected [ 15.301116] [ 15.301264] Memory state around the buggy address: [ 15.301614] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302149] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.302650] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.303151] ^ [ 15.303700] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.304232] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.304727] ================================================================== [ 14.422583] ================================================================== [ 14.422874] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4ba4/0x5450 [ 14.423286] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.423568] [ 14.423736] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.423782] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.423794] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.423815] Call Trace: [ 14.423829] <TASK> [ 14.423871] dump_stack_lvl+0x73/0xb0 [ 14.423913] print_report+0xd1/0x640 [ 14.423948] ? __virt_addr_valid+0x1db/0x2d0 [ 14.423972] ? kasan_atomics_helper+0x4ba4/0x5450 [ 14.423994] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.424017] ? kasan_atomics_helper+0x4ba4/0x5450 [ 14.424040] kasan_report+0x140/0x180 [ 14.424074] ? kasan_atomics_helper+0x4ba4/0x5450 [ 14.424103] __asan_report_store4_noabort+0x1b/0x30 [ 14.424125] kasan_atomics_helper+0x4ba4/0x5450 [ 14.424160] ? kasan_save_alloc_info+0x3b/0x50 [ 14.424183] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.424208] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.424236] kasan_atomics+0x1dd/0x310 [ 14.424354] ? __pfx_kasan_atomics+0x10/0x10 [ 14.424379] ? __pfx_read_tsc+0x10/0x10 [ 14.424399] ? ktime_get_ts64+0x84/0x230 [ 14.424426] kunit_try_run_case+0x1a6/0x480 [ 14.424448] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.424469] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.424489] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.424515] ? __kthread_parkme+0x82/0x160 [ 14.424534] ? preempt_count_sub+0x50/0x80 [ 14.424556] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.424576] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.424601] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.424626] kthread+0x257/0x310 [ 14.424644] ? __pfx_kthread+0x10/0x10 [ 14.424679] ret_from_fork+0x41/0x80 [ 14.424702] ? __pfx_kthread+0x10/0x10 [ 14.424721] ret_from_fork_asm+0x1a/0x30 [ 14.424750] </TASK> [ 14.424761] [ 14.431606] Allocated by task 270: [ 14.431862] kasan_save_stack+0x45/0x70 [ 14.432266] kasan_save_track+0x18/0x40 [ 14.432503] kasan_save_alloc_info+0x3b/0x50 [ 14.432604] __kasan_kmalloc+0xb7/0xc0 [ 14.432703] __kmalloc_cache_noprof+0x168/0x350 [ 14.432925] kasan_atomics+0x96/0x310 [ 14.433138] kunit_try_run_case+0x1a6/0x480 [ 14.433422] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.433554] kthread+0x257/0x310 [ 14.433656] ret_from_fork+0x41/0x80 [ 14.433757] ret_from_fork_asm+0x1a/0x30 [ 14.433929] [ 14.434036] The buggy address belongs to the object at ffff888102635000 [ 14.434036] which belongs to the cache kmalloc-64 of size 64 [ 14.434546] The buggy address is located 0 bytes to the right of [ 14.434546] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.434907] [ 14.434959] The buggy address belongs to the physical page: [ 14.435056] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.435442] flags: 0x200000000000000(node=0|zone=2) [ 14.435734] page_type: f5(slab) [ 14.435818] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.436560] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.436878] page dumped because: kasan: bad access detected [ 14.436982] [ 14.437033] Memory state around the buggy address: [ 14.437502] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.437913] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.438841] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.439260] ^ [ 14.439383] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.439532] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.439842] ================================================================== [ 15.462894] ================================================================== [ 15.463289] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1780/0x5450 [ 15.463858] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.464348] [ 15.464640] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.464747] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.464775] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.464819] Call Trace: [ 15.464857] <TASK> [ 15.464890] dump_stack_lvl+0x73/0xb0 [ 15.464940] print_report+0xd1/0x640 [ 15.464976] ? __virt_addr_valid+0x1db/0x2d0 [ 15.465016] ? kasan_atomics_helper+0x1780/0x5450 [ 15.465056] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.465134] ? kasan_atomics_helper+0x1780/0x5450 [ 15.465184] kasan_report+0x140/0x180 [ 15.465230] ? kasan_atomics_helper+0x1780/0x5450 [ 15.465292] kasan_check_range+0x10c/0x1c0 [ 15.465336] __kasan_check_write+0x18/0x20 [ 15.465374] kasan_atomics_helper+0x1780/0x5450 [ 15.465421] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.465472] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.465523] kasan_atomics+0x1dd/0x310 [ 15.465547] ? __pfx_kasan_atomics+0x10/0x10 [ 15.465569] ? __pfx_read_tsc+0x10/0x10 [ 15.465589] ? ktime_get_ts64+0x84/0x230 [ 15.465617] kunit_try_run_case+0x1a6/0x480 [ 15.465639] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.465659] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.465703] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.465729] ? __kthread_parkme+0x82/0x160 [ 15.465749] ? preempt_count_sub+0x50/0x80 [ 15.465771] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.465791] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.465816] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.465841] kthread+0x257/0x310 [ 15.465859] ? __pfx_kthread+0x10/0x10 [ 15.465878] ret_from_fork+0x41/0x80 [ 15.465899] ? __pfx_kthread+0x10/0x10 [ 15.465929] ret_from_fork_asm+0x1a/0x30 [ 15.465962] </TASK> [ 15.465976] [ 15.475552] Allocated by task 270: [ 15.475855] kasan_save_stack+0x45/0x70 [ 15.476178] kasan_save_track+0x18/0x40 [ 15.476418] kasan_save_alloc_info+0x3b/0x50 [ 15.476736] __kasan_kmalloc+0xb7/0xc0 [ 15.476909] __kmalloc_cache_noprof+0x168/0x350 [ 15.477152] kasan_atomics+0x96/0x310 [ 15.477454] kunit_try_run_case+0x1a6/0x480 [ 15.477779] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.477995] kthread+0x257/0x310 [ 15.478301] ret_from_fork+0x41/0x80 [ 15.478574] ret_from_fork_asm+0x1a/0x30 [ 15.478838] [ 15.479010] The buggy address belongs to the object at ffff888102635000 [ 15.479010] which belongs to the cache kmalloc-64 of size 64 [ 15.479588] The buggy address is located 0 bytes to the right of [ 15.479588] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.480226] [ 15.480371] The buggy address belongs to the physical page: [ 15.480560] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.481112] flags: 0x200000000000000(node=0|zone=2) [ 15.481437] page_type: f5(slab) [ 15.481596] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.481853] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.482392] page dumped because: kasan: bad access detected [ 15.482777] [ 15.482948] Memory state around the buggy address: [ 15.483316] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.483632] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.484154] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.484399] ^ [ 15.484760] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.485129] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.485367] ================================================================== [ 15.751442] ================================================================== [ 15.751763] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1eab/0x5450 [ 15.752274] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.752790] [ 15.752981] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.753100] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.753130] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.753175] Call Trace: [ 15.753217] <TASK> [ 15.753253] dump_stack_lvl+0x73/0xb0 [ 15.753312] print_report+0xd1/0x640 [ 15.753363] ? __virt_addr_valid+0x1db/0x2d0 [ 15.753415] ? kasan_atomics_helper+0x1eab/0x5450 [ 15.753461] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.753512] ? kasan_atomics_helper+0x1eab/0x5450 [ 15.753561] kasan_report+0x140/0x180 [ 15.753614] ? kasan_atomics_helper+0x1eab/0x5450 [ 15.753686] kasan_check_range+0x10c/0x1c0 [ 15.753737] __kasan_check_write+0x18/0x20 [ 15.753784] kasan_atomics_helper+0x1eab/0x5450 [ 15.753831] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.753875] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.753935] kasan_atomics+0x1dd/0x310 [ 15.753978] ? __pfx_kasan_atomics+0x10/0x10 [ 15.754019] ? __pfx_read_tsc+0x10/0x10 [ 15.754089] ? ktime_get_ts64+0x84/0x230 [ 15.754145] kunit_try_run_case+0x1a6/0x480 [ 15.754186] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.754224] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.754267] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.754315] ? __kthread_parkme+0x82/0x160 [ 15.754352] ? preempt_count_sub+0x50/0x80 [ 15.754399] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.754434] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.754483] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.754533] kthread+0x257/0x310 [ 15.754572] ? __pfx_kthread+0x10/0x10 [ 15.754615] ret_from_fork+0x41/0x80 [ 15.754659] ? __pfx_kthread+0x10/0x10 [ 15.754712] ret_from_fork_asm+0x1a/0x30 [ 15.754776] </TASK> [ 15.754800] [ 15.762774] Allocated by task 270: [ 15.763114] kasan_save_stack+0x45/0x70 [ 15.763431] kasan_save_track+0x18/0x40 [ 15.763759] kasan_save_alloc_info+0x3b/0x50 [ 15.764133] __kasan_kmalloc+0xb7/0xc0 [ 15.764438] __kmalloc_cache_noprof+0x168/0x350 [ 15.764798] kasan_atomics+0x96/0x310 [ 15.765122] kunit_try_run_case+0x1a6/0x480 [ 15.765443] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.766193] kthread+0x257/0x310 [ 15.766509] ret_from_fork+0x41/0x80 [ 15.766795] ret_from_fork_asm+0x1a/0x30 [ 15.766993] [ 15.767181] The buggy address belongs to the object at ffff888102635000 [ 15.767181] which belongs to the cache kmalloc-64 of size 64 [ 15.767716] The buggy address is located 0 bytes to the right of [ 15.767716] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.768368] [ 15.768493] The buggy address belongs to the physical page: [ 15.768708] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.768991] flags: 0x200000000000000(node=0|zone=2) [ 15.769228] page_type: f5(slab) [ 15.769401] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.769889] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.770483] page dumped because: kasan: bad access detected [ 15.770896] [ 15.771081] Memory state around the buggy address: [ 15.771440] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.771937] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.772321] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.772575] ^ [ 15.772889] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.773391] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.773848] ================================================================== [ 15.635575] ================================================================== [ 15.635889] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1c19/0x5450 [ 15.636419] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.636701] [ 15.636879] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.636961] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.636987] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.637025] Call Trace: [ 15.637116] <TASK> [ 15.637150] dump_stack_lvl+0x73/0xb0 [ 15.637208] print_report+0xd1/0x640 [ 15.637251] ? __virt_addr_valid+0x1db/0x2d0 [ 15.637318] ? kasan_atomics_helper+0x1c19/0x5450 [ 15.637361] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.637408] ? kasan_atomics_helper+0x1c19/0x5450 [ 15.637452] kasan_report+0x140/0x180 [ 15.637516] ? kasan_atomics_helper+0x1c19/0x5450 [ 15.637573] kasan_check_range+0x10c/0x1c0 [ 15.637616] __kasan_check_write+0x18/0x20 [ 15.637655] kasan_atomics_helper+0x1c19/0x5450 [ 15.637712] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.637778] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.637832] kasan_atomics+0x1dd/0x310 [ 15.637869] ? __pfx_kasan_atomics+0x10/0x10 [ 15.637919] ? __pfx_read_tsc+0x10/0x10 [ 15.637963] ? ktime_get_ts64+0x84/0x230 [ 15.638039] kunit_try_run_case+0x1a6/0x480 [ 15.638121] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.638165] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.638213] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.638285] ? __kthread_parkme+0x82/0x160 [ 15.638329] ? preempt_count_sub+0x50/0x80 [ 15.638379] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.638424] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.638495] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.638550] kthread+0x257/0x310 [ 15.638593] ? __pfx_kthread+0x10/0x10 [ 15.638633] ret_from_fork+0x41/0x80 [ 15.638685] ? __pfx_kthread+0x10/0x10 [ 15.638747] ret_from_fork_asm+0x1a/0x30 [ 15.638813] </TASK> [ 15.638844] [ 15.646200] Allocated by task 270: [ 15.646384] kasan_save_stack+0x45/0x70 [ 15.646657] kasan_save_track+0x18/0x40 [ 15.646988] kasan_save_alloc_info+0x3b/0x50 [ 15.647340] __kasan_kmalloc+0xb7/0xc0 [ 15.647649] __kmalloc_cache_noprof+0x168/0x350 [ 15.648006] kasan_atomics+0x96/0x310 [ 15.648334] kunit_try_run_case+0x1a6/0x480 [ 15.648663] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.649045] kthread+0x257/0x310 [ 15.649365] ret_from_fork+0x41/0x80 [ 15.649691] ret_from_fork_asm+0x1a/0x30 [ 15.649897] [ 15.650004] The buggy address belongs to the object at ffff888102635000 [ 15.650004] which belongs to the cache kmalloc-64 of size 64 [ 15.651875] The buggy address is located 0 bytes to the right of [ 15.651875] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.652574] [ 15.652762] The buggy address belongs to the physical page: [ 15.652996] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.653490] flags: 0x200000000000000(node=0|zone=2) [ 15.653704] page_type: f5(slab) [ 15.653868] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.654131] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.654374] page dumped because: kasan: bad access detected [ 15.654565] [ 15.654793] Memory state around the buggy address: [ 15.655179] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.655712] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.656513] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.657091] ^ [ 15.657467] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.658033] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.658563] ================================================================== [ 15.486639] ================================================================== [ 15.487880] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1819/0x5450 [ 15.488641] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.488909] [ 15.489041] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.489204] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.489229] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.489262] Call Trace: [ 15.489295] <TASK> [ 15.489326] dump_stack_lvl+0x73/0xb0 [ 15.489384] print_report+0xd1/0x640 [ 15.489433] ? __virt_addr_valid+0x1db/0x2d0 [ 15.489483] ? kasan_atomics_helper+0x1819/0x5450 [ 15.489529] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.489576] ? kasan_atomics_helper+0x1819/0x5450 [ 15.489623] kasan_report+0x140/0x180 [ 15.489681] ? kasan_atomics_helper+0x1819/0x5450 [ 15.489736] kasan_check_range+0x10c/0x1c0 [ 15.489771] __kasan_check_write+0x18/0x20 [ 15.489794] kasan_atomics_helper+0x1819/0x5450 [ 15.489819] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.489844] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.489871] kasan_atomics+0x1dd/0x310 [ 15.489891] ? __pfx_kasan_atomics+0x10/0x10 [ 15.489929] ? __pfx_read_tsc+0x10/0x10 [ 15.489952] ? ktime_get_ts64+0x84/0x230 [ 15.489981] kunit_try_run_case+0x1a6/0x480 [ 15.490006] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.490027] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.490049] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.490127] ? __kthread_parkme+0x82/0x160 [ 15.490148] ? preempt_count_sub+0x50/0x80 [ 15.490171] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.490191] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.490218] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.490244] kthread+0x257/0x310 [ 15.490263] ? __pfx_kthread+0x10/0x10 [ 15.490283] ret_from_fork+0x41/0x80 [ 15.490304] ? __pfx_kthread+0x10/0x10 [ 15.490323] ret_from_fork_asm+0x1a/0x30 [ 15.490354] </TASK> [ 15.490368] [ 15.498457] Allocated by task 270: [ 15.498790] kasan_save_stack+0x45/0x70 [ 15.499168] kasan_save_track+0x18/0x40 [ 15.499530] kasan_save_alloc_info+0x3b/0x50 [ 15.499958] __kasan_kmalloc+0xb7/0xc0 [ 15.500358] __kmalloc_cache_noprof+0x168/0x350 [ 15.500739] kasan_atomics+0x96/0x310 [ 15.501079] kunit_try_run_case+0x1a6/0x480 [ 15.501448] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.501749] kthread+0x257/0x310 [ 15.502006] ret_from_fork+0x41/0x80 [ 15.502387] ret_from_fork_asm+0x1a/0x30 [ 15.502783] [ 15.502999] The buggy address belongs to the object at ffff888102635000 [ 15.502999] which belongs to the cache kmalloc-64 of size 64 [ 15.503841] The buggy address is located 0 bytes to the right of [ 15.503841] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.504341] [ 15.504441] The buggy address belongs to the physical page: [ 15.504608] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.505395] flags: 0x200000000000000(node=0|zone=2) [ 15.505830] page_type: f5(slab) [ 15.506179] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.506801] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.507305] page dumped because: kasan: bad access detected [ 15.507651] [ 15.507824] Memory state around the buggy address: [ 15.508260] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.508615] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.508969] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.509522] ^ [ 15.509772] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510288] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.510763] ================================================================== [ 15.900842] ================================================================== [ 15.901279] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fb4/0x5450 [ 15.901625] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.902299] [ 15.902462] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.902547] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.902569] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.902608] Call Trace: [ 15.902649] <TASK> [ 15.902695] dump_stack_lvl+0x73/0xb0 [ 15.902756] print_report+0xd1/0x640 [ 15.902808] ? __virt_addr_valid+0x1db/0x2d0 [ 15.902858] ? kasan_atomics_helper+0x4fb4/0x5450 [ 15.902910] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.902954] ? kasan_atomics_helper+0x4fb4/0x5450 [ 15.902997] kasan_report+0x140/0x180 [ 15.903067] ? kasan_atomics_helper+0x4fb4/0x5450 [ 15.903121] __asan_report_load8_noabort+0x18/0x20 [ 15.903179] kasan_atomics_helper+0x4fb4/0x5450 [ 15.903230] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.903276] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.903344] kasan_atomics+0x1dd/0x310 [ 15.903387] ? __pfx_kasan_atomics+0x10/0x10 [ 15.903423] ? __pfx_read_tsc+0x10/0x10 [ 15.903461] ? ktime_get_ts64+0x84/0x230 [ 15.903514] kunit_try_run_case+0x1a6/0x480 [ 15.903564] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903606] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.903653] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.903726] ? __kthread_parkme+0x82/0x160 [ 15.903768] ? preempt_count_sub+0x50/0x80 [ 15.903815] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.903853] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.903889] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.903930] kthread+0x257/0x310 [ 15.903964] ? __pfx_kthread+0x10/0x10 [ 15.904001] ret_from_fork+0x41/0x80 [ 15.904059] ? __pfx_kthread+0x10/0x10 [ 15.904228] ret_from_fork_asm+0x1a/0x30 [ 15.904294] </TASK> [ 15.904323] [ 15.915082] Allocated by task 270: [ 15.915406] kasan_save_stack+0x45/0x70 [ 15.915769] kasan_save_track+0x18/0x40 [ 15.916110] kasan_save_alloc_info+0x3b/0x50 [ 15.916475] __kasan_kmalloc+0xb7/0xc0 [ 15.916799] __kmalloc_cache_noprof+0x168/0x350 [ 15.917154] kasan_atomics+0x96/0x310 [ 15.917312] kunit_try_run_case+0x1a6/0x480 [ 15.917563] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.917921] kthread+0x257/0x310 [ 15.918219] ret_from_fork+0x41/0x80 [ 15.918423] ret_from_fork_asm+0x1a/0x30 [ 15.918745] [ 15.918901] The buggy address belongs to the object at ffff888102635000 [ 15.918901] which belongs to the cache kmalloc-64 of size 64 [ 15.919434] The buggy address is located 0 bytes to the right of [ 15.919434] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.920216] [ 15.920363] The buggy address belongs to the physical page: [ 15.921140] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.921469] flags: 0x200000000000000(node=0|zone=2) [ 15.921659] page_type: f5(slab) [ 15.921929] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.922392] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.922803] page dumped because: kasan: bad access detected [ 15.923030] [ 15.923202] Memory state around the buggy address: [ 15.923529] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.923784] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.924292] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.924600] ^ [ 15.924931] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.925373] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.925631] ================================================================== [ 14.630603] ================================================================== [ 14.631135] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5ff/0x5450 [ 14.631371] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.631649] [ 14.631852] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.631936] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.631964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.632006] Call Trace: [ 14.632037] <TASK> [ 14.632067] dump_stack_lvl+0x73/0xb0 [ 14.632118] print_report+0xd1/0x640 [ 14.632177] ? __virt_addr_valid+0x1db/0x2d0 [ 14.632216] ? kasan_atomics_helper+0x5ff/0x5450 [ 14.632257] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.632302] ? kasan_atomics_helper+0x5ff/0x5450 [ 14.632350] kasan_report+0x140/0x180 [ 14.632396] ? kasan_atomics_helper+0x5ff/0x5450 [ 14.632444] kasan_check_range+0x10c/0x1c0 [ 14.632482] __kasan_check_write+0x18/0x20 [ 14.632518] kasan_atomics_helper+0x5ff/0x5450 [ 14.632556] ? kasan_save_alloc_info+0x3b/0x50 [ 14.632598] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.632649] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.632720] kasan_atomics+0x1dd/0x310 [ 14.632766] ? __pfx_kasan_atomics+0x10/0x10 [ 14.632811] ? __pfx_read_tsc+0x10/0x10 [ 14.632852] ? ktime_get_ts64+0x84/0x230 [ 14.632908] kunit_try_run_case+0x1a6/0x480 [ 14.632952] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.632977] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.633000] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.633025] ? __kthread_parkme+0x82/0x160 [ 14.633046] ? preempt_count_sub+0x50/0x80 [ 14.633081] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.633127] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.633154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.633181] kthread+0x257/0x310 [ 14.633200] ? __pfx_kthread+0x10/0x10 [ 14.633219] ret_from_fork+0x41/0x80 [ 14.633240] ? __pfx_kthread+0x10/0x10 [ 14.633258] ret_from_fork_asm+0x1a/0x30 [ 14.633289] </TASK> [ 14.633304] [ 14.640868] Allocated by task 270: [ 14.641049] kasan_save_stack+0x45/0x70 [ 14.641352] kasan_save_track+0x18/0x40 [ 14.642513] kasan_save_alloc_info+0x3b/0x50 [ 14.642873] __kasan_kmalloc+0xb7/0xc0 [ 14.643223] __kmalloc_cache_noprof+0x168/0x350 [ 14.643421] kasan_atomics+0x96/0x310 [ 14.643593] kunit_try_run_case+0x1a6/0x480 [ 14.643838] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.644978] kthread+0x257/0x310 [ 14.645499] ret_from_fork+0x41/0x80 [ 14.645847] ret_from_fork_asm+0x1a/0x30 [ 14.646210] [ 14.646352] The buggy address belongs to the object at ffff888102635000 [ 14.646352] which belongs to the cache kmalloc-64 of size 64 [ 14.646842] The buggy address is located 0 bytes to the right of [ 14.646842] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.647342] [ 14.647506] The buggy address belongs to the physical page: [ 14.647897] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.648189] flags: 0x200000000000000(node=0|zone=2) [ 14.648382] page_type: f5(slab) [ 14.648637] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.649178] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.649605] page dumped because: kasan: bad access detected [ 14.649884] [ 14.650052] Memory state around the buggy address: [ 14.650288] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.650632] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.651013] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.651422] ^ [ 14.651776] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.652126] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.652559] ================================================================== [ 14.676774] ================================================================== [ 14.677310] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x730/0x5450 [ 14.677711] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.677955] [ 14.678142] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.678224] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.678251] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.678293] Call Trace: [ 14.678325] <TASK> [ 14.678355] dump_stack_lvl+0x73/0xb0 [ 14.678410] print_report+0xd1/0x640 [ 14.678457] ? __virt_addr_valid+0x1db/0x2d0 [ 14.678503] ? kasan_atomics_helper+0x730/0x5450 [ 14.678549] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.678592] ? kasan_atomics_helper+0x730/0x5450 [ 14.678639] kasan_report+0x140/0x180 [ 14.678694] ? kasan_atomics_helper+0x730/0x5450 [ 14.678742] kasan_check_range+0x10c/0x1c0 [ 14.678780] __kasan_check_write+0x18/0x20 [ 14.678817] kasan_atomics_helper+0x730/0x5450 [ 14.678860] ? kasan_save_alloc_info+0x3b/0x50 [ 14.678901] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.678952] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.678998] kasan_atomics+0x1dd/0x310 [ 14.679032] ? __pfx_kasan_atomics+0x10/0x10 [ 14.679070] ? __pfx_read_tsc+0x10/0x10 [ 14.679129] ? ktime_get_ts64+0x84/0x230 [ 14.679173] kunit_try_run_case+0x1a6/0x480 [ 14.679213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.679251] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.679294] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.679342] ? __kthread_parkme+0x82/0x160 [ 14.679382] ? preempt_count_sub+0x50/0x80 [ 14.679432] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.679472] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.679520] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.679570] kthread+0x257/0x310 [ 14.679609] ? __pfx_kthread+0x10/0x10 [ 14.679648] ret_from_fork+0x41/0x80 [ 14.679698] ? __pfx_kthread+0x10/0x10 [ 14.679731] ret_from_fork_asm+0x1a/0x30 [ 14.679783] </TASK> [ 14.679805] [ 14.687369] Allocated by task 270: [ 14.687547] kasan_save_stack+0x45/0x70 [ 14.687828] kasan_save_track+0x18/0x40 [ 14.688110] kasan_save_alloc_info+0x3b/0x50 [ 14.688440] __kasan_kmalloc+0xb7/0xc0 [ 14.688744] __kmalloc_cache_noprof+0x168/0x350 [ 14.689088] kasan_atomics+0x96/0x310 [ 14.689364] kunit_try_run_case+0x1a6/0x480 [ 14.689660] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.690058] kthread+0x257/0x310 [ 14.690289] ret_from_fork+0x41/0x80 [ 14.690448] ret_from_fork_asm+0x1a/0x30 [ 14.690747] [ 14.690888] The buggy address belongs to the object at ffff888102635000 [ 14.690888] which belongs to the cache kmalloc-64 of size 64 [ 14.691855] The buggy address is located 0 bytes to the right of [ 14.691855] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.692547] [ 14.692733] The buggy address belongs to the physical page: [ 14.692945] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.693377] flags: 0x200000000000000(node=0|zone=2) [ 14.693781] page_type: f5(slab) [ 14.693999] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.694261] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.694525] page dumped because: kasan: bad access detected [ 14.694747] [ 14.694857] Memory state around the buggy address: [ 14.695220] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.695683] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.696136] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.696596] ^ [ 14.696930] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697503] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.697965] ================================================================== [ 14.892691] ================================================================== [ 14.893409] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a86/0x5450 [ 14.894015] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.894525] [ 14.894730] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.894801] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.894828] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.894857] Call Trace: [ 14.894883] <TASK> [ 14.894906] dump_stack_lvl+0x73/0xb0 [ 14.894953] print_report+0xd1/0x640 [ 14.894986] ? __virt_addr_valid+0x1db/0x2d0 [ 14.895020] ? kasan_atomics_helper+0x4a86/0x5450 [ 14.895078] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.895120] ? kasan_atomics_helper+0x4a86/0x5450 [ 14.895162] kasan_report+0x140/0x180 [ 14.895204] ? kasan_atomics_helper+0x4a86/0x5450 [ 14.895249] __asan_report_load4_noabort+0x18/0x20 [ 14.895289] kasan_atomics_helper+0x4a86/0x5450 [ 14.895337] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.895383] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.895440] kasan_atomics+0x1dd/0x310 [ 14.895476] ? __pfx_kasan_atomics+0x10/0x10 [ 14.895521] ? __pfx_read_tsc+0x10/0x10 [ 14.895561] ? ktime_get_ts64+0x84/0x230 [ 14.895613] kunit_try_run_case+0x1a6/0x480 [ 14.895660] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.895713] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.895759] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.895809] ? __kthread_parkme+0x82/0x160 [ 14.895848] ? preempt_count_sub+0x50/0x80 [ 14.895900] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.895935] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.895981] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.896026] kthread+0x257/0x310 [ 14.896095] ? __pfx_kthread+0x10/0x10 [ 14.896154] ret_from_fork+0x41/0x80 [ 14.896185] ? __pfx_kthread+0x10/0x10 [ 14.896242] ret_from_fork_asm+0x1a/0x30 [ 14.896288] </TASK> [ 14.896308] [ 14.904625] Allocated by task 270: [ 14.904867] kasan_save_stack+0x45/0x70 [ 14.905177] kasan_save_track+0x18/0x40 [ 14.905482] kasan_save_alloc_info+0x3b/0x50 [ 14.905783] __kasan_kmalloc+0xb7/0xc0 [ 14.906139] __kmalloc_cache_noprof+0x168/0x350 [ 14.906503] kasan_atomics+0x96/0x310 [ 14.906794] kunit_try_run_case+0x1a6/0x480 [ 14.907148] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.907457] kthread+0x257/0x310 [ 14.907648] ret_from_fork+0x41/0x80 [ 14.907962] ret_from_fork_asm+0x1a/0x30 [ 14.908211] [ 14.908374] The buggy address belongs to the object at ffff888102635000 [ 14.908374] which belongs to the cache kmalloc-64 of size 64 [ 14.908978] The buggy address is located 0 bytes to the right of [ 14.908978] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.909574] [ 14.909767] The buggy address belongs to the physical page: [ 14.910104] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.910508] flags: 0x200000000000000(node=0|zone=2) [ 14.910874] page_type: f5(slab) [ 14.911178] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.911567] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.911959] page dumped because: kasan: bad access detected [ 14.912280] [ 14.912389] Memory state around the buggy address: [ 14.912572] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.912812] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.913046] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.913301] ^ [ 14.913488] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.913746] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.914275] ================================================================== [ 15.135287] ================================================================== [ 15.135620] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a04/0x5450 [ 15.136028] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.137004] [ 15.137156] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.137575] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.137615] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.137788] Call Trace: [ 15.137948] <TASK> [ 15.137990] dump_stack_lvl+0x73/0xb0 [ 15.138049] print_report+0xd1/0x640 [ 15.138127] ? __virt_addr_valid+0x1db/0x2d0 [ 15.138169] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.138206] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.138250] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.138293] kasan_report+0x140/0x180 [ 15.138487] ? kasan_atomics_helper+0x4a04/0x5450 [ 15.138547] __asan_report_load4_noabort+0x18/0x20 [ 15.138591] kasan_atomics_helper+0x4a04/0x5450 [ 15.139082] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.139312] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.139370] kasan_atomics+0x1dd/0x310 [ 15.139411] ? __pfx_kasan_atomics+0x10/0x10 [ 15.139482] ? __pfx_read_tsc+0x10/0x10 [ 15.139522] ? ktime_get_ts64+0x84/0x230 [ 15.139818] kunit_try_run_case+0x1a6/0x480 [ 15.139871] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.139914] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.139957] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.140043] ? __kthread_parkme+0x82/0x160 [ 15.140106] ? preempt_count_sub+0x50/0x80 [ 15.140158] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.140202] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.140255] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.140312] kthread+0x257/0x310 [ 15.140369] ? __pfx_kthread+0x10/0x10 [ 15.140393] ret_from_fork+0x41/0x80 [ 15.140414] ? __pfx_kthread+0x10/0x10 [ 15.140433] ret_from_fork_asm+0x1a/0x30 [ 15.140464] </TASK> [ 15.140477] [ 15.148914] Allocated by task 270: [ 15.149256] kasan_save_stack+0x45/0x70 [ 15.149603] kasan_save_track+0x18/0x40 [ 15.149824] kasan_save_alloc_info+0x3b/0x50 [ 15.150221] __kasan_kmalloc+0xb7/0xc0 [ 15.150518] __kmalloc_cache_noprof+0x168/0x350 [ 15.150862] kasan_atomics+0x96/0x310 [ 15.151092] kunit_try_run_case+0x1a6/0x480 [ 15.151440] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.151660] kthread+0x257/0x310 [ 15.151830] ret_from_fork+0x41/0x80 [ 15.151998] ret_from_fork_asm+0x1a/0x30 [ 15.152205] [ 15.152335] The buggy address belongs to the object at ffff888102635000 [ 15.152335] which belongs to the cache kmalloc-64 of size 64 [ 15.153203] The buggy address is located 0 bytes to the right of [ 15.153203] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.154674] [ 15.154926] The buggy address belongs to the physical page: [ 15.155582] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.155838] flags: 0x200000000000000(node=0|zone=2) [ 15.156499] page_type: f5(slab) [ 15.156758] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.157023] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.157852] page dumped because: kasan: bad access detected [ 15.158380] [ 15.158584] Memory state around the buggy address: [ 15.158964] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159502] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.159817] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.160225] ^ [ 15.160508] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.160971] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.161506] ================================================================== [ 15.336612] ================================================================== [ 15.337034] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x50d6/0x5450 [ 15.337631] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.337983] [ 15.338238] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.338335] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.338359] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.338398] Call Trace: [ 15.338431] <TASK> [ 15.338463] dump_stack_lvl+0x73/0xb0 [ 15.338524] print_report+0xd1/0x640 [ 15.338572] ? __virt_addr_valid+0x1db/0x2d0 [ 15.338622] ? kasan_atomics_helper+0x50d6/0x5450 [ 15.338683] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.338728] ? kasan_atomics_helper+0x50d6/0x5450 [ 15.338773] kasan_report+0x140/0x180 [ 15.338840] ? kasan_atomics_helper+0x50d6/0x5450 [ 15.338896] __asan_report_store8_noabort+0x1b/0x30 [ 15.338939] kasan_atomics_helper+0x50d6/0x5450 [ 15.338986] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.339035] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.339141] kasan_atomics+0x1dd/0x310 [ 15.339185] ? __pfx_kasan_atomics+0x10/0x10 [ 15.339224] ? __pfx_read_tsc+0x10/0x10 [ 15.339258] ? ktime_get_ts64+0x84/0x230 [ 15.339290] kunit_try_run_case+0x1a6/0x480 [ 15.339314] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339334] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.339357] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.339382] ? __kthread_parkme+0x82/0x160 [ 15.339402] ? preempt_count_sub+0x50/0x80 [ 15.339425] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.339445] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.339471] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.339497] kthread+0x257/0x310 [ 15.339516] ? __pfx_kthread+0x10/0x10 [ 15.339535] ret_from_fork+0x41/0x80 [ 15.339556] ? __pfx_kthread+0x10/0x10 [ 15.339575] ret_from_fork_asm+0x1a/0x30 [ 15.339605] </TASK> [ 15.339619] [ 15.347474] Allocated by task 270: [ 15.347687] kasan_save_stack+0x45/0x70 [ 15.348000] kasan_save_track+0x18/0x40 [ 15.348340] kasan_save_alloc_info+0x3b/0x50 [ 15.348652] __kasan_kmalloc+0xb7/0xc0 [ 15.348971] __kmalloc_cache_noprof+0x168/0x350 [ 15.349347] kasan_atomics+0x96/0x310 [ 15.349662] kunit_try_run_case+0x1a6/0x480 [ 15.350025] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.350391] kthread+0x257/0x310 [ 15.350691] ret_from_fork+0x41/0x80 [ 15.350915] ret_from_fork_asm+0x1a/0x30 [ 15.351257] [ 15.351400] The buggy address belongs to the object at ffff888102635000 [ 15.351400] which belongs to the cache kmalloc-64 of size 64 [ 15.351829] The buggy address is located 0 bytes to the right of [ 15.351829] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.352673] [ 15.352776] The buggy address belongs to the physical page: [ 15.353179] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.353571] flags: 0x200000000000000(node=0|zone=2) [ 15.353945] page_type: f5(slab) [ 15.354273] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.354706] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.355242] page dumped because: kasan: bad access detected [ 15.355519] [ 15.355689] Memory state around the buggy address: [ 15.355952] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.356247] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.356739] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.357120] ^ [ 15.357425] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.357849] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.358387] ================================================================== [ 15.774817] ================================================================== [ 15.775214] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1f44/0x5450 [ 15.775508] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.775868] [ 15.776054] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.776171] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.776198] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.776241] Call Trace: [ 15.776284] <TASK> [ 15.776320] dump_stack_lvl+0x73/0xb0 [ 15.776379] print_report+0xd1/0x640 [ 15.776425] ? __virt_addr_valid+0x1db/0x2d0 [ 15.776475] ? kasan_atomics_helper+0x1f44/0x5450 [ 15.776521] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.776571] ? kasan_atomics_helper+0x1f44/0x5450 [ 15.776622] kasan_report+0x140/0x180 [ 15.776680] ? kasan_atomics_helper+0x1f44/0x5450 [ 15.776765] kasan_check_range+0x10c/0x1c0 [ 15.776799] __kasan_check_write+0x18/0x20 [ 15.776838] kasan_atomics_helper+0x1f44/0x5450 [ 15.776876] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.776916] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.776957] kasan_atomics+0x1dd/0x310 [ 15.776986] ? __pfx_kasan_atomics+0x10/0x10 [ 15.777016] ? __pfx_read_tsc+0x10/0x10 [ 15.777044] ? ktime_get_ts64+0x84/0x230 [ 15.778933] kunit_try_run_case+0x1a6/0x480 [ 15.779011] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.779090] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.779143] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.779198] ? __kthread_parkme+0x82/0x160 [ 15.779243] ? preempt_count_sub+0x50/0x80 [ 15.779294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.779338] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.779393] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.779437] kthread+0x257/0x310 [ 15.779458] ? __pfx_kthread+0x10/0x10 [ 15.779479] ret_from_fork+0x41/0x80 [ 15.779499] ? __pfx_kthread+0x10/0x10 [ 15.779518] ret_from_fork_asm+0x1a/0x30 [ 15.779549] </TASK> [ 15.779563] [ 15.787887] Allocated by task 270: [ 15.788123] kasan_save_stack+0x45/0x70 [ 15.788357] kasan_save_track+0x18/0x40 [ 15.788553] kasan_save_alloc_info+0x3b/0x50 [ 15.788843] __kasan_kmalloc+0xb7/0xc0 [ 15.789141] __kmalloc_cache_noprof+0x168/0x350 [ 15.789492] kasan_atomics+0x96/0x310 [ 15.789816] kunit_try_run_case+0x1a6/0x480 [ 15.790187] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.790583] kthread+0x257/0x310 [ 15.790849] ret_from_fork+0x41/0x80 [ 15.791110] ret_from_fork_asm+0x1a/0x30 [ 15.791350] [ 15.791509] The buggy address belongs to the object at ffff888102635000 [ 15.791509] which belongs to the cache kmalloc-64 of size 64 [ 15.792040] The buggy address is located 0 bytes to the right of [ 15.792040] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.792485] [ 15.792598] The buggy address belongs to the physical page: [ 15.792805] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.793122] flags: 0x200000000000000(node=0|zone=2) [ 15.793484] page_type: f5(slab) [ 15.793781] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.794338] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.794840] page dumped because: kasan: bad access detected [ 15.795247] [ 15.795408] Memory state around the buggy address: [ 15.795685] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.796030] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.796426] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.796892] ^ [ 15.797532] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.798424] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.798701] ================================================================== [ 14.870219] ================================================================== [ 14.870775] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xc71/0x5450 [ 14.871306] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.871805] [ 14.871985] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.872081] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.872108] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.872144] Call Trace: [ 14.872181] <TASK> [ 14.872207] dump_stack_lvl+0x73/0xb0 [ 14.872279] print_report+0xd1/0x640 [ 14.872328] ? __virt_addr_valid+0x1db/0x2d0 [ 14.872373] ? kasan_atomics_helper+0xc71/0x5450 [ 14.872419] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.872468] ? kasan_atomics_helper+0xc71/0x5450 [ 14.872513] kasan_report+0x140/0x180 [ 14.872554] ? kasan_atomics_helper+0xc71/0x5450 [ 14.872604] kasan_check_range+0x10c/0x1c0 [ 14.872646] __kasan_check_write+0x18/0x20 [ 14.872698] kasan_atomics_helper+0xc71/0x5450 [ 14.872747] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.872791] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.872836] kasan_atomics+0x1dd/0x310 [ 14.872875] ? __pfx_kasan_atomics+0x10/0x10 [ 14.872923] ? __pfx_read_tsc+0x10/0x10 [ 14.872962] ? ktime_get_ts64+0x84/0x230 [ 14.873028] kunit_try_run_case+0x1a6/0x480 [ 14.873102] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.873151] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.873208] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.873255] ? __kthread_parkme+0x82/0x160 [ 14.873295] ? preempt_count_sub+0x50/0x80 [ 14.873346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.873389] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.873450] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.873499] kthread+0x257/0x310 [ 14.873537] ? __pfx_kthread+0x10/0x10 [ 14.873574] ret_from_fork+0x41/0x80 [ 14.873625] ? __pfx_kthread+0x10/0x10 [ 14.873681] ret_from_fork_asm+0x1a/0x30 [ 14.873739] </TASK> [ 14.873764] [ 14.881518] Allocated by task 270: [ 14.881813] kasan_save_stack+0x45/0x70 [ 14.882204] kasan_save_track+0x18/0x40 [ 14.882533] kasan_save_alloc_info+0x3b/0x50 [ 14.882883] __kasan_kmalloc+0xb7/0xc0 [ 14.883251] __kmalloc_cache_noprof+0x168/0x350 [ 14.883596] kasan_atomics+0x96/0x310 [ 14.883829] kunit_try_run_case+0x1a6/0x480 [ 14.884161] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.884511] kthread+0x257/0x310 [ 14.884692] ret_from_fork+0x41/0x80 [ 14.884904] ret_from_fork_asm+0x1a/0x30 [ 14.885189] [ 14.885298] The buggy address belongs to the object at ffff888102635000 [ 14.885298] which belongs to the cache kmalloc-64 of size 64 [ 14.886001] The buggy address is located 0 bytes to the right of [ 14.886001] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.886707] [ 14.886894] The buggy address belongs to the physical page: [ 14.887249] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.887717] flags: 0x200000000000000(node=0|zone=2) [ 14.888091] page_type: f5(slab) [ 14.888352] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.888723] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.889209] page dumped because: kasan: bad access detected [ 14.889515] [ 14.889644] Memory state around the buggy address: [ 14.889992] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.890360] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.890712] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.890958] ^ [ 14.891172] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.891411] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.891637] ================================================================== [ 15.112912] ================================================================== [ 15.113418] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1149/0x5450 [ 15.114635] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.115043] [ 15.115208] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.115290] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.115318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.115360] Call Trace: [ 15.115394] <TASK> [ 15.115423] dump_stack_lvl+0x73/0xb0 [ 15.115476] print_report+0xd1/0x640 [ 15.115520] ? __virt_addr_valid+0x1db/0x2d0 [ 15.115567] ? kasan_atomics_helper+0x1149/0x5450 [ 15.115615] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.115672] ? kasan_atomics_helper+0x1149/0x5450 [ 15.115724] kasan_report+0x140/0x180 [ 15.115777] ? kasan_atomics_helper+0x1149/0x5450 [ 15.115838] kasan_check_range+0x10c/0x1c0 [ 15.115884] __kasan_check_write+0x18/0x20 [ 15.115923] kasan_atomics_helper+0x1149/0x5450 [ 15.115968] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.116006] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.116053] kasan_atomics+0x1dd/0x310 [ 15.116092] ? __pfx_kasan_atomics+0x10/0x10 [ 15.116132] ? __pfx_read_tsc+0x10/0x10 [ 15.116170] ? ktime_get_ts64+0x84/0x230 [ 15.116221] kunit_try_run_case+0x1a6/0x480 [ 15.116265] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.116307] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.116348] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.116397] ? __kthread_parkme+0x82/0x160 [ 15.116438] ? preempt_count_sub+0x50/0x80 [ 15.116488] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.116528] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.116569] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.116609] kthread+0x257/0x310 [ 15.116641] ? __pfx_kthread+0x10/0x10 [ 15.116716] ret_from_fork+0x41/0x80 [ 15.116763] ? __pfx_kthread+0x10/0x10 [ 15.116806] ret_from_fork_asm+0x1a/0x30 [ 15.116870] </TASK> [ 15.116897] [ 15.124294] Allocated by task 270: [ 15.124530] kasan_save_stack+0x45/0x70 [ 15.124809] kasan_save_track+0x18/0x40 [ 15.125044] kasan_save_alloc_info+0x3b/0x50 [ 15.125372] __kasan_kmalloc+0xb7/0xc0 [ 15.125570] __kmalloc_cache_noprof+0x168/0x350 [ 15.125773] kasan_atomics+0x96/0x310 [ 15.125955] kunit_try_run_case+0x1a6/0x480 [ 15.126183] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.126399] kthread+0x257/0x310 [ 15.126597] ret_from_fork+0x41/0x80 [ 15.126893] ret_from_fork_asm+0x1a/0x30 [ 15.127240] [ 15.127402] The buggy address belongs to the object at ffff888102635000 [ 15.127402] which belongs to the cache kmalloc-64 of size 64 [ 15.128210] The buggy address is located 0 bytes to the right of [ 15.128210] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.129004] [ 15.129188] The buggy address belongs to the physical page: [ 15.129430] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.129835] flags: 0x200000000000000(node=0|zone=2) [ 15.130172] page_type: f5(slab) [ 15.130380] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.130804] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.131200] page dumped because: kasan: bad access detected [ 15.131472] [ 15.131613] Memory state around the buggy address: [ 15.131807] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.132048] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.132313] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.132597] ^ [ 15.132930] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.133459] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.133989] ================================================================== [ 15.234088] ================================================================== [ 15.234556] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49d0/0x5450 [ 15.234982] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.235417] [ 15.235645] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.235744] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.235773] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.235816] Call Trace: [ 15.235854] <TASK> [ 15.235888] dump_stack_lvl+0x73/0xb0 [ 15.235950] print_report+0xd1/0x640 [ 15.236001] ? __virt_addr_valid+0x1db/0x2d0 [ 15.236051] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.236095] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.236146] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.236197] kasan_report+0x140/0x180 [ 15.236249] ? kasan_atomics_helper+0x49d0/0x5450 [ 15.236310] __asan_report_load4_noabort+0x18/0x20 [ 15.236358] kasan_atomics_helper+0x49d0/0x5450 [ 15.236404] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.236449] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.236503] kasan_atomics+0x1dd/0x310 [ 15.236547] ? __pfx_kasan_atomics+0x10/0x10 [ 15.236594] ? __pfx_read_tsc+0x10/0x10 [ 15.236630] ? ktime_get_ts64+0x84/0x230 [ 15.236712] kunit_try_run_case+0x1a6/0x480 [ 15.236763] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.236840] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.236900] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.236954] ? __kthread_parkme+0x82/0x160 [ 15.236999] ? preempt_count_sub+0x50/0x80 [ 15.237050] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.237092] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.237146] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.237203] kthread+0x257/0x310 [ 15.237246] ? __pfx_kthread+0x10/0x10 [ 15.237291] ret_from_fork+0x41/0x80 [ 15.237599] ? __pfx_kthread+0x10/0x10 [ 15.237680] ret_from_fork_asm+0x1a/0x30 [ 15.237748] </TASK> [ 15.237778] [ 15.246417] Allocated by task 270: [ 15.246747] kasan_save_stack+0x45/0x70 [ 15.247106] kasan_save_track+0x18/0x40 [ 15.247336] kasan_save_alloc_info+0x3b/0x50 [ 15.247530] __kasan_kmalloc+0xb7/0xc0 [ 15.247716] __kmalloc_cache_noprof+0x168/0x350 [ 15.248081] kasan_atomics+0x96/0x310 [ 15.248382] kunit_try_run_case+0x1a6/0x480 [ 15.248711] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.249101] kthread+0x257/0x310 [ 15.249261] ret_from_fork+0x41/0x80 [ 15.249425] ret_from_fork_asm+0x1a/0x30 [ 15.249735] [ 15.249887] The buggy address belongs to the object at ffff888102635000 [ 15.249887] which belongs to the cache kmalloc-64 of size 64 [ 15.250676] The buggy address is located 0 bytes to the right of [ 15.250676] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.251099] [ 15.251260] The buggy address belongs to the physical page: [ 15.251629] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.252168] flags: 0x200000000000000(node=0|zone=2) [ 15.252531] page_type: f5(slab) [ 15.252777] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.253035] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.253500] page dumped because: kasan: bad access detected [ 15.253758] [ 15.253863] Memory state around the buggy address: [ 15.254229] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254488] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.254946] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.255431] ^ [ 15.255639] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.255983] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.256400] ================================================================== [ 14.460284] ================================================================== [ 14.460574] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b70/0x5450 [ 14.460859] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.461804] [ 14.462044] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.462154] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.462190] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.462451] Call Trace: [ 14.462484] <TASK> [ 14.462509] dump_stack_lvl+0x73/0xb0 [ 14.462559] print_report+0xd1/0x640 [ 14.462594] ? __virt_addr_valid+0x1db/0x2d0 [ 14.462635] ? kasan_atomics_helper+0x4b70/0x5450 [ 14.462687] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.462729] ? kasan_atomics_helper+0x4b70/0x5450 [ 14.462774] kasan_report+0x140/0x180 [ 14.462813] ? kasan_atomics_helper+0x4b70/0x5450 [ 14.462857] __asan_report_store4_noabort+0x1b/0x30 [ 14.462887] kasan_atomics_helper+0x4b70/0x5450 [ 14.462923] ? kasan_save_alloc_info+0x3b/0x50 [ 14.462959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.463003] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.463058] kasan_atomics+0x1dd/0x310 [ 14.463096] ? __pfx_kasan_atomics+0x10/0x10 [ 14.463139] ? __pfx_read_tsc+0x10/0x10 [ 14.463178] ? ktime_get_ts64+0x84/0x230 [ 14.463243] kunit_try_run_case+0x1a6/0x480 [ 14.463275] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.463306] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.463336] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.463360] ? __kthread_parkme+0x82/0x160 [ 14.463380] ? preempt_count_sub+0x50/0x80 [ 14.463401] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.463420] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.463445] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.463469] kthread+0x257/0x310 [ 14.463487] ? __pfx_kthread+0x10/0x10 [ 14.463505] ret_from_fork+0x41/0x80 [ 14.463524] ? __pfx_kthread+0x10/0x10 [ 14.463542] ret_from_fork_asm+0x1a/0x30 [ 14.463571] </TASK> [ 14.463583] [ 14.474767] Allocated by task 270: [ 14.474961] kasan_save_stack+0x45/0x70 [ 14.475164] kasan_save_track+0x18/0x40 [ 14.475459] kasan_save_alloc_info+0x3b/0x50 [ 14.476042] __kasan_kmalloc+0xb7/0xc0 [ 14.476478] __kmalloc_cache_noprof+0x168/0x350 [ 14.476813] kasan_atomics+0x96/0x310 [ 14.477299] kunit_try_run_case+0x1a6/0x480 [ 14.477576] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.477863] kthread+0x257/0x310 [ 14.478333] ret_from_fork+0x41/0x80 [ 14.478571] ret_from_fork_asm+0x1a/0x30 [ 14.478812] [ 14.478988] The buggy address belongs to the object at ffff888102635000 [ 14.478988] which belongs to the cache kmalloc-64 of size 64 [ 14.479940] The buggy address is located 0 bytes to the right of [ 14.479940] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.480714] [ 14.480917] The buggy address belongs to the physical page: [ 14.481402] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.481965] flags: 0x200000000000000(node=0|zone=2) [ 14.482492] page_type: f5(slab) [ 14.482722] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.483246] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.484067] page dumped because: kasan: bad access detected [ 14.484605] [ 14.484755] Memory state around the buggy address: [ 14.484943] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.485577] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.485990] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.486550] ^ [ 14.486854] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.487602] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.487986] ================================================================== [ 14.940678] ================================================================== [ 14.941035] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xde1/0x5450 [ 14.941472] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.941955] [ 14.942147] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.942234] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.942262] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.942318] Call Trace: [ 14.942350] <TASK> [ 14.942379] dump_stack_lvl+0x73/0xb0 [ 14.942443] print_report+0xd1/0x640 [ 14.942491] ? __virt_addr_valid+0x1db/0x2d0 [ 14.942560] ? kasan_atomics_helper+0xde1/0x5450 [ 14.942602] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.942672] ? kasan_atomics_helper+0xde1/0x5450 [ 14.942723] kasan_report+0x140/0x180 [ 14.942772] ? kasan_atomics_helper+0xde1/0x5450 [ 14.942827] kasan_check_range+0x10c/0x1c0 [ 14.942862] __kasan_check_write+0x18/0x20 [ 14.942896] kasan_atomics_helper+0xde1/0x5450 [ 14.942943] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.942997] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.943049] kasan_atomics+0x1dd/0x310 [ 14.943119] ? __pfx_kasan_atomics+0x10/0x10 [ 14.943162] ? __pfx_read_tsc+0x10/0x10 [ 14.943198] ? ktime_get_ts64+0x84/0x230 [ 14.943249] kunit_try_run_case+0x1a6/0x480 [ 14.943303] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.943357] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.943399] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.943445] ? __kthread_parkme+0x82/0x160 [ 14.943491] ? preempt_count_sub+0x50/0x80 [ 14.943538] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.943592] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.943640] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.943706] kthread+0x257/0x310 [ 14.943745] ? __pfx_kthread+0x10/0x10 [ 14.943799] ret_from_fork+0x41/0x80 [ 14.943839] ? __pfx_kthread+0x10/0x10 [ 14.943879] ret_from_fork_asm+0x1a/0x30 [ 14.943932] </TASK> [ 14.943962] [ 14.951442] Allocated by task 270: [ 14.951619] kasan_save_stack+0x45/0x70 [ 14.951813] kasan_save_track+0x18/0x40 [ 14.952221] kasan_save_alloc_info+0x3b/0x50 [ 14.952556] __kasan_kmalloc+0xb7/0xc0 [ 14.952854] __kmalloc_cache_noprof+0x168/0x350 [ 14.953250] kasan_atomics+0x96/0x310 [ 14.953544] kunit_try_run_case+0x1a6/0x480 [ 14.953879] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.954373] kthread+0x257/0x310 [ 14.954584] ret_from_fork+0x41/0x80 [ 14.954777] ret_from_fork_asm+0x1a/0x30 [ 14.954961] [ 14.955064] The buggy address belongs to the object at ffff888102635000 [ 14.955064] which belongs to the cache kmalloc-64 of size 64 [ 14.955931] The buggy address is located 0 bytes to the right of [ 14.955931] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.956810] [ 14.956925] The buggy address belongs to the physical page: [ 14.957675] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.958766] flags: 0x200000000000000(node=0|zone=2) [ 14.959490] page_type: f5(slab) [ 14.960144] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.960712] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.961121] page dumped because: kasan: bad access detected [ 14.961474] [ 14.961607] Memory state around the buggy address: [ 14.961882] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.962322] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.962747] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.963045] ^ [ 14.963365] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.963804] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.964119] ================================================================== [ 15.612550] ================================================================== [ 15.612928] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1b23/0x5450 [ 15.613355] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.613836] [ 15.614005] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.614123] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.614151] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.614205] Call Trace: [ 15.614253] <TASK> [ 15.614287] dump_stack_lvl+0x73/0xb0 [ 15.614379] print_report+0xd1/0x640 [ 15.614417] ? __virt_addr_valid+0x1db/0x2d0 [ 15.614454] ? kasan_atomics_helper+0x1b23/0x5450 [ 15.614490] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.614523] ? kasan_atomics_helper+0x1b23/0x5450 [ 15.614560] kasan_report+0x140/0x180 [ 15.614601] ? kasan_atomics_helper+0x1b23/0x5450 [ 15.614651] kasan_check_range+0x10c/0x1c0 [ 15.614703] __kasan_check_write+0x18/0x20 [ 15.614746] kasan_atomics_helper+0x1b23/0x5450 [ 15.614792] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.614830] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.614867] kasan_atomics+0x1dd/0x310 [ 15.614888] ? __pfx_kasan_atomics+0x10/0x10 [ 15.614912] ? __pfx_read_tsc+0x10/0x10 [ 15.614944] ? ktime_get_ts64+0x84/0x230 [ 15.614992] kunit_try_run_case+0x1a6/0x480 [ 15.615037] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.615090] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.615134] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.615177] ? __kthread_parkme+0x82/0x160 [ 15.615210] ? preempt_count_sub+0x50/0x80 [ 15.615247] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.615283] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.615330] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.615381] kthread+0x257/0x310 [ 15.615422] ? __pfx_kthread+0x10/0x10 [ 15.615465] ret_from_fork+0x41/0x80 [ 15.615506] ? __pfx_kthread+0x10/0x10 [ 15.615547] ret_from_fork_asm+0x1a/0x30 [ 15.615611] </TASK> [ 15.615638] [ 15.625212] Allocated by task 270: [ 15.625389] kasan_save_stack+0x45/0x70 [ 15.625700] kasan_save_track+0x18/0x40 [ 15.626020] kasan_save_alloc_info+0x3b/0x50 [ 15.626404] __kasan_kmalloc+0xb7/0xc0 [ 15.626592] __kmalloc_cache_noprof+0x168/0x350 [ 15.626891] kasan_atomics+0x96/0x310 [ 15.627111] kunit_try_run_case+0x1a6/0x480 [ 15.627405] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.627715] kthread+0x257/0x310 [ 15.627877] ret_from_fork+0x41/0x80 [ 15.628042] ret_from_fork_asm+0x1a/0x30 [ 15.628374] [ 15.628535] The buggy address belongs to the object at ffff888102635000 [ 15.628535] which belongs to the cache kmalloc-64 of size 64 [ 15.629197] The buggy address is located 0 bytes to the right of [ 15.629197] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.629697] [ 15.629804] The buggy address belongs to the physical page: [ 15.630199] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.630722] flags: 0x200000000000000(node=0|zone=2) [ 15.630959] page_type: f5(slab) [ 15.631253] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.631606] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.631947] page dumped because: kasan: bad access detected [ 15.632264] [ 15.632382] Memory state around the buggy address: [ 15.632561] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.632802] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.633032] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.633459] ^ [ 15.633788] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634320] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.634699] ================================================================== [ 15.090763] ================================================================== [ 15.091191] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a1e/0x5450 [ 15.091580] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.091825] [ 15.091975] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.092054] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.092080] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.092122] Call Trace: [ 15.092157] <TASK> [ 15.092187] dump_stack_lvl+0x73/0xb0 [ 15.092243] print_report+0xd1/0x640 [ 15.092293] ? __virt_addr_valid+0x1db/0x2d0 [ 15.092338] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.092381] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.092419] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.092462] kasan_report+0x140/0x180 [ 15.092502] ? kasan_atomics_helper+0x4a1e/0x5450 [ 15.092549] __asan_report_load4_noabort+0x18/0x20 [ 15.092590] kasan_atomics_helper+0x4a1e/0x5450 [ 15.092637] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.092735] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.092804] kasan_atomics+0x1dd/0x310 [ 15.092848] ? __pfx_kasan_atomics+0x10/0x10 [ 15.092891] ? __pfx_read_tsc+0x10/0x10 [ 15.092930] ? ktime_get_ts64+0x84/0x230 [ 15.092993] kunit_try_run_case+0x1a6/0x480 [ 15.093079] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.093116] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.093141] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.093168] ? __kthread_parkme+0x82/0x160 [ 15.093190] ? preempt_count_sub+0x50/0x80 [ 15.093213] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.093240] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.093282] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.093329] kthread+0x257/0x310 [ 15.093365] ? __pfx_kthread+0x10/0x10 [ 15.093412] ret_from_fork+0x41/0x80 [ 15.093451] ? __pfx_kthread+0x10/0x10 [ 15.093505] ret_from_fork_asm+0x1a/0x30 [ 15.093564] </TASK> [ 15.093589] [ 15.101449] Allocated by task 270: [ 15.101634] kasan_save_stack+0x45/0x70 [ 15.102010] kasan_save_track+0x18/0x40 [ 15.102372] kasan_save_alloc_info+0x3b/0x50 [ 15.102713] __kasan_kmalloc+0xb7/0xc0 [ 15.103009] __kmalloc_cache_noprof+0x168/0x350 [ 15.103382] kasan_atomics+0x96/0x310 [ 15.103611] kunit_try_run_case+0x1a6/0x480 [ 15.103910] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.104153] kthread+0x257/0x310 [ 15.104317] ret_from_fork+0x41/0x80 [ 15.104491] ret_from_fork_asm+0x1a/0x30 [ 15.104745] [ 15.104915] The buggy address belongs to the object at ffff888102635000 [ 15.104915] which belongs to the cache kmalloc-64 of size 64 [ 15.105707] The buggy address is located 0 bytes to the right of [ 15.105707] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.106609] [ 15.106812] The buggy address belongs to the physical page: [ 15.107233] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.107586] flags: 0x200000000000000(node=0|zone=2) [ 15.107930] page_type: f5(slab) [ 15.108190] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.108619] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.108964] page dumped because: kasan: bad access detected [ 15.109281] [ 15.109479] Memory state around the buggy address: [ 15.109745] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.110186] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.110437] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.110680] ^ [ 15.111043] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.111541] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.112005] ================================================================== [ 14.570710] ================================================================== [ 14.571227] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b3c/0x5450 [ 14.571749] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.572306] [ 14.572489] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.572577] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.572601] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.572644] Call Trace: [ 14.572691] <TASK> [ 14.572726] dump_stack_lvl+0x73/0xb0 [ 14.572783] print_report+0xd1/0x640 [ 14.572834] ? __virt_addr_valid+0x1db/0x2d0 [ 14.572883] ? kasan_atomics_helper+0x4b3c/0x5450 [ 14.572931] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.572978] ? kasan_atomics_helper+0x4b3c/0x5450 [ 14.573026] kasan_report+0x140/0x180 [ 14.573103] ? kasan_atomics_helper+0x4b3c/0x5450 [ 14.573165] __asan_report_store4_noabort+0x1b/0x30 [ 14.573213] kasan_atomics_helper+0x4b3c/0x5450 [ 14.573258] ? kasan_save_alloc_info+0x3b/0x50 [ 14.573297] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.573337] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.573377] kasan_atomics+0x1dd/0x310 [ 14.573412] ? __pfx_kasan_atomics+0x10/0x10 [ 14.573447] ? __pfx_read_tsc+0x10/0x10 [ 14.573476] ? ktime_get_ts64+0x84/0x230 [ 14.573520] kunit_try_run_case+0x1a6/0x480 [ 14.573560] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.573595] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.573632] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.573689] ? __kthread_parkme+0x82/0x160 [ 14.573724] ? preempt_count_sub+0x50/0x80 [ 14.573765] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.573803] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.573844] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.573888] kthread+0x257/0x310 [ 14.573938] ? __pfx_kthread+0x10/0x10 [ 14.573979] ret_from_fork+0x41/0x80 [ 14.574022] ? __pfx_kthread+0x10/0x10 [ 14.574096] ret_from_fork_asm+0x1a/0x30 [ 14.574164] </TASK> [ 14.574192] [ 14.588809] Allocated by task 270: [ 14.589060] kasan_save_stack+0x45/0x70 [ 14.589690] kasan_save_track+0x18/0x40 [ 14.590264] kasan_save_alloc_info+0x3b/0x50 [ 14.590584] __kasan_kmalloc+0xb7/0xc0 [ 14.590814] __kmalloc_cache_noprof+0x168/0x350 [ 14.591072] kasan_atomics+0x96/0x310 [ 14.591619] kunit_try_run_case+0x1a6/0x480 [ 14.591786] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.592247] kthread+0x257/0x310 [ 14.592536] ret_from_fork+0x41/0x80 [ 14.592820] ret_from_fork_asm+0x1a/0x30 [ 14.593017] [ 14.593558] The buggy address belongs to the object at ffff888102635000 [ 14.593558] which belongs to the cache kmalloc-64 of size 64 [ 14.594322] The buggy address is located 0 bytes to the right of [ 14.594322] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.594940] [ 14.595321] The buggy address belongs to the physical page: [ 14.595670] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.596053] flags: 0x200000000000000(node=0|zone=2) [ 14.596635] page_type: f5(slab) [ 14.596881] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.597543] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.598020] page dumped because: kasan: bad access detected [ 14.598465] [ 14.598627] Memory state around the buggy address: [ 14.598875] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.599461] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.599814] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.600287] ^ [ 14.600633] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.600978] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.601614] ================================================================== [ 15.013360] ================================================================== [ 15.013796] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xfaa/0x5450 [ 15.014344] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.014530] [ 15.014622] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.014695] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.014716] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.014746] Call Trace: [ 15.014772] <TASK> [ 15.014796] dump_stack_lvl+0x73/0xb0 [ 15.014839] print_report+0xd1/0x640 [ 15.014874] ? __virt_addr_valid+0x1db/0x2d0 [ 15.014910] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.014944] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.014984] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.015022] kasan_report+0x140/0x180 [ 15.015114] ? kasan_atomics_helper+0xfaa/0x5450 [ 15.015185] kasan_check_range+0x10c/0x1c0 [ 15.015231] __kasan_check_write+0x18/0x20 [ 15.015274] kasan_atomics_helper+0xfaa/0x5450 [ 15.015320] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.015370] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.015428] kasan_atomics+0x1dd/0x310 [ 15.015474] ? __pfx_kasan_atomics+0x10/0x10 [ 15.015520] ? __pfx_read_tsc+0x10/0x10 [ 15.015560] ? ktime_get_ts64+0x84/0x230 [ 15.015619] kunit_try_run_case+0x1a6/0x480 [ 15.015659] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015709] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.015747] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.015796] ? __kthread_parkme+0x82/0x160 [ 15.015837] ? preempt_count_sub+0x50/0x80 [ 15.015884] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.015925] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.015996] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.016049] kthread+0x257/0x310 [ 15.016113] ? __pfx_kthread+0x10/0x10 [ 15.016154] ret_from_fork+0x41/0x80 [ 15.016195] ? __pfx_kthread+0x10/0x10 [ 15.016236] ret_from_fork_asm+0x1a/0x30 [ 15.016299] </TASK> [ 15.016325] [ 15.026391] Allocated by task 270: [ 15.026609] kasan_save_stack+0x45/0x70 [ 15.026964] kasan_save_track+0x18/0x40 [ 15.027226] kasan_save_alloc_info+0x3b/0x50 [ 15.027507] __kasan_kmalloc+0xb7/0xc0 [ 15.027823] __kmalloc_cache_noprof+0x168/0x350 [ 15.028044] kasan_atomics+0x96/0x310 [ 15.028269] kunit_try_run_case+0x1a6/0x480 [ 15.028611] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.029014] kthread+0x257/0x310 [ 15.029296] ret_from_fork+0x41/0x80 [ 15.029545] ret_from_fork_asm+0x1a/0x30 [ 15.029820] [ 15.029999] The buggy address belongs to the object at ffff888102635000 [ 15.029999] which belongs to the cache kmalloc-64 of size 64 [ 15.030572] The buggy address is located 0 bytes to the right of [ 15.030572] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.031093] [ 15.031227] The buggy address belongs to the physical page: [ 15.031621] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.032128] flags: 0x200000000000000(node=0|zone=2) [ 15.032456] page_type: f5(slab) [ 15.032700] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.033127] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.033477] page dumped because: kasan: bad access detected [ 15.033835] [ 15.034024] Memory state around the buggy address: [ 15.034281] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.034674] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.035049] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.035536] ^ [ 15.035803] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036250] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.036607] ================================================================== [ 15.659510] ================================================================== [ 15.660065] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f32/0x5450 [ 15.660648] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.661620] [ 15.661868] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.661978] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.662006] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.662046] Call Trace: [ 15.662099] <TASK> [ 15.662134] dump_stack_lvl+0x73/0xb0 [ 15.662193] print_report+0xd1/0x640 [ 15.662236] ? __virt_addr_valid+0x1db/0x2d0 [ 15.662267] ? kasan_atomics_helper+0x4f32/0x5450 [ 15.662292] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.662317] ? kasan_atomics_helper+0x4f32/0x5450 [ 15.662342] kasan_report+0x140/0x180 [ 15.662368] ? kasan_atomics_helper+0x4f32/0x5450 [ 15.662398] __asan_report_load8_noabort+0x18/0x20 [ 15.662420] kasan_atomics_helper+0x4f32/0x5450 [ 15.662446] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.662472] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.662499] kasan_atomics+0x1dd/0x310 [ 15.662521] ? __pfx_kasan_atomics+0x10/0x10 [ 15.662543] ? __pfx_read_tsc+0x10/0x10 [ 15.662563] ? ktime_get_ts64+0x84/0x230 [ 15.662592] kunit_try_run_case+0x1a6/0x480 [ 15.662615] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662636] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.662659] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.662711] ? __kthread_parkme+0x82/0x160 [ 15.662734] ? preempt_count_sub+0x50/0x80 [ 15.662758] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.662780] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.662807] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.662834] kthread+0x257/0x310 [ 15.662853] ? __pfx_kthread+0x10/0x10 [ 15.662874] ret_from_fork+0x41/0x80 [ 15.662895] ? __pfx_kthread+0x10/0x10 [ 15.662915] ret_from_fork_asm+0x1a/0x30 [ 15.662948] </TASK> [ 15.662961] [ 15.672147] Allocated by task 270: [ 15.672811] kasan_save_stack+0x45/0x70 [ 15.673208] kasan_save_track+0x18/0x40 [ 15.673491] kasan_save_alloc_info+0x3b/0x50 [ 15.673876] __kasan_kmalloc+0xb7/0xc0 [ 15.674330] __kmalloc_cache_noprof+0x168/0x350 [ 15.674888] kasan_atomics+0x96/0x310 [ 15.675185] kunit_try_run_case+0x1a6/0x480 [ 15.675374] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.675602] kthread+0x257/0x310 [ 15.675766] ret_from_fork+0x41/0x80 [ 15.675960] ret_from_fork_asm+0x1a/0x30 [ 15.676251] [ 15.676386] The buggy address belongs to the object at ffff888102635000 [ 15.676386] which belongs to the cache kmalloc-64 of size 64 [ 15.676887] The buggy address is located 0 bytes to the right of [ 15.676887] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.677489] [ 15.677656] The buggy address belongs to the physical page: [ 15.677881] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.678336] flags: 0x200000000000000(node=0|zone=2) [ 15.678555] page_type: f5(slab) [ 15.678749] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.679284] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.679728] page dumped because: kasan: bad access detected [ 15.680084] [ 15.680243] Memory state around the buggy address: [ 15.680448] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.680814] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681123] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.681357] ^ [ 15.681547] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.681931] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.682421] ================================================================== [ 14.848426] ================================================================== [ 14.848865] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xb6b/0x5450 [ 14.849278] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.849660] [ 14.849853] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.849941] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.849964] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.850010] Call Trace: [ 14.850043] <TASK> [ 14.850118] dump_stack_lvl+0x73/0xb0 [ 14.850177] print_report+0xd1/0x640 [ 14.850226] ? __virt_addr_valid+0x1db/0x2d0 [ 14.850272] ? kasan_atomics_helper+0xb6b/0x5450 [ 14.850317] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.850363] ? kasan_atomics_helper+0xb6b/0x5450 [ 14.850413] kasan_report+0x140/0x180 [ 14.850460] ? kasan_atomics_helper+0xb6b/0x5450 [ 14.850518] kasan_check_range+0x10c/0x1c0 [ 14.850564] __kasan_check_write+0x18/0x20 [ 14.850612] kasan_atomics_helper+0xb6b/0x5450 [ 14.850652] ? kasan_save_alloc_info+0x3b/0x50 [ 14.850711] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.850760] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.850818] kasan_atomics+0x1dd/0x310 [ 14.850863] ? __pfx_kasan_atomics+0x10/0x10 [ 14.850910] ? __pfx_read_tsc+0x10/0x10 [ 14.850952] ? ktime_get_ts64+0x84/0x230 [ 14.851006] kunit_try_run_case+0x1a6/0x480 [ 14.851083] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851129] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.851173] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.851223] ? __kthread_parkme+0x82/0x160 [ 14.851266] ? preempt_count_sub+0x50/0x80 [ 14.851309] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.851342] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.851379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.851405] kthread+0x257/0x310 [ 14.851424] ? __pfx_kthread+0x10/0x10 [ 14.851443] ret_from_fork+0x41/0x80 [ 14.851463] ? __pfx_kthread+0x10/0x10 [ 14.851480] ret_from_fork_asm+0x1a/0x30 [ 14.851510] </TASK> [ 14.851523] [ 14.859568] Allocated by task 270: [ 14.859800] kasan_save_stack+0x45/0x70 [ 14.860146] kasan_save_track+0x18/0x40 [ 14.860398] kasan_save_alloc_info+0x3b/0x50 [ 14.860720] __kasan_kmalloc+0xb7/0xc0 [ 14.860894] __kmalloc_cache_noprof+0x168/0x350 [ 14.861108] kasan_atomics+0x96/0x310 [ 14.861318] kunit_try_run_case+0x1a6/0x480 [ 14.861654] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.862096] kthread+0x257/0x310 [ 14.862377] ret_from_fork+0x41/0x80 [ 14.862647] ret_from_fork_asm+0x1a/0x30 [ 14.862821] [ 14.863004] The buggy address belongs to the object at ffff888102635000 [ 14.863004] which belongs to the cache kmalloc-64 of size 64 [ 14.863615] The buggy address is located 0 bytes to the right of [ 14.863615] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.864246] [ 14.864437] The buggy address belongs to the physical page: [ 14.864691] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.865151] flags: 0x200000000000000(node=0|zone=2) [ 14.865473] page_type: f5(slab) [ 14.865705] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.866245] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.866500] page dumped because: kasan: bad access detected [ 14.866718] [ 14.866875] Memory state around the buggy address: [ 14.867260] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.867746] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.868220] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.868502] ^ [ 14.868827] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869165] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.869396] ================================================================== [ 15.535172] ================================================================== [ 15.535445] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x194b/0x5450 [ 15.536252] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.536861] [ 15.537097] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.537212] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.537244] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.537286] Call Trace: [ 15.537322] <TASK> [ 15.537352] dump_stack_lvl+0x73/0xb0 [ 15.537413] print_report+0xd1/0x640 [ 15.537461] ? __virt_addr_valid+0x1db/0x2d0 [ 15.537512] ? kasan_atomics_helper+0x194b/0x5450 [ 15.537560] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.537608] ? kasan_atomics_helper+0x194b/0x5450 [ 15.537659] kasan_report+0x140/0x180 [ 15.537721] ? kasan_atomics_helper+0x194b/0x5450 [ 15.537781] kasan_check_range+0x10c/0x1c0 [ 15.537827] __kasan_check_write+0x18/0x20 [ 15.537872] kasan_atomics_helper+0x194b/0x5450 [ 15.537931] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.537975] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.538029] kasan_atomics+0x1dd/0x310 [ 15.538071] ? __pfx_kasan_atomics+0x10/0x10 [ 15.538166] ? __pfx_read_tsc+0x10/0x10 [ 15.538207] ? ktime_get_ts64+0x84/0x230 [ 15.538276] kunit_try_run_case+0x1a6/0x480 [ 15.538324] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.538368] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.538431] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.538480] ? __kthread_parkme+0x82/0x160 [ 15.538539] ? preempt_count_sub+0x50/0x80 [ 15.538581] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.538622] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.538684] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.538740] kthread+0x257/0x310 [ 15.538782] ? __pfx_kthread+0x10/0x10 [ 15.538825] ret_from_fork+0x41/0x80 [ 15.538864] ? __pfx_kthread+0x10/0x10 [ 15.538887] ret_from_fork_asm+0x1a/0x30 [ 15.538918] </TASK> [ 15.538932] [ 15.546770] Allocated by task 270: [ 15.547070] kasan_save_stack+0x45/0x70 [ 15.547396] kasan_save_track+0x18/0x40 [ 15.547709] kasan_save_alloc_info+0x3b/0x50 [ 15.548104] __kasan_kmalloc+0xb7/0xc0 [ 15.548455] __kmalloc_cache_noprof+0x168/0x350 [ 15.548806] kasan_atomics+0x96/0x310 [ 15.549846] kunit_try_run_case+0x1a6/0x480 [ 15.550743] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.551045] kthread+0x257/0x310 [ 15.551440] ret_from_fork+0x41/0x80 [ 15.551745] ret_from_fork_asm+0x1a/0x30 [ 15.552029] [ 15.552191] The buggy address belongs to the object at ffff888102635000 [ 15.552191] which belongs to the cache kmalloc-64 of size 64 [ 15.552578] The buggy address is located 0 bytes to the right of [ 15.552578] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.553164] [ 15.553324] The buggy address belongs to the physical page: [ 15.553725] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.554239] flags: 0x200000000000000(node=0|zone=2) [ 15.554451] page_type: f5(slab) [ 15.554613] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.555233] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.555888] page dumped because: kasan: bad access detected [ 15.556241] [ 15.556365] Memory state around the buggy address: [ 15.556554] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.557056] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.557395] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.557636] ^ [ 15.557926] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.558560] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.559052] ================================================================== [ 15.585410] ================================================================== [ 15.585694] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1a80/0x5450 [ 15.586135] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.586372] [ 15.586486] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.586560] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.586583] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.586618] Call Trace: [ 15.586650] <TASK> [ 15.586957] dump_stack_lvl+0x73/0xb0 [ 15.587025] print_report+0xd1/0x640 [ 15.587062] ? __virt_addr_valid+0x1db/0x2d0 [ 15.587096] ? kasan_atomics_helper+0x1a80/0x5450 [ 15.587132] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.587168] ? kasan_atomics_helper+0x1a80/0x5450 [ 15.587207] kasan_report+0x140/0x180 [ 15.587248] ? kasan_atomics_helper+0x1a80/0x5450 [ 15.587297] kasan_check_range+0x10c/0x1c0 [ 15.587330] __kasan_check_write+0x18/0x20 [ 15.587360] kasan_atomics_helper+0x1a80/0x5450 [ 15.587396] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.587431] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.587471] kasan_atomics+0x1dd/0x310 [ 15.587501] ? __pfx_kasan_atomics+0x10/0x10 [ 15.587554] ? __pfx_read_tsc+0x10/0x10 [ 15.587960] ? ktime_get_ts64+0x84/0x230 [ 15.588063] kunit_try_run_case+0x1a6/0x480 [ 15.588108] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.588141] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.588175] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.588219] ? __kthread_parkme+0x82/0x160 [ 15.588257] ? preempt_count_sub+0x50/0x80 [ 15.588299] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.588336] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.588381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.588426] kthread+0x257/0x310 [ 15.588460] ? __pfx_kthread+0x10/0x10 [ 15.588496] ret_from_fork+0x41/0x80 [ 15.588531] ? __pfx_kthread+0x10/0x10 [ 15.588564] ret_from_fork_asm+0x1a/0x30 [ 15.588622] </TASK> [ 15.588645] [ 15.599677] Allocated by task 270: [ 15.599974] kasan_save_stack+0x45/0x70 [ 15.600343] kasan_save_track+0x18/0x40 [ 15.600647] kasan_save_alloc_info+0x3b/0x50 [ 15.600984] __kasan_kmalloc+0xb7/0xc0 [ 15.601314] __kmalloc_cache_noprof+0x168/0x350 [ 15.601660] kasan_atomics+0x96/0x310 [ 15.602006] kunit_try_run_case+0x1a6/0x480 [ 15.602379] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.602800] kthread+0x257/0x310 [ 15.603111] ret_from_fork+0x41/0x80 [ 15.603419] ret_from_fork_asm+0x1a/0x30 [ 15.603747] [ 15.603908] The buggy address belongs to the object at ffff888102635000 [ 15.603908] which belongs to the cache kmalloc-64 of size 64 [ 15.604871] The buggy address is located 0 bytes to the right of [ 15.604871] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.605390] [ 15.605605] The buggy address belongs to the physical page: [ 15.605974] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.606493] flags: 0x200000000000000(node=0|zone=2) [ 15.606836] page_type: f5(slab) [ 15.607156] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.607545] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.607966] page dumped because: kasan: bad access detected [ 15.608386] [ 15.608533] Memory state around the buggy address: [ 15.608917] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.609383] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.609746] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.610233] ^ [ 15.610493] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.610939] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.611419] ================================================================== [ 15.728501] ================================================================== [ 15.729044] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1e13/0x5450 [ 15.729529] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.730756] [ 15.730914] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.731005] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.731033] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.731085] Call Trace: [ 15.731127] <TASK> [ 15.731162] dump_stack_lvl+0x73/0xb0 [ 15.731220] print_report+0xd1/0x640 [ 15.731246] ? __virt_addr_valid+0x1db/0x2d0 [ 15.731271] ? kasan_atomics_helper+0x1e13/0x5450 [ 15.731294] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.731317] ? kasan_atomics_helper+0x1e13/0x5450 [ 15.731341] kasan_report+0x140/0x180 [ 15.731364] ? kasan_atomics_helper+0x1e13/0x5450 [ 15.731392] kasan_check_range+0x10c/0x1c0 [ 15.731413] __kasan_check_write+0x18/0x20 [ 15.731434] kasan_atomics_helper+0x1e13/0x5450 [ 15.731458] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.731482] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.731510] kasan_atomics+0x1dd/0x310 [ 15.731530] ? __pfx_kasan_atomics+0x10/0x10 [ 15.731551] ? __pfx_read_tsc+0x10/0x10 [ 15.731570] ? ktime_get_ts64+0x84/0x230 [ 15.731596] kunit_try_run_case+0x1a6/0x480 [ 15.731618] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.731638] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.731660] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.731713] ? __kthread_parkme+0x82/0x160 [ 15.731748] ? preempt_count_sub+0x50/0x80 [ 15.731785] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.731816] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.731857] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.731903] kthread+0x257/0x310 [ 15.731936] ? __pfx_kthread+0x10/0x10 [ 15.731966] ret_from_fork+0x41/0x80 [ 15.731998] ? __pfx_kthread+0x10/0x10 [ 15.732028] ret_from_fork_asm+0x1a/0x30 [ 15.732082] </TASK> [ 15.732105] [ 15.741288] Allocated by task 270: [ 15.741539] kasan_save_stack+0x45/0x70 [ 15.741860] kasan_save_track+0x18/0x40 [ 15.742085] kasan_save_alloc_info+0x3b/0x50 [ 15.742406] __kasan_kmalloc+0xb7/0xc0 [ 15.742597] __kmalloc_cache_noprof+0x168/0x350 [ 15.742873] kasan_atomics+0x96/0x310 [ 15.743140] kunit_try_run_case+0x1a6/0x480 [ 15.743452] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.743732] kthread+0x257/0x310 [ 15.743937] ret_from_fork+0x41/0x80 [ 15.744216] ret_from_fork_asm+0x1a/0x30 [ 15.744386] [ 15.744523] The buggy address belongs to the object at ffff888102635000 [ 15.744523] which belongs to the cache kmalloc-64 of size 64 [ 15.744997] The buggy address is located 0 bytes to the right of [ 15.744997] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.745604] [ 15.745772] The buggy address belongs to the physical page: [ 15.746193] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.746481] flags: 0x200000000000000(node=0|zone=2) [ 15.746833] page_type: f5(slab) [ 15.747035] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.747446] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.747759] page dumped because: kasan: bad access detected [ 15.748030] [ 15.748199] Memory state around the buggy address: [ 15.748415] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.748809] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.749103] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.749476] ^ [ 15.749832] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750189] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.750632] ================================================================== [ 14.774452] ================================================================== [ 14.775179] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x993/0x5450 [ 14.775688] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.776215] [ 14.776383] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.776468] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.776495] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.776537] Call Trace: [ 14.776569] <TASK> [ 14.776599] dump_stack_lvl+0x73/0xb0 [ 14.776656] print_report+0xd1/0x640 [ 14.776714] ? __virt_addr_valid+0x1db/0x2d0 [ 14.776766] ? kasan_atomics_helper+0x993/0x5450 [ 14.776807] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.776854] ? kasan_atomics_helper+0x993/0x5450 [ 14.776902] kasan_report+0x140/0x180 [ 14.776941] ? kasan_atomics_helper+0x993/0x5450 [ 14.776981] kasan_check_range+0x10c/0x1c0 [ 14.777014] __kasan_check_write+0x18/0x20 [ 14.777044] kasan_atomics_helper+0x993/0x5450 [ 14.777112] ? kasan_save_alloc_info+0x3b/0x50 [ 14.777144] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.777182] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.777228] kasan_atomics+0x1dd/0x310 [ 14.777262] ? __pfx_kasan_atomics+0x10/0x10 [ 14.777295] ? __pfx_read_tsc+0x10/0x10 [ 14.777323] ? ktime_get_ts64+0x84/0x230 [ 14.777361] kunit_try_run_case+0x1a6/0x480 [ 14.777394] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777425] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.777459] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.777498] ? __kthread_parkme+0x82/0x160 [ 14.777529] ? preempt_count_sub+0x50/0x80 [ 14.777563] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.777593] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.777635] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.777691] kthread+0x257/0x310 [ 14.777722] ? __pfx_kthread+0x10/0x10 [ 14.777754] ret_from_fork+0x41/0x80 [ 14.777788] ? __pfx_kthread+0x10/0x10 [ 14.777823] ret_from_fork_asm+0x1a/0x30 [ 14.777875] </TASK> [ 14.777918] [ 14.786299] Allocated by task 270: [ 14.786604] kasan_save_stack+0x45/0x70 [ 14.786933] kasan_save_track+0x18/0x40 [ 14.787312] kasan_save_alloc_info+0x3b/0x50 [ 14.787596] __kasan_kmalloc+0xb7/0xc0 [ 14.787768] __kmalloc_cache_noprof+0x168/0x350 [ 14.787952] kasan_atomics+0x96/0x310 [ 14.788149] kunit_try_run_case+0x1a6/0x480 [ 14.788333] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.788539] kthread+0x257/0x310 [ 14.788696] ret_from_fork+0x41/0x80 [ 14.788963] ret_from_fork_asm+0x1a/0x30 [ 14.789302] [ 14.789466] The buggy address belongs to the object at ffff888102635000 [ 14.789466] which belongs to the cache kmalloc-64 of size 64 [ 14.790008] The buggy address is located 0 bytes to the right of [ 14.790008] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.791195] [ 14.791375] The buggy address belongs to the physical page: [ 14.793240] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.793815] flags: 0x200000000000000(node=0|zone=2) [ 14.794218] page_type: f5(slab) [ 14.794497] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.794839] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.795097] page dumped because: kasan: bad access detected [ 14.795272] [ 14.795361] Memory state around the buggy address: [ 14.795553] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.795850] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.796377] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.796976] ^ [ 14.797222] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797456] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.797652] ================================================================== [ 15.185264] ================================================================== [ 15.185693] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x49ea/0x5450 [ 15.186259] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.186688] [ 15.186984] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.187432] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.187485] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.187540] Call Trace: [ 15.187576] <TASK> [ 15.187608] dump_stack_lvl+0x73/0xb0 [ 15.187693] print_report+0xd1/0x640 [ 15.187755] ? __virt_addr_valid+0x1db/0x2d0 [ 15.187803] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.187858] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.187901] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.187939] kasan_report+0x140/0x180 [ 15.187983] ? kasan_atomics_helper+0x49ea/0x5450 [ 15.188034] __asan_report_load4_noabort+0x18/0x20 [ 15.188117] kasan_atomics_helper+0x49ea/0x5450 [ 15.188175] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.188229] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.188290] kasan_atomics+0x1dd/0x310 [ 15.188338] ? __pfx_kasan_atomics+0x10/0x10 [ 15.188385] ? __pfx_read_tsc+0x10/0x10 [ 15.188427] ? ktime_get_ts64+0x84/0x230 [ 15.188487] kunit_try_run_case+0x1a6/0x480 [ 15.188536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.188576] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.188610] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.188637] ? __kthread_parkme+0x82/0x160 [ 15.188658] ? preempt_count_sub+0x50/0x80 [ 15.188708] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.188731] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.188758] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.188786] kthread+0x257/0x310 [ 15.188806] ? __pfx_kthread+0x10/0x10 [ 15.188826] ret_from_fork+0x41/0x80 [ 15.188847] ? __pfx_kthread+0x10/0x10 [ 15.188868] ret_from_fork_asm+0x1a/0x30 [ 15.188899] </TASK> [ 15.188912] [ 15.198474] Allocated by task 270: [ 15.198698] kasan_save_stack+0x45/0x70 [ 15.199107] kasan_save_track+0x18/0x40 [ 15.199480] kasan_save_alloc_info+0x3b/0x50 [ 15.199853] __kasan_kmalloc+0xb7/0xc0 [ 15.200230] __kmalloc_cache_noprof+0x168/0x350 [ 15.200425] kasan_atomics+0x96/0x310 [ 15.200907] kunit_try_run_case+0x1a6/0x480 [ 15.201226] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.201416] kthread+0x257/0x310 [ 15.201655] ret_from_fork+0x41/0x80 [ 15.201983] ret_from_fork_asm+0x1a/0x30 [ 15.202223] [ 15.202336] The buggy address belongs to the object at ffff888102635000 [ 15.202336] which belongs to the cache kmalloc-64 of size 64 [ 15.202996] The buggy address is located 0 bytes to the right of [ 15.202996] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.203591] [ 15.203764] The buggy address belongs to the physical page: [ 15.204084] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.204457] flags: 0x200000000000000(node=0|zone=2) [ 15.204796] page_type: f5(slab) [ 15.205103] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.205460] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.205909] page dumped because: kasan: bad access detected [ 15.206182] [ 15.206293] Memory state around the buggy address: [ 15.206478] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.206980] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.207508] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.207756] ^ [ 15.207941] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208472] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.208963] ================================================================== [ 14.653426] ================================================================== [ 14.653952] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x698/0x5450 [ 14.654226] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.654631] [ 14.654845] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.654927] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.654952] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.654994] Call Trace: [ 14.655029] <TASK> [ 14.655061] dump_stack_lvl+0x73/0xb0 [ 14.655129] print_report+0xd1/0x640 [ 14.655174] ? __virt_addr_valid+0x1db/0x2d0 [ 14.655217] ? kasan_atomics_helper+0x698/0x5450 [ 14.655253] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.655294] ? kasan_atomics_helper+0x698/0x5450 [ 14.655337] kasan_report+0x140/0x180 [ 14.655380] ? kasan_atomics_helper+0x698/0x5450 [ 14.655433] kasan_check_range+0x10c/0x1c0 [ 14.655472] __kasan_check_write+0x18/0x20 [ 14.655511] kasan_atomics_helper+0x698/0x5450 [ 14.655550] ? kasan_save_alloc_info+0x3b/0x50 [ 14.655593] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.655638] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.655707] kasan_atomics+0x1dd/0x310 [ 14.655752] ? __pfx_kasan_atomics+0x10/0x10 [ 14.655796] ? __pfx_read_tsc+0x10/0x10 [ 14.655836] ? ktime_get_ts64+0x84/0x230 [ 14.655894] kunit_try_run_case+0x1a6/0x480 [ 14.655942] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.655986] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.656029] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.656078] ? __kthread_parkme+0x82/0x160 [ 14.656121] ? preempt_count_sub+0x50/0x80 [ 14.656169] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.656212] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.656263] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.656307] kthread+0x257/0x310 [ 14.656344] ? __pfx_kthread+0x10/0x10 [ 14.656380] ret_from_fork+0x41/0x80 [ 14.656414] ? __pfx_kthread+0x10/0x10 [ 14.656445] ret_from_fork_asm+0x1a/0x30 [ 14.656524] </TASK> [ 14.656550] [ 14.664465] Allocated by task 270: [ 14.664660] kasan_save_stack+0x45/0x70 [ 14.664962] kasan_save_track+0x18/0x40 [ 14.665330] kasan_save_alloc_info+0x3b/0x50 [ 14.665565] __kasan_kmalloc+0xb7/0xc0 [ 14.665807] __kmalloc_cache_noprof+0x168/0x350 [ 14.666058] kasan_atomics+0x96/0x310 [ 14.666306] kunit_try_run_case+0x1a6/0x480 [ 14.666539] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.666788] kthread+0x257/0x310 [ 14.666951] ret_from_fork+0x41/0x80 [ 14.667112] ret_from_fork_asm+0x1a/0x30 [ 14.667290] [ 14.667393] The buggy address belongs to the object at ffff888102635000 [ 14.667393] which belongs to the cache kmalloc-64 of size 64 [ 14.667929] The buggy address is located 0 bytes to the right of [ 14.667929] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.669054] [ 14.669230] The buggy address belongs to the physical page: [ 14.669601] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.670171] flags: 0x200000000000000(node=0|zone=2) [ 14.670380] page_type: f5(slab) [ 14.670591] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.670993] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.671608] page dumped because: kasan: bad access detected [ 14.671829] [ 14.671981] Memory state around the buggy address: [ 14.672239] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.672484] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.672755] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.674154] ^ [ 14.674507] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.674996] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.676177] ================================================================== [ 15.926653] ================================================================== [ 15.927232] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x218b/0x5450 [ 15.927881] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.928735] [ 15.928946] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.929037] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.929076] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.929117] Call Trace: [ 15.929156] <TASK> [ 15.929191] dump_stack_lvl+0x73/0xb0 [ 15.929251] print_report+0xd1/0x640 [ 15.929296] ? __virt_addr_valid+0x1db/0x2d0 [ 15.929344] ? kasan_atomics_helper+0x218b/0x5450 [ 15.929386] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.929432] ? kasan_atomics_helper+0x218b/0x5450 [ 15.929477] kasan_report+0x140/0x180 [ 15.929519] ? kasan_atomics_helper+0x218b/0x5450 [ 15.929574] kasan_check_range+0x10c/0x1c0 [ 15.929620] __kasan_check_write+0x18/0x20 [ 15.929675] kasan_atomics_helper+0x218b/0x5450 [ 15.929726] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.929768] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.929815] kasan_atomics+0x1dd/0x310 [ 15.929837] ? __pfx_kasan_atomics+0x10/0x10 [ 15.929859] ? __pfx_read_tsc+0x10/0x10 [ 15.929880] ? ktime_get_ts64+0x84/0x230 [ 15.929918] kunit_try_run_case+0x1a6/0x480 [ 15.929948] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.929972] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.929998] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.930027] ? __kthread_parkme+0x82/0x160 [ 15.930050] ? preempt_count_sub+0x50/0x80 [ 15.930087] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.930114] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.930141] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.930168] kthread+0x257/0x310 [ 15.930188] ? __pfx_kthread+0x10/0x10 [ 15.930207] ret_from_fork+0x41/0x80 [ 15.930227] ? __pfx_kthread+0x10/0x10 [ 15.930246] ret_from_fork_asm+0x1a/0x30 [ 15.930277] </TASK> [ 15.930292] [ 15.937619] Allocated by task 270: [ 15.937941] kasan_save_stack+0x45/0x70 [ 15.938308] kasan_save_track+0x18/0x40 [ 15.938551] kasan_save_alloc_info+0x3b/0x50 [ 15.938788] __kasan_kmalloc+0xb7/0xc0 [ 15.939192] __kmalloc_cache_noprof+0x168/0x350 [ 15.939393] kasan_atomics+0x96/0x310 [ 15.939568] kunit_try_run_case+0x1a6/0x480 [ 15.939769] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.939987] kthread+0x257/0x310 [ 15.940227] ret_from_fork+0x41/0x80 [ 15.940528] ret_from_fork_asm+0x1a/0x30 [ 15.940854] [ 15.941021] The buggy address belongs to the object at ffff888102635000 [ 15.941021] which belongs to the cache kmalloc-64 of size 64 [ 15.942122] The buggy address is located 0 bytes to the right of [ 15.942122] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.942591] [ 15.942728] The buggy address belongs to the physical page: [ 15.943121] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.943547] flags: 0x200000000000000(node=0|zone=2) [ 15.943847] page_type: f5(slab) [ 15.944015] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.944420] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.944880] page dumped because: kasan: bad access detected [ 15.945301] [ 15.945397] Memory state around the buggy address: [ 15.945622] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.945893] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.946376] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.946850] ^ [ 15.947227] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.947471] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.947708] ================================================================== [ 15.210290] ================================================================== [ 15.210571] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x12e7/0x5450 [ 15.211161] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.211543] [ 15.211759] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.211844] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.211868] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.211906] Call Trace: [ 15.211938] <TASK> [ 15.211968] dump_stack_lvl+0x73/0xb0 [ 15.212028] print_report+0xd1/0x640 [ 15.212114] ? __virt_addr_valid+0x1db/0x2d0 [ 15.212163] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.212214] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.212270] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.212318] kasan_report+0x140/0x180 [ 15.212370] ? kasan_atomics_helper+0x12e7/0x5450 [ 15.212427] kasan_check_range+0x10c/0x1c0 [ 15.212473] __kasan_check_write+0x18/0x20 [ 15.212518] kasan_atomics_helper+0x12e7/0x5450 [ 15.212571] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.212626] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.212691] kasan_atomics+0x1dd/0x310 [ 15.212730] ? __pfx_kasan_atomics+0x10/0x10 [ 15.212771] ? __pfx_read_tsc+0x10/0x10 [ 15.212809] ? ktime_get_ts64+0x84/0x230 [ 15.212866] kunit_try_run_case+0x1a6/0x480 [ 15.212926] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.212967] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.213010] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.213088] ? __kthread_parkme+0x82/0x160 [ 15.213133] ? preempt_count_sub+0x50/0x80 [ 15.213193] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.213229] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.213261] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.213288] kthread+0x257/0x310 [ 15.213306] ? __pfx_kthread+0x10/0x10 [ 15.213325] ret_from_fork+0x41/0x80 [ 15.213345] ? __pfx_kthread+0x10/0x10 [ 15.213364] ret_from_fork_asm+0x1a/0x30 [ 15.213395] </TASK> [ 15.213409] [ 15.221470] Allocated by task 270: [ 15.221661] kasan_save_stack+0x45/0x70 [ 15.222098] kasan_save_track+0x18/0x40 [ 15.222438] kasan_save_alloc_info+0x3b/0x50 [ 15.222830] __kasan_kmalloc+0xb7/0xc0 [ 15.223225] __kmalloc_cache_noprof+0x168/0x350 [ 15.223610] kasan_atomics+0x96/0x310 [ 15.223932] kunit_try_run_case+0x1a6/0x480 [ 15.224232] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.224501] kthread+0x257/0x310 [ 15.224681] ret_from_fork+0x41/0x80 [ 15.224872] ret_from_fork_asm+0x1a/0x30 [ 15.225082] [ 15.225193] The buggy address belongs to the object at ffff888102635000 [ 15.225193] which belongs to the cache kmalloc-64 of size 64 [ 15.226051] The buggy address is located 0 bytes to the right of [ 15.226051] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.226993] [ 15.227202] The buggy address belongs to the physical page: [ 15.227600] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.227881] flags: 0x200000000000000(node=0|zone=2) [ 15.228188] page_type: f5(slab) [ 15.228505] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.229075] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.229627] page dumped because: kasan: bad access detected [ 15.229871] [ 15.230094] Memory state around the buggy address: [ 15.230365] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.230860] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.231285] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.231720] ^ [ 15.231965] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.232438] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.232813] ================================================================== [ 15.408486] ================================================================== [ 15.409045] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1650/0x5450 [ 15.409611] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.410194] [ 15.410373] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.410460] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.410488] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.410527] Call Trace: [ 15.410563] <TASK> [ 15.410592] dump_stack_lvl+0x73/0xb0 [ 15.410630] print_report+0xd1/0x640 [ 15.410653] ? __virt_addr_valid+0x1db/0x2d0 [ 15.410704] ? kasan_atomics_helper+0x1650/0x5450 [ 15.410737] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.410780] ? kasan_atomics_helper+0x1650/0x5450 [ 15.410816] kasan_report+0x140/0x180 [ 15.410854] ? kasan_atomics_helper+0x1650/0x5450 [ 15.410903] kasan_check_range+0x10c/0x1c0 [ 15.410944] __kasan_check_write+0x18/0x20 [ 15.411010] kasan_atomics_helper+0x1650/0x5450 [ 15.411103] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.411155] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.411204] kasan_atomics+0x1dd/0x310 [ 15.411244] ? __pfx_kasan_atomics+0x10/0x10 [ 15.411284] ? __pfx_read_tsc+0x10/0x10 [ 15.411325] ? ktime_get_ts64+0x84/0x230 [ 15.411380] kunit_try_run_case+0x1a6/0x480 [ 15.411442] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.411484] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.411525] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.411571] ? __kthread_parkme+0x82/0x160 [ 15.411614] ? preempt_count_sub+0x50/0x80 [ 15.411678] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.411718] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.411766] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.411816] kthread+0x257/0x310 [ 15.411853] ? __pfx_kthread+0x10/0x10 [ 15.411907] ret_from_fork+0x41/0x80 [ 15.411947] ? __pfx_kthread+0x10/0x10 [ 15.411983] ret_from_fork_asm+0x1a/0x30 [ 15.412040] </TASK> [ 15.412075] [ 15.422155] Allocated by task 270: [ 15.422468] kasan_save_stack+0x45/0x70 [ 15.422701] kasan_save_track+0x18/0x40 [ 15.422993] kasan_save_alloc_info+0x3b/0x50 [ 15.423566] __kasan_kmalloc+0xb7/0xc0 [ 15.423813] __kmalloc_cache_noprof+0x168/0x350 [ 15.424115] kasan_atomics+0x96/0x310 [ 15.424785] kunit_try_run_case+0x1a6/0x480 [ 15.425043] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.425443] kthread+0x257/0x310 [ 15.425609] ret_from_fork+0x41/0x80 [ 15.425889] ret_from_fork_asm+0x1a/0x30 [ 15.426134] [ 15.426323] The buggy address belongs to the object at ffff888102635000 [ 15.426323] which belongs to the cache kmalloc-64 of size 64 [ 15.426863] The buggy address is located 0 bytes to the right of [ 15.426863] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.427477] [ 15.428091] The buggy address belongs to the physical page: [ 15.428352] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.428657] flags: 0x200000000000000(node=0|zone=2) [ 15.429075] page_type: f5(slab) [ 15.429431] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.429992] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.430253] page dumped because: kasan: bad access detected [ 15.430703] [ 15.430873] Memory state around the buggy address: [ 15.431334] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.431888] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.432237] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.432710] ^ [ 15.433013] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433551] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.433898] ================================================================== [ 14.440528] ================================================================== [ 14.440876] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4b8a/0x5450 [ 14.441391] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.441606] [ 14.441684] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.441732] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.441764] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.441787] Call Trace: [ 14.441812] <TASK> [ 14.441839] dump_stack_lvl+0x73/0xb0 [ 14.441878] print_report+0xd1/0x640 [ 14.441914] ? __virt_addr_valid+0x1db/0x2d0 [ 14.441943] ? kasan_atomics_helper+0x4b8a/0x5450 [ 14.441979] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.442014] ? kasan_atomics_helper+0x4b8a/0x5450 [ 14.442051] kasan_report+0x140/0x180 [ 14.442076] ? kasan_atomics_helper+0x4b8a/0x5450 [ 14.442116] __asan_report_load4_noabort+0x18/0x20 [ 14.442139] kasan_atomics_helper+0x4b8a/0x5450 [ 14.442161] ? kasan_save_alloc_info+0x3b/0x50 [ 14.442182] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.442206] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.442233] kasan_atomics+0x1dd/0x310 [ 14.442253] ? __pfx_kasan_atomics+0x10/0x10 [ 14.442274] ? __pfx_read_tsc+0x10/0x10 [ 14.442292] ? ktime_get_ts64+0x84/0x230 [ 14.442485] kunit_try_run_case+0x1a6/0x480 [ 14.442519] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.442542] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.442562] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.442586] ? __kthread_parkme+0x82/0x160 [ 14.442621] ? preempt_count_sub+0x50/0x80 [ 14.442645] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.442674] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.442702] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.442727] kthread+0x257/0x310 [ 14.442745] ? __pfx_kthread+0x10/0x10 [ 14.442783] ret_from_fork+0x41/0x80 [ 14.442803] ? __pfx_kthread+0x10/0x10 [ 14.442832] ret_from_fork_asm+0x1a/0x30 [ 14.442862] </TASK> [ 14.442874] [ 14.449344] Allocated by task 270: [ 14.449451] kasan_save_stack+0x45/0x70 [ 14.449554] kasan_save_track+0x18/0x40 [ 14.449764] kasan_save_alloc_info+0x3b/0x50 [ 14.450041] __kasan_kmalloc+0xb7/0xc0 [ 14.450327] __kmalloc_cache_noprof+0x168/0x350 [ 14.450804] kasan_atomics+0x96/0x310 [ 14.451301] kunit_try_run_case+0x1a6/0x480 [ 14.451609] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.451879] kthread+0x257/0x310 [ 14.452528] ret_from_fork+0x41/0x80 [ 14.452819] ret_from_fork_asm+0x1a/0x30 [ 14.453445] [ 14.453615] The buggy address belongs to the object at ffff888102635000 [ 14.453615] which belongs to the cache kmalloc-64 of size 64 [ 14.453868] The buggy address is located 0 bytes to the right of [ 14.453868] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.454508] [ 14.454581] The buggy address belongs to the physical page: [ 14.454707] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.454978] flags: 0x200000000000000(node=0|zone=2) [ 14.455285] page_type: f5(slab) [ 14.455557] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.455933] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.456436] page dumped because: kasan: bad access detected [ 14.456764] [ 14.456867] Memory state around the buggy address: [ 14.457268] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.457545] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.457774] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.458079] ^ [ 14.458316] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.458848] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.459008] ================================================================== [ 14.989747] ================================================================== [ 14.990340] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xf11/0x5450 [ 14.990808] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.991309] [ 14.991493] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.991582] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.991608] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.991648] Call Trace: [ 14.991691] <TASK> [ 14.991725] dump_stack_lvl+0x73/0xb0 [ 14.991783] print_report+0xd1/0x640 [ 14.991829] ? __virt_addr_valid+0x1db/0x2d0 [ 14.991876] ? kasan_atomics_helper+0xf11/0x5450 [ 14.991923] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.991967] ? kasan_atomics_helper+0xf11/0x5450 [ 14.992016] kasan_report+0x140/0x180 [ 14.992127] ? kasan_atomics_helper+0xf11/0x5450 [ 14.992199] kasan_check_range+0x10c/0x1c0 [ 14.992245] __kasan_check_write+0x18/0x20 [ 14.992288] kasan_atomics_helper+0xf11/0x5450 [ 14.992341] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.992392] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.992454] kasan_atomics+0x1dd/0x310 [ 14.992500] ? __pfx_kasan_atomics+0x10/0x10 [ 14.992547] ? __pfx_read_tsc+0x10/0x10 [ 14.992589] ? ktime_get_ts64+0x84/0x230 [ 14.992646] kunit_try_run_case+0x1a6/0x480 [ 14.992705] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.992750] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.992789] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.992825] ? __kthread_parkme+0x82/0x160 [ 14.992846] ? preempt_count_sub+0x50/0x80 [ 14.992870] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.992892] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.992919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.992946] kthread+0x257/0x310 [ 14.992966] ? __pfx_kthread+0x10/0x10 [ 14.992986] ret_from_fork+0x41/0x80 [ 14.993006] ? __pfx_kthread+0x10/0x10 [ 14.993026] ret_from_fork_asm+0x1a/0x30 [ 14.993072] </TASK> [ 14.993110] [ 15.001482] Allocated by task 270: [ 15.001780] kasan_save_stack+0x45/0x70 [ 15.002192] kasan_save_track+0x18/0x40 [ 15.002516] kasan_save_alloc_info+0x3b/0x50 [ 15.002859] __kasan_kmalloc+0xb7/0xc0 [ 15.003172] __kmalloc_cache_noprof+0x168/0x350 [ 15.003516] kasan_atomics+0x96/0x310 [ 15.003773] kunit_try_run_case+0x1a6/0x480 [ 15.003956] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.004198] kthread+0x257/0x310 [ 15.004353] ret_from_fork+0x41/0x80 [ 15.004521] ret_from_fork_asm+0x1a/0x30 [ 15.004697] [ 15.004841] The buggy address belongs to the object at ffff888102635000 [ 15.004841] which belongs to the cache kmalloc-64 of size 64 [ 15.005617] The buggy address is located 0 bytes to the right of [ 15.005617] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.006551] [ 15.006757] The buggy address belongs to the physical page: [ 15.007169] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.007712] flags: 0x200000000000000(node=0|zone=2) [ 15.008012] page_type: f5(slab) [ 15.008337] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.008639] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.008896] page dumped because: kasan: bad access detected [ 15.009118] [ 15.009223] Memory state around the buggy address: [ 15.009406] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.009669] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.010226] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.010710] ^ [ 15.011080] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.011562] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.012050] ================================================================== [ 14.915309] ================================================================== [ 14.916019] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xd48/0x5450 [ 14.916552] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.917165] [ 14.917365] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.917457] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.917482] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.917540] Call Trace: [ 14.917573] <TASK> [ 14.917604] dump_stack_lvl+0x73/0xb0 [ 14.917674] print_report+0xd1/0x640 [ 14.917717] ? __virt_addr_valid+0x1db/0x2d0 [ 14.917763] ? kasan_atomics_helper+0xd48/0x5450 [ 14.917803] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.917858] ? kasan_atomics_helper+0xd48/0x5450 [ 14.917925] kasan_report+0x140/0x180 [ 14.917978] ? kasan_atomics_helper+0xd48/0x5450 [ 14.918034] kasan_check_range+0x10c/0x1c0 [ 14.918102] __kasan_check_write+0x18/0x20 [ 14.918144] kasan_atomics_helper+0xd48/0x5450 [ 14.918190] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.918240] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.918297] kasan_atomics+0x1dd/0x310 [ 14.918342] ? __pfx_kasan_atomics+0x10/0x10 [ 14.918388] ? __pfx_read_tsc+0x10/0x10 [ 14.918432] ? ktime_get_ts64+0x84/0x230 [ 14.918487] kunit_try_run_case+0x1a6/0x480 [ 14.918536] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.918580] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.918624] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.918686] ? __kthread_parkme+0x82/0x160 [ 14.918732] ? preempt_count_sub+0x50/0x80 [ 14.918783] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.918826] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.918882] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.918936] kthread+0x257/0x310 [ 14.918977] ? __pfx_kthread+0x10/0x10 [ 14.919021] ret_from_fork+0x41/0x80 [ 14.919087] ? __pfx_kthread+0x10/0x10 [ 14.919133] ret_from_fork_asm+0x1a/0x30 [ 14.919199] </TASK> [ 14.919225] [ 14.927605] Allocated by task 270: [ 14.927924] kasan_save_stack+0x45/0x70 [ 14.928287] kasan_save_track+0x18/0x40 [ 14.928644] kasan_save_alloc_info+0x3b/0x50 [ 14.929022] __kasan_kmalloc+0xb7/0xc0 [ 14.929405] __kmalloc_cache_noprof+0x168/0x350 [ 14.929828] kasan_atomics+0x96/0x310 [ 14.930223] kunit_try_run_case+0x1a6/0x480 [ 14.930587] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.931029] kthread+0x257/0x310 [ 14.931423] ret_from_fork+0x41/0x80 [ 14.931771] ret_from_fork_asm+0x1a/0x30 [ 14.932110] [ 14.932319] The buggy address belongs to the object at ffff888102635000 [ 14.932319] which belongs to the cache kmalloc-64 of size 64 [ 14.933008] The buggy address is located 0 bytes to the right of [ 14.933008] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.933749] [ 14.933874] The buggy address belongs to the physical page: [ 14.934361] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.934976] flags: 0x200000000000000(node=0|zone=2) [ 14.935424] page_type: f5(slab) [ 14.935726] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.936200] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.936568] page dumped because: kasan: bad access detected [ 14.936931] [ 14.937097] Memory state around the buggy address: [ 14.937275] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.937734] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.938311] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.938661] ^ [ 14.939009] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939582] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.939814] ================================================================== [ 15.037134] ================================================================== [ 15.037826] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4a38/0x5450 [ 15.038404] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.038793] [ 15.038927] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.039010] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.039038] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.039106] Call Trace: [ 15.039140] <TASK> [ 15.039173] dump_stack_lvl+0x73/0xb0 [ 15.039222] print_report+0xd1/0x640 [ 15.039263] ? __virt_addr_valid+0x1db/0x2d0 [ 15.039326] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.039374] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.039428] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.039475] kasan_report+0x140/0x180 [ 15.039533] ? kasan_atomics_helper+0x4a38/0x5450 [ 15.039597] __asan_report_load4_noabort+0x18/0x20 [ 15.039636] kasan_atomics_helper+0x4a38/0x5450 [ 15.039694] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.039742] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.039799] kasan_atomics+0x1dd/0x310 [ 15.039843] ? __pfx_kasan_atomics+0x10/0x10 [ 15.039892] ? __pfx_read_tsc+0x10/0x10 [ 15.039933] ? ktime_get_ts64+0x84/0x230 [ 15.039987] kunit_try_run_case+0x1a6/0x480 [ 15.040033] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.040105] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.040144] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.040187] ? __kthread_parkme+0x82/0x160 [ 15.040226] ? preempt_count_sub+0x50/0x80 [ 15.040294] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.040334] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.040381] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.040431] kthread+0x257/0x310 [ 15.040468] ? __pfx_kthread+0x10/0x10 [ 15.040525] ret_from_fork+0x41/0x80 [ 15.040564] ? __pfx_kthread+0x10/0x10 [ 15.040601] ret_from_fork_asm+0x1a/0x30 [ 15.040656] </TASK> [ 15.040690] [ 15.049294] Allocated by task 270: [ 15.049500] kasan_save_stack+0x45/0x70 [ 15.049772] kasan_save_track+0x18/0x40 [ 15.050030] kasan_save_alloc_info+0x3b/0x50 [ 15.050347] __kasan_kmalloc+0xb7/0xc0 [ 15.050576] __kmalloc_cache_noprof+0x168/0x350 [ 15.050830] kasan_atomics+0x96/0x310 [ 15.051147] kunit_try_run_case+0x1a6/0x480 [ 15.051467] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.051842] kthread+0x257/0x310 [ 15.052037] ret_from_fork+0x41/0x80 [ 15.052318] ret_from_fork_asm+0x1a/0x30 [ 15.052610] [ 15.052785] The buggy address belongs to the object at ffff888102635000 [ 15.052785] which belongs to the cache kmalloc-64 of size 64 [ 15.053345] The buggy address is located 0 bytes to the right of [ 15.053345] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.053955] [ 15.054183] The buggy address belongs to the physical page: [ 15.054513] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.054990] flags: 0x200000000000000(node=0|zone=2) [ 15.055313] page_type: f5(slab) [ 15.055575] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.055894] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.056215] page dumped because: kasan: bad access detected [ 15.056447] [ 15.056561] Memory state around the buggy address: [ 15.056867] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057377] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.057815] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.058304] ^ [ 15.058537] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059375] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.059633] ================================================================== [ 15.948736] ================================================================== [ 15.949291] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4fa7/0x5450 [ 15.949542] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.949895] [ 15.950113] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.950202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.950228] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.950272] Call Trace: [ 15.950311] <TASK> [ 15.950345] dump_stack_lvl+0x73/0xb0 [ 15.950401] print_report+0xd1/0x640 [ 15.950443] ? __virt_addr_valid+0x1db/0x2d0 [ 15.950488] ? kasan_atomics_helper+0x4fa7/0x5450 [ 15.950535] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.950582] ? kasan_atomics_helper+0x4fa7/0x5450 [ 15.950630] kasan_report+0x140/0x180 [ 15.950693] ? kasan_atomics_helper+0x4fa7/0x5450 [ 15.950753] __asan_report_load8_noabort+0x18/0x20 [ 15.950801] kasan_atomics_helper+0x4fa7/0x5450 [ 15.950853] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.950905] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.950964] kasan_atomics+0x1dd/0x310 [ 15.951009] ? __pfx_kasan_atomics+0x10/0x10 [ 15.951055] ? __pfx_read_tsc+0x10/0x10 [ 15.951095] ? ktime_get_ts64+0x84/0x230 [ 15.951149] kunit_try_run_case+0x1a6/0x480 [ 15.951198] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.951242] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.951283] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.951328] ? __kthread_parkme+0x82/0x160 [ 15.951367] ? preempt_count_sub+0x50/0x80 [ 15.951412] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.951451] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.951502] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.951553] kthread+0x257/0x310 [ 15.951606] ? __pfx_kthread+0x10/0x10 [ 15.951646] ret_from_fork+0x41/0x80 [ 15.951709] ? __pfx_kthread+0x10/0x10 [ 15.951749] ret_from_fork_asm+0x1a/0x30 [ 15.951807] </TASK> [ 15.951834] [ 15.960618] Allocated by task 270: [ 15.960842] kasan_save_stack+0x45/0x70 [ 15.961109] kasan_save_track+0x18/0x40 [ 15.961420] kasan_save_alloc_info+0x3b/0x50 [ 15.961749] __kasan_kmalloc+0xb7/0xc0 [ 15.961945] __kmalloc_cache_noprof+0x168/0x350 [ 15.962411] kasan_atomics+0x96/0x310 [ 15.962637] kunit_try_run_case+0x1a6/0x480 [ 15.962986] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.963510] kthread+0x257/0x310 [ 15.963755] ret_from_fork+0x41/0x80 [ 15.964052] ret_from_fork_asm+0x1a/0x30 [ 15.964318] [ 15.964435] The buggy address belongs to the object at ffff888102635000 [ 15.964435] which belongs to the cache kmalloc-64 of size 64 [ 15.965020] The buggy address is located 0 bytes to the right of [ 15.965020] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.965419] [ 15.965538] The buggy address belongs to the physical page: [ 15.965800] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.966361] flags: 0x200000000000000(node=0|zone=2) [ 15.966834] page_type: f5(slab) [ 15.967118] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.967583] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.967803] page dumped because: kasan: bad access detected [ 15.968110] [ 15.968295] Memory state around the buggy address: [ 15.968551] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.968907] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.969330] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.969754] ^ [ 15.970070] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.970323] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.970571] ================================================================== [ 15.560093] ================================================================== [ 15.560420] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x19e4/0x5450 [ 15.560927] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.561401] [ 15.561632] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.561735] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.561763] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.561802] Call Trace: [ 15.561835] <TASK> [ 15.561868] dump_stack_lvl+0x73/0xb0 [ 15.561945] print_report+0xd1/0x640 [ 15.562012] ? __virt_addr_valid+0x1db/0x2d0 [ 15.562060] ? kasan_atomics_helper+0x19e4/0x5450 [ 15.562103] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.562148] ? kasan_atomics_helper+0x19e4/0x5450 [ 15.562193] kasan_report+0x140/0x180 [ 15.562240] ? kasan_atomics_helper+0x19e4/0x5450 [ 15.562298] kasan_check_range+0x10c/0x1c0 [ 15.562344] __kasan_check_write+0x18/0x20 [ 15.562388] kasan_atomics_helper+0x19e4/0x5450 [ 15.562441] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.562489] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.562552] kasan_atomics+0x1dd/0x310 [ 15.562612] ? __pfx_kasan_atomics+0x10/0x10 [ 15.562659] ? __pfx_read_tsc+0x10/0x10 [ 15.562709] ? ktime_get_ts64+0x84/0x230 [ 15.562768] kunit_try_run_case+0x1a6/0x480 [ 15.562818] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.562862] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.562910] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.562958] ? __kthread_parkme+0x82/0x160 [ 15.562999] ? preempt_count_sub+0x50/0x80 [ 15.563058] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.563106] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.563154] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.563210] kthread+0x257/0x310 [ 15.563250] ? __pfx_kthread+0x10/0x10 [ 15.563305] ret_from_fork+0x41/0x80 [ 15.563352] ? __pfx_kthread+0x10/0x10 [ 15.563404] ret_from_fork_asm+0x1a/0x30 [ 15.563471] </TASK> [ 15.563500] [ 15.571602] Allocated by task 270: [ 15.571970] kasan_save_stack+0x45/0x70 [ 15.572418] kasan_save_track+0x18/0x40 [ 15.572757] kasan_save_alloc_info+0x3b/0x50 [ 15.573110] __kasan_kmalloc+0xb7/0xc0 [ 15.573443] __kmalloc_cache_noprof+0x168/0x350 [ 15.573808] kasan_atomics+0x96/0x310 [ 15.574179] kunit_try_run_case+0x1a6/0x480 [ 15.574531] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.574917] kthread+0x257/0x310 [ 15.575096] ret_from_fork+0x41/0x80 [ 15.575388] ret_from_fork_asm+0x1a/0x30 [ 15.575712] [ 15.575833] The buggy address belongs to the object at ffff888102635000 [ 15.575833] which belongs to the cache kmalloc-64 of size 64 [ 15.576374] The buggy address is located 0 bytes to the right of [ 15.576374] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.577096] [ 15.577253] The buggy address belongs to the physical page: [ 15.577451] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.577727] flags: 0x200000000000000(node=0|zone=2) [ 15.577939] page_type: f5(slab) [ 15.578204] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.578757] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.579368] page dumped because: kasan: bad access detected [ 15.579882] [ 15.580402] Memory state around the buggy address: [ 15.580940] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.582730] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.583372] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.583762] ^ [ 15.583936] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.584143] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.584561] ================================================================== [ 14.488851] ================================================================== [ 14.489437] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x3e0/0x5450 [ 14.489988] Read of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.490572] [ 14.490782] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.490886] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.490912] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.490944] Call Trace: [ 14.490976] <TASK> [ 14.491005] dump_stack_lvl+0x73/0xb0 [ 14.491069] print_report+0xd1/0x640 [ 14.491126] ? __virt_addr_valid+0x1db/0x2d0 [ 14.491558] ? kasan_atomics_helper+0x3e0/0x5450 [ 14.491635] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.491686] ? kasan_atomics_helper+0x3e0/0x5450 [ 14.491727] kasan_report+0x140/0x180 [ 14.491773] ? kasan_atomics_helper+0x3e0/0x5450 [ 14.491820] kasan_check_range+0x10c/0x1c0 [ 14.491866] __kasan_check_read+0x15/0x20 [ 14.491905] kasan_atomics_helper+0x3e0/0x5450 [ 14.491961] ? kasan_save_alloc_info+0x3b/0x50 [ 14.491990] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.492015] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.492041] kasan_atomics+0x1dd/0x310 [ 14.492079] ? __pfx_kasan_atomics+0x10/0x10 [ 14.492157] ? __pfx_read_tsc+0x10/0x10 [ 14.492188] ? ktime_get_ts64+0x84/0x230 [ 14.492227] kunit_try_run_case+0x1a6/0x480 [ 14.492250] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.492269] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.492291] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.492314] ? __kthread_parkme+0x82/0x160 [ 14.492333] ? preempt_count_sub+0x50/0x80 [ 14.492355] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.492374] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.492397] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.492422] kthread+0x257/0x310 [ 14.492439] ? __pfx_kthread+0x10/0x10 [ 14.492457] ret_from_fork+0x41/0x80 [ 14.492477] ? __pfx_kthread+0x10/0x10 [ 14.492494] ret_from_fork_asm+0x1a/0x30 [ 14.492523] </TASK> [ 14.492536] [ 14.503597] Allocated by task 270: [ 14.503914] kasan_save_stack+0x45/0x70 [ 14.504342] kasan_save_track+0x18/0x40 [ 14.504698] kasan_save_alloc_info+0x3b/0x50 [ 14.505089] __kasan_kmalloc+0xb7/0xc0 [ 14.505508] __kmalloc_cache_noprof+0x168/0x350 [ 14.505829] kasan_atomics+0x96/0x310 [ 14.506212] kunit_try_run_case+0x1a6/0x480 [ 14.506458] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.506869] kthread+0x257/0x310 [ 14.507232] ret_from_fork+0x41/0x80 [ 14.507413] ret_from_fork_asm+0x1a/0x30 [ 14.507741] [ 14.507928] The buggy address belongs to the object at ffff888102635000 [ 14.507928] which belongs to the cache kmalloc-64 of size 64 [ 14.508885] The buggy address is located 0 bytes to the right of [ 14.508885] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.509390] [ 14.509569] The buggy address belongs to the physical page: [ 14.510024] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.510582] flags: 0x200000000000000(node=0|zone=2) [ 14.510911] page_type: f5(slab) [ 14.511225] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.511638] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.512042] page dumped because: kasan: bad access detected [ 14.512403] [ 14.512532] Memory state around the buggy address: [ 14.512742] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.513274] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.513576] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.513802] ^ [ 14.514294] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.514857] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.515469] ================================================================== [ 15.683442] ================================================================== [ 15.683945] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x1ce2/0x5450 [ 15.684805] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.685109] [ 15.685245] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.685324] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.685348] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.685387] Call Trace: [ 15.685420] <TASK> [ 15.685454] dump_stack_lvl+0x73/0xb0 [ 15.685509] print_report+0xd1/0x640 [ 15.685553] ? __virt_addr_valid+0x1db/0x2d0 [ 15.685599] ? kasan_atomics_helper+0x1ce2/0x5450 [ 15.685645] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.685699] ? kasan_atomics_helper+0x1ce2/0x5450 [ 15.685746] kasan_report+0x140/0x180 [ 15.685793] ? kasan_atomics_helper+0x1ce2/0x5450 [ 15.685853] kasan_check_range+0x10c/0x1c0 [ 15.685898] __kasan_check_write+0x18/0x20 [ 15.685948] kasan_atomics_helper+0x1ce2/0x5450 [ 15.685991] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.686040] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.686135] kasan_atomics+0x1dd/0x310 [ 15.686181] ? __pfx_kasan_atomics+0x10/0x10 [ 15.686231] ? __pfx_read_tsc+0x10/0x10 [ 15.686275] ? ktime_get_ts64+0x84/0x230 [ 15.686333] kunit_try_run_case+0x1a6/0x480 [ 15.686383] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.686427] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.686476] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.686525] ? __kthread_parkme+0x82/0x160 [ 15.686563] ? preempt_count_sub+0x50/0x80 [ 15.686609] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.686648] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.686706] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.686758] kthread+0x257/0x310 [ 15.686798] ? __pfx_kthread+0x10/0x10 [ 15.686836] ret_from_fork+0x41/0x80 [ 15.686873] ? __pfx_kthread+0x10/0x10 [ 15.686906] ret_from_fork_asm+0x1a/0x30 [ 15.686962] </TASK> [ 15.686988] [ 15.694684] Allocated by task 270: [ 15.694995] kasan_save_stack+0x45/0x70 [ 15.695325] kasan_save_track+0x18/0x40 [ 15.695589] kasan_save_alloc_info+0x3b/0x50 [ 15.695884] __kasan_kmalloc+0xb7/0xc0 [ 15.696082] __kmalloc_cache_noprof+0x168/0x350 [ 15.696318] kasan_atomics+0x96/0x310 [ 15.696570] kunit_try_run_case+0x1a6/0x480 [ 15.696900] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.697291] kthread+0x257/0x310 [ 15.697541] ret_from_fork+0x41/0x80 [ 15.697828] ret_from_fork_asm+0x1a/0x30 [ 15.698099] [ 15.698211] The buggy address belongs to the object at ffff888102635000 [ 15.698211] which belongs to the cache kmalloc-64 of size 64 [ 15.698751] The buggy address is located 0 bytes to the right of [ 15.698751] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.699340] [ 15.699454] The buggy address belongs to the physical page: [ 15.699651] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.700177] flags: 0x200000000000000(node=0|zone=2) [ 15.700526] page_type: f5(slab) [ 15.700793] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.701162] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.701502] page dumped because: kasan: bad access detected [ 15.701777] [ 15.701938] Memory state around the buggy address: [ 15.702160] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.702402] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.702642] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.703129] ^ [ 15.703488] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.703968] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.704452] ================================================================== [ 15.799462] ================================================================== [ 15.800001] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x4f73/0x5450 [ 15.800541] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.801016] [ 15.801208] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.801294] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.801318] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.801353] Call Trace: [ 15.801390] <TASK> [ 15.801423] dump_stack_lvl+0x73/0xb0 [ 15.801483] print_report+0xd1/0x640 [ 15.801531] ? __virt_addr_valid+0x1db/0x2d0 [ 15.801584] ? kasan_atomics_helper+0x4f73/0x5450 [ 15.801636] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.801695] ? kasan_atomics_helper+0x4f73/0x5450 [ 15.801739] kasan_report+0x140/0x180 [ 15.801786] ? kasan_atomics_helper+0x4f73/0x5450 [ 15.801861] __asan_report_load8_noabort+0x18/0x20 [ 15.801916] kasan_atomics_helper+0x4f73/0x5450 [ 15.801989] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.802042] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.802135] kasan_atomics+0x1dd/0x310 [ 15.802177] ? __pfx_kasan_atomics+0x10/0x10 [ 15.802218] ? __pfx_read_tsc+0x10/0x10 [ 15.802250] ? ktime_get_ts64+0x84/0x230 [ 15.802301] kunit_try_run_case+0x1a6/0x480 [ 15.802346] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.802407] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.802454] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.802507] ? __kthread_parkme+0x82/0x160 [ 15.802551] ? preempt_count_sub+0x50/0x80 [ 15.802598] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.802639] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.802704] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.802761] kthread+0x257/0x310 [ 15.802802] ? __pfx_kthread+0x10/0x10 [ 15.802839] ret_from_fork+0x41/0x80 [ 15.802876] ? __pfx_kthread+0x10/0x10 [ 15.802915] ret_from_fork_asm+0x1a/0x30 [ 15.802973] </TASK> [ 15.802997] [ 15.811259] Allocated by task 270: [ 15.811483] kasan_save_stack+0x45/0x70 [ 15.811839] kasan_save_track+0x18/0x40 [ 15.812156] kasan_save_alloc_info+0x3b/0x50 [ 15.812424] __kasan_kmalloc+0xb7/0xc0 [ 15.812607] __kmalloc_cache_noprof+0x168/0x350 [ 15.812978] kasan_atomics+0x96/0x310 [ 15.813302] kunit_try_run_case+0x1a6/0x480 [ 15.813615] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.814038] kthread+0x257/0x310 [ 15.814266] ret_from_fork+0x41/0x80 [ 15.814470] ret_from_fork_asm+0x1a/0x30 [ 15.814681] [ 15.814805] The buggy address belongs to the object at ffff888102635000 [ 15.814805] which belongs to the cache kmalloc-64 of size 64 [ 15.815598] The buggy address is located 0 bytes to the right of [ 15.815598] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.816446] [ 15.816600] The buggy address belongs to the physical page: [ 15.816835] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.817389] flags: 0x200000000000000(node=0|zone=2) [ 15.817625] page_type: f5(slab) [ 15.817831] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.818180] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.818459] page dumped because: kasan: bad access detected [ 15.818712] [ 15.818871] Memory state around the buggy address: [ 15.819239] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.819733] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.820227] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.820717] ^ [ 15.821089] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.821449] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.821858] ================================================================== [ 15.822758] ================================================================== [ 15.823320] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x2007/0x5450 [ 15.823693] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.824113] [ 15.824279] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.824365] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.824392] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.824450] Call Trace: [ 15.824488] <TASK> [ 15.824524] dump_stack_lvl+0x73/0xb0 [ 15.824584] print_report+0xd1/0x640 [ 15.824630] ? __virt_addr_valid+0x1db/0x2d0 [ 15.824687] ? kasan_atomics_helper+0x2007/0x5450 [ 15.824751] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.824799] ? kasan_atomics_helper+0x2007/0x5450 [ 15.824843] kasan_report+0x140/0x180 [ 15.824907] ? kasan_atomics_helper+0x2007/0x5450 [ 15.824964] kasan_check_range+0x10c/0x1c0 [ 15.825011] __kasan_check_write+0x18/0x20 [ 15.825083] kasan_atomics_helper+0x2007/0x5450 [ 15.825132] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.825182] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.825252] kasan_atomics+0x1dd/0x310 [ 15.825296] ? __pfx_kasan_atomics+0x10/0x10 [ 15.825341] ? __pfx_read_tsc+0x10/0x10 [ 15.825395] ? ktime_get_ts64+0x84/0x230 [ 15.825450] kunit_try_run_case+0x1a6/0x480 [ 15.825496] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.825537] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.825583] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.825631] ? __kthread_parkme+0x82/0x160 [ 15.825677] ? preempt_count_sub+0x50/0x80 [ 15.825723] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.825765] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.825832] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.825883] kthread+0x257/0x310 [ 15.825938] ? __pfx_kthread+0x10/0x10 [ 15.825983] ret_from_fork+0x41/0x80 [ 15.826030] ? __pfx_kthread+0x10/0x10 [ 15.826116] ret_from_fork_asm+0x1a/0x30 [ 15.826176] </TASK> [ 15.826202] [ 15.834285] Allocated by task 270: [ 15.834535] kasan_save_stack+0x45/0x70 [ 15.834886] kasan_save_track+0x18/0x40 [ 15.835183] kasan_save_alloc_info+0x3b/0x50 [ 15.835520] __kasan_kmalloc+0xb7/0xc0 [ 15.835812] __kmalloc_cache_noprof+0x168/0x350 [ 15.836172] kasan_atomics+0x96/0x310 [ 15.836486] kunit_try_run_case+0x1a6/0x480 [ 15.836729] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.836963] kthread+0x257/0x310 [ 15.837287] ret_from_fork+0x41/0x80 [ 15.837587] ret_from_fork_asm+0x1a/0x30 [ 15.837885] [ 15.838101] The buggy address belongs to the object at ffff888102635000 [ 15.838101] which belongs to the cache kmalloc-64 of size 64 [ 15.838742] The buggy address is located 0 bytes to the right of [ 15.838742] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.839291] [ 15.839445] The buggy address belongs to the physical page: [ 15.839728] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.840269] flags: 0x200000000000000(node=0|zone=2) [ 15.840620] page_type: f5(slab) [ 15.840904] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.841446] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.841997] page dumped because: kasan: bad access detected [ 15.842465] [ 15.842674] Memory state around the buggy address: [ 15.843009] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.843380] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.843906] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.844316] ^ [ 15.844673] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.845102] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.845474] ================================================================== [ 14.698995] ================================================================== [ 14.699514] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x7c8/0x5450 [ 14.699809] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.700060] [ 14.700184] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.700265] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.700292] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.700332] Call Trace: [ 14.700364] <TASK> [ 14.700395] dump_stack_lvl+0x73/0xb0 [ 14.700447] print_report+0xd1/0x640 [ 14.700495] ? __virt_addr_valid+0x1db/0x2d0 [ 14.700542] ? kasan_atomics_helper+0x7c8/0x5450 [ 14.700589] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.700636] ? kasan_atomics_helper+0x7c8/0x5450 [ 14.700689] kasan_report+0x140/0x180 [ 14.700730] ? kasan_atomics_helper+0x7c8/0x5450 [ 14.700784] kasan_check_range+0x10c/0x1c0 [ 14.700828] __kasan_check_write+0x18/0x20 [ 14.700870] kasan_atomics_helper+0x7c8/0x5450 [ 14.700916] ? kasan_save_alloc_info+0x3b/0x50 [ 14.700959] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.701009] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.701066] kasan_atomics+0x1dd/0x310 [ 14.701109] ? __pfx_kasan_atomics+0x10/0x10 [ 14.701155] ? __pfx_read_tsc+0x10/0x10 [ 14.701195] ? ktime_get_ts64+0x84/0x230 [ 14.701250] kunit_try_run_case+0x1a6/0x480 [ 14.701289] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701331] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.701374] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.701424] ? __kthread_parkme+0x82/0x160 [ 14.701458] ? preempt_count_sub+0x50/0x80 [ 14.701520] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.701560] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.701606] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.701658] kthread+0x257/0x310 [ 14.701711] ? __pfx_kthread+0x10/0x10 [ 14.701754] ret_from_fork+0x41/0x80 [ 14.701797] ? __pfx_kthread+0x10/0x10 [ 14.701839] ret_from_fork_asm+0x1a/0x30 [ 14.701911] </TASK> [ 14.701938] [ 14.714773] Allocated by task 270: [ 14.714988] kasan_save_stack+0x45/0x70 [ 14.715197] kasan_save_track+0x18/0x40 [ 14.715362] kasan_save_alloc_info+0x3b/0x50 [ 14.715519] __kasan_kmalloc+0xb7/0xc0 [ 14.715691] __kmalloc_cache_noprof+0x168/0x350 [ 14.716028] kasan_atomics+0x96/0x310 [ 14.716634] kunit_try_run_case+0x1a6/0x480 [ 14.717002] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.717344] kthread+0x257/0x310 [ 14.717555] ret_from_fork+0x41/0x80 [ 14.717786] ret_from_fork_asm+0x1a/0x30 [ 14.718129] [ 14.718313] The buggy address belongs to the object at ffff888102635000 [ 14.718313] which belongs to the cache kmalloc-64 of size 64 [ 14.718830] The buggy address is located 0 bytes to the right of [ 14.718830] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.719476] [ 14.719645] The buggy address belongs to the physical page: [ 14.719962] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.720368] flags: 0x200000000000000(node=0|zone=2) [ 14.720676] page_type: f5(slab) [ 14.720883] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.721379] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.721843] page dumped because: kasan: bad access detected [ 14.722128] [ 14.722308] Memory state around the buggy address: [ 14.722534] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.722893] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.723395] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.723707] ^ [ 14.724050] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.724503] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.724934] ================================================================== [ 14.725852] ================================================================== [ 14.726372] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x861/0x5450 [ 14.726778] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.727148] [ 14.727333] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.727426] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.727451] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.727506] Call Trace: [ 14.727544] <TASK> [ 14.727574] dump_stack_lvl+0x73/0xb0 [ 14.727632] print_report+0xd1/0x640 [ 14.727689] ? __virt_addr_valid+0x1db/0x2d0 [ 14.727750] ? kasan_atomics_helper+0x861/0x5450 [ 14.727792] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.727835] ? kasan_atomics_helper+0x861/0x5450 [ 14.727877] kasan_report+0x140/0x180 [ 14.727933] ? kasan_atomics_helper+0x861/0x5450 [ 14.728001] kasan_check_range+0x10c/0x1c0 [ 14.728042] __kasan_check_write+0x18/0x20 [ 14.728121] kasan_atomics_helper+0x861/0x5450 [ 14.728181] ? kasan_save_alloc_info+0x3b/0x50 [ 14.728223] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.728270] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.728322] kasan_atomics+0x1dd/0x310 [ 14.728372] ? __pfx_kasan_atomics+0x10/0x10 [ 14.728430] ? __pfx_read_tsc+0x10/0x10 [ 14.728470] ? ktime_get_ts64+0x84/0x230 [ 14.728521] kunit_try_run_case+0x1a6/0x480 [ 14.728574] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.728614] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.728679] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.728732] ? __kthread_parkme+0x82/0x160 [ 14.728775] ? preempt_count_sub+0x50/0x80 [ 14.728819] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.728860] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.728919] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.728973] kthread+0x257/0x310 [ 14.729029] ? __pfx_kthread+0x10/0x10 [ 14.729098] ret_from_fork+0x41/0x80 [ 14.729136] ? __pfx_kthread+0x10/0x10 [ 14.729167] ret_from_fork_asm+0x1a/0x30 [ 14.729199] </TASK> [ 14.729213] [ 14.740197] Allocated by task 270: [ 14.740495] kasan_save_stack+0x45/0x70 [ 14.740823] kasan_save_track+0x18/0x40 [ 14.741079] kasan_save_alloc_info+0x3b/0x50 [ 14.741271] __kasan_kmalloc+0xb7/0xc0 [ 14.741436] __kmalloc_cache_noprof+0x168/0x350 [ 14.741913] kasan_atomics+0x96/0x310 [ 14.742311] kunit_try_run_case+0x1a6/0x480 [ 14.742824] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.743260] kthread+0x257/0x310 [ 14.743527] ret_from_fork+0x41/0x80 [ 14.743724] ret_from_fork_asm+0x1a/0x30 [ 14.744128] [ 14.744304] The buggy address belongs to the object at ffff888102635000 [ 14.744304] which belongs to the cache kmalloc-64 of size 64 [ 14.745109] The buggy address is located 0 bytes to the right of [ 14.745109] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.745693] [ 14.745849] The buggy address belongs to the physical page: [ 14.746154] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.746602] flags: 0x200000000000000(node=0|zone=2) [ 14.747038] page_type: f5(slab) [ 14.747361] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.747603] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.748089] page dumped because: kasan: bad access detected [ 14.748447] [ 14.748600] Memory state around the buggy address: [ 14.748870] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749302] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.749679] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.750011] ^ [ 14.750422] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.750791] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.751228] ================================================================== [ 15.511600] ================================================================== [ 15.512071] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x18b2/0x5450 [ 15.512755] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.513111] [ 15.513343] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.513496] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.513524] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.513579] Call Trace: [ 15.513619] <TASK> [ 15.513651] dump_stack_lvl+0x73/0xb0 [ 15.513723] print_report+0xd1/0x640 [ 15.513767] ? __virt_addr_valid+0x1db/0x2d0 [ 15.513849] ? kasan_atomics_helper+0x18b2/0x5450 [ 15.513919] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.513972] ? kasan_atomics_helper+0x18b2/0x5450 [ 15.514027] kasan_report+0x140/0x180 [ 15.514075] ? kasan_atomics_helper+0x18b2/0x5450 [ 15.514152] kasan_check_range+0x10c/0x1c0 [ 15.514196] __kasan_check_write+0x18/0x20 [ 15.514264] kasan_atomics_helper+0x18b2/0x5450 [ 15.514325] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.514377] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.514418] kasan_atomics+0x1dd/0x310 [ 15.514441] ? __pfx_kasan_atomics+0x10/0x10 [ 15.514463] ? __pfx_read_tsc+0x10/0x10 [ 15.514483] ? ktime_get_ts64+0x84/0x230 [ 15.514512] kunit_try_run_case+0x1a6/0x480 [ 15.514535] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514555] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.514577] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.514603] ? __kthread_parkme+0x82/0x160 [ 15.514624] ? preempt_count_sub+0x50/0x80 [ 15.514647] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.514686] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.514717] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.514744] kthread+0x257/0x310 [ 15.514763] ? __pfx_kthread+0x10/0x10 [ 15.514782] ret_from_fork+0x41/0x80 [ 15.514803] ? __pfx_kthread+0x10/0x10 [ 15.514821] ret_from_fork_asm+0x1a/0x30 [ 15.514852] </TASK> [ 15.514865] [ 15.523550] Allocated by task 270: [ 15.523807] kasan_save_stack+0x45/0x70 [ 15.524151] kasan_save_track+0x18/0x40 [ 15.524393] kasan_save_alloc_info+0x3b/0x50 [ 15.524705] __kasan_kmalloc+0xb7/0xc0 [ 15.524970] __kmalloc_cache_noprof+0x168/0x350 [ 15.525408] kasan_atomics+0x96/0x310 [ 15.525608] kunit_try_run_case+0x1a6/0x480 [ 15.525854] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.526304] kthread+0x257/0x310 [ 15.526627] ret_from_fork+0x41/0x80 [ 15.526844] ret_from_fork_asm+0x1a/0x30 [ 15.527255] [ 15.527371] The buggy address belongs to the object at ffff888102635000 [ 15.527371] which belongs to the cache kmalloc-64 of size 64 [ 15.528077] The buggy address is located 0 bytes to the right of [ 15.528077] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.528615] [ 15.528741] The buggy address belongs to the physical page: [ 15.528994] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.529662] flags: 0x200000000000000(node=0|zone=2) [ 15.530060] page_type: f5(slab) [ 15.530430] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.530883] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.531142] page dumped because: kasan: bad access detected [ 15.531347] [ 15.531540] Memory state around the buggy address: [ 15.531887] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532425] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.532930] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.533273] ^ [ 15.533544] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.534122] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.534538] ================================================================== [ 16.000156] ================================================================== [ 16.000550] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x5117/0x5450 [ 16.001103] Read of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 16.001630] [ 16.001860] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 16.001964] Tainted: [B]=BAD_PAGE, [N]=TEST [ 16.001992] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 16.002082] Call Trace: [ 16.002127] <TASK> [ 16.002164] dump_stack_lvl+0x73/0xb0 [ 16.002224] print_report+0xd1/0x640 [ 16.002289] ? __virt_addr_valid+0x1db/0x2d0 [ 16.002345] ? kasan_atomics_helper+0x5117/0x5450 [ 16.002387] ? kasan_complete_mode_report_info+0x2a/0x200 [ 16.002431] ? kasan_atomics_helper+0x5117/0x5450 [ 16.002478] kasan_report+0x140/0x180 [ 16.002528] ? kasan_atomics_helper+0x5117/0x5450 [ 16.002587] __asan_report_load8_noabort+0x18/0x20 [ 16.002633] kasan_atomics_helper+0x5117/0x5450 [ 16.002686] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 16.002717] ? __kmalloc_cache_noprof+0x168/0x350 [ 16.002746] kasan_atomics+0x1dd/0x310 [ 16.002767] ? __pfx_kasan_atomics+0x10/0x10 [ 16.002789] ? __pfx_read_tsc+0x10/0x10 [ 16.002809] ? ktime_get_ts64+0x84/0x230 [ 16.002837] kunit_try_run_case+0x1a6/0x480 [ 16.002861] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.002880] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 16.002902] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 16.002927] ? __kthread_parkme+0x82/0x160 [ 16.002947] ? preempt_count_sub+0x50/0x80 [ 16.002971] ? __pfx_kunit_try_run_case+0x10/0x10 [ 16.002991] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 16.003016] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.003042] kthread+0x257/0x310 [ 16.003082] ? __pfx_kthread+0x10/0x10 [ 16.003135] ret_from_fork+0x41/0x80 [ 16.003157] ? __pfx_kthread+0x10/0x10 [ 16.003176] ret_from_fork_asm+0x1a/0x30 [ 16.003207] </TASK> [ 16.003221] [ 16.012777] Allocated by task 270: [ 16.013012] kasan_save_stack+0x45/0x70 [ 16.013477] kasan_save_track+0x18/0x40 [ 16.013869] kasan_save_alloc_info+0x3b/0x50 [ 16.014222] __kasan_kmalloc+0xb7/0xc0 [ 16.014524] __kmalloc_cache_noprof+0x168/0x350 [ 16.014988] kasan_atomics+0x96/0x310 [ 16.015338] kunit_try_run_case+0x1a6/0x480 [ 16.015716] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 16.016052] kthread+0x257/0x310 [ 16.016323] ret_from_fork+0x41/0x80 [ 16.016589] ret_from_fork_asm+0x1a/0x30 [ 16.016891] [ 16.017132] The buggy address belongs to the object at ffff888102635000 [ 16.017132] which belongs to the cache kmalloc-64 of size 64 [ 16.017902] The buggy address is located 0 bytes to the right of [ 16.017902] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 16.018582] [ 16.018768] The buggy address belongs to the physical page: [ 16.019090] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 16.019556] flags: 0x200000000000000(node=0|zone=2) [ 16.019900] page_type: f5(slab) [ 16.020213] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 16.020578] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 16.020883] page dumped because: kasan: bad access detected [ 16.021257] [ 16.021428] Memory state around the buggy address: [ 16.021798] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.022284] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.022740] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 16.023094] ^ [ 16.023455] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.023805] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 16.024235] ================================================================== [ 15.359792] ================================================================== [ 15.360380] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x151e/0x5450 [ 15.360708] Write of size 8 at addr ffff888102635030 by task kunit_try_catch/270 [ 15.360961] [ 15.361115] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 15.361202] Tainted: [B]=BAD_PAGE, [N]=TEST [ 15.361230] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 15.361275] Call Trace: [ 15.361315] <TASK> [ 15.361352] dump_stack_lvl+0x73/0xb0 [ 15.361402] print_report+0xd1/0x640 [ 15.361445] ? __virt_addr_valid+0x1db/0x2d0 [ 15.361482] ? kasan_atomics_helper+0x151e/0x5450 [ 15.361518] ? kasan_complete_mode_report_info+0x2a/0x200 [ 15.361559] ? kasan_atomics_helper+0x151e/0x5450 [ 15.361603] kasan_report+0x140/0x180 [ 15.361688] ? kasan_atomics_helper+0x151e/0x5450 [ 15.361744] kasan_check_range+0x10c/0x1c0 [ 15.361788] __kasan_check_write+0x18/0x20 [ 15.361828] kasan_atomics_helper+0x151e/0x5450 [ 15.361879] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 15.361944] ? __kmalloc_cache_noprof+0x168/0x350 [ 15.362009] kasan_atomics+0x1dd/0x310 [ 15.362107] ? __pfx_kasan_atomics+0x10/0x10 [ 15.362165] ? __pfx_read_tsc+0x10/0x10 [ 15.362204] ? ktime_get_ts64+0x84/0x230 [ 15.362254] kunit_try_run_case+0x1a6/0x480 [ 15.362301] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362338] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 15.362384] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 15.362437] ? __kthread_parkme+0x82/0x160 [ 15.362481] ? preempt_count_sub+0x50/0x80 [ 15.362534] ? __pfx_kunit_try_run_case+0x10/0x10 [ 15.362578] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 15.362631] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.362696] kthread+0x257/0x310 [ 15.362735] ? __pfx_kthread+0x10/0x10 [ 15.362775] ret_from_fork+0x41/0x80 [ 15.362807] ? __pfx_kthread+0x10/0x10 [ 15.362838] ret_from_fork_asm+0x1a/0x30 [ 15.362897] </TASK> [ 15.362922] [ 15.371760] Allocated by task 270: [ 15.372098] kasan_save_stack+0x45/0x70 [ 15.372356] kasan_save_track+0x18/0x40 [ 15.372621] kasan_save_alloc_info+0x3b/0x50 [ 15.372932] __kasan_kmalloc+0xb7/0xc0 [ 15.373213] __kmalloc_cache_noprof+0x168/0x350 [ 15.373499] kasan_atomics+0x96/0x310 [ 15.373809] kunit_try_run_case+0x1a6/0x480 [ 15.374087] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 15.374423] kthread+0x257/0x310 [ 15.374691] ret_from_fork+0x41/0x80 [ 15.374907] ret_from_fork_asm+0x1a/0x30 [ 15.375212] [ 15.375378] The buggy address belongs to the object at ffff888102635000 [ 15.375378] which belongs to the cache kmalloc-64 of size 64 [ 15.375840] The buggy address is located 0 bytes to the right of [ 15.375840] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 15.376546] [ 15.376728] The buggy address belongs to the physical page: [ 15.377028] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 15.377463] flags: 0x200000000000000(node=0|zone=2) [ 15.377729] page_type: f5(slab) [ 15.377894] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 15.378345] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 15.378864] page dumped because: kasan: bad access detected [ 15.379245] [ 15.379352] Memory state around the buggy address: [ 15.379537] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.379941] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.380464] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 15.380890] ^ [ 15.381112] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381351] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 15.381581] ================================================================== [ 14.752298] ================================================================== [ 14.752747] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0x8fa/0x5450 [ 14.753147] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.753475] [ 14.753803] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.753897] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.753928] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.753963] Call Trace: [ 14.753992] <TASK> [ 14.754017] dump_stack_lvl+0x73/0xb0 [ 14.754076] print_report+0xd1/0x640 [ 14.754110] ? __virt_addr_valid+0x1db/0x2d0 [ 14.754143] ? kasan_atomics_helper+0x8fa/0x5450 [ 14.754175] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.754208] ? kasan_atomics_helper+0x8fa/0x5450 [ 14.754245] kasan_report+0x140/0x180 [ 14.754275] ? kasan_atomics_helper+0x8fa/0x5450 [ 14.754304] kasan_check_range+0x10c/0x1c0 [ 14.754327] __kasan_check_write+0x18/0x20 [ 14.754349] kasan_atomics_helper+0x8fa/0x5450 [ 14.754373] ? kasan_save_alloc_info+0x3b/0x50 [ 14.754395] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.754424] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.754453] kasan_atomics+0x1dd/0x310 [ 14.754474] ? __pfx_kasan_atomics+0x10/0x10 [ 14.754497] ? __pfx_read_tsc+0x10/0x10 [ 14.754517] ? ktime_get_ts64+0x84/0x230 [ 14.754545] kunit_try_run_case+0x1a6/0x480 [ 14.754569] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.754590] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.754613] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.754639] ? __kthread_parkme+0x82/0x160 [ 14.754660] ? preempt_count_sub+0x50/0x80 [ 14.754715] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.754751] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.754798] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.754845] kthread+0x257/0x310 [ 14.754885] ? __pfx_kthread+0x10/0x10 [ 14.754926] ret_from_fork+0x41/0x80 [ 14.754966] ? __pfx_kthread+0x10/0x10 [ 14.755002] ret_from_fork_asm+0x1a/0x30 [ 14.755063] </TASK> [ 14.755088] [ 14.763383] Allocated by task 270: [ 14.763652] kasan_save_stack+0x45/0x70 [ 14.764003] kasan_save_track+0x18/0x40 [ 14.764247] kasan_save_alloc_info+0x3b/0x50 [ 14.764490] __kasan_kmalloc+0xb7/0xc0 [ 14.764775] __kmalloc_cache_noprof+0x168/0x350 [ 14.765086] kasan_atomics+0x96/0x310 [ 14.765392] kunit_try_run_case+0x1a6/0x480 [ 14.765730] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.765970] kthread+0x257/0x310 [ 14.766297] ret_from_fork+0x41/0x80 [ 14.766526] ret_from_fork_asm+0x1a/0x30 [ 14.766831] [ 14.766980] The buggy address belongs to the object at ffff888102635000 [ 14.766980] which belongs to the cache kmalloc-64 of size 64 [ 14.767647] The buggy address is located 0 bytes to the right of [ 14.767647] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.768351] [ 14.768501] The buggy address belongs to the physical page: [ 14.768790] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.769294] flags: 0x200000000000000(node=0|zone=2) [ 14.769595] page_type: f5(slab) [ 14.769855] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.770276] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.770698] page dumped because: kasan: bad access detected [ 14.771024] [ 14.771228] Memory state around the buggy address: [ 14.771483] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.771873] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.772331] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.772694] ^ [ 14.772942] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.773209] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.773441] ================================================================== [ 14.965383] ================================================================== [ 14.965744] BUG: KASAN: slab-out-of-bounds in kasan_atomics_helper+0xe79/0x5450 [ 14.966035] Write of size 4 at addr ffff888102635030 by task kunit_try_catch/270 [ 14.966579] [ 14.966765] CPU: 0 UID: 0 PID: 270 Comm: kunit_try_catch Tainted: G B N 6.12.32-rc1 #1 [ 14.966853] Tainted: [B]=BAD_PAGE, [N]=TEST [ 14.966877] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014 [ 14.966916] Call Trace: [ 14.966949] <TASK> [ 14.967002] dump_stack_lvl+0x73/0xb0 [ 14.967099] print_report+0xd1/0x640 [ 14.967143] ? __virt_addr_valid+0x1db/0x2d0 [ 14.967187] ? kasan_atomics_helper+0xe79/0x5450 [ 14.967227] ? kasan_complete_mode_report_info+0x2a/0x200 [ 14.967271] ? kasan_atomics_helper+0xe79/0x5450 [ 14.967332] kasan_report+0x140/0x180 [ 14.967388] ? kasan_atomics_helper+0xe79/0x5450 [ 14.967443] kasan_check_range+0x10c/0x1c0 [ 14.967489] __kasan_check_write+0x18/0x20 [ 14.967532] kasan_atomics_helper+0xe79/0x5450 [ 14.967577] ? __pfx_kasan_atomics_helper+0x10/0x10 [ 14.967627] ? __kmalloc_cache_noprof+0x168/0x350 [ 14.967693] kasan_atomics+0x1dd/0x310 [ 14.967739] ? __pfx_kasan_atomics+0x10/0x10 [ 14.967784] ? __pfx_read_tsc+0x10/0x10 [ 14.967818] ? ktime_get_ts64+0x84/0x230 [ 14.967850] kunit_try_run_case+0x1a6/0x480 [ 14.967874] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.967894] ? _raw_spin_lock_irqsave+0xa2/0x110 [ 14.967916] ? _raw_spin_unlock_irqrestore+0x5f/0x90 [ 14.967941] ? __kthread_parkme+0x82/0x160 [ 14.967961] ? preempt_count_sub+0x50/0x80 [ 14.967983] ? __pfx_kunit_try_run_case+0x10/0x10 [ 14.968003] ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10 [ 14.968028] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.968068] kthread+0x257/0x310 [ 14.968125] ? __pfx_kthread+0x10/0x10 [ 14.968145] ret_from_fork+0x41/0x80 [ 14.968166] ? __pfx_kthread+0x10/0x10 [ 14.968186] ret_from_fork_asm+0x1a/0x30 [ 14.968216] </TASK> [ 14.968230] [ 14.977918] Allocated by task 270: [ 14.978239] kasan_save_stack+0x45/0x70 [ 14.978491] kasan_save_track+0x18/0x40 [ 14.978711] kasan_save_alloc_info+0x3b/0x50 [ 14.978947] __kasan_kmalloc+0xb7/0xc0 [ 14.979206] __kmalloc_cache_noprof+0x168/0x350 [ 14.979442] kasan_atomics+0x96/0x310 [ 14.979762] kunit_try_run_case+0x1a6/0x480 [ 14.979984] kunit_generic_run_threadfn_adapter+0x85/0xf0 [ 14.980224] kthread+0x257/0x310 [ 14.980382] ret_from_fork+0x41/0x80 [ 14.980550] ret_from_fork_asm+0x1a/0x30 [ 14.980835] [ 14.981029] The buggy address belongs to the object at ffff888102635000 [ 14.981029] which belongs to the cache kmalloc-64 of size 64 [ 14.981949] The buggy address is located 0 bytes to the right of [ 14.981949] allocated 48-byte region [ffff888102635000, ffff888102635030) [ 14.982818] [ 14.982995] The buggy address belongs to the physical page: [ 14.983412] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102635 [ 14.983899] flags: 0x200000000000000(node=0|zone=2) [ 14.984324] page_type: f5(slab) [ 14.984494] raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000 [ 14.984814] raw: 0000000000000000 0000000080200020 00000001f5000000 0000000000000000 [ 14.985443] page dumped because: kasan: bad access detected [ 14.985756] [ 14.985863] Memory state around the buggy address: [ 14.986118] ffff888102634f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.986619] ffff888102634f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.987192] >ffff888102635000: 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc fc [ 14.987601] ^ [ 14.987816] ffff888102635080: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988163] ffff888102635100: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 14.988656] ==================================================================